Hay
Date
May 13, 2025, 12:07 p.m.

Environment
qemu-arm64
qemu-x86_64

[   22.083925] ==================================================================
[   22.084026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   22.084521] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.086015] 
[   22.086107] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.086221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.086256] Hardware name: linux,dummy-virt (DT)
[   22.086296] Call trace:
[   22.086328]  show_stack+0x20/0x38 (C)
[   22.086396]  dump_stack_lvl+0x8c/0xd0
[   22.086465]  print_report+0x118/0x608
[   22.086524]  kasan_report+0xdc/0x128
[   22.086581]  kasan_check_range+0x100/0x1a8
[   22.086637]  __kasan_check_write+0x20/0x30
[   22.086693]  kasan_atomics_helper+0x154c/0x4858
[   22.086751]  kasan_atomics+0x198/0x2e0
[   22.086806]  kunit_try_run_case+0x170/0x3f0
[   22.086863]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.086925]  kthread+0x328/0x630
[   22.086988]  ret_from_fork+0x10/0x20
[   22.087052] 
[   22.087077] Allocated by task 265:
[   22.087113]  kasan_save_stack+0x3c/0x68
[   22.088819]  kasan_save_track+0x20/0x40
[   22.088930]  kasan_save_alloc_info+0x40/0x58
[   22.089037]  __kasan_kmalloc+0xd4/0xd8
[   22.089117]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.089166]  kasan_atomics+0xb8/0x2e0
[   22.089224]  kunit_try_run_case+0x170/0x3f0
[   22.089325]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.089428]  kthread+0x328/0x630
[   22.089526]  ret_from_fork+0x10/0x20
[   22.089572] 
[   22.089605] The buggy address belongs to the object at fff00000c59de300
[   22.089605]  which belongs to the cache kmalloc-64 of size 64
[   22.089685] The buggy address is located 0 bytes to the right of
[   22.089685]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.089759] 
[   22.089786] The buggy address belongs to the physical page:
[   22.089850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.089918] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.090021] page_type: f5(slab)
[   22.090076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.090135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.090185] page dumped because: kasan: bad access detected
[   22.090225] 
[   22.090249] Memory state around the buggy address:
[   22.090290]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.090370]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.090423] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.090491]                                      ^
[   22.090557]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.090612]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.090672] ==================================================================
[   22.091569] ==================================================================
[   22.091648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   22.091727] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.091787] 
[   22.091830] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.091927] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.091960] Hardware name: linux,dummy-virt (DT)
[   22.092018] Call trace:
[   22.092049]  show_stack+0x20/0x38 (C)
[   22.092109]  dump_stack_lvl+0x8c/0xd0
[   22.092164]  print_report+0x118/0x608
[   22.092216]  kasan_report+0xdc/0x128
[   22.092270]  kasan_check_range+0x100/0x1a8
[   22.092323]  __kasan_check_write+0x20/0x30
[   22.092376]  kasan_atomics_helper+0x15b4/0x4858
[   22.092439]  kasan_atomics+0x198/0x2e0
[   22.092551]  kunit_try_run_case+0x170/0x3f0
[   22.092670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.092731]  kthread+0x328/0x630
[   22.092784]  ret_from_fork+0x10/0x20
[   22.092841] 
[   22.092866] Allocated by task 265:
[   22.092902]  kasan_save_stack+0x3c/0x68
[   22.092953]  kasan_save_track+0x20/0x40
[   22.093014]  kasan_save_alloc_info+0x40/0x58
[   22.093062]  __kasan_kmalloc+0xd4/0xd8
[   22.093105]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.093151]  kasan_atomics+0xb8/0x2e0
[   22.093220]  kunit_try_run_case+0x170/0x3f0
[   22.093277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.093338]  kthread+0x328/0x630
[   22.093391]  ret_from_fork+0x10/0x20
[   22.093445] 
[   22.094009] The buggy address belongs to the object at fff00000c59de300
[   22.094009]  which belongs to the cache kmalloc-64 of size 64
[   22.094085] The buggy address is located 0 bytes to the right of
[   22.094085]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.094161] 
[   22.094707] The buggy address belongs to the physical page:
[   22.094805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.094876] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.095175] page_type: f5(slab)
[   22.095256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.095325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.095376] page dumped because: kasan: bad access detected
[   22.095425] 
[   22.095457] Memory state around the buggy address:
[   22.095508]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.095561]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.096014] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.096100]                                      ^
[   22.096169]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.096264]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.096344] ==================================================================
[   21.835378] ==================================================================
[   21.835462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   21.835544] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.835606] 
[   21.835652] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.835758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.835795] Hardware name: linux,dummy-virt (DT)
[   21.835878] Call trace:
[   21.835917]  show_stack+0x20/0x38 (C)
[   21.835993]  dump_stack_lvl+0x8c/0xd0
[   21.836056]  print_report+0x118/0x608
[   21.836135]  kasan_report+0xdc/0x128
[   21.836198]  __asan_report_load4_noabort+0x20/0x30
[   21.836261]  kasan_atomics_helper+0x3dcc/0x4858
[   21.836324]  kasan_atomics+0x198/0x2e0
[   21.836376]  kunit_try_run_case+0x170/0x3f0
[   21.836455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.836527]  kthread+0x328/0x630
[   21.836583]  ret_from_fork+0x10/0x20
[   21.836643] 
[   21.836670] Allocated by task 265:
[   21.836708]  kasan_save_stack+0x3c/0x68
[   21.836761]  kasan_save_track+0x20/0x40
[   21.836806]  kasan_save_alloc_info+0x40/0x58
[   21.836852]  __kasan_kmalloc+0xd4/0xd8
[   21.836897]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.836943]  kasan_atomics+0xb8/0x2e0
[   21.837001]  kunit_try_run_case+0x170/0x3f0
[   21.837078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.837131]  kthread+0x328/0x630
[   21.837173]  ret_from_fork+0x10/0x20
[   21.838105] 
[   21.838168] The buggy address belongs to the object at fff00000c59de300
[   21.838168]  which belongs to the cache kmalloc-64 of size 64
[   21.838249] The buggy address is located 0 bytes to the right of
[   21.838249]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.838325] 
[   21.838359] The buggy address belongs to the physical page:
[   21.838409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.838658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.838725] page_type: f5(slab)
[   21.838877] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.839165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.839243] page dumped because: kasan: bad access detected
[   21.839388] 
[   21.839418] Memory state around the buggy address:
[   21.839605]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.839792]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.841735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   21.845951]  kthread+0x328/0x630
[   21.847457]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.850843] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.854364]  print_report+0x118/0x608
[   21.857769]  kasan_save_alloc_info+0x40/0x58
[   21.859215] 
[   21.861231]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.866995] 
[   21.868774]  ret_from_fork+0x10/0x20
[   21.870195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.870620] page dumped because: kasan: bad access detected
[   21.870772]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.879072]  kunit_try_run_case+0x170/0x3f0
[   21.881700] page dumped because: kasan: bad access detected
[   21.882798]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.886526] Hardware name: linux,dummy-virt (DT)
[   21.887964]  kasan_save_alloc_info+0x40/0x58
[   21.889479] 
[   21.889509] The buggy address belongs to the object at fff00000c59de300
[   21.889509]  which belongs to the cache kmalloc-64 of size 64
[   21.891154] page dumped because: kasan: bad access detected
[   21.891319] 
[   21.891384] Memory state around the buggy address:
[   21.891433]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.891487]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.891625] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.891676]                                      ^
[   21.892053]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.892234]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.892286] ==================================================================
[   21.977845] ==================================================================
[   21.977925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   21.978015] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.978077] 
[   21.978122] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.978224] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.978257] Hardware name: linux,dummy-virt (DT)
[   21.978299] Call trace:
[   21.978329]  show_stack+0x20/0x38 (C)
[   21.978391]  dump_stack_lvl+0x8c/0xd0
[   21.978448]  print_report+0x118/0x608
[   21.978503]  kasan_report+0xdc/0x128
[   21.978557]  kasan_check_range+0x100/0x1a8
[   21.978615]  __kasan_check_write+0x20/0x30
[   21.978673]  kasan_atomics_helper+0xf20/0x4858
[   21.978731]  kasan_atomics+0x198/0x2e0
[   21.978785]  kunit_try_run_case+0x170/0x3f0
[   21.978840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.978903]  kthread+0x328/0x630
[   21.978957]  ret_from_fork+0x10/0x20
[   21.979471] 
[   21.980061] Allocated by task 265:
[   21.980155]  kasan_save_stack+0x3c/0x68
[   21.980573]  kasan_save_track+0x20/0x40
[   21.980881]  kasan_save_alloc_info+0x40/0x58
[   21.981101]  __kasan_kmalloc+0xd4/0xd8
[   21.981469]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.981600]  kasan_atomics+0xb8/0x2e0
[   21.981656]  kunit_try_run_case+0x170/0x3f0
[   21.981705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.982003]  kthread+0x328/0x630
[   21.982250]  ret_from_fork+0x10/0x20
[   21.982592] 
[   21.982636] The buggy address belongs to the object at fff00000c59de300
[   21.982636]  which belongs to the cache kmalloc-64 of size 64
[   21.982722] The buggy address is located 0 bytes to the right of
[   21.982722]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.982801] 
[   21.982829] The buggy address belongs to the physical page:
[   21.983257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.983398] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.983479] page_type: f5(slab)
[   21.983560] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.983731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.983793] page dumped because: kasan: bad access detected
[   21.983994] 
[   21.984073] Memory state around the buggy address:
[   21.984148]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.984459]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.984631] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.984693]                                      ^
[   21.984738]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.985067]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.985131] ==================================================================
[   21.995516] ==================================================================
[   21.995588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   21.995659] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.995715] 
[   21.995757] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.995853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.995885] Hardware name: linux,dummy-virt (DT)
[   21.995924] Call trace:
[   21.995954]  show_stack+0x20/0x38 (C)
[   21.996088]  dump_stack_lvl+0x8c/0xd0
[   21.996141]  print_report+0x118/0x608
[   21.996190]  kasan_report+0xdc/0x128
[   21.996238]  kasan_check_range+0x100/0x1a8
[   21.996291]  __kasan_check_write+0x20/0x30
[   21.996344]  kasan_atomics_helper+0xff0/0x4858
[   21.996399]  kasan_atomics+0x198/0x2e0
[   21.996449]  kunit_try_run_case+0x170/0x3f0
[   21.996500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.996558]  kthread+0x328/0x630
[   21.996676]  ret_from_fork+0x10/0x20
[   21.996741] 
[   21.996767] Allocated by task 265:
[   21.996801]  kasan_save_stack+0x3c/0x68
[   21.996853]  kasan_save_track+0x20/0x40
[   21.996898]  kasan_save_alloc_info+0x40/0x58
[   21.996945]  __kasan_kmalloc+0xd4/0xd8
[   21.997001]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.997051]  kasan_atomics+0xb8/0x2e0
[   21.997135]  kunit_try_run_case+0x170/0x3f0
[   21.997184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.997235]  kthread+0x328/0x630
[   21.997277]  ret_from_fork+0x10/0x20
[   21.997320] 
[   21.997349] The buggy address belongs to the object at fff00000c59de300
[   21.997349]  which belongs to the cache kmalloc-64 of size 64
[   21.997429] The buggy address is located 0 bytes to the right of
[   21.997429]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.997503] 
[   21.997531] The buggy address belongs to the physical page:
[   21.997570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.997627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.997682] page_type: f5(slab)
[   21.997730] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.997790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.997867] page dumped because: kasan: bad access detected
[   21.997950] 
[   21.998019] Memory state around the buggy address:
[   21.998063]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.998115]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.998166] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.998210]                                      ^
[   21.998253]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.998302]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.998347] ==================================================================
[   22.096606] ==================================================================
[   22.096665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   22.096742] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.096801] 
[   22.096843] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.096937] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.097006] Hardware name: linux,dummy-virt (DT)
[   22.097051] Call trace:
[   22.097080]  show_stack+0x20/0x38 (C)
[   22.097139]  dump_stack_lvl+0x8c/0xd0
[   22.097195]  print_report+0x118/0x608
[   22.097254]  kasan_report+0xdc/0x128
[   22.097372]  __asan_report_load8_noabort+0x20/0x30
[   22.097496]  kasan_atomics_helper+0x3db0/0x4858
[   22.097551]  kasan_atomics+0x198/0x2e0
[   22.097611]  kunit_try_run_case+0x170/0x3f0
[   22.097719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.097857]  kthread+0x328/0x630
[   22.098205]  ret_from_fork+0x10/0x20
[   22.098469] 
[   22.098500] Allocated by task 265:
[   22.098539]  kasan_save_stack+0x3c/0x68
[   22.098597]  kasan_save_track+0x20/0x40
[   22.098645]  kasan_save_alloc_info+0x40/0x58
[   22.098694]  __kasan_kmalloc+0xd4/0xd8
[   22.098739]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.098787]  kasan_atomics+0xb8/0x2e0
[   22.098832]  kunit_try_run_case+0x170/0x3f0
[   22.098969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.099088]  kthread+0x328/0x630
[   22.099137]  ret_from_fork+0x10/0x20
[   22.099184] 
[   22.099210] The buggy address belongs to the object at fff00000c59de300
[   22.099210]  which belongs to the cache kmalloc-64 of size 64
[   22.099279] The buggy address is located 0 bytes to the right of
[   22.099279]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.099355] 
[   22.099381] The buggy address belongs to the physical page:
[   22.099439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.099508] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.099613] page_type: f5(slab)
[   22.099687] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.099751] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.099801] page dumped because: kasan: bad access detected
[   22.099867] 
[   22.099907] Memory state around the buggy address:
[   22.099949]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.100016]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.100069] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.100115]                                      ^
[   22.100156]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.100208]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.100286] ==================================================================
[   21.778836] ==================================================================
[   21.779182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   21.779370] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.779439] 
[   21.779550] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.779654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.779691] Hardware name: linux,dummy-virt (DT)
[   21.780126] Call trace:
[   21.780204]  show_stack+0x20/0x38 (C)
[   21.780434]  dump_stack_lvl+0x8c/0xd0
[   21.780559]  print_report+0x118/0x608
[   21.780680]  kasan_report+0xdc/0x128
[   21.780925]  __asan_report_load4_noabort+0x20/0x30
[   21.781023]  kasan_atomics_helper+0x42d8/0x4858
[   21.781311]  kasan_atomics+0x198/0x2e0
[   21.781381]  kunit_try_run_case+0x170/0x3f0
[   21.781529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.781796]  kthread+0x328/0x630
[   21.781913]  ret_from_fork+0x10/0x20
[   21.781989] 
[   21.782121] Allocated by task 265:
[   21.782180]  kasan_save_stack+0x3c/0x68
[   21.782242]  kasan_save_track+0x20/0x40
[   21.782447]  kasan_save_alloc_info+0x40/0x58
[   21.782501]  __kasan_kmalloc+0xd4/0xd8
[   21.782546]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.782596]  kasan_atomics+0xb8/0x2e0
[   21.782684]  kunit_try_run_case+0x170/0x3f0
[   21.782738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.782837]  ret_from_fork+0x10/0x20
[   21.783907] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.783994] page_type: f5(slab)
[   21.784046] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.784465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.784854]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.785156] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.785435]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.785730] ==================================================================
[   21.824896] ==================================================================
[   21.825511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   21.825614] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.825979] 
[   21.826042] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.826394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.826606] Hardware name: linux,dummy-virt (DT)
[   21.826663] Call trace:
[   21.826827]  show_stack+0x20/0x38 (C)
[   21.827008]  dump_stack_lvl+0x8c/0xd0
[   21.827125]  print_report+0x118/0x608
[   21.827229]  kasan_report+0xdc/0x128
[   21.827574]  kasan_check_range+0x100/0x1a8
[   21.827661]  __kasan_check_write+0x20/0x30
[   21.827722]  kasan_atomics_helper+0xad4/0x4858
[   21.827783]  kasan_atomics+0x198/0x2e0
[   21.827981]  kunit_try_run_case+0x170/0x3f0
[   21.828373]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.828499]  kthread+0x328/0x630
[   21.828565]  ret_from_fork+0x10/0x20
[   21.828647] 
[   21.828682] Allocated by task 265:
[   21.828900]  kasan_save_stack+0x3c/0x68
[   21.829169]  kasan_save_track+0x20/0x40
[   21.829341]  kasan_save_alloc_info+0x40/0x58
[   21.829412]  __kasan_kmalloc+0xd4/0xd8
[   21.829462]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.829744]  kasan_atomics+0xb8/0x2e0
[   21.829999]  kunit_try_run_case+0x170/0x3f0
[   21.830177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.830250]  kthread+0x328/0x630
[   21.830437]  ret_from_fork+0x10/0x20
[   21.830523] 
[   21.830561] The buggy address belongs to the object at fff00000c59de300
[   21.830561]  which belongs to the cache kmalloc-64 of size 64
[   21.830773] The buggy address is located 0 bytes to the right of
[   21.830773]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.830862] 
[   21.830893] The buggy address belongs to the physical page:
[   21.831103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.831303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.831643] page_type: f5(slab)
[   21.831719] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.831782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.831831] page dumped because: kasan: bad access detected
[   21.831871] 
[   21.832070] Memory state around the buggy address:
[   21.832281]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.832391]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.832450] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.832704]                                      ^
[   21.832868]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.833098]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.833293] ==================================================================
[   22.137206] ==================================================================
[   22.137454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   22.137675] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.137768] 
[   22.137822] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.137928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.137966] Hardware name: linux,dummy-virt (DT)
[   22.138018] Call trace:
[   22.138318]  show_stack+0x20/0x38 (C)
[   22.138432]  dump_stack_lvl+0x8c/0xd0
[   22.138596]  print_report+0x118/0x608
[   22.138660]  kasan_report+0xdc/0x128
[   22.138861]  __asan_report_load8_noabort+0x20/0x30
[   22.138930]  kasan_atomics_helper+0x3e20/0x4858
[   22.139025]  kasan_atomics+0x198/0x2e0
[   22.139138]  kunit_try_run_case+0x170/0x3f0
[   22.139250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.139316]  kthread+0x328/0x630
[   22.139412]  ret_from_fork+0x10/0x20
[   22.139502] 
[   22.139557] Allocated by task 265:
[   22.139651]  kasan_save_stack+0x3c/0x68
[   22.139707]  kasan_save_track+0x20/0x40
[   22.139753]  kasan_save_alloc_info+0x40/0x58
[   22.139803]  __kasan_kmalloc+0xd4/0xd8
[   22.139875]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.139979]  kasan_atomics+0xb8/0x2e0
[   22.140089]  kunit_try_run_case+0x170/0x3f0
[   22.140177]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.140229]  kthread+0x328/0x630
[   22.140271]  ret_from_fork+0x10/0x20
[   22.140322] 
[   22.140348] The buggy address belongs to the object at fff00000c59de300
[   22.140348]  which belongs to the cache kmalloc-64 of size 64
[   22.140439] The buggy address is located 0 bytes to the right of
[   22.140439]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.140517] 
[   22.140546] The buggy address belongs to the physical page:
[   22.140599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.140734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.140797] page_type: f5(slab)
[   22.140848] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.140911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.140960] page dumped because: kasan: bad access detected
[   22.141163] 
[   22.141186] Memory state around the buggy address:
[   22.141226]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.141276]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.141669] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.141922]                                      ^
[   22.141985]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.142042]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.142087] ==================================================================
[   22.064787] ==================================================================
[   22.064851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   22.064923] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.064993] 
[   22.065033] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.065130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.065163] Hardware name: linux,dummy-virt (DT)
[   22.065201] Call trace:
[   22.065229]  show_stack+0x20/0x38 (C)
[   22.065320]  dump_stack_lvl+0x8c/0xd0
[   22.065543]  print_report+0x118/0x608
[   22.065610]  kasan_report+0xdc/0x128
[   22.065860]  kasan_check_range+0x100/0x1a8
[   22.066055]  __kasan_check_write+0x20/0x30
[   22.066130]  kasan_atomics_helper+0x147c/0x4858
[   22.066206]  kasan_atomics+0x198/0x2e0
[   22.066262]  kunit_try_run_case+0x170/0x3f0
[   22.066318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.066379]  kthread+0x328/0x630
[   22.066625]  ret_from_fork+0x10/0x20
[   22.067487] 
[   22.067743] Allocated by task 265:
[   22.067836]  kasan_save_stack+0x3c/0x68
[   22.068105]  kasan_save_track+0x20/0x40
[   22.068252]  kasan_save_alloc_info+0x40/0x58
[   22.068303]  __kasan_kmalloc+0xd4/0xd8
[   22.068904]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.069283]  kasan_atomics+0xb8/0x2e0
[   22.069574]  kunit_try_run_case+0x170/0x3f0
[   22.069726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.070031]  kthread+0x328/0x630
[   22.070195]  ret_from_fork+0x10/0x20
[   22.070247] 
[   22.070630] The buggy address belongs to the object at fff00000c59de300
[   22.070630]  which belongs to the cache kmalloc-64 of size 64
[   22.070703] The buggy address is located 0 bytes to the right of
[   22.070703]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.071164] 
[   22.071191] The buggy address belongs to the physical page:
[   22.071229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.071546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.071612] page_type: f5(slab)
[   22.071858] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.072255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.072379] page dumped because: kasan: bad access detected
[   22.072724] 
[   22.072791] Memory state around the buggy address:
[   22.072834]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.073366]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.073464] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.073898]                                      ^
[   22.074011]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.074066]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.074109] ==================================================================
[   21.642326] ==================================================================
[   21.642415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   21.642618] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.643180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.643397]  show_stack+0x20/0x38 (C)
[   21.644019]  kasan_atomics+0x198/0x2e0
[   21.645070] 
[   21.646018]  kunit_try_run_case+0x170/0x3f0
[   21.647284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.648418]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.648595] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.648653]                                      ^
[   21.648816]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.648993]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.649111] ==================================================================
[   22.105402] ==================================================================
[   22.105457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   22.105572] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.105634] 
[   22.105675] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.105771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.105841] Hardware name: linux,dummy-virt (DT)
[   22.105892] Call trace:
[   22.105925]  show_stack+0x20/0x38 (C)
[   22.106019]  dump_stack_lvl+0x8c/0xd0
[   22.106129]  print_report+0x118/0x608
[   22.106188]  kasan_report+0xdc/0x128
[   22.106265]  __asan_report_load8_noabort+0x20/0x30
[   22.106479]  kasan_atomics_helper+0x3df4/0x4858
[   22.106642]  kasan_atomics+0x198/0x2e0
[   22.106704]  kunit_try_run_case+0x170/0x3f0
[   22.106765]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.106827]  kthread+0x328/0x630
[   22.106883]  ret_from_fork+0x10/0x20
[   22.106941] 
[   22.106965] Allocated by task 265:
[   22.107015]  kasan_save_stack+0x3c/0x68
[   22.107118]  kasan_save_track+0x20/0x40
[   22.107533]  kasan_save_alloc_info+0x40/0x58
[   22.108238]  __kasan_kmalloc+0xd4/0xd8
[   22.108321]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.108746]  kasan_atomics+0xb8/0x2e0
[   22.108832]  kunit_try_run_case+0x170/0x3f0
[   22.108895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.109151]  kthread+0x328/0x630
[   22.109427]  ret_from_fork+0x10/0x20
[   22.109502] 
[   22.109551] The buggy address belongs to the object at fff00000c59de300
[   22.109551]  which belongs to the cache kmalloc-64 of size 64
[   22.109968] The buggy address is located 0 bytes to the right of
[   22.109968]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.110120] 
[   22.110174] The buggy address belongs to the physical page:
[   22.110440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.110548] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.110611] page_type: f5(slab)
[   22.110662] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.110724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.110771] page dumped because: kasan: bad access detected
[   22.110850] 
[   22.111240] Memory state around the buggy address:
[   22.111291]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.111367]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.111418] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.111599]                                      ^
[   22.112048]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.112137]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.112282] ==================================================================
[   22.041961] ==================================================================
[   22.042053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   22.042129] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.042188] 
[   22.042229] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.042328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.042362] Hardware name: linux,dummy-virt (DT)
[   22.042399] Call trace:
[   22.042427]  show_stack+0x20/0x38 (C)
[   22.042605]  dump_stack_lvl+0x8c/0xd0
[   22.042765]  print_report+0x118/0x608
[   22.042824]  kasan_report+0xdc/0x128
[   22.042880]  kasan_check_range+0x100/0x1a8
[   22.043033]  __kasan_check_write+0x20/0x30
[   22.043099]  kasan_atomics_helper+0x12d8/0x4858
[   22.043151]  kasan_atomics+0x198/0x2e0
[   22.043200]  kunit_try_run_case+0x170/0x3f0
[   22.043252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.043308]  kthread+0x328/0x630
[   22.043360]  ret_from_fork+0x10/0x20
[   22.043415] 
[   22.043438] Allocated by task 265:
[   22.043503]  kasan_save_stack+0x3c/0x68
[   22.043551]  kasan_save_track+0x20/0x40
[   22.043593]  kasan_save_alloc_info+0x40/0x58
[   22.043636]  __kasan_kmalloc+0xd4/0xd8
[   22.043676]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.043718]  kasan_atomics+0xb8/0x2e0
[   22.043786]  kunit_try_run_case+0x170/0x3f0
[   22.043857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.043907]  kthread+0x328/0x630
[   22.044045]  ret_from_fork+0x10/0x20
[   22.044281] 
[   22.044326] The buggy address belongs to the object at fff00000c59de300
[   22.044326]  which belongs to the cache kmalloc-64 of size 64
[   22.044389] The buggy address is located 0 bytes to the right of
[   22.044389]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.045050] 
[   22.045229] The buggy address belongs to the physical page:
[   22.045273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.045529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.045978] page_type: f5(slab)
[   22.046041] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.046552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.046684] page dumped because: kasan: bad access detected
[   22.046792] 
[   22.046845] Memory state around the buggy address:
[   22.046888]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.046946]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.047011] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.047059]                                      ^
[   22.047132]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.047196]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.047241] ==================================================================
[   22.121052] ==================================================================
[   22.121147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   22.121235] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.121296] 
[   22.121339] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.121437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.121471] Hardware name: linux,dummy-virt (DT)
[   22.121512] Call trace:
[   22.121541]  show_stack+0x20/0x38 (C)
[   22.121602]  dump_stack_lvl+0x8c/0xd0
[   22.121659]  print_report+0x118/0x608
[   22.121712]  kasan_report+0xdc/0x128
[   22.121766]  __asan_report_load8_noabort+0x20/0x30
[   22.121838]  kasan_atomics_helper+0x3e10/0x4858
[   22.121903]  kasan_atomics+0x198/0x2e0
[   22.121958]  kunit_try_run_case+0x170/0x3f0
[   22.122029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.122092]  kthread+0x328/0x630
[   22.122147]  ret_from_fork+0x10/0x20
[   22.123842] 
[   22.124523] Allocated by task 265:
[   22.124601]  kasan_save_stack+0x3c/0x68
[   22.125138]  kasan_save_track+0x20/0x40
[   22.125449]  kasan_save_alloc_info+0x40/0x58
[   22.125665]  __kasan_kmalloc+0xd4/0xd8
[   22.125772]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.125836]  kasan_atomics+0xb8/0x2e0
[   22.125888]  kunit_try_run_case+0x170/0x3f0
[   22.125937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.126002]  kthread+0x328/0x630
[   22.126053]  ret_from_fork+0x10/0x20
[   22.126098] 
[   22.126125] The buggy address belongs to the object at fff00000c59de300
[   22.126125]  which belongs to the cache kmalloc-64 of size 64
[   22.126192] The buggy address is located 0 bytes to the right of
[   22.126192]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.126262] 
[   22.126759] The buggy address belongs to the physical page:
[   22.126869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.127924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.128887] page_type: f5(slab)
[   22.129222] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.129363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.129422] page dumped because: kasan: bad access detected
[   22.129475] 
[   22.129654] Memory state around the buggy address:
[   22.129906]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.130335]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.130400] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.130625]                                      ^
[   22.130693]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.130749]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.130859] ==================================================================
[   21.915690] ==================================================================
[   21.916178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   21.916555] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.916641] 
[   21.916690] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.916791] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.916827] Hardware name: linux,dummy-virt (DT)
[   21.917253] Call trace:
[   21.917314]  show_stack+0x20/0x38 (C)
[   21.917388]  dump_stack_lvl+0x8c/0xd0
[   21.917448]  print_report+0x118/0x608
[   21.917873]  kasan_report+0xdc/0x128
[   21.917963]  __asan_report_load4_noabort+0x20/0x30
[   21.918047]  kasan_atomics_helper+0x3e04/0x4858
[   21.918363]  kasan_atomics+0x198/0x2e0
[   21.918540]  kunit_try_run_case+0x170/0x3f0
[   21.918699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.918775]  kthread+0x328/0x630
[   21.918850]  ret_from_fork+0x10/0x20
[   21.919220] 
[   21.919265] Allocated by task 265:
[   21.919351]  kasan_save_stack+0x3c/0x68
[   21.919460]  kasan_save_track+0x20/0x40
[   21.920343]  kasan_save_alloc_info+0x40/0x58
[   21.920440]  __kasan_kmalloc+0xd4/0xd8
[   21.920489]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.920554]  kasan_atomics+0xb8/0x2e0
[   21.920617]  kunit_try_run_case+0x170/0x3f0
[   21.920679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.921051]  kthread+0x328/0x630
[   21.921168]  ret_from_fork+0x10/0x20
[   21.921220] 
[   21.921249] The buggy address belongs to the object at fff00000c59de300
[   21.921249]  which belongs to the cache kmalloc-64 of size 64
[   21.921732] The buggy address is located 0 bytes to the right of
[   21.921732]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.921846] 
[   21.922036] The buggy address belongs to the physical page:
[   21.922103] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.922392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.922629] page_type: f5(slab)
[   21.922692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.922887] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.922950] page dumped because: kasan: bad access detected
[   21.923007] 
[   21.923033] Memory state around the buggy address:
[   21.923183]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.923292]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.923349] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.923396]                                      ^
[   21.923554]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.923614]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.923663] ==================================================================
[   21.798436] ==================================================================
[   21.798534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   21.798611] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.798673] 
[   21.799021] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.799375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.799582] Hardware name: linux,dummy-virt (DT)
[   21.799753] Call trace:
[   21.799946]  show_stack+0x20/0x38 (C)
[   21.800296]  dump_stack_lvl+0x8c/0xd0
[   21.800371]  print_report+0x118/0x608
[   21.800474]  kasan_report+0xdc/0x128
[   21.800535]  kasan_check_range+0x100/0x1a8
[   21.800760]  __kasan_check_write+0x20/0x30
[   21.800831]  kasan_atomics_helper+0x99c/0x4858
[   21.800891]  kasan_atomics+0x198/0x2e0
[   21.800946]  kunit_try_run_case+0x170/0x3f0
[   21.801118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.801219]  kthread+0x328/0x630
[   21.801850]  ret_from_fork+0x10/0x20
[   21.802108] 
[   21.802244] Allocated by task 265:
[   21.802313]  kasan_save_stack+0x3c/0x68
[   21.802389]  kasan_save_track+0x20/0x40
[   21.802442]  kasan_save_alloc_info+0x40/0x58
[   21.802507]  __kasan_kmalloc+0xd4/0xd8
[   21.802552]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.802601]  kasan_atomics+0xb8/0x2e0
[   21.802645]  kunit_try_run_case+0x170/0x3f0
[   21.802694]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.803129]  kthread+0x328/0x630
[   21.803282]  ret_from_fork+0x10/0x20
[   21.803339] 
[   21.803378] The buggy address belongs to the object at fff00000c59de300
[   21.803378]  which belongs to the cache kmalloc-64 of size 64
[   21.803753] The buggy address is located 0 bytes to the right of
[   21.803753]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.803832] 
[   21.804129] The buggy address belongs to the physical page:
[   21.804183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.804268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.804330] page_type: f5(slab)
[   21.804546] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.804757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.804827] page dumped because: kasan: bad access detected
[   21.804886] 
[   21.804988] Memory state around the buggy address:
[   21.805038]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.805098]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.805559] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.805629]                                      ^
[   21.805690]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.805745]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.805793] ==================================================================
[   22.025493] ==================================================================
[   22.026116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   22.026408] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.026993] 
[   22.027050] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.027166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.027508] Hardware name: linux,dummy-virt (DT)
[   22.027608] Call trace:
[   22.027802]  show_stack+0x20/0x38 (C)
[   22.028265]  dump_stack_lvl+0x8c/0xd0
[   22.028521]  print_report+0x118/0x608
[   22.028578]  kasan_report+0xdc/0x128
[   22.029181]  kasan_check_range+0x100/0x1a8
[   22.030021]  __kasan_check_write+0x20/0x30
[   22.030138]  kasan_atomics_helper+0x1190/0x4858
[   22.030202]  kasan_atomics+0x198/0x2e0
[   22.030255]  kunit_try_run_case+0x170/0x3f0
[   22.030312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.030373]  kthread+0x328/0x630
[   22.030643]  ret_from_fork+0x10/0x20
[   22.030739] 
[   22.030766] Allocated by task 265:
[   22.030822]  kasan_save_stack+0x3c/0x68
[   22.030947]  kasan_save_track+0x20/0x40
[   22.031013]  kasan_save_alloc_info+0x40/0x58
[   22.031060]  __kasan_kmalloc+0xd4/0xd8
[   22.031113]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.031157]  kasan_atomics+0xb8/0x2e0
[   22.031198]  kunit_try_run_case+0x170/0x3f0
[   22.031255]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.031304]  kthread+0x328/0x630
[   22.031347]  ret_from_fork+0x10/0x20
[   22.031440] 
[   22.031471] The buggy address belongs to the object at fff00000c59de300
[   22.031471]  which belongs to the cache kmalloc-64 of size 64
[   22.031544] The buggy address is located 0 bytes to the right of
[   22.031544]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.031688] 
[   22.031719] The buggy address belongs to the physical page:
[   22.031756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.031815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.031868] page_type: f5(slab)
[   22.031915] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.032007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.032116] page dumped because: kasan: bad access detected
[   22.032178] 
[   22.032200] Memory state around the buggy address:
[   22.032249]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.032317]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.032366] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.032431]                                      ^
[   22.032516]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.032568]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.032616] ==================================================================
[   22.075803] ==================================================================
[   22.075878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   22.075950] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.076022] 
[   22.076063] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.076156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.076189] Hardware name: linux,dummy-virt (DT)
[   22.076228] Call trace:
[   22.076257]  show_stack+0x20/0x38 (C)
[   22.076316]  dump_stack_lvl+0x8c/0xd0
[   22.077313]  print_report+0x118/0x608
[   22.077412]  kasan_report+0xdc/0x128
[   22.077489]  kasan_check_range+0x100/0x1a8
[   22.077548]  __kasan_check_write+0x20/0x30
[   22.077956]  kasan_atomics_helper+0x14e4/0x4858
[   22.078059]  kasan_atomics+0x198/0x2e0
[   22.078198]  kunit_try_run_case+0x170/0x3f0
[   22.078263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.078529]  kthread+0x328/0x630
[   22.078597]  ret_from_fork+0x10/0x20
[   22.078992] 
[   22.079036] Allocated by task 265:
[   22.079082]  kasan_save_stack+0x3c/0x68
[   22.079154]  kasan_save_track+0x20/0x40
[   22.079345]  kasan_save_alloc_info+0x40/0x58
[   22.079581]  __kasan_kmalloc+0xd4/0xd8
[   22.079766]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.079830]  kasan_atomics+0xb8/0x2e0
[   22.079877]  kunit_try_run_case+0x170/0x3f0
[   22.080099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.080181]  kthread+0x328/0x630
[   22.080234]  ret_from_fork+0x10/0x20
[   22.080477] 
[   22.080513] The buggy address belongs to the object at fff00000c59de300
[   22.080513]  which belongs to the cache kmalloc-64 of size 64
[   22.080587] The buggy address is located 0 bytes to the right of
[   22.080587]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.080676] 
[   22.080706] The buggy address belongs to the physical page:
[   22.081054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.081143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.081343] page_type: f5(slab)
[   22.081412] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.081831] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.081905] page dumped because: kasan: bad access detected
[   22.082257] 
[   22.082302] Memory state around the buggy address:
[   22.082352]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.082409]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.082552] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.082608]                                      ^
[   22.082653]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.082918]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.083115] ==================================================================
[   22.013578] ==================================================================
[   22.013939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   22.014073] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.014712] 
[   22.014808] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.014923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.016052] Hardware name: linux,dummy-virt (DT)
[   22.016187] Call trace:
[   22.016356]  show_stack+0x20/0x38 (C)
[   22.017055]  dump_stack_lvl+0x8c/0xd0
[   22.017286]  print_report+0x118/0x608
[   22.017348]  kasan_report+0xdc/0x128
[   22.017402]  kasan_check_range+0x100/0x1a8
[   22.017460]  __kasan_check_write+0x20/0x30
[   22.017517]  kasan_atomics_helper+0x1128/0x4858
[   22.017577]  kasan_atomics+0x198/0x2e0
[   22.018632]  kunit_try_run_case+0x170/0x3f0
[   22.018728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.018797]  kthread+0x328/0x630
[   22.019198]  ret_from_fork+0x10/0x20
[   22.019299] 
[   22.019366] Allocated by task 265:
[   22.019458]  kasan_save_stack+0x3c/0x68
[   22.019559]  kasan_save_track+0x20/0x40
[   22.019856]  kasan_save_alloc_info+0x40/0x58
[   22.019980]  __kasan_kmalloc+0xd4/0xd8
[   22.020036]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.020093]  kasan_atomics+0xb8/0x2e0
[   22.020249]  kunit_try_run_case+0x170/0x3f0
[   22.020581]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.020819]  kthread+0x328/0x630
[   22.020874]  ret_from_fork+0x10/0x20
[   22.020920] 
[   22.020977] The buggy address belongs to the object at fff00000c59de300
[   22.020977]  which belongs to the cache kmalloc-64 of size 64
[   22.021049] The buggy address is located 0 bytes to the right of
[   22.021049]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.021117] 
[   22.021143] The buggy address belongs to the physical page:
[   22.021181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.021238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.021292] page_type: f5(slab)
[   22.021337] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.021400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.021442] page dumped because: kasan: bad access detected
[   22.021479] 
[   22.021501] Memory state around the buggy address:
[   22.021539]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.021590]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.022013] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.022203]                                      ^
[   22.022661]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.022809]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.022914] ==================================================================
[   22.037465] ==================================================================
[   22.037527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   22.037594] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.037653] 
[   22.037693] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.037793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.037846] Hardware name: linux,dummy-virt (DT)
[   22.037884] Call trace:
[   22.037913]  show_stack+0x20/0x38 (C)
[   22.037987]  dump_stack_lvl+0x8c/0xd0
[   22.038047]  print_report+0x118/0x608
[   22.038102]  kasan_report+0xdc/0x128
[   22.038155]  kasan_check_range+0x100/0x1a8
[   22.038215]  __kasan_check_write+0x20/0x30
[   22.038270]  kasan_atomics_helper+0x126c/0x4858
[   22.038326]  kasan_atomics+0x198/0x2e0
[   22.038380]  kunit_try_run_case+0x170/0x3f0
[   22.038436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.038553]  kthread+0x328/0x630
[   22.038613]  ret_from_fork+0x10/0x20
[   22.038764] 
[   22.038808] Allocated by task 265:
[   22.038881]  kasan_save_stack+0x3c/0x68
[   22.038954]  kasan_save_track+0x20/0x40
[   22.039014]  kasan_save_alloc_info+0x40/0x58
[   22.039065]  __kasan_kmalloc+0xd4/0xd8
[   22.039111]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.039158]  kasan_atomics+0xb8/0x2e0
[   22.039228]  kunit_try_run_case+0x170/0x3f0
[   22.039344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.039404]  kthread+0x328/0x630
[   22.039453]  ret_from_fork+0x10/0x20
[   22.039499] 
[   22.039527] The buggy address belongs to the object at fff00000c59de300
[   22.039527]  which belongs to the cache kmalloc-64 of size 64
[   22.039625] The buggy address is located 0 bytes to the right of
[   22.039625]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.039739] 
[   22.039780] The buggy address belongs to the physical page:
[   22.039821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.039885] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.039943] page_type: f5(slab)
[   22.040000] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.040294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.040347] page dumped because: kasan: bad access detected
[   22.040386] 
[   22.040409] Memory state around the buggy address:
[   22.040462]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.040514]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.040688] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.040859]                                      ^
[   22.040904]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.040956]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.041013] ==================================================================
[   21.814905] ==================================================================
[   21.815715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   21.815814] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.816116] 
[   21.816168] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.816511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.816553] Hardware name: linux,dummy-virt (DT)
[   21.816735] Call trace:
[   21.816778]  show_stack+0x20/0x38 (C)
[   21.817162]  dump_stack_lvl+0x8c/0xd0
[   21.817389]  print_report+0x118/0x608
[   21.817472]  kasan_report+0xdc/0x128
[   21.817833]  kasan_check_range+0x100/0x1a8
[   21.817995]  __kasan_check_write+0x20/0x30
[   21.818224]  kasan_atomics_helper+0xa6c/0x4858
[   21.818299]  kasan_atomics+0x198/0x2e0
[   21.818685]  kunit_try_run_case+0x170/0x3f0
[   21.818781]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.818849]  kthread+0x328/0x630
[   21.818904]  ret_from_fork+0x10/0x20
[   21.819207] 
[   21.819396] Allocated by task 265:
[   21.819538]  kasan_save_stack+0x3c/0x68
[   21.819654]  kasan_save_track+0x20/0x40
[   21.819712]  kasan_save_alloc_info+0x40/0x58
[   21.819782]  __kasan_kmalloc+0xd4/0xd8
[   21.819991]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.820202]  kasan_atomics+0xb8/0x2e0
[   21.820281]  kunit_try_run_case+0x170/0x3f0
[   21.820331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.820589]  kthread+0x328/0x630
[   21.820826]  ret_from_fork+0x10/0x20
[   21.820881] 
[   21.820913] The buggy address belongs to the object at fff00000c59de300
[   21.820913]  which belongs to the cache kmalloc-64 of size 64
[   21.820996] The buggy address is located 0 bytes to the right of
[   21.820996]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.821251] 
[   21.821381] The buggy address belongs to the physical page:
[   21.821430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.821497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.821567] page_type: f5(slab)
[   21.821926] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.822155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.822221] page dumped because: kasan: bad access detected
[   21.822371] 
[   21.822401] Memory state around the buggy address:
[   21.822572]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.822644]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.822885] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.822948]                                      ^
[   21.823156]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.823219]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.823373] ==================================================================
[   21.808057] ==================================================================
[   21.808162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   21.808361] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.808433] 
[   21.808482] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.808584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.808889] Hardware name: linux,dummy-virt (DT)
[   21.809020] Call trace:
[   21.809055]  show_stack+0x20/0x38 (C)
[   21.809143]  dump_stack_lvl+0x8c/0xd0
[   21.809207]  print_report+0x118/0x608
[   21.809264]  kasan_report+0xdc/0x128
[   21.809568]  kasan_check_range+0x100/0x1a8
[   21.809705]  __kasan_check_write+0x20/0x30
[   21.809772]  kasan_atomics_helper+0xa04/0x4858
[   21.809864]  kasan_atomics+0x198/0x2e0
[   21.809922]  kunit_try_run_case+0x170/0x3f0
[   21.809991]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.810577]  kthread+0x328/0x630
[   21.810793]  ret_from_fork+0x10/0x20
[   21.810896] 
[   21.811023] Allocated by task 265:
[   21.811092]  kasan_save_stack+0x3c/0x68
[   21.811160]  kasan_save_track+0x20/0x40
[   21.811204]  kasan_save_alloc_info+0x40/0x58
[   21.811251]  __kasan_kmalloc+0xd4/0xd8
[   21.811294]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.811609]  kasan_atomics+0xb8/0x2e0
[   21.811777]  kunit_try_run_case+0x170/0x3f0
[   21.811829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.811928]  kthread+0x328/0x630
[   21.811988]  ret_from_fork+0x10/0x20
[   21.812054] 
[   21.812087] The buggy address belongs to the object at fff00000c59de300
[   21.812087]  which belongs to the cache kmalloc-64 of size 64
[   21.812151] The buggy address is located 0 bytes to the right of
[   21.812151]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.812235] 
[   21.812262] The buggy address belongs to the physical page:
[   21.812301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.812357] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.812412] page_type: f5(slab)
[   21.812458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.812518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.812564] page dumped because: kasan: bad access detected
[   21.812614] 
[   21.812640] Memory state around the buggy address:
[   21.812679]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.812730]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.812778] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.812836]                                      ^
[   21.812889]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.812943]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.813006] ==================================================================
[   22.142840] ==================================================================
[   22.142913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   22.143360] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.143431] 
[   22.143475] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.143571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.143604] Hardware name: linux,dummy-virt (DT)
[   22.143640] Call trace:
[   22.143695]  show_stack+0x20/0x38 (C)
[   22.143810]  dump_stack_lvl+0x8c/0xd0
[   22.143917]  print_report+0x118/0x608
[   22.144043]  kasan_report+0xdc/0x128
[   22.144158]  kasan_check_range+0x100/0x1a8
[   22.144219]  __kasan_check_write+0x20/0x30
[   22.144319]  kasan_atomics_helper+0x17ec/0x4858
[   22.144375]  kasan_atomics+0x198/0x2e0
[   22.144435]  kunit_try_run_case+0x170/0x3f0
[   22.144541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.144652]  kthread+0x328/0x630
[   22.144731]  ret_from_fork+0x10/0x20
[   22.144786] 
[   22.144809] Allocated by task 265:
[   22.144843]  kasan_save_stack+0x3c/0x68
[   22.144892]  kasan_save_track+0x20/0x40
[   22.144937]  kasan_save_alloc_info+0x40/0x58
[   22.144999]  __kasan_kmalloc+0xd4/0xd8
[   22.145045]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.145089]  kasan_atomics+0xb8/0x2e0
[   22.145131]  kunit_try_run_case+0x170/0x3f0
[   22.145175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.145226]  kthread+0x328/0x630
[   22.145266]  ret_from_fork+0x10/0x20
[   22.145310] 
[   22.145345] The buggy address belongs to the object at fff00000c59de300
[   22.145345]  which belongs to the cache kmalloc-64 of size 64
[   22.145480] The buggy address is located 0 bytes to the right of
[   22.145480]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.145636] 
[   22.145698] The buggy address belongs to the physical page:
[   22.145774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.145912] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.146013] page_type: f5(slab)
[   22.146064] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.146124] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.146228] page dumped because: kasan: bad access detected
[   22.146266] 
[   22.146289] Memory state around the buggy address:
[   22.146330]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.146381]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.146431] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.146476]                                      ^
[   22.146514]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.146563]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.146607] ==================================================================
[   22.005757] ==================================================================
[   22.005860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   22.005938] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.006012] 
[   22.006052] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.006146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.006179] Hardware name: linux,dummy-virt (DT)
[   22.006216] Call trace:
[   22.006247]  show_stack+0x20/0x38 (C)
[   22.006307]  dump_stack_lvl+0x8c/0xd0
[   22.006361]  print_report+0x118/0x608
[   22.006412]  kasan_report+0xdc/0x128
[   22.006474]  kasan_check_range+0x100/0x1a8
[   22.006526]  __kasan_check_write+0x20/0x30
[   22.006578]  kasan_atomics_helper+0x10c0/0x4858
[   22.006631]  kasan_atomics+0x198/0x2e0
[   22.006717]  kunit_try_run_case+0x170/0x3f0
[   22.007003]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.007089]  kthread+0x328/0x630
[   22.007148]  ret_from_fork+0x10/0x20
[   22.007206] 
[   22.007234] Allocated by task 265:
[   22.007269]  kasan_save_stack+0x3c/0x68
[   22.007322]  kasan_save_track+0x20/0x40
[   22.007524]  kasan_save_alloc_info+0x40/0x58
[   22.007617]  __kasan_kmalloc+0xd4/0xd8
[   22.007926]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.007992]  kasan_atomics+0xb8/0x2e0
[   22.008038]  kunit_try_run_case+0x170/0x3f0
[   22.008220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.008274]  kthread+0x328/0x630
[   22.008345]  ret_from_fork+0x10/0x20
[   22.008612] 
[   22.008696] The buggy address belongs to the object at fff00000c59de300
[   22.008696]  which belongs to the cache kmalloc-64 of size 64
[   22.009071] The buggy address is located 0 bytes to the right of
[   22.009071]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.009559] 
[   22.009610] The buggy address belongs to the physical page:
[   22.009737] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.009964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.010381] page_type: f5(slab)
[   22.010636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.011041] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.011197] page dumped because: kasan: bad access detected
[   22.011416] 
[   22.011447] Memory state around the buggy address:
[   22.011640]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.011715]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.012053] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.012148]                                      ^
[   22.012233]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.012299]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.012533] ==================================================================
[   21.925792] ==================================================================
[   21.926184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   21.926270] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.926334] 
[   21.926379] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.926608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.926942] Hardware name: linux,dummy-virt (DT)
[   21.927054] Call trace:
[   21.927122]  show_stack+0x20/0x38 (C)
[   21.927392]  dump_stack_lvl+0x8c/0xd0
[   21.927460]  print_report+0x118/0x608
[   21.927518]  kasan_report+0xdc/0x128
[   21.927574]  kasan_check_range+0x100/0x1a8
[   21.927631]  __kasan_check_read+0x20/0x30
[   21.927690]  kasan_atomics_helper+0xdd4/0x4858
[   21.927749]  kasan_atomics+0x198/0x2e0
[   21.927805]  kunit_try_run_case+0x170/0x3f0
[   21.927861]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.927924]  kthread+0x328/0x630
[   21.927994]  ret_from_fork+0x10/0x20
[   21.928060] 
[   21.928087] Allocated by task 265:
[   21.928125]  kasan_save_stack+0x3c/0x68
[   21.929901]  kasan_save_track+0x20/0x40
[   21.930146]  kasan_save_alloc_info+0x40/0x58
[   21.930982]  __kasan_kmalloc+0xd4/0xd8
[   21.931117]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.931172]  kasan_atomics+0xb8/0x2e0
[   21.931219]  kunit_try_run_case+0x170/0x3f0
[   21.931268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.931322]  kthread+0x328/0x630
[   21.932296]  ret_from_fork+0x10/0x20
[   21.932635] 
[   21.932710] The buggy address belongs to the object at fff00000c59de300
[   21.932710]  which belongs to the cache kmalloc-64 of size 64
[   21.932789] The buggy address is located 0 bytes to the right of
[   21.932789]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.932864] 
[   21.932893] The buggy address belongs to the physical page:
[   21.932931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.933010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.933075] page_type: f5(slab)
[   21.933127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.933189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.933867] page dumped because: kasan: bad access detected
[   21.935044] 
[   21.935368] Memory state around the buggy address:
[   21.935443]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.935501]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.935552] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.935599]                                      ^
[   21.935743]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.936308]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.936481] ==================================================================
[   21.895260] ==================================================================
[   21.895346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   21.895424] Read of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.895812] 
[   21.895880] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.896777] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.896842] Hardware name: linux,dummy-virt (DT)
[   21.896901] Call trace:
[   21.896940]  show_stack+0x20/0x38 (C)
[   21.897372]  dump_stack_lvl+0x8c/0xd0
[   21.897465]  print_report+0x118/0x608
[   21.897526]  kasan_report+0xdc/0x128
[   21.897585]  __asan_report_load4_noabort+0x20/0x30
[   21.897648]  kasan_atomics_helper+0x3dd8/0x4858
[   21.898347]  kasan_atomics+0x198/0x2e0
[   21.898451]  kunit_try_run_case+0x170/0x3f0
[   21.898597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.898962]  kthread+0x328/0x630
[   21.899054]  ret_from_fork+0x10/0x20
[   21.899121] 
[   21.899147] Allocated by task 265:
[   21.899188]  kasan_save_stack+0x3c/0x68
[   21.899826]  kasan_save_track+0x20/0x40
[   21.899883]  kasan_save_alloc_info+0x40/0x58
[   21.900032]  __kasan_kmalloc+0xd4/0xd8
[   21.900090]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.900355]  kasan_atomics+0xb8/0x2e0
[   21.900528]  kunit_try_run_case+0x170/0x3f0
[   21.900743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.900923]  kthread+0x328/0x630
[   21.901057]  ret_from_fork+0x10/0x20
[   21.901387] 
[   21.901437] The buggy address belongs to the object at fff00000c59de300
[   21.901437]  which belongs to the cache kmalloc-64 of size 64
[   21.901513] The buggy address is located 0 bytes to the right of
[   21.901513]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.902027] 
[   21.902168] The buggy address belongs to the physical page:
[   21.902220] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.902292] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.902355] page_type: f5(slab)
[   21.902408] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.902904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.903137] page dumped because: kasan: bad access detected
[   21.903252] 
[   21.903281] Memory state around the buggy address:
[   21.903349]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.903676]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.903864] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.904059]                                      ^
[   21.904114]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.904327]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.904682] ==================================================================
[   21.956416] ==================================================================
[   21.956503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   21.956586] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.956646] 
[   21.956695] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.956797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.956831] Hardware name: linux,dummy-virt (DT)
[   21.956872] Call trace:
[   21.956903]  show_stack+0x20/0x38 (C)
[   21.956964]  dump_stack_lvl+0x8c/0xd0
[   21.957042]  print_report+0x118/0x608
[   21.957098]  kasan_report+0xdc/0x128
[   21.957152]  kasan_check_range+0x100/0x1a8
[   21.957209]  __kasan_check_write+0x20/0x30
[   21.957264]  kasan_atomics_helper+0xe44/0x4858
[   21.957320]  kasan_atomics+0x198/0x2e0
[   21.957374]  kunit_try_run_case+0x170/0x3f0
[   21.957430]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.957489]  kthread+0x328/0x630
[   21.957541]  ret_from_fork+0x10/0x20
[   21.957601] 
[   21.957626] Allocated by task 265:
[   21.958462]  kasan_save_stack+0x3c/0x68
[   21.958683]  kasan_save_track+0x20/0x40
[   21.959357]  kasan_save_alloc_info+0x40/0x58
[   21.959846]  __kasan_kmalloc+0xd4/0xd8
[   21.960285]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.960682]  kasan_atomics+0xb8/0x2e0
[   21.961178]  kunit_try_run_case+0x170/0x3f0
[   21.961558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.962103]  kthread+0x328/0x630
[   21.962785]  ret_from_fork+0x10/0x20
[   21.963121] 
[   21.963226] The buggy address belongs to the object at fff00000c59de300
[   21.963226]  which belongs to the cache kmalloc-64 of size 64
[   21.963582] The buggy address is located 0 bytes to the right of
[   21.963582]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.963692] 
[   21.964004] The buggy address belongs to the physical page:
[   21.964131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.964202] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.964264] page_type: f5(slab)
[   21.964317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.964377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.964425] page dumped because: kasan: bad access detected
[   21.965756] 
[   21.965798] Memory state around the buggy address:
[   21.965871]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.965931]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.966875] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.967255]                                      ^
[   21.967355]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.967647]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.967733] ==================================================================
[   21.906659] ==================================================================
[   21.906763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   21.906852] Write of size 4 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.906914] 
[   21.907611] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.907794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.907904] Hardware name: linux,dummy-virt (DT)
[   21.907985] Call trace:
[   21.908177]  show_stack+0x20/0x38 (C)
[   21.908292]  dump_stack_lvl+0x8c/0xd0
[   21.908369]  print_report+0x118/0x608
[   21.908705]  kasan_report+0xdc/0x128
[   21.909044]  kasan_check_range+0x100/0x1a8
[   21.909255]  __kasan_check_write+0x20/0x30
[   21.909370]  kasan_atomics_helper+0xd3c/0x4858
[   21.909465]  kasan_atomics+0x198/0x2e0
[   21.909852]  kunit_try_run_case+0x170/0x3f0
[   21.910103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.910181]  kthread+0x328/0x630
[   21.910243]  ret_from_fork+0x10/0x20
[   21.910731] 
[   21.910828] Allocated by task 265:
[   21.910928]  kasan_save_stack+0x3c/0x68
[   21.911006]  kasan_save_track+0x20/0x40
[   21.911261]  kasan_save_alloc_info+0x40/0x58
[   21.911457]  __kasan_kmalloc+0xd4/0xd8
[   21.911522]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.911638]  kasan_atomics+0xb8/0x2e0
[   21.911693]  kunit_try_run_case+0x170/0x3f0
[   21.911761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.912039]  kthread+0x328/0x630
[   21.912090]  ret_from_fork+0x10/0x20
[   21.912138] 
[   21.912379] The buggy address belongs to the object at fff00000c59de300
[   21.912379]  which belongs to the cache kmalloc-64 of size 64
[   21.912457] The buggy address is located 0 bytes to the right of
[   21.912457]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.912530] 
[   21.912561] The buggy address belongs to the physical page:
[   21.912601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.912662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.912723] page_type: f5(slab)
[   21.912773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.913346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.913429] page dumped because: kasan: bad access detected
[   21.913475] 
[   21.913562] Memory state around the buggy address:
[   21.913613]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.913668]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.914002] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.914058]                                      ^
[   21.914103]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.914530]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.914602] ==================================================================
[   21.939962] ==================================================================
[   21.940083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   21.940164] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.940226] 
[   21.940273] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.940372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.940407] Hardware name: linux,dummy-virt (DT)
[   21.940449] Call trace:
[   21.940481]  show_stack+0x20/0x38 (C)
[   21.940544]  dump_stack_lvl+0x8c/0xd0
[   21.940600]  print_report+0x118/0x608
[   21.940654]  kasan_report+0xdc/0x128
[   21.940708]  __asan_report_load8_noabort+0x20/0x30
[   21.940768]  kasan_atomics_helper+0x3f58/0x4858
[   21.941487]  kasan_atomics+0x198/0x2e0
[   21.942103]  kunit_try_run_case+0x170/0x3f0
[   21.942592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.943163]  kthread+0x328/0x630
[   21.943634]  ret_from_fork+0x10/0x20
[   21.944371] 
[   21.944484] Allocated by task 265:
[   21.944531]  kasan_save_stack+0x3c/0x68
[   21.944753]  kasan_save_track+0x20/0x40
[   21.945155]  kasan_save_alloc_info+0x40/0x58
[   21.945408]  __kasan_kmalloc+0xd4/0xd8
[   21.945543]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.945606]  kasan_atomics+0xb8/0x2e0
[   21.945660]  kunit_try_run_case+0x170/0x3f0
[   21.946291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.946541]  kthread+0x328/0x630
[   21.946595]  ret_from_fork+0x10/0x20
[   21.946642] 
[   21.946670] The buggy address belongs to the object at fff00000c59de300
[   21.946670]  which belongs to the cache kmalloc-64 of size 64
[   21.946744] The buggy address is located 0 bytes to the right of
[   21.946744]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.947593] 
[   21.947735] The buggy address belongs to the physical page:
[   21.947784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.947858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.947921] page_type: f5(slab)
[   21.947989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.948055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.948105] page dumped because: kasan: bad access detected
[   21.948145] 
[   21.948172] Memory state around the buggy address:
[   21.950232]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.950765]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.950995] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.951343]                                      ^
[   21.951640]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.951888]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.951942] ==================================================================
[   22.053703] ==================================================================
[   22.054153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   22.054268] Read of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.054342] 
[   22.054384] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.054490] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.054526] Hardware name: linux,dummy-virt (DT)
[   22.054567] Call trace:
[   22.054596]  show_stack+0x20/0x38 (C)
[   22.055008]  dump_stack_lvl+0x8c/0xd0
[   22.055138]  print_report+0x118/0x608
[   22.055301]  kasan_report+0xdc/0x128
[   22.055652]  __asan_report_load8_noabort+0x20/0x30
[   22.055729]  kasan_atomics_helper+0x3f04/0x4858
[   22.055789]  kasan_atomics+0x198/0x2e0
[   22.055845]  kunit_try_run_case+0x170/0x3f0
[   22.055904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.056004]  kthread+0x328/0x630
[   22.056064]  ret_from_fork+0x10/0x20
[   22.056124] 
[   22.056179] Allocated by task 265:
[   22.056222]  kasan_save_stack+0x3c/0x68
[   22.056291]  kasan_save_track+0x20/0x40
[   22.056338]  kasan_save_alloc_info+0x40/0x58
[   22.056386]  __kasan_kmalloc+0xd4/0xd8
[   22.056430]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.056477]  kasan_atomics+0xb8/0x2e0
[   22.056522]  kunit_try_run_case+0x170/0x3f0
[   22.056580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.056656]  kthread+0x328/0x630
[   22.056709]  ret_from_fork+0x10/0x20
[   22.056803] 
[   22.056871] The buggy address belongs to the object at fff00000c59de300
[   22.056871]  which belongs to the cache kmalloc-64 of size 64
[   22.056945] The buggy address is located 0 bytes to the right of
[   22.056945]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.057034] 
[   22.057063] The buggy address belongs to the physical page:
[   22.057118] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.057254] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.057316] page_type: f5(slab)
[   22.057366] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.057428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.057479] page dumped because: kasan: bad access detected
[   22.057518] 
[   22.057540] Memory state around the buggy address:
[   22.057579]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.057633]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.057758] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.057855]                                      ^
[   22.057955]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.058752]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.058844] ==================================================================
[   22.033545] ==================================================================
[   22.033618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   22.033690] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.033749] 
[   22.033789] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.033923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.033958] Hardware name: linux,dummy-virt (DT)
[   22.034010] Call trace:
[   22.034041]  show_stack+0x20/0x38 (C)
[   22.034104]  dump_stack_lvl+0x8c/0xd0
[   22.034153]  print_report+0x118/0x608
[   22.034204]  kasan_report+0xdc/0x128
[   22.034252]  kasan_check_range+0x100/0x1a8
[   22.034307]  __kasan_check_write+0x20/0x30
[   22.034369]  kasan_atomics_helper+0x11f8/0x4858
[   22.034518]  kasan_atomics+0x198/0x2e0
[   22.034576]  kunit_try_run_case+0x170/0x3f0
[   22.034692]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.034817]  kthread+0x328/0x630
[   22.034877]  ret_from_fork+0x10/0x20
[   22.034935] 
[   22.034960] Allocated by task 265:
[   22.035008]  kasan_save_stack+0x3c/0x68
[   22.035072]  kasan_save_track+0x20/0x40
[   22.035169]  kasan_save_alloc_info+0x40/0x58
[   22.035298]  __kasan_kmalloc+0xd4/0xd8
[   22.035351]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.035420]  kasan_atomics+0xb8/0x2e0
[   22.035468]  kunit_try_run_case+0x170/0x3f0
[   22.035639]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.035696]  kthread+0x328/0x630
[   22.035743]  ret_from_fork+0x10/0x20
[   22.035788] 
[   22.035815] The buggy address belongs to the object at fff00000c59de300
[   22.035815]  which belongs to the cache kmalloc-64 of size 64
[   22.035953] The buggy address is located 0 bytes to the right of
[   22.035953]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.036102] 
[   22.036157] The buggy address belongs to the physical page:
[   22.036219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.036334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.036389] page_type: f5(slab)
[   22.036471] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.036573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.036624] page dumped because: kasan: bad access detected
[   22.036664] 
[   22.036688] Memory state around the buggy address:
[   22.036725]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.036776]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.036828] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.036874]                                      ^
[   22.036933]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.037025]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.037131] ==================================================================
[   22.101225] ==================================================================
[   22.101316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   22.101391] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.101451] 
[   22.101532] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.101652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.101690] Hardware name: linux,dummy-virt (DT)
[   22.101730] Call trace:
[   22.101786]  show_stack+0x20/0x38 (C)
[   22.101926]  dump_stack_lvl+0x8c/0xd0
[   22.101994]  print_report+0x118/0x608
[   22.102118]  kasan_report+0xdc/0x128
[   22.102381]  kasan_check_range+0x100/0x1a8
[   22.102693]  __kasan_check_write+0x20/0x30
[   22.102810]  kasan_atomics_helper+0x1644/0x4858
[   22.102880]  kasan_atomics+0x198/0x2e0
[   22.102947]  kunit_try_run_case+0x170/0x3f0
[   22.103103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.103174]  kthread+0x328/0x630
[   22.103231]  ret_from_fork+0x10/0x20
[   22.103313] 
[   22.103339] Allocated by task 265:
[   22.103378]  kasan_save_stack+0x3c/0x68
[   22.103431]  kasan_save_track+0x20/0x40
[   22.103477]  kasan_save_alloc_info+0x40/0x58
[   22.103562]  __kasan_kmalloc+0xd4/0xd8
[   22.103622]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.103670]  kasan_atomics+0xb8/0x2e0
[   22.103713]  kunit_try_run_case+0x170/0x3f0
[   22.103758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.103808]  kthread+0x328/0x630
[   22.103883]  ret_from_fork+0x10/0x20
[   22.103937] 
[   22.103965] The buggy address belongs to the object at fff00000c59de300
[   22.103965]  which belongs to the cache kmalloc-64 of size 64
[   22.104045] The buggy address is located 0 bytes to the right of
[   22.104045]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.104121] 
[   22.104161] The buggy address belongs to the physical page:
[   22.104205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.104302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.104373] page_type: f5(slab)
[   22.104423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.104483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.104591] page dumped because: kasan: bad access detected
[   22.104640] 
[   22.104693] Memory state around the buggy address:
[   22.104778]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.104881]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.104935] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.104989]                                      ^
[   22.105031]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.105106]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.105158] ==================================================================
[   21.998708] ==================================================================
[   21.998769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   21.998838] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.998919] 
[   21.998959] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.999069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.999120] Hardware name: linux,dummy-virt (DT)
[   21.999157] Call trace:
[   21.999186]  show_stack+0x20/0x38 (C)
[   21.999246]  dump_stack_lvl+0x8c/0xd0
[   21.999318]  print_report+0x118/0x608
[   21.999378]  kasan_report+0xdc/0x128
[   21.999432]  kasan_check_range+0x100/0x1a8
[   21.999487]  __kasan_check_write+0x20/0x30
[   21.999545]  kasan_atomics_helper+0x1058/0x4858
[   21.999639]  kasan_atomics+0x198/0x2e0
[   21.999747]  kunit_try_run_case+0x170/0x3f0
[   21.999857]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.999990]  kthread+0x328/0x630
[   22.000109]  ret_from_fork+0x10/0x20
[   22.000226] 
[   22.000272] Allocated by task 265:
[   22.000345]  kasan_save_stack+0x3c/0x68
[   22.000420]  kasan_save_track+0x20/0x40
[   22.000469]  kasan_save_alloc_info+0x40/0x58
[   22.000548]  __kasan_kmalloc+0xd4/0xd8
[   22.000624]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.000706]  kasan_atomics+0xb8/0x2e0
[   22.000784]  kunit_try_run_case+0x170/0x3f0
[   22.000867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.000958]  kthread+0x328/0x630
[   22.001102]  ret_from_fork+0x10/0x20
[   22.001148] 
[   22.001273] The buggy address belongs to the object at fff00000c59de300
[   22.001273]  which belongs to the cache kmalloc-64 of size 64
[   22.001340] The buggy address is located 0 bytes to the right of
[   22.001340]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.001602] 
[   22.001632] The buggy address belongs to the physical page:
[   22.001672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.001914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.002192] page_type: f5(slab)
[   22.002494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.002581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.002952] page dumped because: kasan: bad access detected
[   22.003055] 
[   22.003279] Memory state around the buggy address:
[   22.003328]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.003827]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.004114] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.004178]                                      ^
[   22.004224]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.004473]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.004627] ==================================================================
[   21.986271] ==================================================================
[   21.986549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   21.986705] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.986828] 
[   21.986880] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.986991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.987029] Hardware name: linux,dummy-virt (DT)
[   21.987095] Call trace:
[   21.987130]  show_stack+0x20/0x38 (C)
[   21.987193]  dump_stack_lvl+0x8c/0xd0
[   21.987246]  print_report+0x118/0x608
[   21.987489]  kasan_report+0xdc/0x128
[   21.987622]  kasan_check_range+0x100/0x1a8
[   21.987699]  __kasan_check_write+0x20/0x30
[   21.987810]  kasan_atomics_helper+0xf88/0x4858
[   21.987876]  kasan_atomics+0x198/0x2e0
[   21.987930]  kunit_try_run_case+0x170/0x3f0
[   21.987998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.988065]  kthread+0x328/0x630
[   21.988185]  ret_from_fork+0x10/0x20
[   21.988247] 
[   21.988348] Allocated by task 265:
[   21.988530]  kasan_save_stack+0x3c/0x68
[   21.988588]  kasan_save_track+0x20/0x40
[   21.988635]  kasan_save_alloc_info+0x40/0x58
[   21.988684]  __kasan_kmalloc+0xd4/0xd8
[   21.988728]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.988777]  kasan_atomics+0xb8/0x2e0
[   21.989431]  kunit_try_run_case+0x170/0x3f0
[   21.990194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.990411]  kthread+0x328/0x630
[   21.990612]  ret_from_fork+0x10/0x20
[   21.991046] 
[   21.991283] The buggy address belongs to the object at fff00000c59de300
[   21.991283]  which belongs to the cache kmalloc-64 of size 64
[   21.991365] The buggy address is located 0 bytes to the right of
[   21.991365]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.991440] 
[   21.991470] The buggy address belongs to the physical page:
[   21.991507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.991567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.991622] page_type: f5(slab)
[   21.993035] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.993376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.993432] page dumped because: kasan: bad access detected
[   21.993580] 
[   21.993670] Memory state around the buggy address:
[   21.993712]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.993946]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.994276] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.994465]                                      ^
[   21.994521]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.994575]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.994621] ==================================================================
[   21.968634] ==================================================================
[   21.968733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   21.968823] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.968886] 
[   21.968940] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.969097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.969162] Hardware name: linux,dummy-virt (DT)
[   21.969211] Call trace:
[   21.969292]  show_stack+0x20/0x38 (C)
[   21.969385]  dump_stack_lvl+0x8c/0xd0
[   21.969779]  print_report+0x118/0x608
[   21.969906]  kasan_report+0xdc/0x128
[   21.969965]  __asan_report_store8_noabort+0x20/0x30
[   21.970046]  kasan_atomics_helper+0x3e5c/0x4858
[   21.970109]  kasan_atomics+0x198/0x2e0
[   21.970164]  kunit_try_run_case+0x170/0x3f0
[   21.970222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.970299]  kthread+0x328/0x630
[   21.970366]  ret_from_fork+0x10/0x20
[   21.970450] 
[   21.970481] Allocated by task 265:
[   21.970519]  kasan_save_stack+0x3c/0x68
[   21.970574]  kasan_save_track+0x20/0x40
[   21.970634]  kasan_save_alloc_info+0x40/0x58
[   21.970691]  __kasan_kmalloc+0xd4/0xd8
[   21.970736]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.970784]  kasan_atomics+0xb8/0x2e0
[   21.970849]  kunit_try_run_case+0x170/0x3f0
[   21.970902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.970955]  kthread+0x328/0x630
[   21.971009]  ret_from_fork+0x10/0x20
[   21.971055] 
[   21.971080] The buggy address belongs to the object at fff00000c59de300
[   21.971080]  which belongs to the cache kmalloc-64 of size 64
[   21.971150] The buggy address is located 0 bytes to the right of
[   21.971150]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.971222] 
[   21.971250] The buggy address belongs to the physical page:
[   21.971290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.971355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.971415] page_type: f5(slab)
[   21.971463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.971523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.971572] page dumped because: kasan: bad access detected
[   21.971610] 
[   21.971632] Memory state around the buggy address:
[   21.971671]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.971723]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.971774] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.971819]                                      ^
[   21.971857]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.971907]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.971952] ==================================================================
[   21.972130] ==================================================================
[   21.972184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   21.972240] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   21.972297] 
[   21.972338] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   21.972534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.972589] Hardware name: linux,dummy-virt (DT)
[   21.972629] Call trace:
[   21.972659]  show_stack+0x20/0x38 (C)
[   21.972773]  dump_stack_lvl+0x8c/0xd0
[   21.972883]  print_report+0x118/0x608
[   21.973728]  kasan_report+0xdc/0x128
[   21.973923]  kasan_check_range+0x100/0x1a8
[   21.974080]  __kasan_check_write+0x20/0x30
[   21.974200]  kasan_atomics_helper+0xeb8/0x4858
[   21.974259]  kasan_atomics+0x198/0x2e0
[   21.974320]  kunit_try_run_case+0x170/0x3f0
[   21.974375]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.974462]  kthread+0x328/0x630
[   21.974517]  ret_from_fork+0x10/0x20
[   21.974574] 
[   21.974599] Allocated by task 265:
[   21.974636]  kasan_save_stack+0x3c/0x68
[   21.974823]  kasan_save_track+0x20/0x40
[   21.974908]  kasan_save_alloc_info+0x40/0x58
[   21.974960]  __kasan_kmalloc+0xd4/0xd8
[   21.975031]  __kmalloc_cache_noprof+0x15c/0x3c0
[   21.975079]  kasan_atomics+0xb8/0x2e0
[   21.975124]  kunit_try_run_case+0x170/0x3f0
[   21.975171]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.975222]  kthread+0x328/0x630
[   21.975268]  ret_from_fork+0x10/0x20
[   21.975315] 
[   21.975346] The buggy address belongs to the object at fff00000c59de300
[   21.975346]  which belongs to the cache kmalloc-64 of size 64
[   21.975416] The buggy address is located 0 bytes to the right of
[   21.975416]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   21.975486] 
[   21.975511] The buggy address belongs to the physical page:
[   21.975550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   21.975608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.975663] page_type: f5(slab)
[   21.975711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.975769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.975814] page dumped because: kasan: bad access detected
[   21.975848] 
[   21.975871] Memory state around the buggy address:
[   21.975908]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.975956]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.976024] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.976070]                                      ^
[   21.976111]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.976160]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.976205] ==================================================================
[   22.047798] ==================================================================
[   22.047861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   22.047933] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.048009] 
[   22.048052] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.048151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.048185] Hardware name: linux,dummy-virt (DT)
[   22.048223] Call trace:
[   22.048253]  show_stack+0x20/0x38 (C)
[   22.048315]  dump_stack_lvl+0x8c/0xd0
[   22.048369]  print_report+0x118/0x608
[   22.048425]  kasan_report+0xdc/0x128
[   22.048478]  kasan_check_range+0x100/0x1a8
[   22.048536]  __kasan_check_write+0x20/0x30
[   22.048592]  kasan_atomics_helper+0x1384/0x4858
[   22.048649]  kasan_atomics+0x198/0x2e0
[   22.048703]  kunit_try_run_case+0x170/0x3f0
[   22.048760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.048824]  kthread+0x328/0x630
[   22.048922]  ret_from_fork+0x10/0x20
[   22.049026] 
[   22.049052] Allocated by task 265:
[   22.049089]  kasan_save_stack+0x3c/0x68
[   22.049215]  kasan_save_track+0x20/0x40
[   22.049364]  kasan_save_alloc_info+0x40/0x58
[   22.049475]  __kasan_kmalloc+0xd4/0xd8
[   22.049538]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.049590]  kasan_atomics+0xb8/0x2e0
[   22.049633]  kunit_try_run_case+0x170/0x3f0
[   22.049679]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.049733]  kthread+0x328/0x630
[   22.049777]  ret_from_fork+0x10/0x20
[   22.049845] 
[   22.049876] The buggy address belongs to the object at fff00000c59de300
[   22.049876]  which belongs to the cache kmalloc-64 of size 64
[   22.049947] The buggy address is located 0 bytes to the right of
[   22.049947]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.050064] 
[   22.050097] The buggy address belongs to the physical page:
[   22.050185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.050278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.050337] page_type: f5(slab)
[   22.050388] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.050454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.050541] page dumped because: kasan: bad access detected
[   22.050614] 
[   22.050663] Memory state around the buggy address:
[   22.050705]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.050759]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.050808] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.050852]                                      ^
[   22.050893]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.050944]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.051001] ==================================================================
[   22.059361] ==================================================================
[   22.059429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   22.059498] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.059556] 
[   22.059594] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.059692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.059725] Hardware name: linux,dummy-virt (DT)
[   22.059761] Call trace:
[   22.059790]  show_stack+0x20/0x38 (C)
[   22.059850]  dump_stack_lvl+0x8c/0xd0
[   22.059903]  print_report+0x118/0x608
[   22.059959]  kasan_report+0xdc/0x128
[   22.060027]  kasan_check_range+0x100/0x1a8
[   22.060085]  __kasan_check_write+0x20/0x30
[   22.060140]  kasan_atomics_helper+0x1414/0x4858
[   22.060194]  kasan_atomics+0x198/0x2e0
[   22.060247]  kunit_try_run_case+0x170/0x3f0
[   22.060300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.060361]  kthread+0x328/0x630
[   22.060414]  ret_from_fork+0x10/0x20
[   22.060471] 
[   22.060495] Allocated by task 265:
[   22.060530]  kasan_save_stack+0x3c/0x68
[   22.060581]  kasan_save_track+0x20/0x40
[   22.060627]  kasan_save_alloc_info+0x40/0x58
[   22.060675]  __kasan_kmalloc+0xd4/0xd8
[   22.060719]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.060765]  kasan_atomics+0xb8/0x2e0
[   22.060806]  kunit_try_run_case+0x170/0x3f0
[   22.060854]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.060905]  kthread+0x328/0x630
[   22.060949]  ret_from_fork+0x10/0x20
[   22.061977] 
[   22.062040] The buggy address belongs to the object at fff00000c59de300
[   22.062040]  which belongs to the cache kmalloc-64 of size 64
[   22.062172] The buggy address is located 0 bytes to the right of
[   22.062172]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.062353] 
[   22.062405] The buggy address belongs to the physical page:
[   22.062511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.062720] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.062780] page_type: f5(slab)
[   22.062829] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.062883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.062929] page dumped because: kasan: bad access detected
[   22.063558] 
[   22.063589] Memory state around the buggy address:
[   22.063634]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.063688]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.063736] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.063781]                                      ^
[   22.063822]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.063917]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.063964] ==================================================================
[   22.113023] ==================================================================
[   22.113092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   22.113564] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.113670] 
[   22.113728] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.113841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.113878] Hardware name: linux,dummy-virt (DT)
[   22.113919] Call trace:
[   22.113951]  show_stack+0x20/0x38 (C)
[   22.114031]  dump_stack_lvl+0x8c/0xd0
[   22.114089]  print_report+0x118/0x608
[   22.114142]  kasan_report+0xdc/0x128
[   22.114195]  kasan_check_range+0x100/0x1a8
[   22.114251]  __kasan_check_write+0x20/0x30
[   22.114308]  kasan_atomics_helper+0x16d0/0x4858
[   22.114363]  kasan_atomics+0x198/0x2e0
[   22.114411]  kunit_try_run_case+0x170/0x3f0
[   22.115491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.115613]  kthread+0x328/0x630
[   22.115673]  ret_from_fork+0x10/0x20
[   22.115775] 
[   22.115804] Allocated by task 265:
[   22.115839]  kasan_save_stack+0x3c/0x68
[   22.115894]  kasan_save_track+0x20/0x40
[   22.115940]  kasan_save_alloc_info+0x40/0x58
[   22.116011]  __kasan_kmalloc+0xd4/0xd8
[   22.116060]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.116263]  kasan_atomics+0xb8/0x2e0
[   22.116421]  kunit_try_run_case+0x170/0x3f0
[   22.116565]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.116895]  kthread+0x328/0x630
[   22.116981]  ret_from_fork+0x10/0x20
[   22.117036] 
[   22.117141] The buggy address belongs to the object at fff00000c59de300
[   22.117141]  which belongs to the cache kmalloc-64 of size 64
[   22.117209] The buggy address is located 0 bytes to the right of
[   22.117209]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.117283] 
[   22.117308] The buggy address belongs to the physical page:
[   22.117348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.117409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.117692] page_type: f5(slab)
[   22.117816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.118207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.118307] page dumped because: kasan: bad access detected
[   22.118365] 
[   22.118392] Memory state around the buggy address:
[   22.118662]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.119063]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.119180] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.119524]                                      ^
[   22.119738]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.119858]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.119923] ==================================================================
[   22.131862] ==================================================================
[   22.131944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   22.132042] Write of size 8 at addr fff00000c59de330 by task kunit_try_catch/265
[   22.132103] 
[   22.132148] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT 
[   22.132247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.132280] Hardware name: linux,dummy-virt (DT)
[   22.132315] Call trace:
[   22.132343]  show_stack+0x20/0x38 (C)
[   22.132402]  dump_stack_lvl+0x8c/0xd0
[   22.132453]  print_report+0x118/0x608
[   22.132505]  kasan_report+0xdc/0x128
[   22.132554]  kasan_check_range+0x100/0x1a8
[   22.132607]  __kasan_check_write+0x20/0x30
[   22.132661]  kasan_atomics_helper+0x175c/0x4858
[   22.132715]  kasan_atomics+0x198/0x2e0
[   22.132762]  kunit_try_run_case+0x170/0x3f0
[   22.132815]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.132873]  kthread+0x328/0x630
[   22.132926]  ret_from_fork+0x10/0x20
[   22.133003] 
[   22.133146] Allocated by task 265:
[   22.133193]  kasan_save_stack+0x3c/0x68
[   22.133258]  kasan_save_track+0x20/0x40
[   22.133305]  kasan_save_alloc_info+0x40/0x58
[   22.133354]  __kasan_kmalloc+0xd4/0xd8
[   22.133398]  __kmalloc_cache_noprof+0x15c/0x3c0
[   22.133456]  kasan_atomics+0xb8/0x2e0
[   22.133507]  kunit_try_run_case+0x170/0x3f0
[   22.133553]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.133605]  kthread+0x328/0x630
[   22.133883]  ret_from_fork+0x10/0x20
[   22.133988] 
[   22.134111] The buggy address belongs to the object at fff00000c59de300
[   22.134111]  which belongs to the cache kmalloc-64 of size 64
[   22.134485] The buggy address is located 0 bytes to the right of
[   22.134485]  allocated 48-byte region [fff00000c59de300, fff00000c59de330)
[   22.134564] 
[   22.134592] The buggy address belongs to the physical page:
[   22.134731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1059de
[   22.135063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.135353] page_type: f5(slab)
[   22.135481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.135543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.135592] page dumped because: kasan: bad access detected
[   22.135633] 
[   22.135659] Memory state around the buggy address:
[   22.135699]  fff00000c59de200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.135750]  fff00000c59de280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.135800] >fff00000c59de300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.135845]                                      ^
[   22.135887]  fff00000c59de380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.136194]  fff00000c59de400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.136252] ==================================================================

[   14.245634] ==================================================================
[   14.245920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   14.246243] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.246584] 
[   14.246708] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.246757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.246770] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.246792] Call Trace:
[   14.246805]  <TASK>
[   14.246821]  dump_stack_lvl+0x73/0xb0
[   14.246848]  print_report+0xd1/0x650
[   14.246871]  ? __virt_addr_valid+0x1db/0x2d0
[   14.246897]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.246920]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.246944]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.246968]  kasan_report+0x141/0x180
[   14.246992]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.247020]  __asan_report_load4_noabort+0x18/0x20
[   14.247041]  kasan_atomics_helper+0x4a1c/0x5450
[   14.247066]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.247089]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.247112]  ? kasan_atomics+0x152/0x310
[   14.247136]  kasan_atomics+0x1dc/0x310
[   14.247157]  ? __pfx_kasan_atomics+0x10/0x10
[   14.247180]  ? __pfx_read_tsc+0x10/0x10
[   14.247217]  ? ktime_get_ts64+0x86/0x230
[   14.247244]  kunit_try_run_case+0x1a5/0x480
[   14.247269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.247291]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.247315]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.247338]  ? __kthread_parkme+0x82/0x180
[   14.247360]  ? preempt_count_sub+0x50/0x80
[   14.247385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.247410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.247433]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.247458]  kthread+0x337/0x6f0
[   14.247479]  ? trace_preempt_on+0x20/0xc0
[   14.247502]  ? __pfx_kthread+0x10/0x10
[   14.247525]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.247553]  ? calculate_sigpending+0x7b/0xa0
[   14.247577]  ? __pfx_kthread+0x10/0x10
[   14.247603]  ret_from_fork+0x116/0x1d0
[   14.247632]  ? __pfx_kthread+0x10/0x10
[   14.247655]  ret_from_fork_asm+0x1a/0x30
[   14.247688]  </TASK>
[   14.247699] 
[   14.255472] Allocated by task 282:
[   14.255603]  kasan_save_stack+0x45/0x70
[   14.255942]  kasan_save_track+0x18/0x40
[   14.256136]  kasan_save_alloc_info+0x3b/0x50
[   14.256576]  __kasan_kmalloc+0xb7/0xc0
[   14.256847]  __kmalloc_cache_noprof+0x189/0x420
[   14.257039]  kasan_atomics+0x95/0x310
[   14.257255]  kunit_try_run_case+0x1a5/0x480
[   14.257424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.257792]  kthread+0x337/0x6f0
[   14.257926]  ret_from_fork+0x116/0x1d0
[   14.258109]  ret_from_fork_asm+0x1a/0x30
[   14.258291] 
[   14.258364] The buggy address belongs to the object at ffff8881029e5b80
[   14.258364]  which belongs to the cache kmalloc-64 of size 64
[   14.258845] The buggy address is located 0 bytes to the right of
[   14.258845]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.259558] 
[   14.259664] The buggy address belongs to the physical page:
[   14.259969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.260325] flags: 0x200000000000000(node=0|zone=2)
[   14.260488] page_type: f5(slab)
[   14.261374] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.262442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.263432] page dumped because: kasan: bad access detected
[   14.263685] 
[   14.263792] Memory state around the buggy address:
[   14.264024]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.264788]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.265204] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.265640]                                      ^
[   14.265835]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.266400]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.266823] ==================================================================
[   14.728889] ==================================================================
[   14.729304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   14.729678] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.730012] 
[   14.730130] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.730199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.730213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.730234] Call Trace:
[   14.730249]  <TASK>
[   14.730264]  dump_stack_lvl+0x73/0xb0
[   14.730302]  print_report+0xd1/0x650
[   14.730325]  ? __virt_addr_valid+0x1db/0x2d0
[   14.730349]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.730383]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.730407]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.730431]  kasan_report+0x141/0x180
[   14.730465]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.730494]  kasan_check_range+0x10c/0x1c0
[   14.730530]  __kasan_check_write+0x18/0x20
[   14.730553]  kasan_atomics_helper+0x1c18/0x5450
[   14.730578]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.730602]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.730640]  ? kasan_atomics+0x152/0x310
[   14.730665]  kasan_atomics+0x1dc/0x310
[   14.730695]  ? __pfx_kasan_atomics+0x10/0x10
[   14.730717]  ? __pfx_read_tsc+0x10/0x10
[   14.730739]  ? ktime_get_ts64+0x86/0x230
[   14.730766]  kunit_try_run_case+0x1a5/0x480
[   14.730790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.730822]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.730845]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.730868]  ? __kthread_parkme+0x82/0x180
[   14.730900]  ? preempt_count_sub+0x50/0x80
[   14.730925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.730950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.730973]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.731007]  kthread+0x337/0x6f0
[   14.731028]  ? trace_preempt_on+0x20/0xc0
[   14.731052]  ? __pfx_kthread+0x10/0x10
[   14.731085]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.731107]  ? calculate_sigpending+0x7b/0xa0
[   14.731132]  ? __pfx_kthread+0x10/0x10
[   14.731179]  ret_from_fork+0x116/0x1d0
[   14.731199]  ? __pfx_kthread+0x10/0x10
[   14.731231]  ret_from_fork_asm+0x1a/0x30
[   14.731264]  </TASK>
[   14.731276] 
[   14.738865] Allocated by task 282:
[   14.738994]  kasan_save_stack+0x45/0x70
[   14.739137]  kasan_save_track+0x18/0x40
[   14.739326]  kasan_save_alloc_info+0x3b/0x50
[   14.739568]  __kasan_kmalloc+0xb7/0xc0
[   14.739769]  __kmalloc_cache_noprof+0x189/0x420
[   14.739990]  kasan_atomics+0x95/0x310
[   14.740191]  kunit_try_run_case+0x1a5/0x480
[   14.740400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.740659]  kthread+0x337/0x6f0
[   14.740828]  ret_from_fork+0x116/0x1d0
[   14.741019]  ret_from_fork_asm+0x1a/0x30
[   14.741223] 
[   14.741333] The buggy address belongs to the object at ffff8881029e5b80
[   14.741333]  which belongs to the cache kmalloc-64 of size 64
[   14.741768] The buggy address is located 0 bytes to the right of
[   14.741768]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.742327] 
[   14.742437] The buggy address belongs to the physical page:
[   14.742688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.743036] flags: 0x200000000000000(node=0|zone=2)
[   14.743294] page_type: f5(slab)
[   14.743460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.743804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.744118] page dumped because: kasan: bad access detected
[   14.744415] 
[   14.744526] Memory state around the buggy address:
[   14.744756]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.744994]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.745267] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.745595]                                      ^
[   14.745826]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.746131]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.746386] ==================================================================
[   14.017013] ==================================================================
[   14.017424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   14.017840] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.018143] 
[   14.018294] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.018342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.018354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.018377] Call Trace:
[   14.018392]  <TASK>
[   14.018408]  dump_stack_lvl+0x73/0xb0
[   14.018436]  print_report+0xd1/0x650
[   14.018460]  ? __virt_addr_valid+0x1db/0x2d0
[   14.018487]  ? kasan_atomics_helper+0xc70/0x5450
[   14.018510]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.018534]  ? kasan_atomics_helper+0xc70/0x5450
[   14.018557]  kasan_report+0x141/0x180
[   14.018580]  ? kasan_atomics_helper+0xc70/0x5450
[   14.018608]  kasan_check_range+0x10c/0x1c0
[   14.018646]  __kasan_check_write+0x18/0x20
[   14.018666]  kasan_atomics_helper+0xc70/0x5450
[   14.018690]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.018714]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.018736]  ? kasan_atomics+0x152/0x310
[   14.018761]  kasan_atomics+0x1dc/0x310
[   14.018831]  ? __pfx_kasan_atomics+0x10/0x10
[   14.018856]  ? __pfx_read_tsc+0x10/0x10
[   14.018878]  ? ktime_get_ts64+0x86/0x230
[   14.018904]  kunit_try_run_case+0x1a5/0x480
[   14.018929]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.018953]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.018975]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.018999]  ? __kthread_parkme+0x82/0x180
[   14.019021]  ? preempt_count_sub+0x50/0x80
[   14.019045]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.019069]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.019093]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.019117]  kthread+0x337/0x6f0
[   14.019138]  ? trace_preempt_on+0x20/0xc0
[   14.019162]  ? __pfx_kthread+0x10/0x10
[   14.019185]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.019207]  ? calculate_sigpending+0x7b/0xa0
[   14.019241]  ? __pfx_kthread+0x10/0x10
[   14.019264]  ret_from_fork+0x116/0x1d0
[   14.019283]  ? __pfx_kthread+0x10/0x10
[   14.019305]  ret_from_fork_asm+0x1a/0x30
[   14.019339]  </TASK>
[   14.019352] 
[   14.027661] Allocated by task 282:
[   14.027795]  kasan_save_stack+0x45/0x70
[   14.027939]  kasan_save_track+0x18/0x40
[   14.028092]  kasan_save_alloc_info+0x3b/0x50
[   14.028726]  __kasan_kmalloc+0xb7/0xc0
[   14.028949]  __kmalloc_cache_noprof+0x189/0x420
[   14.029176]  kasan_atomics+0x95/0x310
[   14.029367]  kunit_try_run_case+0x1a5/0x480
[   14.029683]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.029952]  kthread+0x337/0x6f0
[   14.030086]  ret_from_fork+0x116/0x1d0
[   14.030236]  ret_from_fork_asm+0x1a/0x30
[   14.030434] 
[   14.030545] The buggy address belongs to the object at ffff8881029e5b80
[   14.030545]  which belongs to the cache kmalloc-64 of size 64
[   14.031054] The buggy address is located 0 bytes to the right of
[   14.031054]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.031445] 
[   14.031542] The buggy address belongs to the physical page:
[   14.031817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.032231] flags: 0x200000000000000(node=0|zone=2)
[   14.032406] page_type: f5(slab)
[   14.032709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.033073] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.033511] page dumped because: kasan: bad access detected
[   14.033788] 
[   14.033892] Memory state around the buggy address:
[   14.034071]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.034342]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.034683] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.035090]                                      ^
[   14.035355]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.035750]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.035972] ==================================================================
[   14.710754] ==================================================================
[   14.711215] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   14.711601] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.711968] 
[   14.712076] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.712131] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.712145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.712190] Call Trace:
[   14.712203]  <TASK>
[   14.712218]  dump_stack_lvl+0x73/0xb0
[   14.712247]  print_report+0xd1/0x650
[   14.712272]  ? __virt_addr_valid+0x1db/0x2d0
[   14.712295]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.712318]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.712352]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.712376]  kasan_report+0x141/0x180
[   14.712399]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.712438]  kasan_check_range+0x10c/0x1c0
[   14.712463]  __kasan_check_write+0x18/0x20
[   14.712484]  kasan_atomics_helper+0x1b22/0x5450
[   14.712508]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.712531]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.712563]  ? kasan_atomics+0x152/0x310
[   14.712587]  kasan_atomics+0x1dc/0x310
[   14.712607]  ? __pfx_kasan_atomics+0x10/0x10
[   14.712646]  ? __pfx_read_tsc+0x10/0x10
[   14.712668]  ? ktime_get_ts64+0x86/0x230
[   14.712693]  kunit_try_run_case+0x1a5/0x480
[   14.712719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.712741]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.712763]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.712787]  ? __kthread_parkme+0x82/0x180
[   14.712807]  ? preempt_count_sub+0x50/0x80
[   14.712832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.712866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.712890]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.712914]  kthread+0x337/0x6f0
[   14.712945]  ? trace_preempt_on+0x20/0xc0
[   14.712970]  ? __pfx_kthread+0x10/0x10
[   14.712992]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.713013]  ? calculate_sigpending+0x7b/0xa0
[   14.713038]  ? __pfx_kthread+0x10/0x10
[   14.713061]  ret_from_fork+0x116/0x1d0
[   14.713081]  ? __pfx_kthread+0x10/0x10
[   14.713103]  ret_from_fork_asm+0x1a/0x30
[   14.713142]  </TASK>
[   14.713153] 
[   14.720813] Allocated by task 282:
[   14.720995]  kasan_save_stack+0x45/0x70
[   14.721219]  kasan_save_track+0x18/0x40
[   14.721400]  kasan_save_alloc_info+0x3b/0x50
[   14.721549]  __kasan_kmalloc+0xb7/0xc0
[   14.721734]  __kmalloc_cache_noprof+0x189/0x420
[   14.721960]  kasan_atomics+0x95/0x310
[   14.722186]  kunit_try_run_case+0x1a5/0x480
[   14.722404]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.722653]  kthread+0x337/0x6f0
[   14.722842]  ret_from_fork+0x116/0x1d0
[   14.723025]  ret_from_fork_asm+0x1a/0x30
[   14.723239] 
[   14.723337] The buggy address belongs to the object at ffff8881029e5b80
[   14.723337]  which belongs to the cache kmalloc-64 of size 64
[   14.723845] The buggy address is located 0 bytes to the right of
[   14.723845]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.724397] 
[   14.724497] The buggy address belongs to the physical page:
[   14.724745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.725051] flags: 0x200000000000000(node=0|zone=2)
[   14.725239] page_type: f5(slab)
[   14.725362] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.725701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.726099] page dumped because: kasan: bad access detected
[   14.726347] 
[   14.726432] Memory state around the buggy address:
[   14.726632]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.726963]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.727290] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.727604]                                      ^
[   14.727788]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.728111]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.728453] ==================================================================
[   13.679377] ==================================================================
[   13.679943] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   13.680476] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   13.680927] 
[   13.681047] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.681097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.681112] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.681135] Call Trace:
[   13.681151]  <TASK>
[   13.681167]  dump_stack_lvl+0x73/0xb0
[   13.681394]  print_report+0xd1/0x650
[   13.681420]  ? __virt_addr_valid+0x1db/0x2d0
[   13.681444]  ? kasan_atomics_helper+0x3df/0x5450
[   13.681466]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.681491]  ? kasan_atomics_helper+0x3df/0x5450
[   13.681514]  kasan_report+0x141/0x180
[   13.681595]  ? kasan_atomics_helper+0x3df/0x5450
[   13.681637]  kasan_check_range+0x10c/0x1c0
[   13.681663]  __kasan_check_read+0x15/0x20
[   13.681683]  kasan_atomics_helper+0x3df/0x5450
[   13.681707]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.681731]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.681756]  ? kasan_atomics+0x152/0x310
[   13.681780]  kasan_atomics+0x1dc/0x310
[   13.681801]  ? __pfx_kasan_atomics+0x10/0x10
[   13.681824]  ? __pfx_read_tsc+0x10/0x10
[   13.681846]  ? ktime_get_ts64+0x86/0x230
[   13.681872]  kunit_try_run_case+0x1a5/0x480
[   13.681897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.681920]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.681942]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.681966]  ? __kthread_parkme+0x82/0x180
[   13.681987]  ? preempt_count_sub+0x50/0x80
[   13.682012]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.682037]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.682061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.682085]  kthread+0x337/0x6f0
[   13.682106]  ? trace_preempt_on+0x20/0xc0
[   13.682131]  ? __pfx_kthread+0x10/0x10
[   13.682153]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.682175]  ? calculate_sigpending+0x7b/0xa0
[   13.682200]  ? __pfx_kthread+0x10/0x10
[   13.682223]  ret_from_fork+0x116/0x1d0
[   13.682242]  ? __pfx_kthread+0x10/0x10
[   13.682264]  ret_from_fork_asm+0x1a/0x30
[   13.682297]  </TASK>
[   13.682308] 
[   13.692553] Allocated by task 282:
[   13.692748]  kasan_save_stack+0x45/0x70
[   13.693074]  kasan_save_track+0x18/0x40
[   13.693266]  kasan_save_alloc_info+0x3b/0x50
[   13.693415]  __kasan_kmalloc+0xb7/0xc0
[   13.693728]  __kmalloc_cache_noprof+0x189/0x420
[   13.693958]  kasan_atomics+0x95/0x310
[   13.694145]  kunit_try_run_case+0x1a5/0x480
[   13.694446]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.694689]  kthread+0x337/0x6f0
[   13.695002]  ret_from_fork+0x116/0x1d0
[   13.695208]  ret_from_fork_asm+0x1a/0x30
[   13.695411] 
[   13.695486] The buggy address belongs to the object at ffff8881029e5b80
[   13.695486]  which belongs to the cache kmalloc-64 of size 64
[   13.696041] The buggy address is located 0 bytes to the right of
[   13.696041]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   13.696555] 
[   13.696659] The buggy address belongs to the physical page:
[   13.696886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   13.697247] flags: 0x200000000000000(node=0|zone=2)
[   13.697445] page_type: f5(slab)
[   13.697686] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.697950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.698177] page dumped because: kasan: bad access detected
[   13.698402] 
[   13.698566] Memory state around the buggy address:
[   13.698809]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.699078]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.699293] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.699954]                                      ^
[   13.700194]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.700517]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.700874] ==================================================================
[   14.119665] ==================================================================
[   14.120460] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   14.121196] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.121488] 
[   14.121640] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.121689] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.121702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.121725] Call Trace:
[   14.121739]  <TASK>
[   14.121754]  dump_stack_lvl+0x73/0xb0
[   14.121782]  print_report+0xd1/0x650
[   14.121806]  ? __virt_addr_valid+0x1db/0x2d0
[   14.121830]  ? kasan_atomics_helper+0xf10/0x5450
[   14.121852]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.121877]  ? kasan_atomics_helper+0xf10/0x5450
[   14.121900]  kasan_report+0x141/0x180
[   14.121924]  ? kasan_atomics_helper+0xf10/0x5450
[   14.121952]  kasan_check_range+0x10c/0x1c0
[   14.121977]  __kasan_check_write+0x18/0x20
[   14.121998]  kasan_atomics_helper+0xf10/0x5450
[   14.122023]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.122047]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.122069]  ? kasan_atomics+0x152/0x310
[   14.122094]  kasan_atomics+0x1dc/0x310
[   14.122114]  ? __pfx_kasan_atomics+0x10/0x10
[   14.122136]  ? __pfx_read_tsc+0x10/0x10
[   14.122158]  ? ktime_get_ts64+0x86/0x230
[   14.122201]  kunit_try_run_case+0x1a5/0x480
[   14.122226]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.122250]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.122273]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.122297]  ? __kthread_parkme+0x82/0x180
[   14.122318]  ? preempt_count_sub+0x50/0x80
[   14.122343]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.122368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.122394]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.122418]  kthread+0x337/0x6f0
[   14.122439]  ? trace_preempt_on+0x20/0xc0
[   14.122469]  ? __pfx_kthread+0x10/0x10
[   14.122491]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.122513]  ? calculate_sigpending+0x7b/0xa0
[   14.122580]  ? __pfx_kthread+0x10/0x10
[   14.122604]  ret_from_fork+0x116/0x1d0
[   14.122635]  ? __pfx_kthread+0x10/0x10
[   14.122657]  ret_from_fork_asm+0x1a/0x30
[   14.122690]  </TASK>
[   14.122701] 
[   14.137477] Allocated by task 282:
[   14.137902]  kasan_save_stack+0x45/0x70
[   14.138305]  kasan_save_track+0x18/0x40
[   14.138745]  kasan_save_alloc_info+0x3b/0x50
[   14.138942]  __kasan_kmalloc+0xb7/0xc0
[   14.139077]  __kmalloc_cache_noprof+0x189/0x420
[   14.139323]  kasan_atomics+0x95/0x310
[   14.139836]  kunit_try_run_case+0x1a5/0x480
[   14.140264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.140832]  kthread+0x337/0x6f0
[   14.141154]  ret_from_fork+0x116/0x1d0
[   14.141575]  ret_from_fork_asm+0x1a/0x30
[   14.141949] 
[   14.142037] The buggy address belongs to the object at ffff8881029e5b80
[   14.142037]  which belongs to the cache kmalloc-64 of size 64
[   14.142723] The buggy address is located 0 bytes to the right of
[   14.142723]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.143984] 
[   14.144153] The buggy address belongs to the physical page:
[   14.144467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.145319] flags: 0x200000000000000(node=0|zone=2)
[   14.145826] page_type: f5(slab)
[   14.146188] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.146794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.147028] page dumped because: kasan: bad access detected
[   14.147242] 
[   14.147405] Memory state around the buggy address:
[   14.147887]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.148672]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.149302] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.150113]                                      ^
[   14.150822]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.151101]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.151648] ==================================================================
[   14.634972] ==================================================================
[   14.635342] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   14.635684] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.636166] 
[   14.636297] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.636343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.636355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.636376] Call Trace:
[   14.636391]  <TASK>
[   14.636406]  dump_stack_lvl+0x73/0xb0
[   14.636433]  print_report+0xd1/0x650
[   14.636456]  ? __virt_addr_valid+0x1db/0x2d0
[   14.636480]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.636502]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.636526]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.636550]  kasan_report+0x141/0x180
[   14.636574]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.636602]  kasan_check_range+0x10c/0x1c0
[   14.636638]  __kasan_check_write+0x18/0x20
[   14.636659]  kasan_atomics_helper+0x18b1/0x5450
[   14.636683]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.636707]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.636730]  ? kasan_atomics+0x152/0x310
[   14.636756]  kasan_atomics+0x1dc/0x310
[   14.636777]  ? __pfx_kasan_atomics+0x10/0x10
[   14.636799]  ? __pfx_read_tsc+0x10/0x10
[   14.636820]  ? ktime_get_ts64+0x86/0x230
[   14.636846]  kunit_try_run_case+0x1a5/0x480
[   14.636871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.636895]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.636918]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.636941]  ? __kthread_parkme+0x82/0x180
[   14.636963]  ? preempt_count_sub+0x50/0x80
[   14.636989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.637014]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.637038]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.637062]  kthread+0x337/0x6f0
[   14.637083]  ? trace_preempt_on+0x20/0xc0
[   14.637108]  ? __pfx_kthread+0x10/0x10
[   14.637129]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.637151]  ? calculate_sigpending+0x7b/0xa0
[   14.637176]  ? __pfx_kthread+0x10/0x10
[   14.637210]  ret_from_fork+0x116/0x1d0
[   14.637229]  ? __pfx_kthread+0x10/0x10
[   14.637252]  ret_from_fork_asm+0x1a/0x30
[   14.637285]  </TASK>
[   14.637296] 
[   14.644738] Allocated by task 282:
[   14.644893]  kasan_save_stack+0x45/0x70
[   14.645075]  kasan_save_track+0x18/0x40
[   14.645279]  kasan_save_alloc_info+0x3b/0x50
[   14.645469]  __kasan_kmalloc+0xb7/0xc0
[   14.645646]  __kmalloc_cache_noprof+0x189/0x420
[   14.645799]  kasan_atomics+0x95/0x310
[   14.645931]  kunit_try_run_case+0x1a5/0x480
[   14.646079]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.646499]  kthread+0x337/0x6f0
[   14.646690]  ret_from_fork+0x116/0x1d0
[   14.646887]  ret_from_fork_asm+0x1a/0x30
[   14.647086] 
[   14.647192] The buggy address belongs to the object at ffff8881029e5b80
[   14.647192]  which belongs to the cache kmalloc-64 of size 64
[   14.647651] The buggy address is located 0 bytes to the right of
[   14.647651]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.648063] 
[   14.648161] The buggy address belongs to the physical page:
[   14.648434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.648800] flags: 0x200000000000000(node=0|zone=2)
[   14.649011] page_type: f5(slab)
[   14.649159] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.649422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.649658] page dumped because: kasan: bad access detected
[   14.649893] 
[   14.649966] Memory state around the buggy address:
[   14.650147]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.650469]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.650811] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.651097]                                      ^
[   14.651292]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.651560]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.651889] ==================================================================
[   14.671908] ==================================================================
[   14.672456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   14.672788] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.673074] 
[   14.673175] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.673241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.673255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.673276] Call Trace:
[   14.673291]  <TASK>
[   14.673323]  dump_stack_lvl+0x73/0xb0
[   14.673351]  print_report+0xd1/0x650
[   14.673392]  ? __virt_addr_valid+0x1db/0x2d0
[   14.673417]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.673439]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.673463]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.673487]  kasan_report+0x141/0x180
[   14.673511]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.673539]  kasan_check_range+0x10c/0x1c0
[   14.673565]  __kasan_check_write+0x18/0x20
[   14.673585]  kasan_atomics_helper+0x19e3/0x5450
[   14.673638]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.673664]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.673685]  ? kasan_atomics+0x152/0x310
[   14.673727]  kasan_atomics+0x1dc/0x310
[   14.673748]  ? __pfx_kasan_atomics+0x10/0x10
[   14.673770]  ? __pfx_read_tsc+0x10/0x10
[   14.673792]  ? ktime_get_ts64+0x86/0x230
[   14.673818]  kunit_try_run_case+0x1a5/0x480
[   14.673843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.673883]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.673907]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.673931]  ? __kthread_parkme+0x82/0x180
[   14.673951]  ? preempt_count_sub+0x50/0x80
[   14.673977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.674002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.674043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.674068]  kthread+0x337/0x6f0
[   14.674089]  ? trace_preempt_on+0x20/0xc0
[   14.674113]  ? __pfx_kthread+0x10/0x10
[   14.674136]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.674158]  ? calculate_sigpending+0x7b/0xa0
[   14.674225]  ? __pfx_kthread+0x10/0x10
[   14.674248]  ret_from_fork+0x116/0x1d0
[   14.674283]  ? __pfx_kthread+0x10/0x10
[   14.674306]  ret_from_fork_asm+0x1a/0x30
[   14.674339]  </TASK>
[   14.674350] 
[   14.682133] Allocated by task 282:
[   14.682260]  kasan_save_stack+0x45/0x70
[   14.682404]  kasan_save_track+0x18/0x40
[   14.682579]  kasan_save_alloc_info+0x3b/0x50
[   14.682778]  __kasan_kmalloc+0xb7/0xc0
[   14.682956]  __kmalloc_cache_noprof+0x189/0x420
[   14.683144]  kasan_atomics+0x95/0x310
[   14.683307]  kunit_try_run_case+0x1a5/0x480
[   14.683493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.685583]  kthread+0x337/0x6f0
[   14.685740]  ret_from_fork+0x116/0x1d0
[   14.685880]  ret_from_fork_asm+0x1a/0x30
[   14.686021] 
[   14.686099] The buggy address belongs to the object at ffff8881029e5b80
[   14.686099]  which belongs to the cache kmalloc-64 of size 64
[   14.686606] The buggy address is located 0 bytes to the right of
[   14.686606]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.687112] 
[   14.687228] The buggy address belongs to the physical page:
[   14.687490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.687842] flags: 0x200000000000000(node=0|zone=2)
[   14.688036] page_type: f5(slab)
[   14.688251] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.688587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.688927] page dumped because: kasan: bad access detected
[   14.689160] 
[   14.689281] Memory state around the buggy address:
[   14.689528]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.689849]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.690182] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.690525]                                      ^
[   14.690782]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.691113]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.691478] ==================================================================
[   14.989868] ==================================================================
[   14.990270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   14.990659] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.991017] 
[   14.991134] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.991222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.991235] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.991258] Call Trace:
[   14.991284]  <TASK>
[   14.991298]  dump_stack_lvl+0x73/0xb0
[   14.991356]  print_report+0xd1/0x650
[   14.991381]  ? __virt_addr_valid+0x1db/0x2d0
[   14.991405]  ? kasan_atomics_helper+0x224c/0x5450
[   14.991439]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.991463]  ? kasan_atomics_helper+0x224c/0x5450
[   14.991486]  kasan_report+0x141/0x180
[   14.991510]  ? kasan_atomics_helper+0x224c/0x5450
[   14.991538]  kasan_check_range+0x10c/0x1c0
[   14.991563]  __kasan_check_write+0x18/0x20
[   14.991584]  kasan_atomics_helper+0x224c/0x5450
[   14.991609]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.991641]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.991664]  ? kasan_atomics+0x152/0x310
[   14.991688]  kasan_atomics+0x1dc/0x310
[   14.991708]  ? __pfx_kasan_atomics+0x10/0x10
[   14.991760]  ? __pfx_read_tsc+0x10/0x10
[   14.991795]  ? ktime_get_ts64+0x86/0x230
[   14.991832]  kunit_try_run_case+0x1a5/0x480
[   14.991856]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.991879]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.991903]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.991927]  ? __kthread_parkme+0x82/0x180
[   14.991948]  ? preempt_count_sub+0x50/0x80
[   14.991973]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.991998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.992022]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.992047]  kthread+0x337/0x6f0
[   14.992068]  ? trace_preempt_on+0x20/0xc0
[   14.992092]  ? __pfx_kthread+0x10/0x10
[   14.992114]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.992135]  ? calculate_sigpending+0x7b/0xa0
[   14.992179]  ? __pfx_kthread+0x10/0x10
[   14.992203]  ret_from_fork+0x116/0x1d0
[   14.992223]  ? __pfx_kthread+0x10/0x10
[   14.992246]  ret_from_fork_asm+0x1a/0x30
[   14.992279]  </TASK>
[   14.992290] 
[   15.000180] Allocated by task 282:
[   15.000317]  kasan_save_stack+0x45/0x70
[   15.000516]  kasan_save_track+0x18/0x40
[   15.000762]  kasan_save_alloc_info+0x3b/0x50
[   15.000978]  __kasan_kmalloc+0xb7/0xc0
[   15.001231]  __kmalloc_cache_noprof+0x189/0x420
[   15.001572]  kasan_atomics+0x95/0x310
[   15.001762]  kunit_try_run_case+0x1a5/0x480
[   15.001911]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.002086]  kthread+0x337/0x6f0
[   15.002269]  ret_from_fork+0x116/0x1d0
[   15.002510]  ret_from_fork_asm+0x1a/0x30
[   15.002717] 
[   15.002814] The buggy address belongs to the object at ffff8881029e5b80
[   15.002814]  which belongs to the cache kmalloc-64 of size 64
[   15.003469] The buggy address is located 0 bytes to the right of
[   15.003469]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   15.004024] 
[   15.004129] The buggy address belongs to the physical page:
[   15.004501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   15.004787] flags: 0x200000000000000(node=0|zone=2)
[   15.005028] page_type: f5(slab)
[   15.005185] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.005516] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.005860] page dumped because: kasan: bad access detected
[   15.006098] 
[   15.006187] Memory state around the buggy address:
[   15.006401]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.006791]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.007099] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.007438]                                      ^
[   15.007598]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.007824]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.008143] ==================================================================
[   15.008798] ==================================================================
[   15.009095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   15.009556] Read of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   15.009795] 
[   15.009883] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   15.009930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.009943] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.009965] Call Trace:
[   15.009981]  <TASK>
[   15.009997]  dump_stack_lvl+0x73/0xb0
[   15.010024]  print_report+0xd1/0x650
[   15.010047]  ? __virt_addr_valid+0x1db/0x2d0
[   15.010108]  ? kasan_atomics_helper+0x5115/0x5450
[   15.010133]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.010187]  ? kasan_atomics_helper+0x5115/0x5450
[   15.010240]  kasan_report+0x141/0x180
[   15.010267]  ? kasan_atomics_helper+0x5115/0x5450
[   15.010296]  __asan_report_load8_noabort+0x18/0x20
[   15.010328]  kasan_atomics_helper+0x5115/0x5450
[   15.010352]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.010376]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.010398]  ? kasan_atomics+0x152/0x310
[   15.010422]  kasan_atomics+0x1dc/0x310
[   15.010443]  ? __pfx_kasan_atomics+0x10/0x10
[   15.010471]  ? __pfx_read_tsc+0x10/0x10
[   15.010493]  ? ktime_get_ts64+0x86/0x230
[   15.010519]  kunit_try_run_case+0x1a5/0x480
[   15.010571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.010594]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.010634]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.010658]  ? __kthread_parkme+0x82/0x180
[   15.010680]  ? preempt_count_sub+0x50/0x80
[   15.010705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.010730]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.010754]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.010778]  kthread+0x337/0x6f0
[   15.010799]  ? trace_preempt_on+0x20/0xc0
[   15.010824]  ? __pfx_kthread+0x10/0x10
[   15.010846]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.010867]  ? calculate_sigpending+0x7b/0xa0
[   15.010892]  ? __pfx_kthread+0x10/0x10
[   15.010915]  ret_from_fork+0x116/0x1d0
[   15.010935]  ? __pfx_kthread+0x10/0x10
[   15.010957]  ret_from_fork_asm+0x1a/0x30
[   15.010989]  </TASK>
[   15.011000] 
[   15.019118] Allocated by task 282:
[   15.019273]  kasan_save_stack+0x45/0x70
[   15.019420]  kasan_save_track+0x18/0x40
[   15.019602]  kasan_save_alloc_info+0x3b/0x50
[   15.019800]  __kasan_kmalloc+0xb7/0xc0
[   15.020009]  __kmalloc_cache_noprof+0x189/0x420
[   15.020206]  kasan_atomics+0x95/0x310
[   15.020423]  kunit_try_run_case+0x1a5/0x480
[   15.020602]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.020786]  kthread+0x337/0x6f0
[   15.020915]  ret_from_fork+0x116/0x1d0
[   15.021108]  ret_from_fork_asm+0x1a/0x30
[   15.021428] 
[   15.021551] The buggy address belongs to the object at ffff8881029e5b80
[   15.021551]  which belongs to the cache kmalloc-64 of size 64
[   15.022065] The buggy address is located 0 bytes to the right of
[   15.022065]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   15.022601] 
[   15.022713] The buggy address belongs to the physical page:
[   15.023080] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   15.023513] flags: 0x200000000000000(node=0|zone=2)
[   15.023691] page_type: f5(slab)
[   15.023861] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.024274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.024607] page dumped because: kasan: bad access detected
[   15.025233] 
[   15.025507] Memory state around the buggy address:
[   15.025977]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.026840]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.027314] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.027937]                                      ^
[   15.028558]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.029157]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.029703] ==================================================================
[   13.626388] ==================================================================
[   13.626858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   13.627746] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   13.628424] 
[   13.628523] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.628597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.628610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.628643] Call Trace:
[   13.628656]  <TASK>
[   13.628670]  dump_stack_lvl+0x73/0xb0
[   13.628831]  print_report+0xd1/0x650
[   13.628863]  ? __virt_addr_valid+0x1db/0x2d0
[   13.628886]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.628907]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.628931]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.628953]  kasan_report+0x141/0x180
[   13.628975]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.629002]  __asan_report_load4_noabort+0x18/0x20
[   13.629023]  kasan_atomics_helper+0x4b88/0x5450
[   13.629046]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.629069]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.629091]  ? kasan_atomics+0x152/0x310
[   13.629114]  kasan_atomics+0x1dc/0x310
[   13.629134]  ? __pfx_kasan_atomics+0x10/0x10
[   13.629155]  ? __pfx_read_tsc+0x10/0x10
[   13.629183]  ? ktime_get_ts64+0x86/0x230
[   13.629208]  kunit_try_run_case+0x1a5/0x480
[   13.629231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.629252]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.629274]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.629297]  ? __kthread_parkme+0x82/0x180
[   13.629317]  ? preempt_count_sub+0x50/0x80
[   13.629341]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.629365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.629389]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.629412]  kthread+0x337/0x6f0
[   13.629433]  ? trace_preempt_on+0x20/0xc0
[   13.629455]  ? __pfx_kthread+0x10/0x10
[   13.629476]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.629497]  ? calculate_sigpending+0x7b/0xa0
[   13.629529]  ? __pfx_kthread+0x10/0x10
[   13.629551]  ret_from_fork+0x116/0x1d0
[   13.629569]  ? __pfx_kthread+0x10/0x10
[   13.629590]  ret_from_fork_asm+0x1a/0x30
[   13.629633]  </TASK>
[   13.629644] 
[   13.641514] Allocated by task 282:
[   13.641926]  kasan_save_stack+0x45/0x70
[   13.642105]  kasan_save_track+0x18/0x40
[   13.642439]  kasan_save_alloc_info+0x3b/0x50
[   13.642855]  __kasan_kmalloc+0xb7/0xc0
[   13.643118]  __kmalloc_cache_noprof+0x189/0x420
[   13.643344]  kasan_atomics+0x95/0x310
[   13.643530]  kunit_try_run_case+0x1a5/0x480
[   13.643935]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.644307]  kthread+0x337/0x6f0
[   13.644576]  ret_from_fork+0x116/0x1d0
[   13.644953]  ret_from_fork_asm+0x1a/0x30
[   13.645150] 
[   13.645270] The buggy address belongs to the object at ffff8881029e5b80
[   13.645270]  which belongs to the cache kmalloc-64 of size 64
[   13.646109] The buggy address is located 0 bytes to the right of
[   13.646109]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   13.647225] 
[   13.647378] The buggy address belongs to the physical page:
[   13.647820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   13.648073] flags: 0x200000000000000(node=0|zone=2)
[   13.648349] page_type: f5(slab)
[   13.648849] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.649164] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.649519] page dumped because: kasan: bad access detected
[   13.650039] 
[   13.650141] Memory state around the buggy address:
[   13.650410]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.651080]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.651523] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.652293]                                      ^
[   13.652795]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.653105]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.653700] ==================================================================
[   13.858234] ==================================================================
[   13.859177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   13.859417] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   13.860034] 
[   13.860279] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.860329] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.860344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.860367] Call Trace:
[   13.860382]  <TASK>
[   13.860399]  dump_stack_lvl+0x73/0xb0
[   13.860457]  print_report+0xd1/0x650
[   13.860483]  ? __virt_addr_valid+0x1db/0x2d0
[   13.860507]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.860581]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.860606]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.860639]  kasan_report+0x141/0x180
[   13.860664]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.860692]  kasan_check_range+0x10c/0x1c0
[   13.860718]  __kasan_check_write+0x18/0x20
[   13.860738]  kasan_atomics_helper+0x7c7/0x5450
[   13.860762]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.860786]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.860808]  ? kasan_atomics+0x152/0x310
[   13.860834]  kasan_atomics+0x1dc/0x310
[   13.860854]  ? __pfx_kasan_atomics+0x10/0x10
[   13.860876]  ? __pfx_read_tsc+0x10/0x10
[   13.860897]  ? ktime_get_ts64+0x86/0x230
[   13.860924]  kunit_try_run_case+0x1a5/0x480
[   13.860948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.860971]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.860995]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.861017]  ? __kthread_parkme+0x82/0x180
[   13.861039]  ? preempt_count_sub+0x50/0x80
[   13.861065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.861089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.861113]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.861137]  kthread+0x337/0x6f0
[   13.861157]  ? trace_preempt_on+0x20/0xc0
[   13.861195]  ? __pfx_kthread+0x10/0x10
[   13.861217]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.861239]  ? calculate_sigpending+0x7b/0xa0
[   13.861263]  ? __pfx_kthread+0x10/0x10
[   13.861287]  ret_from_fork+0x116/0x1d0
[   13.861306]  ? __pfx_kthread+0x10/0x10
[   13.861328]  ret_from_fork_asm+0x1a/0x30
[   13.861361]  </TASK>
[   13.861372] 
[   13.871405] Allocated by task 282:
[   13.871568]  kasan_save_stack+0x45/0x70
[   13.871838]  kasan_save_track+0x18/0x40
[   13.872043]  kasan_save_alloc_info+0x3b/0x50
[   13.872343]  __kasan_kmalloc+0xb7/0xc0
[   13.872566]  __kmalloc_cache_noprof+0x189/0x420
[   13.872773]  kasan_atomics+0x95/0x310
[   13.872946]  kunit_try_run_case+0x1a5/0x480
[   13.873096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.873314]  kthread+0x337/0x6f0
[   13.873808]  ret_from_fork+0x116/0x1d0
[   13.874023]  ret_from_fork_asm+0x1a/0x30
[   13.874223] 
[   13.874319] The buggy address belongs to the object at ffff8881029e5b80
[   13.874319]  which belongs to the cache kmalloc-64 of size 64
[   13.874860] The buggy address is located 0 bytes to the right of
[   13.874860]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   13.875457] 
[   13.875586] The buggy address belongs to the physical page:
[   13.875791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   13.876138] flags: 0x200000000000000(node=0|zone=2)
[   13.876361] page_type: f5(slab)
[   13.876580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.876843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.877072] page dumped because: kasan: bad access detected
[   13.877297] 
[   13.877392] Memory state around the buggy address:
[   13.877797]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.878127]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.878361] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.878580]                                      ^
[   13.879000]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.879579]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.879927] ==================================================================
[   14.296030] ==================================================================
[   14.296591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   14.297276] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.297891] 
[   14.298178] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.298228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.298242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.298263] Call Trace:
[   14.298281]  <TASK>
[   14.298296]  dump_stack_lvl+0x73/0xb0
[   14.298326]  print_report+0xd1/0x650
[   14.298349]  ? __virt_addr_valid+0x1db/0x2d0
[   14.298375]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.298398]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.298423]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.298446]  kasan_report+0x141/0x180
[   14.298477]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.298505]  __asan_report_load4_noabort+0x18/0x20
[   14.298655]  kasan_atomics_helper+0x4a02/0x5450
[   14.298686]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.298711]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.298734]  ? kasan_atomics+0x152/0x310
[   14.298758]  kasan_atomics+0x1dc/0x310
[   14.298779]  ? __pfx_kasan_atomics+0x10/0x10
[   14.298802]  ? __pfx_read_tsc+0x10/0x10
[   14.298824]  ? ktime_get_ts64+0x86/0x230
[   14.298850]  kunit_try_run_case+0x1a5/0x480
[   14.298874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.298898]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.298921]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.298944]  ? __kthread_parkme+0x82/0x180
[   14.298965]  ? preempt_count_sub+0x50/0x80
[   14.298990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.299015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.299038]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.299062]  kthread+0x337/0x6f0
[   14.299083]  ? trace_preempt_on+0x20/0xc0
[   14.299108]  ? __pfx_kthread+0x10/0x10
[   14.299129]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.299151]  ? calculate_sigpending+0x7b/0xa0
[   14.299175]  ? __pfx_kthread+0x10/0x10
[   14.299198]  ret_from_fork+0x116/0x1d0
[   14.299217]  ? __pfx_kthread+0x10/0x10
[   14.299239]  ret_from_fork_asm+0x1a/0x30
[   14.299271]  </TASK>
[   14.299282] 
[   14.311148] Allocated by task 282:
[   14.311483]  kasan_save_stack+0x45/0x70
[   14.311703]  kasan_save_track+0x18/0x40
[   14.312211]  kasan_save_alloc_info+0x3b/0x50
[   14.312514]  __kasan_kmalloc+0xb7/0xc0
[   14.312893]  __kmalloc_cache_noprof+0x189/0x420
[   14.313058]  kasan_atomics+0x95/0x310
[   14.313280]  kunit_try_run_case+0x1a5/0x480
[   14.313888]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.314147]  kthread+0x337/0x6f0
[   14.314385]  ret_from_fork+0x116/0x1d0
[   14.314730]  ret_from_fork_asm+0x1a/0x30
[   14.314895] 
[   14.314995] The buggy address belongs to the object at ffff8881029e5b80
[   14.314995]  which belongs to the cache kmalloc-64 of size 64
[   14.315770] The buggy address is located 0 bytes to the right of
[   14.315770]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.316440] 
[   14.316765] The buggy address belongs to the physical page:
[   14.317099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.317538] flags: 0x200000000000000(node=0|zone=2)
[   14.317877] page_type: f5(slab)
[   14.318056] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.318630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.319193] page dumped because: kasan: bad access detected
[   14.319516] 
[   14.319637] Memory state around the buggy address:
[   14.320130]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.320535]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.321033] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.321375]                                      ^
[   14.321547]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.322078]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.322472] ==================================================================
[   13.739918] ==================================================================
[   13.740314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   13.740732] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   13.741089] 
[   13.741200] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.741284] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.741301] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.741335] Call Trace:
[   13.741349]  <TASK>
[   13.741364]  dump_stack_lvl+0x73/0xb0
[   13.741394]  print_report+0xd1/0x650
[   13.741418]  ? __virt_addr_valid+0x1db/0x2d0
[   13.741445]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.741493]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.741579]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.741609]  kasan_report+0x141/0x180
[   13.741646]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.741678]  __asan_report_store4_noabort+0x1b/0x30
[   13.741704]  kasan_atomics_helper+0x4b3a/0x5450
[   13.741731]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.741758]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.741784]  ? kasan_atomics+0x152/0x310
[   13.741832]  kasan_atomics+0x1dc/0x310
[   13.741856]  ? __pfx_kasan_atomics+0x10/0x10
[   13.741880]  ? __pfx_read_tsc+0x10/0x10
[   13.741919]  ? ktime_get_ts64+0x86/0x230
[   13.741946]  kunit_try_run_case+0x1a5/0x480
[   13.741974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.741999]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.742025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.742052]  ? __kthread_parkme+0x82/0x180
[   13.742075]  ? preempt_count_sub+0x50/0x80
[   13.742103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.742131]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.742195]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.742226]  kthread+0x337/0x6f0
[   13.742247]  ? trace_preempt_on+0x20/0xc0
[   13.742274]  ? __pfx_kthread+0x10/0x10
[   13.742298]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.742340]  ? calculate_sigpending+0x7b/0xa0
[   13.742367]  ? __pfx_kthread+0x10/0x10
[   13.742392]  ret_from_fork+0x116/0x1d0
[   13.742413]  ? __pfx_kthread+0x10/0x10
[   13.742436]  ret_from_fork_asm+0x1a/0x30
[   13.742482]  </TASK>
[   13.742494] 
[   13.751246] Allocated by task 282:
[   13.751441]  kasan_save_stack+0x45/0x70
[   13.751739]  kasan_save_track+0x18/0x40
[   13.751966]  kasan_save_alloc_info+0x3b/0x50
[   13.752150]  __kasan_kmalloc+0xb7/0xc0
[   13.752371]  __kmalloc_cache_noprof+0x189/0x420
[   13.752695]  kasan_atomics+0x95/0x310
[   13.752876]  kunit_try_run_case+0x1a5/0x480
[   13.753114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.753304]  kthread+0x337/0x6f0
[   13.753477]  ret_from_fork+0x116/0x1d0
[   13.753746]  ret_from_fork_asm+0x1a/0x30
[   13.753955] 
[   13.754053] The buggy address belongs to the object at ffff8881029e5b80
[   13.754053]  which belongs to the cache kmalloc-64 of size 64
[   13.754649] The buggy address is located 0 bytes to the right of
[   13.754649]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   13.755216] 
[   13.755340] The buggy address belongs to the physical page:
[   13.755942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   13.756343] flags: 0x200000000000000(node=0|zone=2)
[   13.756643] page_type: f5(slab)
[   13.756821] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.757195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.757503] page dumped because: kasan: bad access detected
[   13.757792] 
[   13.757919] Memory state around the buggy address:
[   13.758191]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.758495]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.758913] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.759286]                                      ^
[   13.759587]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.759940]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.760225] ==================================================================
[   13.781931] ==================================================================
[   13.782306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   13.782954] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   13.783370] 
[   13.783484] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.783588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.783603] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.783634] Call Trace:
[   13.783646]  <TASK>
[   13.783660]  dump_stack_lvl+0x73/0xb0
[   13.783689]  print_report+0xd1/0x650
[   13.783736]  ? __virt_addr_valid+0x1db/0x2d0
[   13.783760]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.783782]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.783822]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.783845]  kasan_report+0x141/0x180
[   13.783881]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.783910]  kasan_check_range+0x10c/0x1c0
[   13.783934]  __kasan_check_write+0x18/0x20
[   13.783955]  kasan_atomics_helper+0x5fe/0x5450
[   13.783980]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.784004]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.784026]  ? kasan_atomics+0x152/0x310
[   13.784051]  kasan_atomics+0x1dc/0x310
[   13.784070]  ? __pfx_kasan_atomics+0x10/0x10
[   13.784092]  ? __pfx_read_tsc+0x10/0x10
[   13.784113]  ? ktime_get_ts64+0x86/0x230
[   13.784140]  kunit_try_run_case+0x1a5/0x480
[   13.784182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.784206]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.784229]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.784251]  ? __kthread_parkme+0x82/0x180
[   13.784272]  ? preempt_count_sub+0x50/0x80
[   13.784297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.784322]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.784346]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.784370]  kthread+0x337/0x6f0
[   13.784390]  ? trace_preempt_on+0x20/0xc0
[   13.784415]  ? __pfx_kthread+0x10/0x10
[   13.784437]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.784458]  ? calculate_sigpending+0x7b/0xa0
[   13.784483]  ? __pfx_kthread+0x10/0x10
[   13.784552]  ret_from_fork+0x116/0x1d0
[   13.784576]  ? __pfx_kthread+0x10/0x10
[   13.784598]  ret_from_fork_asm+0x1a/0x30
[   13.784641]  </TASK>
[   13.784652] 
[   13.792979] Allocated by task 282:
[   13.793145]  kasan_save_stack+0x45/0x70
[   13.793313]  kasan_save_track+0x18/0x40
[   13.793450]  kasan_save_alloc_info+0x3b/0x50
[   13.793892]  __kasan_kmalloc+0xb7/0xc0
[   13.794130]  __kmalloc_cache_noprof+0x189/0x420
[   13.794418]  kasan_atomics+0x95/0x310
[   13.794712]  kunit_try_run_case+0x1a5/0x480
[   13.794945]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.795228]  kthread+0x337/0x6f0
[   13.795425]  ret_from_fork+0x116/0x1d0
[   13.795697]  ret_from_fork_asm+0x1a/0x30
[   13.795894] 
[   13.795994] The buggy address belongs to the object at ffff8881029e5b80
[   13.795994]  which belongs to the cache kmalloc-64 of size 64
[   13.796384] The buggy address is located 0 bytes to the right of
[   13.796384]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   13.797051] 
[   13.797173] The buggy address belongs to the physical page:
[   13.797470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   13.797897] flags: 0x200000000000000(node=0|zone=2)
[   13.798100] page_type: f5(slab)
[   13.798257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.798840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.799153] page dumped because: kasan: bad access detected
[   13.799426] 
[   13.799516] Memory state around the buggy address:
[   13.799817]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.800186]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.800498] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.800806]                                      ^
[   13.801034]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.801395]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.801759] ==================================================================
[   13.899692] ==================================================================
[   13.899999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   13.900266] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   13.900787] 
[   13.900895] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.900942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.900955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.900977] Call Trace:
[   13.900991]  <TASK>
[   13.901007]  dump_stack_lvl+0x73/0xb0
[   13.901034]  print_report+0xd1/0x650
[   13.901057]  ? __virt_addr_valid+0x1db/0x2d0
[   13.901082]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.901105]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.901128]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.901152]  kasan_report+0x141/0x180
[   13.901177]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.901206]  kasan_check_range+0x10c/0x1c0
[   13.901232]  __kasan_check_write+0x18/0x20
[   13.901253]  kasan_atomics_helper+0x8f9/0x5450
[   13.901278]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.901301]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.901323]  ? kasan_atomics+0x152/0x310
[   13.901348]  kasan_atomics+0x1dc/0x310
[   13.901367]  ? __pfx_kasan_atomics+0x10/0x10
[   13.901390]  ? __pfx_read_tsc+0x10/0x10
[   13.901411]  ? ktime_get_ts64+0x86/0x230
[   13.901438]  kunit_try_run_case+0x1a5/0x480
[   13.901461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.901485]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.901508]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.901532]  ? __kthread_parkme+0x82/0x180
[   13.901553]  ? preempt_count_sub+0x50/0x80
[   13.901578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.901603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.901682]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.901709]  kthread+0x337/0x6f0
[   13.901730]  ? trace_preempt_on+0x20/0xc0
[   13.901756]  ? __pfx_kthread+0x10/0x10
[   13.901777]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.901799]  ? calculate_sigpending+0x7b/0xa0
[   13.901824]  ? __pfx_kthread+0x10/0x10
[   13.901847]  ret_from_fork+0x116/0x1d0
[   13.901866]  ? __pfx_kthread+0x10/0x10
[   13.901888]  ret_from_fork_asm+0x1a/0x30
[   13.901921]  </TASK>
[   13.901933] 
[   13.910416] Allocated by task 282:
[   13.910607]  kasan_save_stack+0x45/0x70
[   13.910875]  kasan_save_track+0x18/0x40
[   13.911313]  kasan_save_alloc_info+0x3b/0x50
[   13.911499]  __kasan_kmalloc+0xb7/0xc0
[   13.911720]  __kmalloc_cache_noprof+0x189/0x420
[   13.911916]  kasan_atomics+0x95/0x310
[   13.912079]  kunit_try_run_case+0x1a5/0x480
[   13.912316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.912497]  kthread+0x337/0x6f0
[   13.912629]  ret_from_fork+0x116/0x1d0
[   13.912821]  ret_from_fork_asm+0x1a/0x30
[   13.913017] 
[   13.913114] The buggy address belongs to the object at ffff8881029e5b80
[   13.913114]  which belongs to the cache kmalloc-64 of size 64
[   13.913528] The buggy address is located 0 bytes to the right of
[   13.913528]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   13.914278] 
[   13.914379] The buggy address belongs to the physical page:
[   13.914590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   13.914840] flags: 0x200000000000000(node=0|zone=2)
[   13.915004] page_type: f5(slab)
[   13.915128] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.915420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.915844] page dumped because: kasan: bad access detected
[   13.916093] 
[   13.916185] Memory state around the buggy address:
[   13.916408]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.916917]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.917333] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.917715]                                      ^
[   13.917913]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.918171]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.918480] ==================================================================
[   14.616952] ==================================================================
[   14.617242] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   14.617577] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.617859] 
[   14.617945] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.617989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.618002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.618024] Call Trace:
[   14.618037]  <TASK>
[   14.618051]  dump_stack_lvl+0x73/0xb0
[   14.618077]  print_report+0xd1/0x650
[   14.618100]  ? __virt_addr_valid+0x1db/0x2d0
[   14.618124]  ? kasan_atomics_helper+0x1818/0x5450
[   14.618148]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.618170]  ? kasan_atomics_helper+0x1818/0x5450
[   14.618203]  kasan_report+0x141/0x180
[   14.618227]  ? kasan_atomics_helper+0x1818/0x5450
[   14.618255]  kasan_check_range+0x10c/0x1c0
[   14.618280]  __kasan_check_write+0x18/0x20
[   14.618301]  kasan_atomics_helper+0x1818/0x5450
[   14.618326]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.618350]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.618372]  ? kasan_atomics+0x152/0x310
[   14.618397]  kasan_atomics+0x1dc/0x310
[   14.618418]  ? __pfx_kasan_atomics+0x10/0x10
[   14.618440]  ? __pfx_read_tsc+0x10/0x10
[   14.618468]  ? ktime_get_ts64+0x86/0x230
[   14.618495]  kunit_try_run_case+0x1a5/0x480
[   14.618519]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.618542]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.618566]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.618590]  ? __kthread_parkme+0x82/0x180
[   14.618622]  ? preempt_count_sub+0x50/0x80
[   14.618648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.618673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.618697]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.618722]  kthread+0x337/0x6f0
[   14.618743]  ? trace_preempt_on+0x20/0xc0
[   14.618769]  ? __pfx_kthread+0x10/0x10
[   14.618792]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.618813]  ? calculate_sigpending+0x7b/0xa0
[   14.618838]  ? __pfx_kthread+0x10/0x10
[   14.618862]  ret_from_fork+0x116/0x1d0
[   14.618882]  ? __pfx_kthread+0x10/0x10
[   14.618904]  ret_from_fork_asm+0x1a/0x30
[   14.618937]  </TASK>
[   14.618948] 
[   14.626694] Allocated by task 282:
[   14.626876]  kasan_save_stack+0x45/0x70
[   14.627046]  kasan_save_track+0x18/0x40
[   14.627192]  kasan_save_alloc_info+0x3b/0x50
[   14.627403]  __kasan_kmalloc+0xb7/0xc0
[   14.627590]  __kmalloc_cache_noprof+0x189/0x420
[   14.627787]  kasan_atomics+0x95/0x310
[   14.627959]  kunit_try_run_case+0x1a5/0x480
[   14.628109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.628566]  kthread+0x337/0x6f0
[   14.628736]  ret_from_fork+0x116/0x1d0
[   14.628873]  ret_from_fork_asm+0x1a/0x30
[   14.629016] 
[   14.629088] The buggy address belongs to the object at ffff8881029e5b80
[   14.629088]  which belongs to the cache kmalloc-64 of size 64
[   14.629722] The buggy address is located 0 bytes to the right of
[   14.629722]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.630182] 
[   14.630259] The buggy address belongs to the physical page:
[   14.630432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.630686] flags: 0x200000000000000(node=0|zone=2)
[   14.630850] page_type: f5(slab)
[   14.630972] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.631478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.631835] page dumped because: kasan: bad access detected
[   14.632086] 
[   14.632179] Memory state around the buggy address:
[   14.632406]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.632735]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.633157] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.633447]                                      ^
[   14.633633]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.633848]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.634481] ==================================================================
[   14.934315] ==================================================================
[   14.934850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   14.935182] Read of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.935586] 
[   14.935716] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.935764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.935777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.935799] Call Trace:
[   14.935814]  <TASK>
[   14.935830]  dump_stack_lvl+0x73/0xb0
[   14.935856]  print_report+0xd1/0x650
[   14.935880]  ? __virt_addr_valid+0x1db/0x2d0
[   14.935904]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.935927]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.935950]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.935973]  kasan_report+0x141/0x180
[   14.935997]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.936025]  __asan_report_load8_noabort+0x18/0x20
[   14.936047]  kasan_atomics_helper+0x4fb2/0x5450
[   14.936071]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.936095]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.936117]  ? kasan_atomics+0x152/0x310
[   14.936142]  kasan_atomics+0x1dc/0x310
[   14.936185]  ? __pfx_kasan_atomics+0x10/0x10
[   14.936207]  ? __pfx_read_tsc+0x10/0x10
[   14.936229]  ? ktime_get_ts64+0x86/0x230
[   14.936255]  kunit_try_run_case+0x1a5/0x480
[   14.936279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.936302]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.936335]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.936360]  ? __kthread_parkme+0x82/0x180
[   14.936381]  ? preempt_count_sub+0x50/0x80
[   14.936416]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.936440]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.936466]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.936490]  kthread+0x337/0x6f0
[   14.936511]  ? trace_preempt_on+0x20/0xc0
[   14.936535]  ? __pfx_kthread+0x10/0x10
[   14.936558]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.936579]  ? calculate_sigpending+0x7b/0xa0
[   14.936604]  ? __pfx_kthread+0x10/0x10
[   14.936636]  ret_from_fork+0x116/0x1d0
[   14.936654]  ? __pfx_kthread+0x10/0x10
[   14.936676]  ret_from_fork_asm+0x1a/0x30
[   14.936708]  </TASK>
[   14.936719] 
[   14.944179] Allocated by task 282:
[   14.944381]  kasan_save_stack+0x45/0x70
[   14.944585]  kasan_save_track+0x18/0x40
[   14.944814]  kasan_save_alloc_info+0x3b/0x50
[   14.945008]  __kasan_kmalloc+0xb7/0xc0
[   14.945224]  __kmalloc_cache_noprof+0x189/0x420
[   14.945409]  kasan_atomics+0x95/0x310
[   14.945543]  kunit_try_run_case+0x1a5/0x480
[   14.945701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.945876]  kthread+0x337/0x6f0
[   14.945999]  ret_from_fork+0x116/0x1d0
[   14.946144]  ret_from_fork_asm+0x1a/0x30
[   14.946395] 
[   14.946514] The buggy address belongs to the object at ffff8881029e5b80
[   14.946514]  which belongs to the cache kmalloc-64 of size 64
[   14.947060] The buggy address is located 0 bytes to the right of
[   14.947060]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.947660] 
[   14.947760] The buggy address belongs to the physical page:
[   14.948040] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.948434] flags: 0x200000000000000(node=0|zone=2)
[   14.948645] page_type: f5(slab)
[   14.948835] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.949156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.949449] page dumped because: kasan: bad access detected
[   14.949630] 
[   14.949748] Memory state around the buggy address:
[   14.949977]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.950286]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.950527] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.950852]                                      ^
[   14.951069]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.951346]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.951559] ==================================================================
[   14.442187] ==================================================================
[   14.443020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.443471] Read of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.443778] 
[   14.443931] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.443980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.443992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.444014] Call Trace:
[   14.444030]  <TASK>
[   14.444045]  dump_stack_lvl+0x73/0xb0
[   14.444073]  print_report+0xd1/0x650
[   14.444098]  ? __virt_addr_valid+0x1db/0x2d0
[   14.444123]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.444146]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.444169]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.444465]  kasan_report+0x141/0x180
[   14.444492]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.444521]  __asan_report_load8_noabort+0x18/0x20
[   14.444543]  kasan_atomics_helper+0x4eae/0x5450
[   14.444569]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.444592]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.444638]  ? kasan_atomics+0x152/0x310
[   14.444664]  kasan_atomics+0x1dc/0x310
[   14.444685]  ? __pfx_kasan_atomics+0x10/0x10
[   14.444707]  ? __pfx_read_tsc+0x10/0x10
[   14.444729]  ? ktime_get_ts64+0x86/0x230
[   14.444755]  kunit_try_run_case+0x1a5/0x480
[   14.444780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.444803]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.444827]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.444850]  ? __kthread_parkme+0x82/0x180
[   14.444872]  ? preempt_count_sub+0x50/0x80
[   14.444897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.444921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.444945]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.444968]  kthread+0x337/0x6f0
[   14.444989]  ? trace_preempt_on+0x20/0xc0
[   14.445014]  ? __pfx_kthread+0x10/0x10
[   14.445036]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.445058]  ? calculate_sigpending+0x7b/0xa0
[   14.445082]  ? __pfx_kthread+0x10/0x10
[   14.445105]  ret_from_fork+0x116/0x1d0
[   14.445124]  ? __pfx_kthread+0x10/0x10
[   14.445146]  ret_from_fork_asm+0x1a/0x30
[   14.445180]  </TASK>
[   14.445192] 
[   14.456017] Allocated by task 282:
[   14.456468]  kasan_save_stack+0x45/0x70
[   14.456770]  kasan_save_track+0x18/0x40
[   14.456960]  kasan_save_alloc_info+0x3b/0x50
[   14.457173]  __kasan_kmalloc+0xb7/0xc0
[   14.457342]  __kmalloc_cache_noprof+0x189/0x420
[   14.457564]  kasan_atomics+0x95/0x310
[   14.457795]  kunit_try_run_case+0x1a5/0x480
[   14.457967]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.458216]  kthread+0x337/0x6f0
[   14.458828]  ret_from_fork+0x116/0x1d0
[   14.458988]  ret_from_fork_asm+0x1a/0x30
[   14.459439] 
[   14.459523] The buggy address belongs to the object at ffff8881029e5b80
[   14.459523]  which belongs to the cache kmalloc-64 of size 64
[   14.460378] The buggy address is located 0 bytes to the right of
[   14.460378]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.461094] 
[   14.461207] The buggy address belongs to the physical page:
[   14.461653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.462127] flags: 0x200000000000000(node=0|zone=2)
[   14.462384] page_type: f5(slab)
[   14.462774] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.463084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.463699] page dumped because: kasan: bad access detected
[   14.463905] 
[   14.464100] Memory state around the buggy address:
[   14.464275]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.464857]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.465296] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.465764]                                      ^
[   14.466022]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.466422]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.466895] ==================================================================
[   14.094411] ==================================================================
[   14.094985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   14.095332] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.095556] 
[   14.095653] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.095701] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.095715] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.095737] Call Trace:
[   14.095752]  <TASK>
[   14.095768]  dump_stack_lvl+0x73/0xb0
[   14.095795]  print_report+0xd1/0x650
[   14.095818]  ? __virt_addr_valid+0x1db/0x2d0
[   14.095842]  ? kasan_atomics_helper+0xe78/0x5450
[   14.095865]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.095889]  ? kasan_atomics_helper+0xe78/0x5450
[   14.095912]  kasan_report+0x141/0x180
[   14.095935]  ? kasan_atomics_helper+0xe78/0x5450
[   14.095964]  kasan_check_range+0x10c/0x1c0
[   14.095989]  __kasan_check_write+0x18/0x20
[   14.096009]  kasan_atomics_helper+0xe78/0x5450
[   14.096033]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.096057]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.096080]  ? kasan_atomics+0x152/0x310
[   14.096104]  kasan_atomics+0x1dc/0x310
[   14.096191]  ? __pfx_kasan_atomics+0x10/0x10
[   14.096214]  ? __pfx_read_tsc+0x10/0x10
[   14.096236]  ? ktime_get_ts64+0x86/0x230
[   14.096262]  kunit_try_run_case+0x1a5/0x480
[   14.096287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.096311]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.096334]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.096358]  ? __kthread_parkme+0x82/0x180
[   14.096380]  ? preempt_count_sub+0x50/0x80
[   14.096405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.096429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.096453]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.096478]  kthread+0x337/0x6f0
[   14.096498]  ? trace_preempt_on+0x20/0xc0
[   14.096523]  ? __pfx_kthread+0x10/0x10
[   14.096557]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.096578]  ? calculate_sigpending+0x7b/0xa0
[   14.096603]  ? __pfx_kthread+0x10/0x10
[   14.096637]  ret_from_fork+0x116/0x1d0
[   14.096657]  ? __pfx_kthread+0x10/0x10
[   14.096679]  ret_from_fork_asm+0x1a/0x30
[   14.096711]  </TASK>
[   14.096722] 
[   14.105395] Allocated by task 282:
[   14.105656]  kasan_save_stack+0x45/0x70
[   14.105859]  kasan_save_track+0x18/0x40
[   14.106043]  kasan_save_alloc_info+0x3b/0x50
[   14.106248]  __kasan_kmalloc+0xb7/0xc0
[   14.106443]  __kmalloc_cache_noprof+0x189/0x420
[   14.106780]  kasan_atomics+0x95/0x310
[   14.106946]  kunit_try_run_case+0x1a5/0x480
[   14.107137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.107371]  kthread+0x337/0x6f0
[   14.107512]  ret_from_fork+0x116/0x1d0
[   14.108432]  ret_from_fork_asm+0x1a/0x30
[   14.108976] 
[   14.109163] The buggy address belongs to the object at ffff8881029e5b80
[   14.109163]  which belongs to the cache kmalloc-64 of size 64
[   14.109797] The buggy address is located 0 bytes to the right of
[   14.109797]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.110978] 
[   14.111192] The buggy address belongs to the physical page:
[   14.111727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.112572] flags: 0x200000000000000(node=0|zone=2)
[   14.112937] page_type: f5(slab)
[   14.113066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.113565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.114317] page dumped because: kasan: bad access detected
[   14.114861] 
[   14.115087] Memory state around the buggy address:
[   14.115502]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.116087]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.116595] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.117370]                                      ^
[   14.117832]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.118434]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.118825] ==================================================================
[   14.515117] ==================================================================
[   14.515346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.516282] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.516690] 
[   14.516893] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.516945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.516959] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.516981] Call Trace:
[   14.516997]  <TASK>
[   14.517014]  dump_stack_lvl+0x73/0xb0
[   14.517134]  print_report+0xd1/0x650
[   14.517159]  ? __virt_addr_valid+0x1db/0x2d0
[   14.517197]  ? kasan_atomics_helper+0x151d/0x5450
[   14.517220]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.517245]  ? kasan_atomics_helper+0x151d/0x5450
[   14.517268]  kasan_report+0x141/0x180
[   14.517292]  ? kasan_atomics_helper+0x151d/0x5450
[   14.517321]  kasan_check_range+0x10c/0x1c0
[   14.517348]  __kasan_check_write+0x18/0x20
[   14.517369]  kasan_atomics_helper+0x151d/0x5450
[   14.517394]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.517418]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.517440]  ? kasan_atomics+0x152/0x310
[   14.517464]  kasan_atomics+0x1dc/0x310
[   14.517485]  ? __pfx_kasan_atomics+0x10/0x10
[   14.517506]  ? __pfx_read_tsc+0x10/0x10
[   14.517528]  ? ktime_get_ts64+0x86/0x230
[   14.517554]  kunit_try_run_case+0x1a5/0x480
[   14.517578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.517601]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.517635]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.517659]  ? __kthread_parkme+0x82/0x180
[   14.517682]  ? preempt_count_sub+0x50/0x80
[   14.517706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.517731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.517755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.517779]  kthread+0x337/0x6f0
[   14.517800]  ? trace_preempt_on+0x20/0xc0
[   14.517824]  ? __pfx_kthread+0x10/0x10
[   14.517846]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.517867]  ? calculate_sigpending+0x7b/0xa0
[   14.517891]  ? __pfx_kthread+0x10/0x10
[   14.517914]  ret_from_fork+0x116/0x1d0
[   14.517933]  ? __pfx_kthread+0x10/0x10
[   14.517955]  ret_from_fork_asm+0x1a/0x30
[   14.517988]  </TASK>
[   14.518000] 
[   14.528492] Allocated by task 282:
[   14.528674]  kasan_save_stack+0x45/0x70
[   14.528966]  kasan_save_track+0x18/0x40
[   14.529155]  kasan_save_alloc_info+0x3b/0x50
[   14.529453]  __kasan_kmalloc+0xb7/0xc0
[   14.529597]  __kmalloc_cache_noprof+0x189/0x420
[   14.529958]  kasan_atomics+0x95/0x310
[   14.530238]  kunit_try_run_case+0x1a5/0x480
[   14.530459]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.530672]  kthread+0x337/0x6f0
[   14.530849]  ret_from_fork+0x116/0x1d0
[   14.531026]  ret_from_fork_asm+0x1a/0x30
[   14.531211] 
[   14.531637] The buggy address belongs to the object at ffff8881029e5b80
[   14.531637]  which belongs to the cache kmalloc-64 of size 64
[   14.532287] The buggy address is located 0 bytes to the right of
[   14.532287]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.532919] 
[   14.533008] The buggy address belongs to the physical page:
[   14.533398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.533836] flags: 0x200000000000000(node=0|zone=2)
[   14.534065] page_type: f5(slab)
[   14.534410] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.534765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.535163] page dumped because: kasan: bad access detected
[   14.535505] 
[   14.535585] Memory state around the buggy address:
[   14.535950]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.536376]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.536743] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.537049]                                      ^
[   14.537388]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.537764]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.538111] ==================================================================
[   14.652313] ==================================================================
[   14.653076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   14.653469] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.653827] 
[   14.653937] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.653983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.653995] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.654016] Call Trace:
[   14.654030]  <TASK>
[   14.654045]  dump_stack_lvl+0x73/0xb0
[   14.654093]  print_report+0xd1/0x650
[   14.654116]  ? __virt_addr_valid+0x1db/0x2d0
[   14.654140]  ? kasan_atomics_helper+0x194a/0x5450
[   14.654191]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.654214]  ? kasan_atomics_helper+0x194a/0x5450
[   14.654237]  kasan_report+0x141/0x180
[   14.654262]  ? kasan_atomics_helper+0x194a/0x5450
[   14.654290]  kasan_check_range+0x10c/0x1c0
[   14.654332]  __kasan_check_write+0x18/0x20
[   14.654354]  kasan_atomics_helper+0x194a/0x5450
[   14.654378]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.654401]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.654425]  ? kasan_atomics+0x152/0x310
[   14.654449]  kasan_atomics+0x1dc/0x310
[   14.654500]  ? __pfx_kasan_atomics+0x10/0x10
[   14.654523]  ? __pfx_read_tsc+0x10/0x10
[   14.654546]  ? ktime_get_ts64+0x86/0x230
[   14.654572]  kunit_try_run_case+0x1a5/0x480
[   14.654597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.654632]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.654656]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.654696]  ? __kthread_parkme+0x82/0x180
[   14.654731]  ? preempt_count_sub+0x50/0x80
[   14.654779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.654818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.654842]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.654866]  kthread+0x337/0x6f0
[   14.654887]  ? trace_preempt_on+0x20/0xc0
[   14.654912]  ? __pfx_kthread+0x10/0x10
[   14.654934]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.654956]  ? calculate_sigpending+0x7b/0xa0
[   14.654981]  ? __pfx_kthread+0x10/0x10
[   14.655004]  ret_from_fork+0x116/0x1d0
[   14.655024]  ? __pfx_kthread+0x10/0x10
[   14.655046]  ret_from_fork_asm+0x1a/0x30
[   14.655078]  </TASK>
[   14.655089] 
[   14.663391] Allocated by task 282:
[   14.663594]  kasan_save_stack+0x45/0x70
[   14.663842]  kasan_save_track+0x18/0x40
[   14.664048]  kasan_save_alloc_info+0x3b/0x50
[   14.664265]  __kasan_kmalloc+0xb7/0xc0
[   14.664460]  __kmalloc_cache_noprof+0x189/0x420
[   14.664645]  kasan_atomics+0x95/0x310
[   14.664854]  kunit_try_run_case+0x1a5/0x480
[   14.665082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.665348]  kthread+0x337/0x6f0
[   14.665524]  ret_from_fork+0x116/0x1d0
[   14.665746]  ret_from_fork_asm+0x1a/0x30
[   14.665945] 
[   14.666041] The buggy address belongs to the object at ffff8881029e5b80
[   14.666041]  which belongs to the cache kmalloc-64 of size 64
[   14.666563] The buggy address is located 0 bytes to the right of
[   14.666563]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.667113] 
[   14.667231] The buggy address belongs to the physical page:
[   14.667478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.667821] flags: 0x200000000000000(node=0|zone=2)
[   14.668050] page_type: f5(slab)
[   14.668308] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.668665] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.668914] page dumped because: kasan: bad access detected
[   14.669107] 
[   14.669276] Memory state around the buggy address:
[   14.669515]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.669887]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.670253] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.670483]                                      ^
[   14.670706]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.671048]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.671441] ==================================================================
[   14.350831] ==================================================================
[   14.351087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   14.351766] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.352052] 
[   14.352157] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.352207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.352221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.352245] Call Trace:
[   14.352260]  <TASK>
[   14.352276]  dump_stack_lvl+0x73/0xb0
[   14.352306]  print_report+0xd1/0x650
[   14.352329]  ? __virt_addr_valid+0x1db/0x2d0
[   14.352354]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.352412]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.352437]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.352461]  kasan_report+0x141/0x180
[   14.352486]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.352514]  __asan_report_load4_noabort+0x18/0x20
[   14.352536]  kasan_atomics_helper+0x49e8/0x5450
[   14.352560]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.352584]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.352606]  ? kasan_atomics+0x152/0x310
[   14.352641]  kasan_atomics+0x1dc/0x310
[   14.352674]  ? __pfx_kasan_atomics+0x10/0x10
[   14.352695]  ? __pfx_read_tsc+0x10/0x10
[   14.352717]  ? ktime_get_ts64+0x86/0x230
[   14.352744]  kunit_try_run_case+0x1a5/0x480
[   14.352768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.352790]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.352814]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.352837]  ? __kthread_parkme+0x82/0x180
[   14.352859]  ? preempt_count_sub+0x50/0x80
[   14.352884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.352908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.352932]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.352957]  kthread+0x337/0x6f0
[   14.352977]  ? trace_preempt_on+0x20/0xc0
[   14.353001]  ? __pfx_kthread+0x10/0x10
[   14.353023]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.353045]  ? calculate_sigpending+0x7b/0xa0
[   14.353069]  ? __pfx_kthread+0x10/0x10
[   14.353092]  ret_from_fork+0x116/0x1d0
[   14.353111]  ? __pfx_kthread+0x10/0x10
[   14.353136]  ret_from_fork_asm+0x1a/0x30
[   14.353171]  </TASK>
[   14.353194] 
[   14.360993] Allocated by task 282:
[   14.361175]  kasan_save_stack+0x45/0x70
[   14.361352]  kasan_save_track+0x18/0x40
[   14.361547]  kasan_save_alloc_info+0x3b/0x50
[   14.361770]  __kasan_kmalloc+0xb7/0xc0
[   14.361907]  __kmalloc_cache_noprof+0x189/0x420
[   14.362060]  kasan_atomics+0x95/0x310
[   14.362242]  kunit_try_run_case+0x1a5/0x480
[   14.362664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.362918]  kthread+0x337/0x6f0
[   14.363099]  ret_from_fork+0x116/0x1d0
[   14.363288]  ret_from_fork_asm+0x1a/0x30
[   14.363583] 
[   14.363685] The buggy address belongs to the object at ffff8881029e5b80
[   14.363685]  which belongs to the cache kmalloc-64 of size 64
[   14.364149] The buggy address is located 0 bytes to the right of
[   14.364149]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.364610] 
[   14.364727] The buggy address belongs to the physical page:
[   14.365105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.365494] flags: 0x200000000000000(node=0|zone=2)
[   14.365816] page_type: f5(slab)
[   14.365970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.366206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.366434] page dumped because: kasan: bad access detected
[   14.366620] 
[   14.366692] Memory state around the buggy address:
[   14.366854]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.367190]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.367653] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.367911]                                      ^
[   14.368067]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.368571]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.368897] ==================================================================
[   14.915957] ==================================================================
[   14.916588] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   14.916936] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.917293] 
[   14.917419] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.917476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.917489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.917511] Call Trace:
[   14.917524]  <TASK>
[   14.917540]  dump_stack_lvl+0x73/0xb0
[   14.917567]  print_report+0xd1/0x650
[   14.917590]  ? __virt_addr_valid+0x1db/0x2d0
[   14.917623]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.917646]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.917670]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.917693]  kasan_report+0x141/0x180
[   14.917717]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.917755]  kasan_check_range+0x10c/0x1c0
[   14.917780]  __kasan_check_write+0x18/0x20
[   14.917801]  kasan_atomics_helper+0x20c8/0x5450
[   14.917836]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.917860]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.917882]  ? kasan_atomics+0x152/0x310
[   14.917915]  kasan_atomics+0x1dc/0x310
[   14.917936]  ? __pfx_kasan_atomics+0x10/0x10
[   14.917959]  ? __pfx_read_tsc+0x10/0x10
[   14.917990]  ? ktime_get_ts64+0x86/0x230
[   14.918017]  kunit_try_run_case+0x1a5/0x480
[   14.918042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.918073]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.918097]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.918120]  ? __kthread_parkme+0x82/0x180
[   14.918152]  ? preempt_count_sub+0x50/0x80
[   14.918195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.918228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.918252]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.918278]  kthread+0x337/0x6f0
[   14.918309]  ? trace_preempt_on+0x20/0xc0
[   14.918334]  ? __pfx_kthread+0x10/0x10
[   14.918356]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.918386]  ? calculate_sigpending+0x7b/0xa0
[   14.918411]  ? __pfx_kthread+0x10/0x10
[   14.918433]  ret_from_fork+0x116/0x1d0
[   14.918469]  ? __pfx_kthread+0x10/0x10
[   14.918491]  ret_from_fork_asm+0x1a/0x30
[   14.918524]  </TASK>
[   14.918535] 
[   14.926190] Allocated by task 282:
[   14.926400]  kasan_save_stack+0x45/0x70
[   14.926610]  kasan_save_track+0x18/0x40
[   14.926819]  kasan_save_alloc_info+0x3b/0x50
[   14.927014]  __kasan_kmalloc+0xb7/0xc0
[   14.927149]  __kmalloc_cache_noprof+0x189/0x420
[   14.927323]  kasan_atomics+0x95/0x310
[   14.927454]  kunit_try_run_case+0x1a5/0x480
[   14.927602]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.927890]  kthread+0x337/0x6f0
[   14.928060]  ret_from_fork+0x116/0x1d0
[   14.928273]  ret_from_fork_asm+0x1a/0x30
[   14.928471] 
[   14.928568] The buggy address belongs to the object at ffff8881029e5b80
[   14.928568]  which belongs to the cache kmalloc-64 of size 64
[   14.929138] The buggy address is located 0 bytes to the right of
[   14.929138]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.929677] 
[   14.929751] The buggy address belongs to the physical page:
[   14.929927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.930183] flags: 0x200000000000000(node=0|zone=2)
[   14.930412] page_type: f5(slab)
[   14.930591] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.930970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.931388] page dumped because: kasan: bad access detected
[   14.931672] 
[   14.931765] Memory state around the buggy address:
[   14.931975]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.932246]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.932604] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.932907]                                      ^
[   14.933126]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.933448]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.933764] ==================================================================
[   13.944053] ==================================================================
[   13.944415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   13.944815] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   13.945401] 
[   13.945510] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.945557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.945570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.945592] Call Trace:
[   13.945606]  <TASK>
[   13.945643]  dump_stack_lvl+0x73/0xb0
[   13.945672]  print_report+0xd1/0x650
[   13.945716]  ? __virt_addr_valid+0x1db/0x2d0
[   13.945741]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.945764]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.945914]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.945943]  kasan_report+0x141/0x180
[   13.945968]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.945997]  kasan_check_range+0x10c/0x1c0
[   13.946022]  __kasan_check_write+0x18/0x20
[   13.946043]  kasan_atomics_helper+0xa2b/0x5450
[   13.946067]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.946091]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.946114]  ? kasan_atomics+0x152/0x310
[   13.946139]  kasan_atomics+0x1dc/0x310
[   13.946206]  ? __pfx_kasan_atomics+0x10/0x10
[   13.946228]  ? __pfx_read_tsc+0x10/0x10
[   13.946250]  ? ktime_get_ts64+0x86/0x230
[   13.946278]  kunit_try_run_case+0x1a5/0x480
[   13.946302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.946325]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.946381]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.946405]  ? __kthread_parkme+0x82/0x180
[   13.946426]  ? preempt_count_sub+0x50/0x80
[   13.946452]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.946482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.946507]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.946531]  kthread+0x337/0x6f0
[   13.946593]  ? trace_preempt_on+0x20/0xc0
[   13.946631]  ? __pfx_kthread+0x10/0x10
[   13.946654]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.946676]  ? calculate_sigpending+0x7b/0xa0
[   13.946701]  ? __pfx_kthread+0x10/0x10
[   13.946725]  ret_from_fork+0x116/0x1d0
[   13.946744]  ? __pfx_kthread+0x10/0x10
[   13.946766]  ret_from_fork_asm+0x1a/0x30
[   13.946799]  </TASK>
[   13.946811] 
[   13.955809] Allocated by task 282:
[   13.955941]  kasan_save_stack+0x45/0x70
[   13.956403]  kasan_save_track+0x18/0x40
[   13.956785]  kasan_save_alloc_info+0x3b/0x50
[   13.957038]  __kasan_kmalloc+0xb7/0xc0
[   13.957290]  __kmalloc_cache_noprof+0x189/0x420
[   13.957579]  kasan_atomics+0x95/0x310
[   13.957782]  kunit_try_run_case+0x1a5/0x480
[   13.957961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.958220]  kthread+0x337/0x6f0
[   13.958381]  ret_from_fork+0x116/0x1d0
[   13.958518]  ret_from_fork_asm+0x1a/0x30
[   13.958820] 
[   13.958977] The buggy address belongs to the object at ffff8881029e5b80
[   13.958977]  which belongs to the cache kmalloc-64 of size 64
[   13.959570] The buggy address is located 0 bytes to the right of
[   13.959570]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   13.960065] 
[   13.960143] The buggy address belongs to the physical page:
[   13.960549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   13.961279] flags: 0x200000000000000(node=0|zone=2)
[   13.961473] page_type: f5(slab)
[   13.961594] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.961838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.962247] page dumped because: kasan: bad access detected
[   13.962827] 
[   13.962934] Memory state around the buggy address:
[   13.963205]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.963525]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.963926] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.964274]                                      ^
[   13.964483]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.964927]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.965312] ==================================================================
[   13.701220] ==================================================================
[   13.701673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   13.701996] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   13.702333] 
[   13.702440] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.702494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.702507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.702528] Call Trace:
[   13.702541]  <TASK>
[   13.702555]  dump_stack_lvl+0x73/0xb0
[   13.702581]  print_report+0xd1/0x650
[   13.702605]  ? __virt_addr_valid+0x1db/0x2d0
[   13.702641]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.702663]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.702686]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.702710]  kasan_report+0x141/0x180
[   13.702734]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.702762]  __asan_report_load4_noabort+0x18/0x20
[   13.702784]  kasan_atomics_helper+0x4b54/0x5450
[   13.702808]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.702831]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.702854]  ? kasan_atomics+0x152/0x310
[   13.702878]  kasan_atomics+0x1dc/0x310
[   13.702899]  ? __pfx_kasan_atomics+0x10/0x10
[   13.702920]  ? __pfx_read_tsc+0x10/0x10
[   13.702942]  ? ktime_get_ts64+0x86/0x230
[   13.702968]  kunit_try_run_case+0x1a5/0x480
[   13.702993]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.703016]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.703039]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.703062]  ? __kthread_parkme+0x82/0x180
[   13.703084]  ? preempt_count_sub+0x50/0x80
[   13.703108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.703133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.703156]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.703180]  kthread+0x337/0x6f0
[   13.703201]  ? trace_preempt_on+0x20/0xc0
[   13.703226]  ? __pfx_kthread+0x10/0x10
[   13.703247]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.703269]  ? calculate_sigpending+0x7b/0xa0
[   13.703294]  ? __pfx_kthread+0x10/0x10
[   13.703318]  ret_from_fork+0x116/0x1d0
[   13.703337]  ? __pfx_kthread+0x10/0x10
[   13.703359]  ret_from_fork_asm+0x1a/0x30
[   13.703392]  </TASK>
[   13.703403] 
[   13.711410] Allocated by task 282:
[   13.711576]  kasan_save_stack+0x45/0x70
[   13.711803]  kasan_save_track+0x18/0x40
[   13.711977]  kasan_save_alloc_info+0x3b/0x50
[   13.712156]  __kasan_kmalloc+0xb7/0xc0
[   13.712297]  __kmalloc_cache_noprof+0x189/0x420
[   13.712586]  kasan_atomics+0x95/0x310
[   13.712785]  kunit_try_run_case+0x1a5/0x480
[   13.712992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.713166]  kthread+0x337/0x6f0
[   13.713288]  ret_from_fork+0x116/0x1d0
[   13.713524]  ret_from_fork_asm+0x1a/0x30
[   13.713782] 
[   13.713882] The buggy address belongs to the object at ffff8881029e5b80
[   13.713882]  which belongs to the cache kmalloc-64 of size 64
[   13.714466] The buggy address is located 0 bytes to the right of
[   13.714466]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   13.715095] 
[   13.715214] The buggy address belongs to the physical page:
[   13.715437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   13.715894] flags: 0x200000000000000(node=0|zone=2)
[   13.716068] page_type: f5(slab)
[   13.716204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.716563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.716921] page dumped because: kasan: bad access detected
[   13.717177] 
[   13.717326] Memory state around the buggy address:
[   13.717572]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.717872]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.718112] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.718325]                                      ^
[   13.718512]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.718860]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.719179] ==================================================================
[   14.765457] ==================================================================
[   14.765847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   14.766251] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.766561] 
[   14.766664] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.766710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.766723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.766743] Call Trace:
[   14.766759]  <TASK>
[   14.766775]  dump_stack_lvl+0x73/0xb0
[   14.766801]  print_report+0xd1/0x650
[   14.766824]  ? __virt_addr_valid+0x1db/0x2d0
[   14.766848]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.766872]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.766896]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.766956]  kasan_report+0x141/0x180
[   14.766981]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.767032]  kasan_check_range+0x10c/0x1c0
[   14.767057]  __kasan_check_write+0x18/0x20
[   14.767092]  kasan_atomics_helper+0x1ce1/0x5450
[   14.767116]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.767139]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.767198]  ? kasan_atomics+0x152/0x310
[   14.767236]  kasan_atomics+0x1dc/0x310
[   14.767267]  ? __pfx_kasan_atomics+0x10/0x10
[   14.767289]  ? __pfx_read_tsc+0x10/0x10
[   14.767310]  ? ktime_get_ts64+0x86/0x230
[   14.767337]  kunit_try_run_case+0x1a5/0x480
[   14.767361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.767384]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.767407]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.767430]  ? __kthread_parkme+0x82/0x180
[   14.767451]  ? preempt_count_sub+0x50/0x80
[   14.767476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.767530]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.767555]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.767579]  kthread+0x337/0x6f0
[   14.767648]  ? trace_preempt_on+0x20/0xc0
[   14.767684]  ? __pfx_kthread+0x10/0x10
[   14.767743]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.767766]  ? calculate_sigpending+0x7b/0xa0
[   14.767791]  ? __pfx_kthread+0x10/0x10
[   14.767823]  ret_from_fork+0x116/0x1d0
[   14.767843]  ? __pfx_kthread+0x10/0x10
[   14.767865]  ret_from_fork_asm+0x1a/0x30
[   14.767898]  </TASK>
[   14.767909] 
[   14.776025] Allocated by task 282:
[   14.776279]  kasan_save_stack+0x45/0x70
[   14.776561]  kasan_save_track+0x18/0x40
[   14.776821]  kasan_save_alloc_info+0x3b/0x50
[   14.777029]  __kasan_kmalloc+0xb7/0xc0
[   14.777240]  __kmalloc_cache_noprof+0x189/0x420
[   14.777409]  kasan_atomics+0x95/0x310
[   14.777596]  kunit_try_run_case+0x1a5/0x480
[   14.777814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.778035]  kthread+0x337/0x6f0
[   14.778240]  ret_from_fork+0x116/0x1d0
[   14.778459]  ret_from_fork_asm+0x1a/0x30
[   14.778695] 
[   14.778769] The buggy address belongs to the object at ffff8881029e5b80
[   14.778769]  which belongs to the cache kmalloc-64 of size 64
[   14.779232] The buggy address is located 0 bytes to the right of
[   14.779232]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.779719] 
[   14.779817] The buggy address belongs to the physical page:
[   14.780073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.780462] flags: 0x200000000000000(node=0|zone=2)
[   14.780739] page_type: f5(slab)
[   14.780889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.781122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.781478] page dumped because: kasan: bad access detected
[   14.781782] 
[   14.781879] Memory state around the buggy address:
[   14.782153]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.782490]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.782746] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.783042]                                      ^
[   14.783393]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.783715]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.783967] ==================================================================
[   14.581319] ==================================================================
[   14.581819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.582157] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.582480] 
[   14.582594] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.582649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.582662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.582684] Call Trace:
[   14.582698]  <TASK>
[   14.582713]  dump_stack_lvl+0x73/0xb0
[   14.582739]  print_report+0xd1/0x650
[   14.582763]  ? __virt_addr_valid+0x1db/0x2d0
[   14.582789]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.582811]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.582835]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.582858]  kasan_report+0x141/0x180
[   14.582882]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.582910]  kasan_check_range+0x10c/0x1c0
[   14.582936]  __kasan_check_write+0x18/0x20
[   14.582956]  kasan_atomics_helper+0x16e7/0x5450
[   14.582980]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.583004]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.583026]  ? kasan_atomics+0x152/0x310
[   14.583050]  kasan_atomics+0x1dc/0x310
[   14.583070]  ? __pfx_kasan_atomics+0x10/0x10
[   14.583092]  ? __pfx_read_tsc+0x10/0x10
[   14.583115]  ? ktime_get_ts64+0x86/0x230
[   14.583143]  kunit_try_run_case+0x1a5/0x480
[   14.583168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.583202]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.583225]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.583249]  ? __kthread_parkme+0x82/0x180
[   14.583270]  ? preempt_count_sub+0x50/0x80
[   14.583296]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.583320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.583344]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.583368]  kthread+0x337/0x6f0
[   14.583389]  ? trace_preempt_on+0x20/0xc0
[   14.583414]  ? __pfx_kthread+0x10/0x10
[   14.583436]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.583457]  ? calculate_sigpending+0x7b/0xa0
[   14.583482]  ? __pfx_kthread+0x10/0x10
[   14.583505]  ret_from_fork+0x116/0x1d0
[   14.583524]  ? __pfx_kthread+0x10/0x10
[   14.583546]  ret_from_fork_asm+0x1a/0x30
[   14.583579]  </TASK>
[   14.583590] 
[   14.591109] Allocated by task 282:
[   14.591293]  kasan_save_stack+0x45/0x70
[   14.591462]  kasan_save_track+0x18/0x40
[   14.591651]  kasan_save_alloc_info+0x3b/0x50
[   14.591825]  __kasan_kmalloc+0xb7/0xc0
[   14.591960]  __kmalloc_cache_noprof+0x189/0x420
[   14.592112]  kasan_atomics+0x95/0x310
[   14.592242]  kunit_try_run_case+0x1a5/0x480
[   14.592455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.592718]  kthread+0x337/0x6f0
[   14.592889]  ret_from_fork+0x116/0x1d0
[   14.593269]  ret_from_fork_asm+0x1a/0x30
[   14.593468] 
[   14.593550] The buggy address belongs to the object at ffff8881029e5b80
[   14.593550]  which belongs to the cache kmalloc-64 of size 64
[   14.593907] The buggy address is located 0 bytes to the right of
[   14.593907]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.594809] 
[   14.594888] The buggy address belongs to the physical page:
[   14.595123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.595363] flags: 0x200000000000000(node=0|zone=2)
[   14.595524] page_type: f5(slab)
[   14.595656] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.595903] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.596319] page dumped because: kasan: bad access detected
[   14.596570] 
[   14.596677] Memory state around the buggy address:
[   14.596905]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.597250]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.597470] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.597692]                                      ^
[   14.597848]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.598099]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.598729] ==================================================================
[   13.802335] ==================================================================
[   13.802714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   13.803048] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   13.803395] 
[   13.803577] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.803662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.803677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.803716] Call Trace:
[   13.803746]  <TASK>
[   13.803762]  dump_stack_lvl+0x73/0xb0
[   13.803792]  print_report+0xd1/0x650
[   13.803816]  ? __virt_addr_valid+0x1db/0x2d0
[   13.803840]  ? kasan_atomics_helper+0x697/0x5450
[   13.803863]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.803886]  ? kasan_atomics_helper+0x697/0x5450
[   13.803909]  kasan_report+0x141/0x180
[   13.803933]  ? kasan_atomics_helper+0x697/0x5450
[   13.803960]  kasan_check_range+0x10c/0x1c0
[   13.803985]  __kasan_check_write+0x18/0x20
[   13.804007]  kasan_atomics_helper+0x697/0x5450
[   13.804030]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.804054]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.804076]  ? kasan_atomics+0x152/0x310
[   13.804100]  kasan_atomics+0x1dc/0x310
[   13.804120]  ? __pfx_kasan_atomics+0x10/0x10
[   13.804141]  ? __pfx_read_tsc+0x10/0x10
[   13.804182]  ? ktime_get_ts64+0x86/0x230
[   13.804226]  kunit_try_run_case+0x1a5/0x480
[   13.804251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.804274]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.804312]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.804336]  ? __kthread_parkme+0x82/0x180
[   13.804357]  ? preempt_count_sub+0x50/0x80
[   13.804381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.804406]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.804430]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.804453]  kthread+0x337/0x6f0
[   13.804476]  ? trace_preempt_on+0x20/0xc0
[   13.804500]  ? __pfx_kthread+0x10/0x10
[   13.804577]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.804600]  ? calculate_sigpending+0x7b/0xa0
[   13.804634]  ? __pfx_kthread+0x10/0x10
[   13.804657]  ret_from_fork+0x116/0x1d0
[   13.804676]  ? __pfx_kthread+0x10/0x10
[   13.804698]  ret_from_fork_asm+0x1a/0x30
[   13.804731]  </TASK>
[   13.804742] 
[   13.813128] Allocated by task 282:
[   13.813339]  kasan_save_stack+0x45/0x70
[   13.813839]  kasan_save_track+0x18/0x40
[   13.814041]  kasan_save_alloc_info+0x3b/0x50
[   13.814235]  __kasan_kmalloc+0xb7/0xc0
[   13.814367]  __kmalloc_cache_noprof+0x189/0x420
[   13.814591]  kasan_atomics+0x95/0x310
[   13.814792]  kunit_try_run_case+0x1a5/0x480
[   13.815025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.815352]  kthread+0x337/0x6f0
[   13.815646]  ret_from_fork+0x116/0x1d0
[   13.815859]  ret_from_fork_asm+0x1a/0x30
[   13.816033] 
[   13.816134] The buggy address belongs to the object at ffff8881029e5b80
[   13.816134]  which belongs to the cache kmalloc-64 of size 64
[   13.816694] The buggy address is located 0 bytes to the right of
[   13.816694]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   13.817307] 
[   13.817409] The buggy address belongs to the physical page:
[   13.817728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   13.818080] flags: 0x200000000000000(node=0|zone=2)
[   13.818264] page_type: f5(slab)
[   13.818386] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.819370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.820429] page dumped because: kasan: bad access detected
[   13.821181] 
[   13.821605] Memory state around the buggy address:
[   13.822267]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.822894]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.823118] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.824206]                                      ^
[   13.824975]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.825991]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.826603] ==================================================================
[   14.599324] ==================================================================
[   14.599764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   14.600123] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.600376] 
[   14.600461] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.600507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.600520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.600541] Call Trace:
[   14.600556]  <TASK>
[   14.600572]  dump_stack_lvl+0x73/0xb0
[   14.600601]  print_report+0xd1/0x650
[   14.600637]  ? __virt_addr_valid+0x1db/0x2d0
[   14.600662]  ? kasan_atomics_helper+0x177f/0x5450
[   14.600685]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.600709]  ? kasan_atomics_helper+0x177f/0x5450
[   14.600733]  kasan_report+0x141/0x180
[   14.600757]  ? kasan_atomics_helper+0x177f/0x5450
[   14.600785]  kasan_check_range+0x10c/0x1c0
[   14.600811]  __kasan_check_write+0x18/0x20
[   14.600832]  kasan_atomics_helper+0x177f/0x5450
[   14.600856]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.600880]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.600902]  ? kasan_atomics+0x152/0x310
[   14.600927]  kasan_atomics+0x1dc/0x310
[   14.600948]  ? __pfx_kasan_atomics+0x10/0x10
[   14.600970]  ? __pfx_read_tsc+0x10/0x10
[   14.600992]  ? ktime_get_ts64+0x86/0x230
[   14.601019]  kunit_try_run_case+0x1a5/0x480
[   14.601044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.601067]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.601091]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.601114]  ? __kthread_parkme+0x82/0x180
[   14.601136]  ? preempt_count_sub+0x50/0x80
[   14.601161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.601197]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.601221]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.601246]  kthread+0x337/0x6f0
[   14.601267]  ? trace_preempt_on+0x20/0xc0
[   14.601292]  ? __pfx_kthread+0x10/0x10
[   14.601314]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.601336]  ? calculate_sigpending+0x7b/0xa0
[   14.601361]  ? __pfx_kthread+0x10/0x10
[   14.601384]  ret_from_fork+0x116/0x1d0
[   14.601404]  ? __pfx_kthread+0x10/0x10
[   14.601426]  ret_from_fork_asm+0x1a/0x30
[   14.601459]  </TASK>
[   14.601471] 
[   14.609085] Allocated by task 282:
[   14.609217]  kasan_save_stack+0x45/0x70
[   14.609361]  kasan_save_track+0x18/0x40
[   14.609500]  kasan_save_alloc_info+0x3b/0x50
[   14.609705]  __kasan_kmalloc+0xb7/0xc0
[   14.609893]  __kmalloc_cache_noprof+0x189/0x420
[   14.610113]  kasan_atomics+0x95/0x310
[   14.610466]  kunit_try_run_case+0x1a5/0x480
[   14.610689]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.610944]  kthread+0x337/0x6f0
[   14.611084]  ret_from_fork+0x116/0x1d0
[   14.611297]  ret_from_fork_asm+0x1a/0x30
[   14.611439] 
[   14.611512] The buggy address belongs to the object at ffff8881029e5b80
[   14.611512]  which belongs to the cache kmalloc-64 of size 64
[   14.611875] The buggy address is located 0 bytes to the right of
[   14.611875]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.612399] 
[   14.612498] The buggy address belongs to the physical page:
[   14.612767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.613367] flags: 0x200000000000000(node=0|zone=2)
[   14.613547] page_type: f5(slab)
[   14.613687] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.614025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.614341] page dumped because: kasan: bad access detected
[   14.614547] 
[   14.614629] Memory state around the buggy address:
[   14.614786]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.615007]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.615250] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.615574]                                      ^
[   14.615807]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.616242]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.616515] ==================================================================
[   14.216039] ==================================================================
[   14.216877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   14.217268] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.217837] 
[   14.217949] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.217998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.218012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.218034] Call Trace:
[   14.218049]  <TASK>
[   14.218065]  dump_stack_lvl+0x73/0xb0
[   14.218095]  print_report+0xd1/0x650
[   14.218121]  ? __virt_addr_valid+0x1db/0x2d0
[   14.218145]  ? kasan_atomics_helper+0x1079/0x5450
[   14.218167]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.218352]  ? kasan_atomics_helper+0x1079/0x5450
[   14.218381]  kasan_report+0x141/0x180
[   14.218406]  ? kasan_atomics_helper+0x1079/0x5450
[   14.218436]  kasan_check_range+0x10c/0x1c0
[   14.218461]  __kasan_check_write+0x18/0x20
[   14.218523]  kasan_atomics_helper+0x1079/0x5450
[   14.218628]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.218653]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.218675]  ? kasan_atomics+0x152/0x310
[   14.218700]  kasan_atomics+0x1dc/0x310
[   14.218721]  ? __pfx_kasan_atomics+0x10/0x10
[   14.218743]  ? __pfx_read_tsc+0x10/0x10
[   14.218764]  ? ktime_get_ts64+0x86/0x230
[   14.218793]  kunit_try_run_case+0x1a5/0x480
[   14.218818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.218842]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.218865]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.218888]  ? __kthread_parkme+0x82/0x180
[   14.218910]  ? preempt_count_sub+0x50/0x80
[   14.218935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.218959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.218983]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.219007]  kthread+0x337/0x6f0
[   14.219029]  ? trace_preempt_on+0x20/0xc0
[   14.219053]  ? __pfx_kthread+0x10/0x10
[   14.219076]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.219097]  ? calculate_sigpending+0x7b/0xa0
[   14.219122]  ? __pfx_kthread+0x10/0x10
[   14.219145]  ret_from_fork+0x116/0x1d0
[   14.219164]  ? __pfx_kthread+0x10/0x10
[   14.219194]  ret_from_fork_asm+0x1a/0x30
[   14.219226]  </TASK>
[   14.219239] 
[   14.232289] Allocated by task 282:
[   14.232493]  kasan_save_stack+0x45/0x70
[   14.232864]  kasan_save_track+0x18/0x40
[   14.233053]  kasan_save_alloc_info+0x3b/0x50
[   14.233402]  __kasan_kmalloc+0xb7/0xc0
[   14.233841]  __kmalloc_cache_noprof+0x189/0x420
[   14.234089]  kasan_atomics+0x95/0x310
[   14.234530]  kunit_try_run_case+0x1a5/0x480
[   14.235096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.235501]  kthread+0x337/0x6f0
[   14.235684]  ret_from_fork+0x116/0x1d0
[   14.236174]  ret_from_fork_asm+0x1a/0x30
[   14.236466] 
[   14.236692] The buggy address belongs to the object at ffff8881029e5b80
[   14.236692]  which belongs to the cache kmalloc-64 of size 64
[   14.237624] The buggy address is located 0 bytes to the right of
[   14.237624]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.238529] 
[   14.238646] The buggy address belongs to the physical page:
[   14.239187] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.239813] flags: 0x200000000000000(node=0|zone=2)
[   14.240158] page_type: f5(slab)
[   14.240534] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.240867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.241150] page dumped because: kasan: bad access detected
[   14.241684] 
[   14.241934] Memory state around the buggy address:
[   14.242351]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.242988]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.243455] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.243902]                                      ^
[   14.244116]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.244692]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.245206] ==================================================================
[   14.952003] ==================================================================
[   14.952371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   14.952738] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.953064] 
[   14.953148] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.953214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.953227] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.953250] Call Trace:
[   14.953263]  <TASK>
[   14.953277]  dump_stack_lvl+0x73/0xb0
[   14.953304]  print_report+0xd1/0x650
[   14.953327]  ? __virt_addr_valid+0x1db/0x2d0
[   14.953352]  ? kasan_atomics_helper+0x218a/0x5450
[   14.953375]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.953398]  ? kasan_atomics_helper+0x218a/0x5450
[   14.953422]  kasan_report+0x141/0x180
[   14.953446]  ? kasan_atomics_helper+0x218a/0x5450
[   14.953474]  kasan_check_range+0x10c/0x1c0
[   14.953499]  __kasan_check_write+0x18/0x20
[   14.953531]  kasan_atomics_helper+0x218a/0x5450
[   14.953555]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.953579]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.953627]  ? kasan_atomics+0x152/0x310
[   14.953652]  kasan_atomics+0x1dc/0x310
[   14.953671]  ? __pfx_kasan_atomics+0x10/0x10
[   14.953704]  ? __pfx_read_tsc+0x10/0x10
[   14.953725]  ? ktime_get_ts64+0x86/0x230
[   14.953751]  kunit_try_run_case+0x1a5/0x480
[   14.953776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.953799]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.953823]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.953846]  ? __kthread_parkme+0x82/0x180
[   14.953867]  ? preempt_count_sub+0x50/0x80
[   14.953893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.953918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.953942]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.953966]  kthread+0x337/0x6f0
[   14.953987]  ? trace_preempt_on+0x20/0xc0
[   14.954012]  ? __pfx_kthread+0x10/0x10
[   14.954034]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.954056]  ? calculate_sigpending+0x7b/0xa0
[   14.954080]  ? __pfx_kthread+0x10/0x10
[   14.954103]  ret_from_fork+0x116/0x1d0
[   14.954122]  ? __pfx_kthread+0x10/0x10
[   14.954145]  ret_from_fork_asm+0x1a/0x30
[   14.954205]  </TASK>
[   14.954216] 
[   14.962123] Allocated by task 282:
[   14.962392]  kasan_save_stack+0x45/0x70
[   14.962661]  kasan_save_track+0x18/0x40
[   14.962850]  kasan_save_alloc_info+0x3b/0x50
[   14.963053]  __kasan_kmalloc+0xb7/0xc0
[   14.963215]  __kmalloc_cache_noprof+0x189/0x420
[   14.963370]  kasan_atomics+0x95/0x310
[   14.963502]  kunit_try_run_case+0x1a5/0x480
[   14.963752]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.964026]  kthread+0x337/0x6f0
[   14.964227]  ret_from_fork+0x116/0x1d0
[   14.964478]  ret_from_fork_asm+0x1a/0x30
[   14.964744] 
[   14.964830] The buggy address belongs to the object at ffff8881029e5b80
[   14.964830]  which belongs to the cache kmalloc-64 of size 64
[   14.965250] The buggy address is located 0 bytes to the right of
[   14.965250]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.965732] 
[   14.965877] The buggy address belongs to the physical page:
[   14.966139] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.966554] flags: 0x200000000000000(node=0|zone=2)
[   14.966856] page_type: f5(slab)
[   14.967122] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.967433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.967670] page dumped because: kasan: bad access detected
[   14.967843] 
[   14.967941] Memory state around the buggy address:
[   14.968206]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.968556]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.968891] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.969276]                                      ^
[   14.969511]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.969857]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.970155] ==================================================================
[   14.822800] ==================================================================
[   14.823308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   14.823703] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.824055] 
[   14.824284] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.824332] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.824345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.824368] Call Trace:
[   14.824382]  <TASK>
[   14.824398]  dump_stack_lvl+0x73/0xb0
[   14.824426]  print_report+0xd1/0x650
[   14.824450]  ? __virt_addr_valid+0x1db/0x2d0
[   14.824476]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.824499]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.824523]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.824546]  kasan_report+0x141/0x180
[   14.824570]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.824598]  kasan_check_range+0x10c/0x1c0
[   14.824634]  __kasan_check_write+0x18/0x20
[   14.824654]  kasan_atomics_helper+0x1eaa/0x5450
[   14.824678]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.824702]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.824724]  ? kasan_atomics+0x152/0x310
[   14.824748]  kasan_atomics+0x1dc/0x310
[   14.824768]  ? __pfx_kasan_atomics+0x10/0x10
[   14.824790]  ? __pfx_read_tsc+0x10/0x10
[   14.824812]  ? ktime_get_ts64+0x86/0x230
[   14.824838]  kunit_try_run_case+0x1a5/0x480
[   14.824862]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.824885]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.824908]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.824931]  ? __kthread_parkme+0x82/0x180
[   14.824953]  ? preempt_count_sub+0x50/0x80
[   14.824978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.825002]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.825026]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.825049]  kthread+0x337/0x6f0
[   14.825070]  ? trace_preempt_on+0x20/0xc0
[   14.825094]  ? __pfx_kthread+0x10/0x10
[   14.825116]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.825138]  ? calculate_sigpending+0x7b/0xa0
[   14.825162]  ? __pfx_kthread+0x10/0x10
[   14.825185]  ret_from_fork+0x116/0x1d0
[   14.825204]  ? __pfx_kthread+0x10/0x10
[   14.825226]  ret_from_fork_asm+0x1a/0x30
[   14.825259]  </TASK>
[   14.825270] 
[   14.833428] Allocated by task 282:
[   14.833660]  kasan_save_stack+0x45/0x70
[   14.833880]  kasan_save_track+0x18/0x40
[   14.834133]  kasan_save_alloc_info+0x3b/0x50
[   14.834353]  __kasan_kmalloc+0xb7/0xc0
[   14.834589]  __kmalloc_cache_noprof+0x189/0x420
[   14.834757]  kasan_atomics+0x95/0x310
[   14.834936]  kunit_try_run_case+0x1a5/0x480
[   14.835287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.835572]  kthread+0x337/0x6f0
[   14.835710]  ret_from_fork+0x116/0x1d0
[   14.835875]  ret_from_fork_asm+0x1a/0x30
[   14.836121] 
[   14.836280] The buggy address belongs to the object at ffff8881029e5b80
[   14.836280]  which belongs to the cache kmalloc-64 of size 64
[   14.836891] The buggy address is located 0 bytes to the right of
[   14.836891]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.837403] 
[   14.837506] The buggy address belongs to the physical page:
[   14.837820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.838230] flags: 0x200000000000000(node=0|zone=2)
[   14.838400] page_type: f5(slab)
[   14.838606] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.838973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.839329] page dumped because: kasan: bad access detected
[   14.839590] 
[   14.839698] Memory state around the buggy address:
[   14.839883]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.840341]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.840733] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.840983]                                      ^
[   14.841325]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.841582]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.841943] ==================================================================
[   13.719659] ==================================================================
[   13.720132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   13.720491] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   13.720731] 
[   13.720830] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.720878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.720890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.720911] Call Trace:
[   13.720971]  <TASK>
[   13.720989]  dump_stack_lvl+0x73/0xb0
[   13.721019]  print_report+0xd1/0x650
[   13.721042]  ? __virt_addr_valid+0x1db/0x2d0
[   13.721066]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.721088]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.721112]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.721134]  kasan_report+0x141/0x180
[   13.721158]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.721186]  kasan_check_range+0x10c/0x1c0
[   13.721212]  __kasan_check_write+0x18/0x20
[   13.721233]  kasan_atomics_helper+0x4a0/0x5450
[   13.721258]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.721282]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.721304]  ? kasan_atomics+0x152/0x310
[   13.721328]  kasan_atomics+0x1dc/0x310
[   13.721349]  ? __pfx_kasan_atomics+0x10/0x10
[   13.721372]  ? __pfx_read_tsc+0x10/0x10
[   13.721393]  ? ktime_get_ts64+0x86/0x230
[   13.721418]  kunit_try_run_case+0x1a5/0x480
[   13.721443]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.721466]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.721490]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.721513]  ? __kthread_parkme+0x82/0x180
[   13.721534]  ? preempt_count_sub+0x50/0x80
[   13.721602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.721639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.721664]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.721688]  kthread+0x337/0x6f0
[   13.721709]  ? trace_preempt_on+0x20/0xc0
[   13.721732]  ? __pfx_kthread+0x10/0x10
[   13.721754]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.721777]  ? calculate_sigpending+0x7b/0xa0
[   13.721801]  ? __pfx_kthread+0x10/0x10
[   13.721824]  ret_from_fork+0x116/0x1d0
[   13.721843]  ? __pfx_kthread+0x10/0x10
[   13.721865]  ret_from_fork_asm+0x1a/0x30
[   13.721898]  </TASK>
[   13.721908] 
[   13.730185] Allocated by task 282:
[   13.730390]  kasan_save_stack+0x45/0x70
[   13.730648]  kasan_save_track+0x18/0x40
[   13.730863]  kasan_save_alloc_info+0x3b/0x50
[   13.731060]  __kasan_kmalloc+0xb7/0xc0
[   13.731355]  __kmalloc_cache_noprof+0x189/0x420
[   13.731715]  kasan_atomics+0x95/0x310
[   13.731928]  kunit_try_run_case+0x1a5/0x480
[   13.732166]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.732481]  kthread+0x337/0x6f0
[   13.732785]  ret_from_fork+0x116/0x1d0
[   13.732989]  ret_from_fork_asm+0x1a/0x30
[   13.733198] 
[   13.733293] The buggy address belongs to the object at ffff8881029e5b80
[   13.733293]  which belongs to the cache kmalloc-64 of size 64
[   13.733916] The buggy address is located 0 bytes to the right of
[   13.733916]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   13.734466] 
[   13.734609] The buggy address belongs to the physical page:
[   13.734901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   13.735323] flags: 0x200000000000000(node=0|zone=2)
[   13.735673] page_type: f5(slab)
[   13.735901] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.736285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.736855] page dumped because: kasan: bad access detected
[   13.737116] 
[   13.737243] Memory state around the buggy address:
[   13.737470]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.737816]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.738158] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.738475]                                      ^
[   13.738773]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.739089]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.739329] ==================================================================
[   14.267681] ==================================================================
[   14.267979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   14.268452] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.269321] 
[   14.269457] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.269632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.269649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.269671] Call Trace:
[   14.269684]  <TASK>
[   14.269700]  dump_stack_lvl+0x73/0xb0
[   14.269833]  print_report+0xd1/0x650
[   14.269857]  ? __virt_addr_valid+0x1db/0x2d0
[   14.269881]  ? kasan_atomics_helper+0x1148/0x5450
[   14.269904]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.269927]  ? kasan_atomics_helper+0x1148/0x5450
[   14.269950]  kasan_report+0x141/0x180
[   14.269974]  ? kasan_atomics_helper+0x1148/0x5450
[   14.270002]  kasan_check_range+0x10c/0x1c0
[   14.270027]  __kasan_check_write+0x18/0x20
[   14.270048]  kasan_atomics_helper+0x1148/0x5450
[   14.270072]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.270097]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.270118]  ? kasan_atomics+0x152/0x310
[   14.270142]  kasan_atomics+0x1dc/0x310
[   14.270162]  ? __pfx_kasan_atomics+0x10/0x10
[   14.270194]  ? __pfx_read_tsc+0x10/0x10
[   14.270215]  ? ktime_get_ts64+0x86/0x230
[   14.270240]  kunit_try_run_case+0x1a5/0x480
[   14.270266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.270289]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.270312]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.270335]  ? __kthread_parkme+0x82/0x180
[   14.270356]  ? preempt_count_sub+0x50/0x80
[   14.270381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.270405]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.270430]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.270453]  kthread+0x337/0x6f0
[   14.270481]  ? trace_preempt_on+0x20/0xc0
[   14.270505]  ? __pfx_kthread+0x10/0x10
[   14.270539]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.270561]  ? calculate_sigpending+0x7b/0xa0
[   14.270585]  ? __pfx_kthread+0x10/0x10
[   14.270608]  ret_from_fork+0x116/0x1d0
[   14.270640]  ? __pfx_kthread+0x10/0x10
[   14.270662]  ret_from_fork_asm+0x1a/0x30
[   14.270694]  </TASK>
[   14.270706] 
[   14.282934] Allocated by task 282:
[   14.283121]  kasan_save_stack+0x45/0x70
[   14.283290]  kasan_save_track+0x18/0x40
[   14.283523]  kasan_save_alloc_info+0x3b/0x50
[   14.284150]  __kasan_kmalloc+0xb7/0xc0
[   14.284476]  __kmalloc_cache_noprof+0x189/0x420
[   14.285016]  kasan_atomics+0x95/0x310
[   14.285189]  kunit_try_run_case+0x1a5/0x480
[   14.285422]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.285866]  kthread+0x337/0x6f0
[   14.286148]  ret_from_fork+0x116/0x1d0
[   14.286472]  ret_from_fork_asm+0x1a/0x30
[   14.286872] 
[   14.287024] The buggy address belongs to the object at ffff8881029e5b80
[   14.287024]  which belongs to the cache kmalloc-64 of size 64
[   14.287999] The buggy address is located 0 bytes to the right of
[   14.287999]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.288708] 
[   14.288816] The buggy address belongs to the physical page:
[   14.289322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.289832] flags: 0x200000000000000(node=0|zone=2)
[   14.290283] page_type: f5(slab)
[   14.290460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.291018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.291565] page dumped because: kasan: bad access detected
[   14.292048] 
[   14.292128] Memory state around the buggy address:
[   14.292664]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.292956]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.293438] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.293927]                                      ^
[   14.294240]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.294779]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.295382] ==================================================================
[   14.369319] ==================================================================
[   14.369582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   14.369827] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.370058] 
[   14.370162] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.370206] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.370220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.370241] Call Trace:
[   14.370255]  <TASK>
[   14.370269]  dump_stack_lvl+0x73/0xb0
[   14.370295]  print_report+0xd1/0x650
[   14.370317]  ? __virt_addr_valid+0x1db/0x2d0
[   14.370341]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.370364]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.370387]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.370412]  kasan_report+0x141/0x180
[   14.370451]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.370488]  kasan_check_range+0x10c/0x1c0
[   14.370514]  __kasan_check_write+0x18/0x20
[   14.370535]  kasan_atomics_helper+0x12e6/0x5450
[   14.370559]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.370583]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.370606]  ? kasan_atomics+0x152/0x310
[   14.370640]  kasan_atomics+0x1dc/0x310
[   14.370661]  ? __pfx_kasan_atomics+0x10/0x10
[   14.370695]  ? __pfx_read_tsc+0x10/0x10
[   14.370716]  ? ktime_get_ts64+0x86/0x230
[   14.370742]  kunit_try_run_case+0x1a5/0x480
[   14.370767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.370790]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.370812]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.370836]  ? __kthread_parkme+0x82/0x180
[   14.370857]  ? preempt_count_sub+0x50/0x80
[   14.370882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.370906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.370930]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.370954]  kthread+0x337/0x6f0
[   14.370975]  ? trace_preempt_on+0x20/0xc0
[   14.370999]  ? __pfx_kthread+0x10/0x10
[   14.371022]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.371043]  ? calculate_sigpending+0x7b/0xa0
[   14.371068]  ? __pfx_kthread+0x10/0x10
[   14.371091]  ret_from_fork+0x116/0x1d0
[   14.371110]  ? __pfx_kthread+0x10/0x10
[   14.371134]  ret_from_fork_asm+0x1a/0x30
[   14.371166]  </TASK>
[   14.371177] 
[   14.379815] Allocated by task 282:
[   14.379980]  kasan_save_stack+0x45/0x70
[   14.380363]  kasan_save_track+0x18/0x40
[   14.380563]  kasan_save_alloc_info+0x3b/0x50
[   14.380782]  __kasan_kmalloc+0xb7/0xc0
[   14.380969]  __kmalloc_cache_noprof+0x189/0x420
[   14.381190]  kasan_atomics+0x95/0x310
[   14.381375]  kunit_try_run_case+0x1a5/0x480
[   14.381692]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.381883]  kthread+0x337/0x6f0
[   14.382006]  ret_from_fork+0x116/0x1d0
[   14.382139]  ret_from_fork_asm+0x1a/0x30
[   14.382560] 
[   14.382668] The buggy address belongs to the object at ffff8881029e5b80
[   14.382668]  which belongs to the cache kmalloc-64 of size 64
[   14.383144] The buggy address is located 0 bytes to the right of
[   14.383144]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.383520] 
[   14.383598] The buggy address belongs to the physical page:
[   14.383861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.384222] flags: 0x200000000000000(node=0|zone=2)
[   14.384503] page_type: f5(slab)
[   14.384704] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.384989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.386020] page dumped because: kasan: bad access detected
[   14.386302] 
[   14.386382] Memory state around the buggy address:
[   14.386552]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.386781]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.387356] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.387980]                                      ^
[   14.388442]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.388963]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.389637] ==================================================================
[   14.861600] ==================================================================
[   14.862059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   14.862454] Read of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.862839] 
[   14.862945] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.862992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.863005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.863027] Call Trace:
[   14.863040]  <TASK>
[   14.863055]  dump_stack_lvl+0x73/0xb0
[   14.863083]  print_report+0xd1/0x650
[   14.863106]  ? __virt_addr_valid+0x1db/0x2d0
[   14.863131]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.863155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.863201]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.863225]  kasan_report+0x141/0x180
[   14.863248]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.863276]  __asan_report_load8_noabort+0x18/0x20
[   14.863299]  kasan_atomics_helper+0x4f71/0x5450
[   14.863324]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.863347]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.863370]  ? kasan_atomics+0x152/0x310
[   14.863431]  kasan_atomics+0x1dc/0x310
[   14.863452]  ? __pfx_kasan_atomics+0x10/0x10
[   14.863486]  ? __pfx_read_tsc+0x10/0x10
[   14.863507]  ? ktime_get_ts64+0x86/0x230
[   14.863533]  kunit_try_run_case+0x1a5/0x480
[   14.863558]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.863580]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.863603]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.863635]  ? __kthread_parkme+0x82/0x180
[   14.863656]  ? preempt_count_sub+0x50/0x80
[   14.863681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.863705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.863729]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.863753]  kthread+0x337/0x6f0
[   14.863774]  ? trace_preempt_on+0x20/0xc0
[   14.863831]  ? __pfx_kthread+0x10/0x10
[   14.863852]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.863886]  ? calculate_sigpending+0x7b/0xa0
[   14.863911]  ? __pfx_kthread+0x10/0x10
[   14.863933]  ret_from_fork+0x116/0x1d0
[   14.863953]  ? __pfx_kthread+0x10/0x10
[   14.863975]  ret_from_fork_asm+0x1a/0x30
[   14.864008]  </TASK>
[   14.864019] 
[   14.872081] Allocated by task 282:
[   14.872234]  kasan_save_stack+0x45/0x70
[   14.872435]  kasan_save_track+0x18/0x40
[   14.872687]  kasan_save_alloc_info+0x3b/0x50
[   14.872941]  __kasan_kmalloc+0xb7/0xc0
[   14.873132]  __kmalloc_cache_noprof+0x189/0x420
[   14.873392]  kasan_atomics+0x95/0x310
[   14.873556]  kunit_try_run_case+0x1a5/0x480
[   14.873886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.874095]  kthread+0x337/0x6f0
[   14.874324]  ret_from_fork+0x116/0x1d0
[   14.874633]  ret_from_fork_asm+0x1a/0x30
[   14.874797] 
[   14.874870] The buggy address belongs to the object at ffff8881029e5b80
[   14.874870]  which belongs to the cache kmalloc-64 of size 64
[   14.875400] The buggy address is located 0 bytes to the right of
[   14.875400]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.875929] 
[   14.876003] The buggy address belongs to the physical page:
[   14.876229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.876639] flags: 0x200000000000000(node=0|zone=2)
[   14.876931] page_type: f5(slab)
[   14.877187] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.877469] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.877724] page dumped because: kasan: bad access detected
[   14.878010] 
[   14.878121] Memory state around the buggy address:
[   14.878379]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.878753]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.879017] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.879349]                                      ^
[   14.879669]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.879920]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.880298] ==================================================================
[   13.654288] ==================================================================
[   13.654959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   13.655436] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   13.656041] 
[   13.656161] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.656213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.656227] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.656251] Call Trace:
[   13.656266]  <TASK>
[   13.656282]  dump_stack_lvl+0x73/0xb0
[   13.656312]  print_report+0xd1/0x650
[   13.656335]  ? __virt_addr_valid+0x1db/0x2d0
[   13.656361]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.656385]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.656408]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.656432]  kasan_report+0x141/0x180
[   13.656457]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.656486]  __asan_report_store4_noabort+0x1b/0x30
[   13.656509]  kasan_atomics_helper+0x4b6e/0x5450
[   13.656727]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.656755]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.656778]  ? kasan_atomics+0x152/0x310
[   13.656802]  kasan_atomics+0x1dc/0x310
[   13.656823]  ? __pfx_kasan_atomics+0x10/0x10
[   13.656845]  ? __pfx_read_tsc+0x10/0x10
[   13.656867]  ? ktime_get_ts64+0x86/0x230
[   13.656894]  kunit_try_run_case+0x1a5/0x480
[   13.656919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.656942]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.656966]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.656990]  ? __kthread_parkme+0x82/0x180
[   13.657011]  ? preempt_count_sub+0x50/0x80
[   13.657038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.657062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.657086]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.657110]  kthread+0x337/0x6f0
[   13.657131]  ? trace_preempt_on+0x20/0xc0
[   13.657155]  ? __pfx_kthread+0x10/0x10
[   13.657177]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.657199]  ? calculate_sigpending+0x7b/0xa0
[   13.657224]  ? __pfx_kthread+0x10/0x10
[   13.657247]  ret_from_fork+0x116/0x1d0
[   13.657268]  ? __pfx_kthread+0x10/0x10
[   13.657290]  ret_from_fork_asm+0x1a/0x30
[   13.657324]  </TASK>
[   13.657335] 
[   13.668065] Allocated by task 282:
[   13.668368]  kasan_save_stack+0x45/0x70
[   13.668802]  kasan_save_track+0x18/0x40
[   13.668983]  kasan_save_alloc_info+0x3b/0x50
[   13.669322]  __kasan_kmalloc+0xb7/0xc0
[   13.669512]  __kmalloc_cache_noprof+0x189/0x420
[   13.669811]  kasan_atomics+0x95/0x310
[   13.669989]  kunit_try_run_case+0x1a5/0x480
[   13.670401]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.670918]  kthread+0x337/0x6f0
[   13.671104]  ret_from_fork+0x116/0x1d0
[   13.671475]  ret_from_fork_asm+0x1a/0x30
[   13.671760] 
[   13.671848] The buggy address belongs to the object at ffff8881029e5b80
[   13.671848]  which belongs to the cache kmalloc-64 of size 64
[   13.672512] The buggy address is located 0 bytes to the right of
[   13.672512]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   13.673124] 
[   13.673436] The buggy address belongs to the physical page:
[   13.673763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   13.674160] flags: 0x200000000000000(node=0|zone=2)
[   13.674371] page_type: f5(slab)
[   13.674748] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.675149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.675782] page dumped because: kasan: bad access detected
[   13.676036] 
[   13.676133] Memory state around the buggy address:
[   13.676591]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.676933]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.677355] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.677711]                                      ^
[   13.677932]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.678219]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.678826] ==================================================================
[   14.880896] ==================================================================
[   14.881196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   14.881601] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.881962] 
[   14.882074] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.882147] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.882198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.882221] Call Trace:
[   14.882234]  <TASK>
[   14.882259]  dump_stack_lvl+0x73/0xb0
[   14.882287]  print_report+0xd1/0x650
[   14.882310]  ? __virt_addr_valid+0x1db/0x2d0
[   14.882335]  ? kasan_atomics_helper+0x2006/0x5450
[   14.882357]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.882381]  ? kasan_atomics_helper+0x2006/0x5450
[   14.882405]  kasan_report+0x141/0x180
[   14.882429]  ? kasan_atomics_helper+0x2006/0x5450
[   14.882458]  kasan_check_range+0x10c/0x1c0
[   14.882487]  __kasan_check_write+0x18/0x20
[   14.882508]  kasan_atomics_helper+0x2006/0x5450
[   14.882533]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.882572]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.882595]  ? kasan_atomics+0x152/0x310
[   14.882629]  kasan_atomics+0x1dc/0x310
[   14.882650]  ? __pfx_kasan_atomics+0x10/0x10
[   14.882673]  ? __pfx_read_tsc+0x10/0x10
[   14.882694]  ? ktime_get_ts64+0x86/0x230
[   14.882721]  kunit_try_run_case+0x1a5/0x480
[   14.882746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.882769]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.882792]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.882815]  ? __kthread_parkme+0x82/0x180
[   14.882836]  ? preempt_count_sub+0x50/0x80
[   14.882860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.882885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.882910]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.882934]  kthread+0x337/0x6f0
[   14.882955]  ? trace_preempt_on+0x20/0xc0
[   14.882981]  ? __pfx_kthread+0x10/0x10
[   14.883004]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.883024]  ? calculate_sigpending+0x7b/0xa0
[   14.883049]  ? __pfx_kthread+0x10/0x10
[   14.883072]  ret_from_fork+0x116/0x1d0
[   14.883091]  ? __pfx_kthread+0x10/0x10
[   14.883113]  ret_from_fork_asm+0x1a/0x30
[   14.883146]  </TASK>
[   14.883157] 
[   14.890666] Allocated by task 282:
[   14.890847]  kasan_save_stack+0x45/0x70
[   14.891045]  kasan_save_track+0x18/0x40
[   14.891218]  kasan_save_alloc_info+0x3b/0x50
[   14.891455]  __kasan_kmalloc+0xb7/0xc0
[   14.891654]  __kmalloc_cache_noprof+0x189/0x420
[   14.891856]  kasan_atomics+0x95/0x310
[   14.892007]  kunit_try_run_case+0x1a5/0x480
[   14.892233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.892480]  kthread+0x337/0x6f0
[   14.892605]  ret_from_fork+0x116/0x1d0
[   14.892747]  ret_from_fork_asm+0x1a/0x30
[   14.892887] 
[   14.892958] The buggy address belongs to the object at ffff8881029e5b80
[   14.892958]  which belongs to the cache kmalloc-64 of size 64
[   14.893494] The buggy address is located 0 bytes to the right of
[   14.893494]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.894051] 
[   14.894150] The buggy address belongs to the physical page:
[   14.894416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.894680] flags: 0x200000000000000(node=0|zone=2)
[   14.894844] page_type: f5(slab)
[   14.895004] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.895401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.895767] page dumped because: kasan: bad access detected
[   14.895970] 
[   14.896042] Memory state around the buggy address:
[   14.896220]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.896543]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.896869] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.897228]                                      ^
[   14.897453]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.897686]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.897968] ==================================================================
[   13.760989] ==================================================================
[   13.761266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   13.761553] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   13.762148] 
[   13.762290] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.762358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.762371] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.762406] Call Trace:
[   13.762421]  <TASK>
[   13.762436]  dump_stack_lvl+0x73/0xb0
[   13.762486]  print_report+0xd1/0x650
[   13.762583]  ? __virt_addr_valid+0x1db/0x2d0
[   13.762610]  ? kasan_atomics_helper+0x565/0x5450
[   13.762643]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.762667]  ? kasan_atomics_helper+0x565/0x5450
[   13.762693]  kasan_report+0x141/0x180
[   13.762716]  ? kasan_atomics_helper+0x565/0x5450
[   13.762744]  kasan_check_range+0x10c/0x1c0
[   13.762768]  __kasan_check_write+0x18/0x20
[   13.762789]  kasan_atomics_helper+0x565/0x5450
[   13.762813]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.762837]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.762861]  ? kasan_atomics+0x152/0x310
[   13.762885]  kasan_atomics+0x1dc/0x310
[   13.762905]  ? __pfx_kasan_atomics+0x10/0x10
[   13.762928]  ? __pfx_read_tsc+0x10/0x10
[   13.762949]  ? ktime_get_ts64+0x86/0x230
[   13.762974]  kunit_try_run_case+0x1a5/0x480
[   13.762999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.763021]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.763044]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.763067]  ? __kthread_parkme+0x82/0x180
[   13.763088]  ? preempt_count_sub+0x50/0x80
[   13.763113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.763138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.763180]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.763204]  kthread+0x337/0x6f0
[   13.763226]  ? trace_preempt_on+0x20/0xc0
[   13.763250]  ? __pfx_kthread+0x10/0x10
[   13.763272]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.763293]  ? calculate_sigpending+0x7b/0xa0
[   13.763317]  ? __pfx_kthread+0x10/0x10
[   13.763340]  ret_from_fork+0x116/0x1d0
[   13.763360]  ? __pfx_kthread+0x10/0x10
[   13.763381]  ret_from_fork_asm+0x1a/0x30
[   13.763413]  </TASK>
[   13.763425] 
[   13.772314] Allocated by task 282:
[   13.772503]  kasan_save_stack+0x45/0x70
[   13.772780]  kasan_save_track+0x18/0x40
[   13.772952]  kasan_save_alloc_info+0x3b/0x50
[   13.773164]  __kasan_kmalloc+0xb7/0xc0
[   13.773385]  __kmalloc_cache_noprof+0x189/0x420
[   13.773734]  kasan_atomics+0x95/0x310
[   13.773931]  kunit_try_run_case+0x1a5/0x480
[   13.774140]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.774398]  kthread+0x337/0x6f0
[   13.774573]  ret_from_fork+0x116/0x1d0
[   13.774772]  ret_from_fork_asm+0x1a/0x30
[   13.774949] 
[   13.775022] The buggy address belongs to the object at ffff8881029e5b80
[   13.775022]  which belongs to the cache kmalloc-64 of size 64
[   13.775834] The buggy address is located 0 bytes to the right of
[   13.775834]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   13.776326] 
[   13.776445] The buggy address belongs to the physical page:
[   13.776806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   13.777138] flags: 0x200000000000000(node=0|zone=2)
[   13.777386] page_type: f5(slab)
[   13.777634] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.777986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.778359] page dumped because: kasan: bad access detected
[   13.778696] 
[   13.778791] Memory state around the buggy address:
[   13.779002]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.779351]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.779774] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.780097]                                      ^
[   13.780349]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.780827]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.781141] ==================================================================
[   13.880373] ==================================================================
[   13.880902] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   13.881148] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   13.881562] 
[   13.881696] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.881746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.881759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.881781] Call Trace:
[   13.881796]  <TASK>
[   13.881812]  dump_stack_lvl+0x73/0xb0
[   13.881840]  print_report+0xd1/0x650
[   13.881864]  ? __virt_addr_valid+0x1db/0x2d0
[   13.881889]  ? kasan_atomics_helper+0x860/0x5450
[   13.881912]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.881936]  ? kasan_atomics_helper+0x860/0x5450
[   13.881960]  kasan_report+0x141/0x180
[   13.881984]  ? kasan_atomics_helper+0x860/0x5450
[   13.882012]  kasan_check_range+0x10c/0x1c0
[   13.882038]  __kasan_check_write+0x18/0x20
[   13.882059]  kasan_atomics_helper+0x860/0x5450
[   13.882082]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.882107]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.882129]  ? kasan_atomics+0x152/0x310
[   13.882153]  kasan_atomics+0x1dc/0x310
[   13.882173]  ? __pfx_kasan_atomics+0x10/0x10
[   13.882260]  ? __pfx_read_tsc+0x10/0x10
[   13.882284]  ? ktime_get_ts64+0x86/0x230
[   13.882310]  kunit_try_run_case+0x1a5/0x480
[   13.882336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.882358]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.882381]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.882404]  ? __kthread_parkme+0x82/0x180
[   13.882426]  ? preempt_count_sub+0x50/0x80
[   13.882452]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.882482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.882505]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.882560]  kthread+0x337/0x6f0
[   13.882584]  ? trace_preempt_on+0x20/0xc0
[   13.882609]  ? __pfx_kthread+0x10/0x10
[   13.882641]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.882663]  ? calculate_sigpending+0x7b/0xa0
[   13.882688]  ? __pfx_kthread+0x10/0x10
[   13.882711]  ret_from_fork+0x116/0x1d0
[   13.882731]  ? __pfx_kthread+0x10/0x10
[   13.882754]  ret_from_fork_asm+0x1a/0x30
[   13.882786]  </TASK>
[   13.882797] 
[   13.890981] Allocated by task 282:
[   13.891151]  kasan_save_stack+0x45/0x70
[   13.891295]  kasan_save_track+0x18/0x40
[   13.891433]  kasan_save_alloc_info+0x3b/0x50
[   13.891939]  __kasan_kmalloc+0xb7/0xc0
[   13.892109]  __kmalloc_cache_noprof+0x189/0x420
[   13.892331]  kasan_atomics+0x95/0x310
[   13.892513]  kunit_try_run_case+0x1a5/0x480
[   13.892750]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.892988]  kthread+0x337/0x6f0
[   13.893135]  ret_from_fork+0x116/0x1d0
[   13.893420]  ret_from_fork_asm+0x1a/0x30
[   13.893609] 
[   13.893701] The buggy address belongs to the object at ffff8881029e5b80
[   13.893701]  which belongs to the cache kmalloc-64 of size 64
[   13.894051] The buggy address is located 0 bytes to the right of
[   13.894051]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   13.894423] 
[   13.894523] The buggy address belongs to the physical page:
[   13.894975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   13.895333] flags: 0x200000000000000(node=0|zone=2)
[   13.895570] page_type: f5(slab)
[   13.895886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.896290] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.896519] page dumped because: kasan: bad access detected
[   13.896823] 
[   13.896920] Memory state around the buggy address:
[   13.897146]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.897488]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.897882] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.898100]                                      ^
[   13.898336]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.898940]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.899266] ==================================================================
[   14.491650] ==================================================================
[   14.491930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.492218] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.492591] 
[   14.493008] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.493061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.493075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.493097] Call Trace:
[   14.493114]  <TASK>
[   14.493129]  dump_stack_lvl+0x73/0xb0
[   14.493159]  print_report+0xd1/0x650
[   14.493465]  ? __virt_addr_valid+0x1db/0x2d0
[   14.493496]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.493520]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.493545]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.493568]  kasan_report+0x141/0x180
[   14.493592]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.493633]  __asan_report_store8_noabort+0x1b/0x30
[   14.493657]  kasan_atomics_helper+0x50d4/0x5450
[   14.493682]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.493705]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.493728]  ? kasan_atomics+0x152/0x310
[   14.493752]  kasan_atomics+0x1dc/0x310
[   14.493773]  ? __pfx_kasan_atomics+0x10/0x10
[   14.493795]  ? __pfx_read_tsc+0x10/0x10
[   14.493817]  ? ktime_get_ts64+0x86/0x230
[   14.493842]  kunit_try_run_case+0x1a5/0x480
[   14.493867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.493890]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.493913]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.493936]  ? __kthread_parkme+0x82/0x180
[   14.493957]  ? preempt_count_sub+0x50/0x80
[   14.493982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.494007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.494031]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.494055]  kthread+0x337/0x6f0
[   14.494075]  ? trace_preempt_on+0x20/0xc0
[   14.494100]  ? __pfx_kthread+0x10/0x10
[   14.494121]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.494143]  ? calculate_sigpending+0x7b/0xa0
[   14.494168]  ? __pfx_kthread+0x10/0x10
[   14.494200]  ret_from_fork+0x116/0x1d0
[   14.494219]  ? __pfx_kthread+0x10/0x10
[   14.494240]  ret_from_fork_asm+0x1a/0x30
[   14.494272]  </TASK>
[   14.494284] 
[   14.504149] Allocated by task 282:
[   14.504323]  kasan_save_stack+0x45/0x70
[   14.504903]  kasan_save_track+0x18/0x40
[   14.505062]  kasan_save_alloc_info+0x3b/0x50
[   14.505421]  __kasan_kmalloc+0xb7/0xc0
[   14.505702]  __kmalloc_cache_noprof+0x189/0x420
[   14.505978]  kasan_atomics+0x95/0x310
[   14.506251]  kunit_try_run_case+0x1a5/0x480
[   14.506552]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.506874]  kthread+0x337/0x6f0
[   14.507010]  ret_from_fork+0x116/0x1d0
[   14.507347]  ret_from_fork_asm+0x1a/0x30
[   14.507641] 
[   14.507720] The buggy address belongs to the object at ffff8881029e5b80
[   14.507720]  which belongs to the cache kmalloc-64 of size 64
[   14.508470] The buggy address is located 0 bytes to the right of
[   14.508470]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.509027] 
[   14.509133] The buggy address belongs to the physical page:
[   14.509600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.510026] flags: 0x200000000000000(node=0|zone=2)
[   14.510390] page_type: f5(slab)
[   14.510656] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.511048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.511569] page dumped because: kasan: bad access detected
[   14.511906] 
[   14.511985] Memory state around the buggy address:
[   14.512332]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.512686]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.512936] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.513490]                                      ^
[   14.513788]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.514155]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.514591] ==================================================================
[   14.746857] ==================================================================
[   14.747242] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   14.747649] Read of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.747979] 
[   14.748070] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.748115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.748127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.748149] Call Trace:
[   14.748183]  <TASK>
[   14.748199]  dump_stack_lvl+0x73/0xb0
[   14.748227]  print_report+0xd1/0x650
[   14.748250]  ? __virt_addr_valid+0x1db/0x2d0
[   14.748274]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.748296]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.748320]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.748344]  kasan_report+0x141/0x180
[   14.748368]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.748396]  __asan_report_load8_noabort+0x18/0x20
[   14.748418]  kasan_atomics_helper+0x4f30/0x5450
[   14.748442]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.748465]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.748488]  ? kasan_atomics+0x152/0x310
[   14.748522]  kasan_atomics+0x1dc/0x310
[   14.748542]  ? __pfx_kasan_atomics+0x10/0x10
[   14.748564]  ? __pfx_read_tsc+0x10/0x10
[   14.748596]  ? ktime_get_ts64+0x86/0x230
[   14.748629]  kunit_try_run_case+0x1a5/0x480
[   14.748654]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.748677]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.748700]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.748723]  ? __kthread_parkme+0x82/0x180
[   14.748745]  ? preempt_count_sub+0x50/0x80
[   14.748769]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.748794]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.748817]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.748841]  kthread+0x337/0x6f0
[   14.748862]  ? trace_preempt_on+0x20/0xc0
[   14.748887]  ? __pfx_kthread+0x10/0x10
[   14.748908]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.748930]  ? calculate_sigpending+0x7b/0xa0
[   14.748955]  ? __pfx_kthread+0x10/0x10
[   14.748978]  ret_from_fork+0x116/0x1d0
[   14.748998]  ? __pfx_kthread+0x10/0x10
[   14.749020]  ret_from_fork_asm+0x1a/0x30
[   14.749052]  </TASK>
[   14.749064] 
[   14.756740] Allocated by task 282:
[   14.756874]  kasan_save_stack+0x45/0x70
[   14.757066]  kasan_save_track+0x18/0x40
[   14.757313]  kasan_save_alloc_info+0x3b/0x50
[   14.757528]  __kasan_kmalloc+0xb7/0xc0
[   14.757727]  __kmalloc_cache_noprof+0x189/0x420
[   14.757953]  kasan_atomics+0x95/0x310
[   14.758134]  kunit_try_run_case+0x1a5/0x480
[   14.758314]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.758496]  kthread+0x337/0x6f0
[   14.758670]  ret_from_fork+0x116/0x1d0
[   14.758893]  ret_from_fork_asm+0x1a/0x30
[   14.759187] 
[   14.759290] The buggy address belongs to the object at ffff8881029e5b80
[   14.759290]  which belongs to the cache kmalloc-64 of size 64
[   14.759879] The buggy address is located 0 bytes to the right of
[   14.759879]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.760275] 
[   14.760353] The buggy address belongs to the physical page:
[   14.760605] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.761018] flags: 0x200000000000000(node=0|zone=2)
[   14.761317] page_type: f5(slab)
[   14.761540] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.762022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.762470] page dumped because: kasan: bad access detected
[   14.762709] 
[   14.762781] Memory state around the buggy address:
[   14.762938]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.763156]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.763498] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.763866]                                      ^
[   14.764096]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.764483]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.764897] ==================================================================
[   13.826981] ==================================================================
[   13.827476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   13.828694] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   13.829701] 
[   13.830002] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.830054] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.830068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.830090] Call Trace:
[   13.830105]  <TASK>
[   13.830122]  dump_stack_lvl+0x73/0xb0
[   13.830151]  print_report+0xd1/0x650
[   13.830174]  ? __virt_addr_valid+0x1db/0x2d0
[   13.830199]  ? kasan_atomics_helper+0x72f/0x5450
[   13.830222]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.830245]  ? kasan_atomics_helper+0x72f/0x5450
[   13.830268]  kasan_report+0x141/0x180
[   13.830292]  ? kasan_atomics_helper+0x72f/0x5450
[   13.830319]  kasan_check_range+0x10c/0x1c0
[   13.830344]  __kasan_check_write+0x18/0x20
[   13.830366]  kasan_atomics_helper+0x72f/0x5450
[   13.830390]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.830413]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.830436]  ? kasan_atomics+0x152/0x310
[   13.830460]  kasan_atomics+0x1dc/0x310
[   13.830487]  ? __pfx_kasan_atomics+0x10/0x10
[   13.830509]  ? __pfx_read_tsc+0x10/0x10
[   13.830666]  ? ktime_get_ts64+0x86/0x230
[   13.830696]  kunit_try_run_case+0x1a5/0x480
[   13.830722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.830745]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.830804]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.830827]  ? __kthread_parkme+0x82/0x180
[   13.830849]  ? preempt_count_sub+0x50/0x80
[   13.830876]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.830900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.830924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.830948]  kthread+0x337/0x6f0
[   13.830969]  ? trace_preempt_on+0x20/0xc0
[   13.830993]  ? __pfx_kthread+0x10/0x10
[   13.831015]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.831036]  ? calculate_sigpending+0x7b/0xa0
[   13.831061]  ? __pfx_kthread+0x10/0x10
[   13.831084]  ret_from_fork+0x116/0x1d0
[   13.831102]  ? __pfx_kthread+0x10/0x10
[   13.831125]  ret_from_fork_asm+0x1a/0x30
[   13.831159]  </TASK>
[   13.831171] 
[   13.846115] Allocated by task 282:
[   13.846281]  kasan_save_stack+0x45/0x70
[   13.846427]  kasan_save_track+0x18/0x40
[   13.846782]  kasan_save_alloc_info+0x3b/0x50
[   13.847000]  __kasan_kmalloc+0xb7/0xc0
[   13.847196]  __kmalloc_cache_noprof+0x189/0x420
[   13.847394]  kasan_atomics+0x95/0x310
[   13.847635]  kunit_try_run_case+0x1a5/0x480
[   13.847822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.848050]  kthread+0x337/0x6f0
[   13.848245]  ret_from_fork+0x116/0x1d0
[   13.848391]  ret_from_fork_asm+0x1a/0x30
[   13.848830] 
[   13.848931] The buggy address belongs to the object at ffff8881029e5b80
[   13.848931]  which belongs to the cache kmalloc-64 of size 64
[   13.849442] The buggy address is located 0 bytes to the right of
[   13.849442]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   13.850021] 
[   13.850101] The buggy address belongs to the physical page:
[   13.850963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   13.851986] flags: 0x200000000000000(node=0|zone=2)
[   13.852245] page_type: f5(slab)
[   13.852371] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.852607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.853084] page dumped because: kasan: bad access detected
[   13.853928] 
[   13.854133] Memory state around the buggy address:
[   13.854690]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.855447]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.856194] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.856740]                                      ^
[   13.856904]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.857120]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.857357] ==================================================================
[   13.574263] ==================================================================
[   13.575120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   13.575552] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   13.576023] 
[   13.576121] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.576170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.576183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.576204] Call Trace:
[   13.576217]  <TASK>
[   13.576439]  dump_stack_lvl+0x73/0xb0
[   13.576472]  print_report+0xd1/0x650
[   13.576495]  ? __virt_addr_valid+0x1db/0x2d0
[   13.576561]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.576586]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.576609]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.576645]  kasan_report+0x141/0x180
[   13.576668]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.576696]  __asan_report_load4_noabort+0x18/0x20
[   13.576717]  kasan_atomics_helper+0x4bbc/0x5450
[   13.576740]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.576763]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.576785]  ? kasan_atomics+0x152/0x310
[   13.576808]  kasan_atomics+0x1dc/0x310
[   13.576828]  ? __pfx_kasan_atomics+0x10/0x10
[   13.576849]  ? __pfx_read_tsc+0x10/0x10
[   13.576869]  ? ktime_get_ts64+0x86/0x230
[   13.576894]  kunit_try_run_case+0x1a5/0x480
[   13.576919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.576941]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.576964]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.576987]  ? __kthread_parkme+0x82/0x180
[   13.577008]  ? preempt_count_sub+0x50/0x80
[   13.577034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.577057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.577081]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.577104]  kthread+0x337/0x6f0
[   13.577124]  ? trace_preempt_on+0x20/0xc0
[   13.577149]  ? __pfx_kthread+0x10/0x10
[   13.577170]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.577191]  ? calculate_sigpending+0x7b/0xa0
[   13.577215]  ? __pfx_kthread+0x10/0x10
[   13.577237]  ret_from_fork+0x116/0x1d0
[   13.577256]  ? __pfx_kthread+0x10/0x10
[   13.577277]  ret_from_fork_asm+0x1a/0x30
[   13.577309]  </TASK>
[   13.577320] 
[   13.587915] Allocated by task 282:
[   13.588084]  kasan_save_stack+0x45/0x70
[   13.588285]  kasan_save_track+0x18/0x40
[   13.588798]  kasan_save_alloc_info+0x3b/0x50
[   13.588998]  __kasan_kmalloc+0xb7/0xc0
[   13.589170]  __kmalloc_cache_noprof+0x189/0x420
[   13.589588]  kasan_atomics+0x95/0x310
[   13.589966]  kunit_try_run_case+0x1a5/0x480
[   13.590208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.590630]  kthread+0x337/0x6f0
[   13.591033]  ret_from_fork+0x116/0x1d0
[   13.591207]  ret_from_fork_asm+0x1a/0x30
[   13.591553] 
[   13.591810] The buggy address belongs to the object at ffff8881029e5b80
[   13.591810]  which belongs to the cache kmalloc-64 of size 64
[   13.592327] The buggy address is located 0 bytes to the right of
[   13.592327]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   13.593199] 
[   13.593375] The buggy address belongs to the physical page:
[   13.593813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   13.594291] flags: 0x200000000000000(node=0|zone=2)
[   13.594517] page_type: f5(slab)
[   13.594794] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.595270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.595737] page dumped because: kasan: bad access detected
[   13.596198] 
[   13.596362] Memory state around the buggy address:
[   13.596592]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.597176]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.597682] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.598109]                                      ^
[   13.598514]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.598965]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.599492] ==================================================================
[   14.691974] ==================================================================
[   14.692363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   14.692804] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.693119] 
[   14.693274] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.693331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.693344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.693366] Call Trace:
[   14.693388]  <TASK>
[   14.693404]  dump_stack_lvl+0x73/0xb0
[   14.693431]  print_report+0xd1/0x650
[   14.693465]  ? __virt_addr_valid+0x1db/0x2d0
[   14.693489]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.693512]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.693544]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.693567]  kasan_report+0x141/0x180
[   14.693591]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.693635]  kasan_check_range+0x10c/0x1c0
[   14.693660]  __kasan_check_write+0x18/0x20
[   14.693681]  kasan_atomics_helper+0x1a7f/0x5450
[   14.693704]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.693728]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.693750]  ? kasan_atomics+0x152/0x310
[   14.693775]  kasan_atomics+0x1dc/0x310
[   14.693795]  ? __pfx_kasan_atomics+0x10/0x10
[   14.693817]  ? __pfx_read_tsc+0x10/0x10
[   14.693847]  ? ktime_get_ts64+0x86/0x230
[   14.693873]  kunit_try_run_case+0x1a5/0x480
[   14.693898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.693931]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.693953]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.693977]  ? __kthread_parkme+0x82/0x180
[   14.693999]  ? preempt_count_sub+0x50/0x80
[   14.694024]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.694049]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.694073]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.694096]  kthread+0x337/0x6f0
[   14.694117]  ? trace_preempt_on+0x20/0xc0
[   14.694143]  ? __pfx_kthread+0x10/0x10
[   14.694183]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.694214]  ? calculate_sigpending+0x7b/0xa0
[   14.694239]  ? __pfx_kthread+0x10/0x10
[   14.694262]  ret_from_fork+0x116/0x1d0
[   14.694292]  ? __pfx_kthread+0x10/0x10
[   14.694314]  ret_from_fork_asm+0x1a/0x30
[   14.694347]  </TASK>
[   14.694358] 
[   14.701844] Allocated by task 282:
[   14.702023]  kasan_save_stack+0x45/0x70
[   14.702275]  kasan_save_track+0x18/0x40
[   14.702514]  kasan_save_alloc_info+0x3b/0x50
[   14.702721]  __kasan_kmalloc+0xb7/0xc0
[   14.702861]  __kmalloc_cache_noprof+0x189/0x420
[   14.703091]  kasan_atomics+0x95/0x310
[   14.703339]  kunit_try_run_case+0x1a5/0x480
[   14.703522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.703801]  kthread+0x337/0x6f0
[   14.703959]  ret_from_fork+0x116/0x1d0
[   14.704097]  ret_from_fork_asm+0x1a/0x30
[   14.704262] 
[   14.704334] The buggy address belongs to the object at ffff8881029e5b80
[   14.704334]  which belongs to the cache kmalloc-64 of size 64
[   14.704749] The buggy address is located 0 bytes to the right of
[   14.704749]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.705327] 
[   14.705424] The buggy address belongs to the physical page:
[   14.705687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.706043] flags: 0x200000000000000(node=0|zone=2)
[   14.706291] page_type: f5(slab)
[   14.706413] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.706672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.707017] page dumped because: kasan: bad access detected
[   14.707323] 
[   14.707439] Memory state around the buggy address:
[   14.707694]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.708030]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.708292] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.708558]                                      ^
[   14.708788]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.709136]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.709398] ==================================================================
[   13.918977] ==================================================================
[   13.919322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   13.919564] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   13.919801] 
[   13.919885] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.919931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.919944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.919967] Call Trace:
[   13.919981]  <TASK>
[   13.919998]  dump_stack_lvl+0x73/0xb0
[   13.920024]  print_report+0xd1/0x650
[   13.920048]  ? __virt_addr_valid+0x1db/0x2d0
[   13.920072]  ? kasan_atomics_helper+0x992/0x5450
[   13.920094]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.920118]  ? kasan_atomics_helper+0x992/0x5450
[   13.920383]  kasan_report+0x141/0x180
[   13.920409]  ? kasan_atomics_helper+0x992/0x5450
[   13.920477]  kasan_check_range+0x10c/0x1c0
[   13.920504]  __kasan_check_write+0x18/0x20
[   13.920565]  kasan_atomics_helper+0x992/0x5450
[   13.920592]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.920634]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.920658]  ? kasan_atomics+0x152/0x310
[   13.920683]  kasan_atomics+0x1dc/0x310
[   13.920704]  ? __pfx_kasan_atomics+0x10/0x10
[   13.920726]  ? __pfx_read_tsc+0x10/0x10
[   13.920748]  ? ktime_get_ts64+0x86/0x230
[   13.920775]  kunit_try_run_case+0x1a5/0x480
[   13.920799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.920823]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.920847]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.920871]  ? __kthread_parkme+0x82/0x180
[   13.920895]  ? preempt_count_sub+0x50/0x80
[   13.920922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.920947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.920972]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.920996]  kthread+0x337/0x6f0
[   13.921018]  ? trace_preempt_on+0x20/0xc0
[   13.921043]  ? __pfx_kthread+0x10/0x10
[   13.921066]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.921088]  ? calculate_sigpending+0x7b/0xa0
[   13.921113]  ? __pfx_kthread+0x10/0x10
[   13.921137]  ret_from_fork+0x116/0x1d0
[   13.921156]  ? __pfx_kthread+0x10/0x10
[   13.921179]  ret_from_fork_asm+0x1a/0x30
[   13.921220]  </TASK>
[   13.921231] 
[   13.931763] Allocated by task 282:
[   13.931962]  kasan_save_stack+0x45/0x70
[   13.932168]  kasan_save_track+0x18/0x40
[   13.932728]  kasan_save_alloc_info+0x3b/0x50
[   13.933072]  __kasan_kmalloc+0xb7/0xc0
[   13.933417]  __kmalloc_cache_noprof+0x189/0x420
[   13.933946]  kasan_atomics+0x95/0x310
[   13.934205]  kunit_try_run_case+0x1a5/0x480
[   13.934580]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.934992]  kthread+0x337/0x6f0
[   13.935117]  ret_from_fork+0x116/0x1d0
[   13.935249]  ret_from_fork_asm+0x1a/0x30
[   13.935386] 
[   13.935533] The buggy address belongs to the object at ffff8881029e5b80
[   13.935533]  which belongs to the cache kmalloc-64 of size 64
[   13.936300] The buggy address is located 0 bytes to the right of
[   13.936300]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   13.936889] 
[   13.936966] The buggy address belongs to the physical page:
[   13.937541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   13.937898] flags: 0x200000000000000(node=0|zone=2)
[   13.938112] page_type: f5(slab)
[   13.938941] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.939452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.939992] page dumped because: kasan: bad access detected
[   13.940400] 
[   13.940866] Memory state around the buggy address:
[   13.941106]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.941427]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.941998] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.942389]                                      ^
[   13.942734]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.943057]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.943456] ==================================================================
[   13.600215] ==================================================================
[   13.600749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   13.601328] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   13.601787] 
[   13.601973] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.602023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.602035] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.602079] Call Trace:
[   13.602091]  <TASK>
[   13.602105]  dump_stack_lvl+0x73/0xb0
[   13.602133]  print_report+0xd1/0x650
[   13.602281]  ? __virt_addr_valid+0x1db/0x2d0
[   13.602309]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.602332]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.602355]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.602398]  kasan_report+0x141/0x180
[   13.602422]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.602449]  __asan_report_store4_noabort+0x1b/0x30
[   13.602476]  kasan_atomics_helper+0x4ba2/0x5450
[   13.602499]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.602521]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.602680]  ? kasan_atomics+0x152/0x310
[   13.602708]  kasan_atomics+0x1dc/0x310
[   13.602728]  ? __pfx_kasan_atomics+0x10/0x10
[   13.602749]  ? __pfx_read_tsc+0x10/0x10
[   13.602770]  ? ktime_get_ts64+0x86/0x230
[   13.602796]  kunit_try_run_case+0x1a5/0x480
[   13.602820]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.602842]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.602864]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.602886]  ? __kthread_parkme+0x82/0x180
[   13.602907]  ? preempt_count_sub+0x50/0x80
[   13.602932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.602955]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.602978]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.603002]  kthread+0x337/0x6f0
[   13.603022]  ? trace_preempt_on+0x20/0xc0
[   13.603045]  ? __pfx_kthread+0x10/0x10
[   13.603066]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.603087]  ? calculate_sigpending+0x7b/0xa0
[   13.603110]  ? __pfx_kthread+0x10/0x10
[   13.603132]  ret_from_fork+0x116/0x1d0
[   13.603150]  ? __pfx_kthread+0x10/0x10
[   13.603171]  ret_from_fork_asm+0x1a/0x30
[   13.603202]  </TASK>
[   13.603213] 
[   13.614736] Allocated by task 282:
[   13.614928]  kasan_save_stack+0x45/0x70
[   13.615103]  kasan_save_track+0x18/0x40
[   13.615635]  kasan_save_alloc_info+0x3b/0x50
[   13.615794]  __kasan_kmalloc+0xb7/0xc0
[   13.616131]  __kmalloc_cache_noprof+0x189/0x420
[   13.616462]  kasan_atomics+0x95/0x310
[   13.616692]  kunit_try_run_case+0x1a5/0x480
[   13.616906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.617374]  kthread+0x337/0x6f0
[   13.617570]  ret_from_fork+0x116/0x1d0
[   13.617887]  ret_from_fork_asm+0x1a/0x30
[   13.618046] 
[   13.618321] The buggy address belongs to the object at ffff8881029e5b80
[   13.618321]  which belongs to the cache kmalloc-64 of size 64
[   13.618900] The buggy address is located 0 bytes to the right of
[   13.618900]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   13.619867] 
[   13.619955] The buggy address belongs to the physical page:
[   13.620221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   13.620670] flags: 0x200000000000000(node=0|zone=2)
[   13.621175] page_type: f5(slab)
[   13.621439] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.622014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.622468] page dumped because: kasan: bad access detected
[   13.622910] 
[   13.623019] Memory state around the buggy address:
[   13.623345]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.623766]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.624113] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.624507]                                      ^
[   13.624946]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.625312]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.625818] ==================================================================
[   14.562848] ==================================================================
[   14.563479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.564073] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.564661] 
[   14.564777] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.564828] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.564842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.564866] Call Trace:
[   14.564881]  <TASK>
[   14.564898]  dump_stack_lvl+0x73/0xb0
[   14.564928]  print_report+0xd1/0x650
[   14.564952]  ? __virt_addr_valid+0x1db/0x2d0
[   14.564976]  ? kasan_atomics_helper+0x164f/0x5450
[   14.564999]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.565023]  ? kasan_atomics_helper+0x164f/0x5450
[   14.565046]  kasan_report+0x141/0x180
[   14.565070]  ? kasan_atomics_helper+0x164f/0x5450
[   14.565099]  kasan_check_range+0x10c/0x1c0
[   14.565125]  __kasan_check_write+0x18/0x20
[   14.565145]  kasan_atomics_helper+0x164f/0x5450
[   14.565171]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.565197]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.565219]  ? kasan_atomics+0x152/0x310
[   14.565243]  kasan_atomics+0x1dc/0x310
[   14.565264]  ? __pfx_kasan_atomics+0x10/0x10
[   14.565285]  ? __pfx_read_tsc+0x10/0x10
[   14.565307]  ? ktime_get_ts64+0x86/0x230
[   14.565333]  kunit_try_run_case+0x1a5/0x480
[   14.565358]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.565381]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.565406]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.565429]  ? __kthread_parkme+0x82/0x180
[   14.565451]  ? preempt_count_sub+0x50/0x80
[   14.565476]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.565501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.565525]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.565548]  kthread+0x337/0x6f0
[   14.565569]  ? trace_preempt_on+0x20/0xc0
[   14.565594]  ? __pfx_kthread+0x10/0x10
[   14.565627]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.565649]  ? calculate_sigpending+0x7b/0xa0
[   14.565675]  ? __pfx_kthread+0x10/0x10
[   14.565697]  ret_from_fork+0x116/0x1d0
[   14.565717]  ? __pfx_kthread+0x10/0x10
[   14.565739]  ret_from_fork_asm+0x1a/0x30
[   14.565773]  </TASK>
[   14.565784] 
[   14.573317] Allocated by task 282:
[   14.573499]  kasan_save_stack+0x45/0x70
[   14.573710]  kasan_save_track+0x18/0x40
[   14.573847]  kasan_save_alloc_info+0x3b/0x50
[   14.573994]  __kasan_kmalloc+0xb7/0xc0
[   14.574130]  __kmalloc_cache_noprof+0x189/0x420
[   14.574347]  kasan_atomics+0x95/0x310
[   14.574538]  kunit_try_run_case+0x1a5/0x480
[   14.574795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.575052]  kthread+0x337/0x6f0
[   14.575238]  ret_from_fork+0x116/0x1d0
[   14.575416]  ret_from_fork_asm+0x1a/0x30
[   14.575579] 
[   14.575662] The buggy address belongs to the object at ffff8881029e5b80
[   14.575662]  which belongs to the cache kmalloc-64 of size 64
[   14.576138] The buggy address is located 0 bytes to the right of
[   14.576138]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.576564] 
[   14.576645] The buggy address belongs to the physical page:
[   14.576820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.577419] flags: 0x200000000000000(node=0|zone=2)
[   14.577664] page_type: f5(slab)
[   14.577833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.578139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.578582] page dumped because: kasan: bad access detected
[   14.578766] 
[   14.578837] Memory state around the buggy address:
[   14.578994]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.579471]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.579808] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.580024]                                      ^
[   14.580182]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.580499]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.580927] ==================================================================
[   14.898487] ==================================================================
[   14.898860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   14.899290] Read of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.899627] 
[   14.899736] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.899783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.899808] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.899831] Call Trace:
[   14.899846]  <TASK>
[   14.899861]  dump_stack_lvl+0x73/0xb0
[   14.899897]  print_report+0xd1/0x650
[   14.899921]  ? __virt_addr_valid+0x1db/0x2d0
[   14.899944]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.899980]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.900004]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.900028]  kasan_report+0x141/0x180
[   14.900052]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.900089]  __asan_report_load8_noabort+0x18/0x20
[   14.900111]  kasan_atomics_helper+0x4f98/0x5450
[   14.900146]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.900188]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.900212]  ? kasan_atomics+0x152/0x310
[   14.900237]  kasan_atomics+0x1dc/0x310
[   14.900266]  ? __pfx_kasan_atomics+0x10/0x10
[   14.900289]  ? __pfx_read_tsc+0x10/0x10
[   14.900310]  ? ktime_get_ts64+0x86/0x230
[   14.900346]  kunit_try_run_case+0x1a5/0x480
[   14.900371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.900394]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.900427]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.900450]  ? __kthread_parkme+0x82/0x180
[   14.900471]  ? preempt_count_sub+0x50/0x80
[   14.900507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.900532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.900555]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.900579]  kthread+0x337/0x6f0
[   14.900599]  ? trace_preempt_on+0x20/0xc0
[   14.900631]  ? __pfx_kthread+0x10/0x10
[   14.900654]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.900675]  ? calculate_sigpending+0x7b/0xa0
[   14.900700]  ? __pfx_kthread+0x10/0x10
[   14.900732]  ret_from_fork+0x116/0x1d0
[   14.900751]  ? __pfx_kthread+0x10/0x10
[   14.900773]  ret_from_fork_asm+0x1a/0x30
[   14.900815]  </TASK>
[   14.900826] 
[   14.908142] Allocated by task 282:
[   14.908353]  kasan_save_stack+0x45/0x70
[   14.908538]  kasan_save_track+0x18/0x40
[   14.908743]  kasan_save_alloc_info+0x3b/0x50
[   14.908943]  __kasan_kmalloc+0xb7/0xc0
[   14.909135]  __kmalloc_cache_noprof+0x189/0x420
[   14.909363]  kasan_atomics+0x95/0x310
[   14.909555]  kunit_try_run_case+0x1a5/0x480
[   14.909746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.909998]  kthread+0x337/0x6f0
[   14.910186]  ret_from_fork+0x116/0x1d0
[   14.910367]  ret_from_fork_asm+0x1a/0x30
[   14.910571] 
[   14.910677] The buggy address belongs to the object at ffff8881029e5b80
[   14.910677]  which belongs to the cache kmalloc-64 of size 64
[   14.911187] The buggy address is located 0 bytes to the right of
[   14.911187]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.911553] 
[   14.911635] The buggy address belongs to the physical page:
[   14.911807] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.912212] flags: 0x200000000000000(node=0|zone=2)
[   14.912443] page_type: f5(slab)
[   14.912619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.912964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.913303] page dumped because: kasan: bad access detected
[   14.913477] 
[   14.913548] Memory state around the buggy address:
[   14.913756]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.914078]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.914458] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.914799]                                      ^
[   14.915022]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.915301]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.915517] ==================================================================
[   14.970604] ==================================================================
[   14.971019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   14.971419] Read of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.971781] 
[   14.971892] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.971970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.971983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.972005] Call Trace:
[   14.972031]  <TASK>
[   14.972046]  dump_stack_lvl+0x73/0xb0
[   14.972074]  print_report+0xd1/0x650
[   14.972097]  ? __virt_addr_valid+0x1db/0x2d0
[   14.972121]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.972145]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.972219]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.972256]  kasan_report+0x141/0x180
[   14.972318]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.972347]  __asan_report_load8_noabort+0x18/0x20
[   14.972404]  kasan_atomics_helper+0x4fa5/0x5450
[   14.972429]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.972453]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.972485]  ? kasan_atomics+0x152/0x310
[   14.972510]  kasan_atomics+0x1dc/0x310
[   14.972531]  ? __pfx_kasan_atomics+0x10/0x10
[   14.972553]  ? __pfx_read_tsc+0x10/0x10
[   14.972575]  ? ktime_get_ts64+0x86/0x230
[   14.972601]  kunit_try_run_case+0x1a5/0x480
[   14.972634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.972687]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.972710]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.972772]  ? __kthread_parkme+0x82/0x180
[   14.972805]  ? preempt_count_sub+0x50/0x80
[   14.972867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.972893]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.972917]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.972951]  kthread+0x337/0x6f0
[   14.972973]  ? trace_preempt_on+0x20/0xc0
[   14.972997]  ? __pfx_kthread+0x10/0x10
[   14.973020]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.973041]  ? calculate_sigpending+0x7b/0xa0
[   14.973066]  ? __pfx_kthread+0x10/0x10
[   14.973089]  ret_from_fork+0x116/0x1d0
[   14.973108]  ? __pfx_kthread+0x10/0x10
[   14.973130]  ret_from_fork_asm+0x1a/0x30
[   14.973181]  </TASK>
[   14.973192] 
[   14.981243] Allocated by task 282:
[   14.981374]  kasan_save_stack+0x45/0x70
[   14.981518]  kasan_save_track+0x18/0x40
[   14.981723]  kasan_save_alloc_info+0x3b/0x50
[   14.981935]  __kasan_kmalloc+0xb7/0xc0
[   14.982202]  __kmalloc_cache_noprof+0x189/0x420
[   14.982437]  kasan_atomics+0x95/0x310
[   14.982716]  kunit_try_run_case+0x1a5/0x480
[   14.982942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.983119]  kthread+0x337/0x6f0
[   14.983268]  ret_from_fork+0x116/0x1d0
[   14.983458]  ret_from_fork_asm+0x1a/0x30
[   14.983709] 
[   14.983810] The buggy address belongs to the object at ffff8881029e5b80
[   14.983810]  which belongs to the cache kmalloc-64 of size 64
[   14.984461] The buggy address is located 0 bytes to the right of
[   14.984461]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.984885] 
[   14.984960] The buggy address belongs to the physical page:
[   14.985215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.985629] flags: 0x200000000000000(node=0|zone=2)
[   14.985871] page_type: f5(slab)
[   14.986042] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.986378] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.986721] page dumped because: kasan: bad access detected
[   14.986900] 
[   14.987039] Memory state around the buggy address:
[   14.987393]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.987691]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.987978] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.988393]                                      ^
[   14.988647]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.988906]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.989300] ==================================================================
[   14.036398] ==================================================================
[   14.036761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   14.037083] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.037437] 
[   14.037520] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.037564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.037578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.037598] Call Trace:
[   14.037610]  <TASK>
[   14.037636]  dump_stack_lvl+0x73/0xb0
[   14.037711]  print_report+0xd1/0x650
[   14.037737]  ? __virt_addr_valid+0x1db/0x2d0
[   14.037763]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.037786]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.037809]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.037832]  kasan_report+0x141/0x180
[   14.037856]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.037885]  __asan_report_load4_noabort+0x18/0x20
[   14.037906]  kasan_atomics_helper+0x4a84/0x5450
[   14.037930]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.037954]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.037976]  ? kasan_atomics+0x152/0x310
[   14.038000]  kasan_atomics+0x1dc/0x310
[   14.038021]  ? __pfx_kasan_atomics+0x10/0x10
[   14.038042]  ? __pfx_read_tsc+0x10/0x10
[   14.038063]  ? ktime_get_ts64+0x86/0x230
[   14.038089]  kunit_try_run_case+0x1a5/0x480
[   14.038114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.038136]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.038159]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.038182]  ? __kthread_parkme+0x82/0x180
[   14.038203]  ? preempt_count_sub+0x50/0x80
[   14.038228]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.038252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.038277]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.038300]  kthread+0x337/0x6f0
[   14.038321]  ? trace_preempt_on+0x20/0xc0
[   14.038346]  ? __pfx_kthread+0x10/0x10
[   14.038367]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.038388]  ? calculate_sigpending+0x7b/0xa0
[   14.038413]  ? __pfx_kthread+0x10/0x10
[   14.038437]  ret_from_fork+0x116/0x1d0
[   14.038456]  ? __pfx_kthread+0x10/0x10
[   14.038485]  ret_from_fork_asm+0x1a/0x30
[   14.038517]  </TASK>
[   14.038538] 
[   14.046876] Allocated by task 282:
[   14.047034]  kasan_save_stack+0x45/0x70
[   14.047179]  kasan_save_track+0x18/0x40
[   14.047317]  kasan_save_alloc_info+0x3b/0x50
[   14.047485]  __kasan_kmalloc+0xb7/0xc0
[   14.047743]  __kmalloc_cache_noprof+0x189/0x420
[   14.047973]  kasan_atomics+0x95/0x310
[   14.048163]  kunit_try_run_case+0x1a5/0x480
[   14.048414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.048590]  kthread+0x337/0x6f0
[   14.048771]  ret_from_fork+0x116/0x1d0
[   14.048963]  ret_from_fork_asm+0x1a/0x30
[   14.049209] 
[   14.049282] The buggy address belongs to the object at ffff8881029e5b80
[   14.049282]  which belongs to the cache kmalloc-64 of size 64
[   14.049898] The buggy address is located 0 bytes to the right of
[   14.049898]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.050265] 
[   14.050339] The buggy address belongs to the physical page:
[   14.050755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.051109] flags: 0x200000000000000(node=0|zone=2)
[   14.051339] page_type: f5(slab)
[   14.051585] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.051824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.052429] page dumped because: kasan: bad access detected
[   14.052933] 
[   14.053020] Memory state around the buggy address:
[   14.053268]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.053629]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.053851] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.054062]                                      ^
[   14.054395]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.055044]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.055500] ==================================================================
[   14.467693] ==================================================================
[   14.468006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.468700] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.468992] 
[   14.469187] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.469494] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.469511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.469532] Call Trace:
[   14.469547]  <TASK>
[   14.469562]  dump_stack_lvl+0x73/0xb0
[   14.469592]  print_report+0xd1/0x650
[   14.469629]  ? __virt_addr_valid+0x1db/0x2d0
[   14.469654]  ? kasan_atomics_helper+0x1467/0x5450
[   14.469677]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.469701]  ? kasan_atomics_helper+0x1467/0x5450
[   14.469724]  kasan_report+0x141/0x180
[   14.469748]  ? kasan_atomics_helper+0x1467/0x5450
[   14.469776]  kasan_check_range+0x10c/0x1c0
[   14.469801]  __kasan_check_write+0x18/0x20
[   14.469821]  kasan_atomics_helper+0x1467/0x5450
[   14.469846]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.469869]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.469892]  ? kasan_atomics+0x152/0x310
[   14.469916]  kasan_atomics+0x1dc/0x310
[   14.469937]  ? __pfx_kasan_atomics+0x10/0x10
[   14.469960]  ? __pfx_read_tsc+0x10/0x10
[   14.469983]  ? ktime_get_ts64+0x86/0x230
[   14.470009]  kunit_try_run_case+0x1a5/0x480
[   14.470033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.470056]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.470080]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.470104]  ? __kthread_parkme+0x82/0x180
[   14.470125]  ? preempt_count_sub+0x50/0x80
[   14.470150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.470184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.470209]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.470234]  kthread+0x337/0x6f0
[   14.470255]  ? trace_preempt_on+0x20/0xc0
[   14.470280]  ? __pfx_kthread+0x10/0x10
[   14.470302]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.470323]  ? calculate_sigpending+0x7b/0xa0
[   14.470348]  ? __pfx_kthread+0x10/0x10
[   14.470371]  ret_from_fork+0x116/0x1d0
[   14.470389]  ? __pfx_kthread+0x10/0x10
[   14.470411]  ret_from_fork_asm+0x1a/0x30
[   14.470443]  </TASK>
[   14.470454] 
[   14.480834] Allocated by task 282:
[   14.481005]  kasan_save_stack+0x45/0x70
[   14.481200]  kasan_save_track+0x18/0x40
[   14.481517]  kasan_save_alloc_info+0x3b/0x50
[   14.481819]  __kasan_kmalloc+0xb7/0xc0
[   14.482083]  __kmalloc_cache_noprof+0x189/0x420
[   14.482482]  kasan_atomics+0x95/0x310
[   14.482768]  kunit_try_run_case+0x1a5/0x480
[   14.482946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.483363]  kthread+0x337/0x6f0
[   14.483546]  ret_from_fork+0x116/0x1d0
[   14.483822]  ret_from_fork_asm+0x1a/0x30
[   14.484025] 
[   14.484123] The buggy address belongs to the object at ffff8881029e5b80
[   14.484123]  which belongs to the cache kmalloc-64 of size 64
[   14.484901] The buggy address is located 0 bytes to the right of
[   14.484901]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.485683] 
[   14.485771] The buggy address belongs to the physical page:
[   14.486048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.486609] flags: 0x200000000000000(node=0|zone=2)
[   14.486933] page_type: f5(slab)
[   14.487178] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.487530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.487871] page dumped because: kasan: bad access detected
[   14.488112] 
[   14.488204] Memory state around the buggy address:
[   14.488719]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.489074]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.489497] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.489866]                                      ^
[   14.490152]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.490539]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.490911] ==================================================================
[   14.538845] ==================================================================
[   14.539100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.539536] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.540318] 
[   14.540583] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.540648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.540662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.540685] Call Trace:
[   14.540698]  <TASK>
[   14.540713]  dump_stack_lvl+0x73/0xb0
[   14.540742]  print_report+0xd1/0x650
[   14.540765]  ? __virt_addr_valid+0x1db/0x2d0
[   14.540790]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.540812]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.540836]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.540860]  kasan_report+0x141/0x180
[   14.540885]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.540913]  kasan_check_range+0x10c/0x1c0
[   14.540938]  __kasan_check_write+0x18/0x20
[   14.540959]  kasan_atomics_helper+0x15b6/0x5450
[   14.540984]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.541008]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.541030]  ? kasan_atomics+0x152/0x310
[   14.541055]  kasan_atomics+0x1dc/0x310
[   14.541075]  ? __pfx_kasan_atomics+0x10/0x10
[   14.541097]  ? __pfx_read_tsc+0x10/0x10
[   14.541120]  ? ktime_get_ts64+0x86/0x230
[   14.541148]  kunit_try_run_case+0x1a5/0x480
[   14.541172]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.541204]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.541228]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.541252]  ? __kthread_parkme+0x82/0x180
[   14.541274]  ? preempt_count_sub+0x50/0x80
[   14.541299]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.541323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.541347]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.541372]  kthread+0x337/0x6f0
[   14.541393]  ? trace_preempt_on+0x20/0xc0
[   14.541417]  ? __pfx_kthread+0x10/0x10
[   14.541439]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.541461]  ? calculate_sigpending+0x7b/0xa0
[   14.541486]  ? __pfx_kthread+0x10/0x10
[   14.541509]  ret_from_fork+0x116/0x1d0
[   14.541527]  ? __pfx_kthread+0x10/0x10
[   14.541549]  ret_from_fork_asm+0x1a/0x30
[   14.541581]  </TASK>
[   14.541592] 
[   14.552035] Allocated by task 282:
[   14.552365]  kasan_save_stack+0x45/0x70
[   14.552570]  kasan_save_track+0x18/0x40
[   14.552907]  kasan_save_alloc_info+0x3b/0x50
[   14.553186]  __kasan_kmalloc+0xb7/0xc0
[   14.553475]  __kmalloc_cache_noprof+0x189/0x420
[   14.553772]  kasan_atomics+0x95/0x310
[   14.553934]  kunit_try_run_case+0x1a5/0x480
[   14.554149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.554580]  kthread+0x337/0x6f0
[   14.554894]  ret_from_fork+0x116/0x1d0
[   14.555238]  ret_from_fork_asm+0x1a/0x30
[   14.555443] 
[   14.555531] The buggy address belongs to the object at ffff8881029e5b80
[   14.555531]  which belongs to the cache kmalloc-64 of size 64
[   14.556028] The buggy address is located 0 bytes to the right of
[   14.556028]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.556897] 
[   14.557127] The buggy address belongs to the physical page:
[   14.557398] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.557830] flags: 0x200000000000000(node=0|zone=2)
[   14.558136] page_type: f5(slab)
[   14.558425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.558882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.559195] page dumped because: kasan: bad access detected
[   14.559521] 
[   14.559606] Memory state around the buggy address:
[   14.559832]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.560130]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.560682] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.561077]                                      ^
[   14.561420]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.561740]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.562109] ==================================================================
[   14.784665] ==================================================================
[   14.784999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   14.785400] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.785746] 
[   14.785859] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.785939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.785953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.785987] Call Trace:
[   14.786001]  <TASK>
[   14.786015]  dump_stack_lvl+0x73/0xb0
[   14.786058]  print_report+0xd1/0x650
[   14.786082]  ? __virt_addr_valid+0x1db/0x2d0
[   14.786106]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.786130]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.786154]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.786215]  kasan_report+0x141/0x180
[   14.786239]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.786304]  kasan_check_range+0x10c/0x1c0
[   14.786330]  __kasan_check_write+0x18/0x20
[   14.786351]  kasan_atomics_helper+0x1d7a/0x5450
[   14.786385]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.786409]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.786431]  ? kasan_atomics+0x152/0x310
[   14.786456]  kasan_atomics+0x1dc/0x310
[   14.786480]  ? __pfx_kasan_atomics+0x10/0x10
[   14.786502]  ? __pfx_read_tsc+0x10/0x10
[   14.786524]  ? ktime_get_ts64+0x86/0x230
[   14.786576]  kunit_try_run_case+0x1a5/0x480
[   14.786602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.786640]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.786663]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.786687]  ? __kthread_parkme+0x82/0x180
[   14.786708]  ? preempt_count_sub+0x50/0x80
[   14.786734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.786759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.786783]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.786806]  kthread+0x337/0x6f0
[   14.786827]  ? trace_preempt_on+0x20/0xc0
[   14.786852]  ? __pfx_kthread+0x10/0x10
[   14.786874]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.786895]  ? calculate_sigpending+0x7b/0xa0
[   14.786921]  ? __pfx_kthread+0x10/0x10
[   14.786943]  ret_from_fork+0x116/0x1d0
[   14.786962]  ? __pfx_kthread+0x10/0x10
[   14.786984]  ret_from_fork_asm+0x1a/0x30
[   14.787016]  </TASK>
[   14.787028] 
[   14.794912] Allocated by task 282:
[   14.795041]  kasan_save_stack+0x45/0x70
[   14.795213]  kasan_save_track+0x18/0x40
[   14.795390]  kasan_save_alloc_info+0x3b/0x50
[   14.795645]  __kasan_kmalloc+0xb7/0xc0
[   14.795852]  __kmalloc_cache_noprof+0x189/0x420
[   14.796075]  kasan_atomics+0x95/0x310
[   14.796328]  kunit_try_run_case+0x1a5/0x480
[   14.796636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.796922]  kthread+0x337/0x6f0
[   14.797057]  ret_from_fork+0x116/0x1d0
[   14.797292]  ret_from_fork_asm+0x1a/0x30
[   14.797524] 
[   14.797598] The buggy address belongs to the object at ffff8881029e5b80
[   14.797598]  which belongs to the cache kmalloc-64 of size 64
[   14.797962] The buggy address is located 0 bytes to the right of
[   14.797962]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.798627] 
[   14.798731] The buggy address belongs to the physical page:
[   14.799004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.799465] flags: 0x200000000000000(node=0|zone=2)
[   14.799643] page_type: f5(slab)
[   14.799775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.800187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.800510] page dumped because: kasan: bad access detected
[   14.800731] 
[   14.800828] Memory state around the buggy address:
[   14.801031]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.801339]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.801723] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.802024]                                      ^
[   14.802294]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.802520]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.802835] ==================================================================
[   13.965992] ==================================================================
[   13.966431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   13.967027] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   13.968015] 
[   13.968274] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.968326] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.968339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.968361] Call Trace:
[   13.968377]  <TASK>
[   13.968394]  dump_stack_lvl+0x73/0xb0
[   13.968424]  print_report+0xd1/0x650
[   13.968447]  ? __virt_addr_valid+0x1db/0x2d0
[   13.968472]  ? kasan_atomics_helper+0xac7/0x5450
[   13.968495]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.968527]  ? kasan_atomics_helper+0xac7/0x5450
[   13.968551]  kasan_report+0x141/0x180
[   13.968574]  ? kasan_atomics_helper+0xac7/0x5450
[   13.968602]  kasan_check_range+0x10c/0x1c0
[   13.968638]  __kasan_check_write+0x18/0x20
[   13.968658]  kasan_atomics_helper+0xac7/0x5450
[   13.968682]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.968706]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.968728]  ? kasan_atomics+0x152/0x310
[   13.968875]  kasan_atomics+0x1dc/0x310
[   13.968898]  ? __pfx_kasan_atomics+0x10/0x10
[   13.968919]  ? __pfx_read_tsc+0x10/0x10
[   13.968941]  ? ktime_get_ts64+0x86/0x230
[   13.968967]  kunit_try_run_case+0x1a5/0x480
[   13.968992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.969015]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.969039]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.969062]  ? __kthread_parkme+0x82/0x180
[   13.969084]  ? preempt_count_sub+0x50/0x80
[   13.969110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.969135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.969159]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.969201]  kthread+0x337/0x6f0
[   13.969222]  ? trace_preempt_on+0x20/0xc0
[   13.969247]  ? __pfx_kthread+0x10/0x10
[   13.969269]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.969291]  ? calculate_sigpending+0x7b/0xa0
[   13.969316]  ? __pfx_kthread+0x10/0x10
[   13.969339]  ret_from_fork+0x116/0x1d0
[   13.969358]  ? __pfx_kthread+0x10/0x10
[   13.969380]  ret_from_fork_asm+0x1a/0x30
[   13.969413]  </TASK>
[   13.969424] 
[   13.978955] Allocated by task 282:
[   13.979337]  kasan_save_stack+0x45/0x70
[   13.980248]  kasan_save_track+0x18/0x40
[   13.980425]  kasan_save_alloc_info+0x3b/0x50
[   13.980788]  __kasan_kmalloc+0xb7/0xc0
[   13.980926]  __kmalloc_cache_noprof+0x189/0x420
[   13.981708]  kasan_atomics+0x95/0x310
[   13.981870]  kunit_try_run_case+0x1a5/0x480
[   13.982279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.982666]  kthread+0x337/0x6f0
[   13.982855]  ret_from_fork+0x116/0x1d0
[   13.983036]  ret_from_fork_asm+0x1a/0x30
[   13.983400] 
[   13.983698] The buggy address belongs to the object at ffff8881029e5b80
[   13.983698]  which belongs to the cache kmalloc-64 of size 64
[   13.984361] The buggy address is located 0 bytes to the right of
[   13.984361]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   13.985123] 
[   13.985242] The buggy address belongs to the physical page:
[   13.985677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   13.986107] flags: 0x200000000000000(node=0|zone=2)
[   13.986475] page_type: f5(slab)
[   13.986713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.987201] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.987652] page dumped because: kasan: bad access detected
[   13.987966] 
[   13.988047] Memory state around the buggy address:
[   13.988424]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.988956]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.989354] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.989804]                                      ^
[   13.990118]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.990425]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.990995] ==================================================================
[   14.803484] ==================================================================
[   14.803863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   14.804191] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.804528] 
[   14.804690] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.804737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.804751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.804773] Call Trace:
[   14.804787]  <TASK>
[   14.804803]  dump_stack_lvl+0x73/0xb0
[   14.804832]  print_report+0xd1/0x650
[   14.804855]  ? __virt_addr_valid+0x1db/0x2d0
[   14.804880]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.804936]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.804960]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.804983]  kasan_report+0x141/0x180
[   14.805018]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.805046]  kasan_check_range+0x10c/0x1c0
[   14.805072]  __kasan_check_write+0x18/0x20
[   14.805092]  kasan_atomics_helper+0x1e12/0x5450
[   14.805116]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.805140]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.805181]  ? kasan_atomics+0x152/0x310
[   14.805206]  kasan_atomics+0x1dc/0x310
[   14.805226]  ? __pfx_kasan_atomics+0x10/0x10
[   14.805247]  ? __pfx_read_tsc+0x10/0x10
[   14.805269]  ? ktime_get_ts64+0x86/0x230
[   14.805295]  kunit_try_run_case+0x1a5/0x480
[   14.805320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.805375]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.805399]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.805432]  ? __kthread_parkme+0x82/0x180
[   14.805453]  ? preempt_count_sub+0x50/0x80
[   14.805508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.805535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.805571]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.805595]  kthread+0x337/0x6f0
[   14.805626]  ? trace_preempt_on+0x20/0xc0
[   14.805651]  ? __pfx_kthread+0x10/0x10
[   14.805674]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.805696]  ? calculate_sigpending+0x7b/0xa0
[   14.805721]  ? __pfx_kthread+0x10/0x10
[   14.805745]  ret_from_fork+0x116/0x1d0
[   14.805764]  ? __pfx_kthread+0x10/0x10
[   14.805787]  ret_from_fork_asm+0x1a/0x30
[   14.805819]  </TASK>
[   14.805831] 
[   14.814012] Allocated by task 282:
[   14.814142]  kasan_save_stack+0x45/0x70
[   14.814398]  kasan_save_track+0x18/0x40
[   14.814634]  kasan_save_alloc_info+0x3b/0x50
[   14.814909]  __kasan_kmalloc+0xb7/0xc0
[   14.815192]  __kmalloc_cache_noprof+0x189/0x420
[   14.815408]  kasan_atomics+0x95/0x310
[   14.815568]  kunit_try_run_case+0x1a5/0x480
[   14.815760]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.815987]  kthread+0x337/0x6f0
[   14.816113]  ret_from_fork+0x116/0x1d0
[   14.816303]  ret_from_fork_asm+0x1a/0x30
[   14.816507] 
[   14.816647] The buggy address belongs to the object at ffff8881029e5b80
[   14.816647]  which belongs to the cache kmalloc-64 of size 64
[   14.817081] The buggy address is located 0 bytes to the right of
[   14.817081]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.817643] 
[   14.817754] The buggy address belongs to the physical page:
[   14.818095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.818471] flags: 0x200000000000000(node=0|zone=2)
[   14.818698] page_type: f5(slab)
[   14.818905] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.819302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.819638] page dumped because: kasan: bad access detected
[   14.819865] 
[   14.819974] Memory state around the buggy address:
[   14.820179]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.820496]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.820865] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.821148]                                      ^
[   14.821386]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.821762]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.822062] ==================================================================
[   14.415907] ==================================================================
[   14.416372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.417020] Read of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.417564] 
[   14.417707] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.417760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.417773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.417795] Call Trace:
[   14.417810]  <TASK>
[   14.417828]  dump_stack_lvl+0x73/0xb0
[   14.417856]  print_report+0xd1/0x650
[   14.417880]  ? __virt_addr_valid+0x1db/0x2d0
[   14.417904]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.417927]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.417951]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.417974]  kasan_report+0x141/0x180
[   14.417999]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.418028]  kasan_check_range+0x10c/0x1c0
[   14.418053]  __kasan_check_read+0x15/0x20
[   14.418074]  kasan_atomics_helper+0x13b5/0x5450
[   14.418098]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.418122]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.418144]  ? kasan_atomics+0x152/0x310
[   14.418168]  kasan_atomics+0x1dc/0x310
[   14.418217]  ? __pfx_kasan_atomics+0x10/0x10
[   14.418241]  ? __pfx_read_tsc+0x10/0x10
[   14.418263]  ? ktime_get_ts64+0x86/0x230
[   14.418290]  kunit_try_run_case+0x1a5/0x480
[   14.418315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.418338]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.418362]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.418386]  ? __kthread_parkme+0x82/0x180
[   14.418408]  ? preempt_count_sub+0x50/0x80
[   14.418434]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.418459]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.418489]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.418513]  kthread+0x337/0x6f0
[   14.418559]  ? trace_preempt_on+0x20/0xc0
[   14.418583]  ? __pfx_kthread+0x10/0x10
[   14.418606]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.418641]  ? calculate_sigpending+0x7b/0xa0
[   14.418668]  ? __pfx_kthread+0x10/0x10
[   14.418691]  ret_from_fork+0x116/0x1d0
[   14.418710]  ? __pfx_kthread+0x10/0x10
[   14.418732]  ret_from_fork_asm+0x1a/0x30
[   14.418765]  </TASK>
[   14.418776] 
[   14.429953] Allocated by task 282:
[   14.430118]  kasan_save_stack+0x45/0x70
[   14.430531]  kasan_save_track+0x18/0x40
[   14.430862]  kasan_save_alloc_info+0x3b/0x50
[   14.431379]  __kasan_kmalloc+0xb7/0xc0
[   14.431544]  __kmalloc_cache_noprof+0x189/0x420
[   14.432023]  kasan_atomics+0x95/0x310
[   14.432326]  kunit_try_run_case+0x1a5/0x480
[   14.432490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.433019]  kthread+0x337/0x6f0
[   14.433166]  ret_from_fork+0x116/0x1d0
[   14.433576]  ret_from_fork_asm+0x1a/0x30
[   14.433776] 
[   14.433879] The buggy address belongs to the object at ffff8881029e5b80
[   14.433879]  which belongs to the cache kmalloc-64 of size 64
[   14.434780] The buggy address is located 0 bytes to the right of
[   14.434780]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.435282] 
[   14.435836] The buggy address belongs to the physical page:
[   14.436083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.436635] flags: 0x200000000000000(node=0|zone=2)
[   14.436827] page_type: f5(slab)
[   14.437133] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.437699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.438110] page dumped because: kasan: bad access detected
[   14.438428] 
[   14.438513] Memory state around the buggy address:
[   14.438982]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.439459]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.440080] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.440471]                                      ^
[   14.440892]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.441164]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.441693] ==================================================================
[   14.842659] ==================================================================
[   14.842947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   14.843362] Write of size 8 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.843745] 
[   14.843837] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.843915] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.843930] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.843964] Call Trace:
[   14.843980]  <TASK>
[   14.843996]  dump_stack_lvl+0x73/0xb0
[   14.844024]  print_report+0xd1/0x650
[   14.844047]  ? __virt_addr_valid+0x1db/0x2d0
[   14.844072]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.844095]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.844119]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.844143]  kasan_report+0x141/0x180
[   14.844204]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.844233]  kasan_check_range+0x10c/0x1c0
[   14.844280]  __kasan_check_write+0x18/0x20
[   14.844302]  kasan_atomics_helper+0x1f43/0x5450
[   14.844327]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.844351]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.844374]  ? kasan_atomics+0x152/0x310
[   14.844399]  kasan_atomics+0x1dc/0x310
[   14.844420]  ? __pfx_kasan_atomics+0x10/0x10
[   14.844442]  ? __pfx_read_tsc+0x10/0x10
[   14.844463]  ? ktime_get_ts64+0x86/0x230
[   14.844520]  kunit_try_run_case+0x1a5/0x480
[   14.844545]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.844568]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.844601]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.844633]  ? __kthread_parkme+0x82/0x180
[   14.844683]  ? preempt_count_sub+0x50/0x80
[   14.844709]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.844733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.844768]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.844792]  kthread+0x337/0x6f0
[   14.844813]  ? trace_preempt_on+0x20/0xc0
[   14.844837]  ? __pfx_kthread+0x10/0x10
[   14.844859]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.844880]  ? calculate_sigpending+0x7b/0xa0
[   14.844905]  ? __pfx_kthread+0x10/0x10
[   14.844927]  ret_from_fork+0x116/0x1d0
[   14.844947]  ? __pfx_kthread+0x10/0x10
[   14.844968]  ret_from_fork_asm+0x1a/0x30
[   14.845001]  </TASK>
[   14.845012] 
[   14.852706] Allocated by task 282:
[   14.852933]  kasan_save_stack+0x45/0x70
[   14.853136]  kasan_save_track+0x18/0x40
[   14.853404]  kasan_save_alloc_info+0x3b/0x50
[   14.853671]  __kasan_kmalloc+0xb7/0xc0
[   14.853863]  __kmalloc_cache_noprof+0x189/0x420
[   14.854067]  kasan_atomics+0x95/0x310
[   14.854226]  kunit_try_run_case+0x1a5/0x480
[   14.854435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.854761]  kthread+0x337/0x6f0
[   14.854937]  ret_from_fork+0x116/0x1d0
[   14.855129]  ret_from_fork_asm+0x1a/0x30
[   14.855359] 
[   14.855434] The buggy address belongs to the object at ffff8881029e5b80
[   14.855434]  which belongs to the cache kmalloc-64 of size 64
[   14.856048] The buggy address is located 0 bytes to the right of
[   14.856048]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.856672] 
[   14.856813] The buggy address belongs to the physical page:
[   14.857083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.857442] flags: 0x200000000000000(node=0|zone=2)
[   14.857689] page_type: f5(slab)
[   14.857903] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.858292] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.858624] page dumped because: kasan: bad access detected
[   14.858926] 
[   14.859002] Memory state around the buggy address:
[   14.859309]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.859556]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.859891] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.860202]                                      ^
[   14.860416]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.860782]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.861074] ==================================================================
[   14.055947] ==================================================================
[   14.056413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   14.056914] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.057201] 
[   14.057320] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.057368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.057382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.057404] Call Trace:
[   14.057419]  <TASK>
[   14.057435]  dump_stack_lvl+0x73/0xb0
[   14.057463]  print_report+0xd1/0x650
[   14.057487]  ? __virt_addr_valid+0x1db/0x2d0
[   14.057511]  ? kasan_atomics_helper+0xd47/0x5450
[   14.057576]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.057604]  ? kasan_atomics_helper+0xd47/0x5450
[   14.057640]  kasan_report+0x141/0x180
[   14.057664]  ? kasan_atomics_helper+0xd47/0x5450
[   14.057692]  kasan_check_range+0x10c/0x1c0
[   14.057718]  __kasan_check_write+0x18/0x20
[   14.057740]  kasan_atomics_helper+0xd47/0x5450
[   14.057763]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.057787]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.057809]  ? kasan_atomics+0x152/0x310
[   14.057833]  kasan_atomics+0x1dc/0x310
[   14.057854]  ? __pfx_kasan_atomics+0x10/0x10
[   14.057875]  ? __pfx_read_tsc+0x10/0x10
[   14.057897]  ? ktime_get_ts64+0x86/0x230
[   14.057922]  kunit_try_run_case+0x1a5/0x480
[   14.057947]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.057970]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.057994]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.058017]  ? __kthread_parkme+0x82/0x180
[   14.058038]  ? preempt_count_sub+0x50/0x80
[   14.058063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.058088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.058112]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.058136]  kthread+0x337/0x6f0
[   14.058158]  ? trace_preempt_on+0x20/0xc0
[   14.058189]  ? __pfx_kthread+0x10/0x10
[   14.058212]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.058234]  ? calculate_sigpending+0x7b/0xa0
[   14.058258]  ? __pfx_kthread+0x10/0x10
[   14.058281]  ret_from_fork+0x116/0x1d0
[   14.058300]  ? __pfx_kthread+0x10/0x10
[   14.058323]  ret_from_fork_asm+0x1a/0x30
[   14.058355]  </TASK>
[   14.058366] 
[   14.066536] Allocated by task 282:
[   14.066733]  kasan_save_stack+0x45/0x70
[   14.067190]  kasan_save_track+0x18/0x40
[   14.067582]  kasan_save_alloc_info+0x3b/0x50
[   14.067793]  __kasan_kmalloc+0xb7/0xc0
[   14.067976]  __kmalloc_cache_noprof+0x189/0x420
[   14.068156]  kasan_atomics+0x95/0x310
[   14.068350]  kunit_try_run_case+0x1a5/0x480
[   14.068569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.068778]  kthread+0x337/0x6f0
[   14.068953]  ret_from_fork+0x116/0x1d0
[   14.069130]  ret_from_fork_asm+0x1a/0x30
[   14.069395] 
[   14.069473] The buggy address belongs to the object at ffff8881029e5b80
[   14.069473]  which belongs to the cache kmalloc-64 of size 64
[   14.070052] The buggy address is located 0 bytes to the right of
[   14.070052]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.070592] 
[   14.070696] The buggy address belongs to the physical page:
[   14.070910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.071269] flags: 0x200000000000000(node=0|zone=2)
[   14.071482] page_type: f5(slab)
[   14.071817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.072111] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.072499] page dumped because: kasan: bad access detected
[   14.072809] 
[   14.072898] Memory state around the buggy address:
[   14.073056]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.073274]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.073490] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.073862]                                      ^
[   14.074091]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.074710]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.074998] ==================================================================
[   14.075418] ==================================================================
[   14.075827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   14.076136] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.076479] 
[   14.076572] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.076635] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.076648] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.076671] Call Trace:
[   14.076686]  <TASK>
[   14.076702]  dump_stack_lvl+0x73/0xb0
[   14.076729]  print_report+0xd1/0x650
[   14.076754]  ? __virt_addr_valid+0x1db/0x2d0
[   14.076779]  ? kasan_atomics_helper+0xde0/0x5450
[   14.076802]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.076827]  ? kasan_atomics_helper+0xde0/0x5450
[   14.076853]  kasan_report+0x141/0x180
[   14.076877]  ? kasan_atomics_helper+0xde0/0x5450
[   14.076905]  kasan_check_range+0x10c/0x1c0
[   14.076931]  __kasan_check_write+0x18/0x20
[   14.076953]  kasan_atomics_helper+0xde0/0x5450
[   14.076978]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.077002]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.077025]  ? kasan_atomics+0x152/0x310
[   14.077049]  kasan_atomics+0x1dc/0x310
[   14.077070]  ? __pfx_kasan_atomics+0x10/0x10
[   14.077093]  ? __pfx_read_tsc+0x10/0x10
[   14.077115]  ? ktime_get_ts64+0x86/0x230
[   14.077141]  kunit_try_run_case+0x1a5/0x480
[   14.077166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.077189]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.077213]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.077236]  ? __kthread_parkme+0x82/0x180
[   14.077258]  ? preempt_count_sub+0x50/0x80
[   14.077283]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.077308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.077332]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.077355]  kthread+0x337/0x6f0
[   14.077376]  ? trace_preempt_on+0x20/0xc0
[   14.077401]  ? __pfx_kthread+0x10/0x10
[   14.077422]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.077444]  ? calculate_sigpending+0x7b/0xa0
[   14.077469]  ? __pfx_kthread+0x10/0x10
[   14.077492]  ret_from_fork+0x116/0x1d0
[   14.077511]  ? __pfx_kthread+0x10/0x10
[   14.077533]  ret_from_fork_asm+0x1a/0x30
[   14.077565]  </TASK>
[   14.077577] 
[   14.086131] Allocated by task 282:
[   14.086329]  kasan_save_stack+0x45/0x70
[   14.086512]  kasan_save_track+0x18/0x40
[   14.086713]  kasan_save_alloc_info+0x3b/0x50
[   14.086902]  __kasan_kmalloc+0xb7/0xc0
[   14.087038]  __kmalloc_cache_noprof+0x189/0x420
[   14.087321]  kasan_atomics+0x95/0x310
[   14.087511]  kunit_try_run_case+0x1a5/0x480
[   14.087917]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.088121]  kthread+0x337/0x6f0
[   14.088353]  ret_from_fork+0x116/0x1d0
[   14.088630]  ret_from_fork_asm+0x1a/0x30
[   14.088777] 
[   14.088851] The buggy address belongs to the object at ffff8881029e5b80
[   14.088851]  which belongs to the cache kmalloc-64 of size 64
[   14.089212] The buggy address is located 0 bytes to the right of
[   14.089212]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.089775] 
[   14.089875] The buggy address belongs to the physical page:
[   14.090162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.090673] flags: 0x200000000000000(node=0|zone=2)
[   14.090884] page_type: f5(slab)
[   14.091008] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.091239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.091610] page dumped because: kasan: bad access detected
[   14.091872] 
[   14.091945] Memory state around the buggy address:
[   14.092102]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.092431]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.092928] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.093236]                                      ^
[   14.093393]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.093610]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.093941] ==================================================================
[   14.323277] ==================================================================
[   14.323979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   14.324450] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.325094] 
[   14.325213] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.325262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.325276] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.325297] Call Trace:
[   14.325312]  <TASK>
[   14.325328]  dump_stack_lvl+0x73/0xb0
[   14.325356]  print_report+0xd1/0x650
[   14.325493]  ? __virt_addr_valid+0x1db/0x2d0
[   14.325520]  ? kasan_atomics_helper+0x1217/0x5450
[   14.325543]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.325569]  ? kasan_atomics_helper+0x1217/0x5450
[   14.325594]  kasan_report+0x141/0x180
[   14.325632]  ? kasan_atomics_helper+0x1217/0x5450
[   14.325661]  kasan_check_range+0x10c/0x1c0
[   14.325686]  __kasan_check_write+0x18/0x20
[   14.325707]  kasan_atomics_helper+0x1217/0x5450
[   14.325731]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.325756]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.325779]  ? kasan_atomics+0x152/0x310
[   14.325804]  kasan_atomics+0x1dc/0x310
[   14.325824]  ? __pfx_kasan_atomics+0x10/0x10
[   14.325846]  ? __pfx_read_tsc+0x10/0x10
[   14.325867]  ? ktime_get_ts64+0x86/0x230
[   14.325894]  kunit_try_run_case+0x1a5/0x480
[   14.325918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.325940]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.325964]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.325988]  ? __kthread_parkme+0x82/0x180
[   14.326009]  ? preempt_count_sub+0x50/0x80
[   14.326034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.326059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.326083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.326107]  kthread+0x337/0x6f0
[   14.326128]  ? trace_preempt_on+0x20/0xc0
[   14.326152]  ? __pfx_kthread+0x10/0x10
[   14.326174]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.326195]  ? calculate_sigpending+0x7b/0xa0
[   14.326220]  ? __pfx_kthread+0x10/0x10
[   14.326243]  ret_from_fork+0x116/0x1d0
[   14.326262]  ? __pfx_kthread+0x10/0x10
[   14.326284]  ret_from_fork_asm+0x1a/0x30
[   14.326316]  </TASK>
[   14.326329] 
[   14.338106] Allocated by task 282:
[   14.338437]  kasan_save_stack+0x45/0x70
[   14.338759]  kasan_save_track+0x18/0x40
[   14.338941]  kasan_save_alloc_info+0x3b/0x50
[   14.339152]  __kasan_kmalloc+0xb7/0xc0
[   14.339471]  __kmalloc_cache_noprof+0x189/0x420
[   14.339899]  kasan_atomics+0x95/0x310
[   14.340251]  kunit_try_run_case+0x1a5/0x480
[   14.340569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.340937]  kthread+0x337/0x6f0
[   14.341103]  ret_from_fork+0x116/0x1d0
[   14.341518]  ret_from_fork_asm+0x1a/0x30
[   14.341799] 
[   14.341886] The buggy address belongs to the object at ffff8881029e5b80
[   14.341886]  which belongs to the cache kmalloc-64 of size 64
[   14.342629] The buggy address is located 0 bytes to the right of
[   14.342629]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.343387] 
[   14.343480] The buggy address belongs to the physical page:
[   14.343738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.344435] flags: 0x200000000000000(node=0|zone=2)
[   14.344897] page_type: f5(slab)
[   14.345146] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.345552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.346197] page dumped because: kasan: bad access detected
[   14.346635] 
[   14.346715] Memory state around the buggy address:
[   14.347040]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.347501]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.348073] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.348473]                                      ^
[   14.348925]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.349412]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.350034] ==================================================================
[   14.152734] ==================================================================
[   14.153291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   14.153533] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.154209] 
[   14.154394] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.154456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.154475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.154499] Call Trace:
[   14.154516]  <TASK>
[   14.154576]  dump_stack_lvl+0x73/0xb0
[   14.154606]  print_report+0xd1/0x650
[   14.154641]  ? __virt_addr_valid+0x1db/0x2d0
[   14.154666]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.154689]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.154713]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.154736]  kasan_report+0x141/0x180
[   14.154760]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.154788]  kasan_check_range+0x10c/0x1c0
[   14.154813]  __kasan_check_write+0x18/0x20
[   14.154834]  kasan_atomics_helper+0xfa9/0x5450
[   14.154859]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.154882]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.154905]  ? kasan_atomics+0x152/0x310
[   14.154929]  kasan_atomics+0x1dc/0x310
[   14.154949]  ? __pfx_kasan_atomics+0x10/0x10
[   14.154971]  ? __pfx_read_tsc+0x10/0x10
[   14.154994]  ? ktime_get_ts64+0x86/0x230
[   14.155020]  kunit_try_run_case+0x1a5/0x480
[   14.155044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.155067]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.155092]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.155116]  ? __kthread_parkme+0x82/0x180
[   14.155138]  ? preempt_count_sub+0x50/0x80
[   14.155164]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.155199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.155222]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.155247]  kthread+0x337/0x6f0
[   14.155267]  ? trace_preempt_on+0x20/0xc0
[   14.155293]  ? __pfx_kthread+0x10/0x10
[   14.155315]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.155336]  ? calculate_sigpending+0x7b/0xa0
[   14.155361]  ? __pfx_kthread+0x10/0x10
[   14.155385]  ret_from_fork+0x116/0x1d0
[   14.155404]  ? __pfx_kthread+0x10/0x10
[   14.155426]  ret_from_fork_asm+0x1a/0x30
[   14.155460]  </TASK>
[   14.155473] 
[   14.169856] Allocated by task 282:
[   14.170202]  kasan_save_stack+0x45/0x70
[   14.170675]  kasan_save_track+0x18/0x40
[   14.171030]  kasan_save_alloc_info+0x3b/0x50
[   14.171454]  __kasan_kmalloc+0xb7/0xc0
[   14.171795]  __kmalloc_cache_noprof+0x189/0x420
[   14.172268]  kasan_atomics+0x95/0x310
[   14.172666]  kunit_try_run_case+0x1a5/0x480
[   14.172854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.173030]  kthread+0x337/0x6f0
[   14.173154]  ret_from_fork+0x116/0x1d0
[   14.173496]  ret_from_fork_asm+0x1a/0x30
[   14.173895] 
[   14.174100] The buggy address belongs to the object at ffff8881029e5b80
[   14.174100]  which belongs to the cache kmalloc-64 of size 64
[   14.175405] The buggy address is located 0 bytes to the right of
[   14.175405]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.176543] 
[   14.176767] The buggy address belongs to the physical page:
[   14.176946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.177195] flags: 0x200000000000000(node=0|zone=2)
[   14.177621] page_type: f5(slab)
[   14.177987] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.178892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.179634] page dumped because: kasan: bad access detected
[   14.180459] 
[   14.180698] Memory state around the buggy address:
[   14.180919]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.181140]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.181470] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.182241]                                      ^
[   14.182779]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.183500]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.184197] ==================================================================
[   14.390335] ==================================================================
[   14.390586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   14.391057] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.391444] 
[   14.391741] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.391875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.391893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.391915] Call Trace:
[   14.391932]  <TASK>
[   14.391948]  dump_stack_lvl+0x73/0xb0
[   14.391978]  print_report+0xd1/0x650
[   14.392002]  ? __virt_addr_valid+0x1db/0x2d0
[   14.392026]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.392048]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.392072]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.392195]  kasan_report+0x141/0x180
[   14.392397]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.392497]  __asan_report_load4_noabort+0x18/0x20
[   14.392521]  kasan_atomics_helper+0x49ce/0x5450
[   14.392546]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.392570]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.392676]  ? kasan_atomics+0x152/0x310
[   14.392702]  kasan_atomics+0x1dc/0x310
[   14.392723]  ? __pfx_kasan_atomics+0x10/0x10
[   14.392745]  ? __pfx_read_tsc+0x10/0x10
[   14.392766]  ? ktime_get_ts64+0x86/0x230
[   14.392793]  kunit_try_run_case+0x1a5/0x480
[   14.392818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.392841]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.392865]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.392888]  ? __kthread_parkme+0x82/0x180
[   14.392910]  ? preempt_count_sub+0x50/0x80
[   14.392935]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.392959]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.392983]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.393007]  kthread+0x337/0x6f0
[   14.393028]  ? trace_preempt_on+0x20/0xc0
[   14.393053]  ? __pfx_kthread+0x10/0x10
[   14.393075]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.393096]  ? calculate_sigpending+0x7b/0xa0
[   14.393120]  ? __pfx_kthread+0x10/0x10
[   14.393143]  ret_from_fork+0x116/0x1d0
[   14.393162]  ? __pfx_kthread+0x10/0x10
[   14.393197]  ret_from_fork_asm+0x1a/0x30
[   14.393229]  </TASK>
[   14.393241] 
[   14.404115] Allocated by task 282:
[   14.404492]  kasan_save_stack+0x45/0x70
[   14.404801]  kasan_save_track+0x18/0x40
[   14.404969]  kasan_save_alloc_info+0x3b/0x50
[   14.405174]  __kasan_kmalloc+0xb7/0xc0
[   14.405872]  __kmalloc_cache_noprof+0x189/0x420
[   14.406221]  kasan_atomics+0x95/0x310
[   14.406580]  kunit_try_run_case+0x1a5/0x480
[   14.406797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.407117]  kthread+0x337/0x6f0
[   14.407405]  ret_from_fork+0x116/0x1d0
[   14.407664]  ret_from_fork_asm+0x1a/0x30
[   14.407819] 
[   14.408021] The buggy address belongs to the object at ffff8881029e5b80
[   14.408021]  which belongs to the cache kmalloc-64 of size 64
[   14.408773] The buggy address is located 0 bytes to the right of
[   14.408773]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.409345] 
[   14.409746] The buggy address belongs to the physical page:
[   14.410078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.410586] flags: 0x200000000000000(node=0|zone=2)
[   14.410869] page_type: f5(slab)
[   14.411047] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.411497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.412015] page dumped because: kasan: bad access detected
[   14.412237] 
[   14.412479] Memory state around the buggy address:
[   14.412836]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.413433]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.413836] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.414264]                                      ^
[   14.414522]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.414829]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.415131] ==================================================================
[   14.185239] ==================================================================
[   14.185847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   14.186090] Read of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   14.186602] 
[   14.186846] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   14.186897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.186911] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.186934] Call Trace:
[   14.186950]  <TASK>
[   14.186968]  dump_stack_lvl+0x73/0xb0
[   14.186996]  print_report+0xd1/0x650
[   14.187019]  ? __virt_addr_valid+0x1db/0x2d0
[   14.187043]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.187066]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.187090]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.187115]  kasan_report+0x141/0x180
[   14.187139]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.187167]  __asan_report_load4_noabort+0x18/0x20
[   14.187199]  kasan_atomics_helper+0x4a36/0x5450
[   14.187224]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.187250]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.187274]  ? kasan_atomics+0x152/0x310
[   14.187298]  kasan_atomics+0x1dc/0x310
[   14.187318]  ? __pfx_kasan_atomics+0x10/0x10
[   14.187340]  ? __pfx_read_tsc+0x10/0x10
[   14.187362]  ? ktime_get_ts64+0x86/0x230
[   14.187389]  kunit_try_run_case+0x1a5/0x480
[   14.187413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.187436]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.187461]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.187485]  ? __kthread_parkme+0x82/0x180
[   14.187507]  ? preempt_count_sub+0x50/0x80
[   14.187533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.187557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.187595]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.187631]  kthread+0x337/0x6f0
[   14.187652]  ? trace_preempt_on+0x20/0xc0
[   14.187677]  ? __pfx_kthread+0x10/0x10
[   14.187699]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.187722]  ? calculate_sigpending+0x7b/0xa0
[   14.187746]  ? __pfx_kthread+0x10/0x10
[   14.187770]  ret_from_fork+0x116/0x1d0
[   14.187789]  ? __pfx_kthread+0x10/0x10
[   14.187811]  ret_from_fork_asm+0x1a/0x30
[   14.187844]  </TASK>
[   14.187855] 
[   14.202204] Allocated by task 282:
[   14.202577]  kasan_save_stack+0x45/0x70
[   14.202922]  kasan_save_track+0x18/0x40
[   14.203063]  kasan_save_alloc_info+0x3b/0x50
[   14.203227]  __kasan_kmalloc+0xb7/0xc0
[   14.203575]  __kmalloc_cache_noprof+0x189/0x420
[   14.204042]  kasan_atomics+0x95/0x310
[   14.204496]  kunit_try_run_case+0x1a5/0x480
[   14.205159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.205731]  kthread+0x337/0x6f0
[   14.205942]  ret_from_fork+0x116/0x1d0
[   14.206397]  ret_from_fork_asm+0x1a/0x30
[   14.206679] 
[   14.206849] The buggy address belongs to the object at ffff8881029e5b80
[   14.206849]  which belongs to the cache kmalloc-64 of size 64
[   14.207571] The buggy address is located 0 bytes to the right of
[   14.207571]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.207950] 
[   14.208024] The buggy address belongs to the physical page:
[   14.208219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.208935] flags: 0x200000000000000(node=0|zone=2)
[   14.209453] page_type: f5(slab)
[   14.209812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.210576] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.211365] page dumped because: kasan: bad access detected
[   14.211917] 
[   14.212093] Memory state around the buggy address:
[   14.212594]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.213263]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.213747] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.213963]                                      ^
[   14.214119]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.214664]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.215174] ==================================================================
[   13.991745] ==================================================================
[   13.992456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   13.992958] Write of size 4 at addr ffff8881029e5bb0 by task kunit_try_catch/282
[   13.993378] 
[   13.993492] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250513 #1 PREEMPT(voluntary) 
[   13.993813] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.993829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.993853] Call Trace:
[   13.993869]  <TASK>
[   13.993885]  dump_stack_lvl+0x73/0xb0
[   13.993915]  print_report+0xd1/0x650
[   13.993938]  ? __virt_addr_valid+0x1db/0x2d0
[   13.993963]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.993986]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.994010]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.994033]  kasan_report+0x141/0x180
[   13.994057]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.994085]  kasan_check_range+0x10c/0x1c0
[   13.994109]  __kasan_check_write+0x18/0x20
[   13.994130]  kasan_atomics_helper+0xb6a/0x5450
[   13.994154]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.994202]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.994225]  ? kasan_atomics+0x152/0x310
[   13.994249]  kasan_atomics+0x1dc/0x310
[   13.994269]  ? __pfx_kasan_atomics+0x10/0x10
[   13.994291]  ? __pfx_read_tsc+0x10/0x10
[   13.994314]  ? ktime_get_ts64+0x86/0x230
[   13.994340]  kunit_try_run_case+0x1a5/0x480
[   13.994365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.994388]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.994411]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.994434]  ? __kthread_parkme+0x82/0x180
[   13.994455]  ? preempt_count_sub+0x50/0x80
[   13.994487]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.994530]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.994555]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.994579]  kthread+0x337/0x6f0
[   13.994600]  ? trace_preempt_on+0x20/0xc0
[   13.994634]  ? __pfx_kthread+0x10/0x10
[   13.994656]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.994678]  ? calculate_sigpending+0x7b/0xa0
[   13.994702]  ? __pfx_kthread+0x10/0x10
[   13.994726]  ret_from_fork+0x116/0x1d0
[   13.994745]  ? __pfx_kthread+0x10/0x10
[   13.994768]  ret_from_fork_asm+0x1a/0x30
[   13.994801]  </TASK>
[   13.994812] 
[   14.005329] Allocated by task 282:
[   14.005510]  kasan_save_stack+0x45/0x70
[   14.006325]  kasan_save_track+0x18/0x40
[   14.006486]  kasan_save_alloc_info+0x3b/0x50
[   14.006899]  __kasan_kmalloc+0xb7/0xc0
[   14.007266]  __kmalloc_cache_noprof+0x189/0x420
[   14.007489]  kasan_atomics+0x95/0x310
[   14.007825]  kunit_try_run_case+0x1a5/0x480
[   14.008245]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.008486]  kthread+0x337/0x6f0
[   14.008792]  ret_from_fork+0x116/0x1d0
[   14.009126]  ret_from_fork_asm+0x1a/0x30
[   14.009317] 
[   14.009572] The buggy address belongs to the object at ffff8881029e5b80
[   14.009572]  which belongs to the cache kmalloc-64 of size 64
[   14.010047] The buggy address is located 0 bytes to the right of
[   14.010047]  allocated 48-byte region [ffff8881029e5b80, ffff8881029e5bb0)
[   14.010915] 
[   14.011209] The buggy address belongs to the physical page:
[   14.011569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029e5
[   14.011929] flags: 0x200000000000000(node=0|zone=2)
[   14.012239] page_type: f5(slab)
[   14.012501] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.012961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.013427] page dumped because: kasan: bad access detected
[   14.013806] 
[   14.013939] Memory state around the buggy address:
[   14.014311]  ffff8881029e5a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.014697]  ffff8881029e5b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.014998] >ffff8881029e5b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.015481]                                      ^
[   14.015779]  ffff8881029e5c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.016086]  ffff8881029e5c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.016325] ==================================================================