Hay
Date
May 15, 2025, 10:38 a.m.

Environment
qemu-arm64
qemu-x86_64

[   20.641031] ==================================================================
[   20.641272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   20.641428] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.641514] 
[   20.641566] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.641669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.641772] Hardware name: linux,dummy-virt (DT)
[   20.641847] Call trace:
[   20.641872]  show_stack+0x20/0x38 (C)
[   20.641923]  dump_stack_lvl+0x8c/0xd0
[   20.641973]  print_report+0x118/0x608
[   20.642129]  kasan_report+0xdc/0x128
[   20.642198]  kasan_check_range+0x100/0x1a8
[   20.642284]  __kasan_check_write+0x20/0x30
[   20.642373]  kasan_atomics_helper+0x1414/0x4858
[   20.642490]  kasan_atomics+0x198/0x2e0
[   20.642590]  kunit_try_run_case+0x170/0x3f0
[   20.642950]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.643018]  kthread+0x328/0x630
[   20.643064]  ret_from_fork+0x10/0x20
[   20.643409] 
[   20.643522] Allocated by task 265:
[   20.643822]  kasan_save_stack+0x3c/0x68
[   20.643925]  kasan_save_track+0x20/0x40
[   20.644057]  kasan_save_alloc_info+0x40/0x58
[   20.644136]  __kasan_kmalloc+0xd4/0xd8
[   20.644200]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.644241]  kasan_atomics+0xb8/0x2e0
[   20.644474]  kunit_try_run_case+0x170/0x3f0
[   20.644602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.644703]  kthread+0x328/0x630
[   20.644893]  ret_from_fork+0x10/0x20
[   20.645067] 
[   20.645139] The buggy address belongs to the object at fff00000c7832f80
[   20.645139]  which belongs to the cache kmalloc-64 of size 64
[   20.645309] The buggy address is located 0 bytes to the right of
[   20.645309]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.645404] 
[   20.645426] The buggy address belongs to the physical page:
[   20.645679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.645821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.645957] page_type: f5(slab)
[   20.646103] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.646312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.646367] page dumped because: kasan: bad access detected
[   20.646465] 
[   20.646544] Memory state around the buggy address:
[   20.646579]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.646647]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.646691] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.646734]                                      ^
[   20.646768]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.646813]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.646852] ==================================================================
[   20.610772] ==================================================================
[   20.610852] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   20.610926] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.610994] 
[   20.611042] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.611149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.611439] Hardware name: linux,dummy-virt (DT)
[   20.611472] Call trace:
[   20.611503]  show_stack+0x20/0x38 (C)
[   20.611572]  dump_stack_lvl+0x8c/0xd0
[   20.611627]  print_report+0x118/0x608
[   20.611704]  kasan_report+0xdc/0x128
[   20.611786]  kasan_check_range+0x100/0x1a8
[   20.611867]  __kasan_check_write+0x20/0x30
[   20.611921]  kasan_atomics_helper+0x1128/0x4858
[   20.612013]  kasan_atomics+0x198/0x2e0
[   20.612103]  kunit_try_run_case+0x170/0x3f0
[   20.612180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.612281]  kthread+0x328/0x630
[   20.612330]  ret_from_fork+0x10/0x20
[   20.612379] 
[   20.612401] Allocated by task 265:
[   20.612686]  kasan_save_stack+0x3c/0x68
[   20.612730]  kasan_save_track+0x20/0x40
[   20.612787]  kasan_save_alloc_info+0x40/0x58
[   20.612849]  __kasan_kmalloc+0xd4/0xd8
[   20.612896]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.612939]  kasan_atomics+0xb8/0x2e0
[   20.612975]  kunit_try_run_case+0x170/0x3f0
[   20.613020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.613075]  kthread+0x328/0x630
[   20.613112]  ret_from_fork+0x10/0x20
[   20.613151] 
[   20.613180] The buggy address belongs to the object at fff00000c7832f80
[   20.613180]  which belongs to the cache kmalloc-64 of size 64
[   20.613239] The buggy address is located 0 bytes to the right of
[   20.613239]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.613314] 
[   20.613337] The buggy address belongs to the physical page:
[   20.613369] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.613436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.613492] page_type: f5(slab)
[   20.613530] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.613581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.613621] page dumped because: kasan: bad access detected
[   20.613656] 
[   20.613676] Memory state around the buggy address:
[   20.613714]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.613788]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.613832] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.613872]                                      ^
[   20.613905]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.613948]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.613990] ==================================================================
[   20.614185] ==================================================================
[   20.614232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   20.614280] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.614331] 
[   20.614361] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.614464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.614592] Hardware name: linux,dummy-virt (DT)
[   20.614628] Call trace:
[   20.614668]  show_stack+0x20/0x38 (C)
[   20.614975]  dump_stack_lvl+0x8c/0xd0
[   20.615070]  print_report+0x118/0x608
[   20.615147]  kasan_report+0xdc/0x128
[   20.615279]  kasan_check_range+0x100/0x1a8
[   20.615347]  __kasan_check_write+0x20/0x30
[   20.615403]  kasan_atomics_helper+0x1190/0x4858
[   20.615517]  kasan_atomics+0x198/0x2e0
[   20.615594]  kunit_try_run_case+0x170/0x3f0
[   20.615659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.615720]  kthread+0x328/0x630
[   20.615808]  ret_from_fork+0x10/0x20
[   20.615885] 
[   20.615925] Allocated by task 265:
[   20.615981]  kasan_save_stack+0x3c/0x68
[   20.616099]  kasan_save_track+0x20/0x40
[   20.616138]  kasan_save_alloc_info+0x40/0x58
[   20.616189]  __kasan_kmalloc+0xd4/0xd8
[   20.616227]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.616268]  kasan_atomics+0xb8/0x2e0
[   20.616306]  kunit_try_run_case+0x170/0x3f0
[   20.616345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.616641]  kthread+0x328/0x630
[   20.616687]  ret_from_fork+0x10/0x20
[   20.616775] 
[   20.616858] The buggy address belongs to the object at fff00000c7832f80
[   20.616858]  which belongs to the cache kmalloc-64 of size 64
[   20.616924] The buggy address is located 0 bytes to the right of
[   20.616924]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.617015] 
[   20.617039] The buggy address belongs to the physical page:
[   20.617334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.617429] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.617495] page_type: f5(slab)
[   20.617534] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.617623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.617667] page dumped because: kasan: bad access detected
[   20.617717] 
[   20.617813] Memory state around the buggy address:
[   20.617854]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.617898]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.617943] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.617982]                                      ^
[   20.618017]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.618457]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.618586] ==================================================================
[   20.546513] ==================================================================
[   20.546559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   20.546607] Read of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.546658] 
[   20.546687] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.546783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.546813] Hardware name: linux,dummy-virt (DT)
[   20.546846] Call trace:
[   20.546869]  show_stack+0x20/0x38 (C)
[   20.546919]  dump_stack_lvl+0x8c/0xd0
[   20.547670]  print_report+0x118/0x608
[   20.547783]  kasan_report+0xdc/0x128
[   20.547833]  __asan_report_load4_noabort+0x20/0x30
[   20.547887]  kasan_atomics_helper+0x3e04/0x4858
[   20.547937]  kasan_atomics+0x198/0x2e0
[   20.547984]  kunit_try_run_case+0x170/0x3f0
[   20.548034]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.548089]  kthread+0x328/0x630
[   20.548140]  ret_from_fork+0x10/0x20
[   20.548716] 
[   20.549051] Allocated by task 265:
[   20.549227]  kasan_save_stack+0x3c/0x68
[   20.549330]  kasan_save_track+0x20/0x40
[   20.549371]  kasan_save_alloc_info+0x40/0x58
[   20.549413]  __kasan_kmalloc+0xd4/0xd8
[   20.549667]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.549809]  kasan_atomics+0xb8/0x2e0
[   20.549846]  kunit_try_run_case+0x170/0x3f0
[   20.549886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.550220]  kthread+0x328/0x630
[   20.550267]  ret_from_fork+0x10/0x20
[   20.550339] 
[   20.550361] The buggy address belongs to the object at fff00000c7832f80
[   20.550361]  which belongs to the cache kmalloc-64 of size 64
[   20.550432] The buggy address is located 0 bytes to the right of
[   20.550432]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.550499] 
[   20.550520] The buggy address belongs to the physical page:
[   20.550553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.550775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.551113] page_type: f5(slab)
[   20.551251] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.551398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.551467] page dumped because: kasan: bad access detected
[   20.551590] 
[   20.551650] Memory state around the buggy address:
[   20.551684]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.551754]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.551798] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.551839]                                      ^
[   20.551875]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.551919]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.552010] ==================================================================
[   20.601124] ==================================================================
[   20.601188] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   20.601591] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.601684] 
[   20.601835] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.602216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.602252] Hardware name: linux,dummy-virt (DT)
[   20.602394] Call trace:
[   20.602553]  show_stack+0x20/0x38 (C)
[   20.602654]  dump_stack_lvl+0x8c/0xd0
[   20.602752]  print_report+0x118/0x608
[   20.602826]  kasan_report+0xdc/0x128
[   20.602875]  kasan_check_range+0x100/0x1a8
[   20.602927]  __kasan_check_write+0x20/0x30
[   20.603122]  kasan_atomics_helper+0x1058/0x4858
[   20.603265]  kasan_atomics+0x198/0x2e0
[   20.603317]  kunit_try_run_case+0x170/0x3f0
[   20.603372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.603654]  kthread+0x328/0x630
[   20.603762]  ret_from_fork+0x10/0x20
[   20.603812] 
[   20.603834] Allocated by task 265:
[   20.603909]  kasan_save_stack+0x3c/0x68
[   20.604140]  kasan_save_track+0x20/0x40
[   20.604370]  kasan_save_alloc_info+0x40/0x58
[   20.604416]  __kasan_kmalloc+0xd4/0xd8
[   20.604455]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.604496]  kasan_atomics+0xb8/0x2e0
[   20.604534]  kunit_try_run_case+0x170/0x3f0
[   20.604574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.604620]  kthread+0x328/0x630
[   20.604659]  ret_from_fork+0x10/0x20
[   20.604736] 
[   20.604808] The buggy address belongs to the object at fff00000c7832f80
[   20.604808]  which belongs to the cache kmalloc-64 of size 64
[   20.604874] The buggy address is located 0 bytes to the right of
[   20.604874]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.604939] 
[   20.605011] The buggy address belongs to the physical page:
[   20.605047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.605115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.605205] page_type: f5(slab)
[   20.605243] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.605296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.605337] page dumped because: kasan: bad access detected
[   20.605371] 
[   20.605391] Memory state around the buggy address:
[   20.605424]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.605468]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.605512] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.605551]                                      ^
[   20.605586]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.606033]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.606105] ==================================================================
[   20.606596] ==================================================================
[   20.606650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   20.606698] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.606774] 
[   20.606819] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.607118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.607166] Hardware name: linux,dummy-virt (DT)
[   20.607199] Call trace:
[   20.607241]  show_stack+0x20/0x38 (C)
[   20.607296]  dump_stack_lvl+0x8c/0xd0
[   20.607431]  print_report+0x118/0x608
[   20.607509]  kasan_report+0xdc/0x128
[   20.607575]  kasan_check_range+0x100/0x1a8
[   20.607645]  __kasan_check_write+0x20/0x30
[   20.607712]  kasan_atomics_helper+0x10c0/0x4858
[   20.607829]  kasan_atomics+0x198/0x2e0
[   20.607878]  kunit_try_run_case+0x170/0x3f0
[   20.607935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.607991]  kthread+0x328/0x630
[   20.608038]  ret_from_fork+0x10/0x20
[   20.608087] 
[   20.608214] Allocated by task 265:
[   20.608249]  kasan_save_stack+0x3c/0x68
[   20.608356]  kasan_save_track+0x20/0x40
[   20.608403]  kasan_save_alloc_info+0x40/0x58
[   20.608445]  __kasan_kmalloc+0xd4/0xd8
[   20.608484]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.608524]  kasan_atomics+0xb8/0x2e0
[   20.608563]  kunit_try_run_case+0x170/0x3f0
[   20.608612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.608658]  kthread+0x328/0x630
[   20.608774]  ret_from_fork+0x10/0x20
[   20.608814] 
[   20.608876] The buggy address belongs to the object at fff00000c7832f80
[   20.608876]  which belongs to the cache kmalloc-64 of size 64
[   20.608938] The buggy address is located 0 bytes to the right of
[   20.608938]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.609002] 
[   20.609025] The buggy address belongs to the physical page:
[   20.609254] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.609411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.609488] page_type: f5(slab)
[   20.609563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.609616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.609685] page dumped because: kasan: bad access detected
[   20.610023] 
[   20.610093] Memory state around the buggy address:
[   20.610129]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.610184]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.610228] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.610268]                                      ^
[   20.610305]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.610368]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.610409] ==================================================================
[   20.690979] ==================================================================
[   20.691024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   20.691071] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.691121] 
[   20.691167] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.691252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.691281] Hardware name: linux,dummy-virt (DT)
[   20.691313] Call trace:
[   20.691336]  show_stack+0x20/0x38 (C)
[   20.691384]  dump_stack_lvl+0x8c/0xd0
[   20.691617]  print_report+0x118/0x608
[   20.691698]  kasan_report+0xdc/0x128
[   20.691826]  __asan_report_load8_noabort+0x20/0x30
[   20.691879]  kasan_atomics_helper+0x3e20/0x4858
[   20.691956]  kasan_atomics+0x198/0x2e0
[   20.692124]  kunit_try_run_case+0x170/0x3f0
[   20.692184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.692259]  kthread+0x328/0x630
[   20.692334]  ret_from_fork+0x10/0x20
[   20.692401] 
[   20.692457] Allocated by task 265:
[   20.692553]  kasan_save_stack+0x3c/0x68
[   20.692612]  kasan_save_track+0x20/0x40
[   20.692669]  kasan_save_alloc_info+0x40/0x58
[   20.692732]  __kasan_kmalloc+0xd4/0xd8
[   20.692844]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.692891]  kasan_atomics+0xb8/0x2e0
[   20.692948]  kunit_try_run_case+0x170/0x3f0
[   20.692987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.693057]  kthread+0x328/0x630
[   20.693141]  ret_from_fork+0x10/0x20
[   20.693247] 
[   20.693270] The buggy address belongs to the object at fff00000c7832f80
[   20.693270]  which belongs to the cache kmalloc-64 of size 64
[   20.693330] The buggy address is located 0 bytes to the right of
[   20.693330]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.693525] 
[   20.693614] The buggy address belongs to the physical page:
[   20.693685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.693783] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.693902] page_type: f5(slab)
[   20.694039] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.694123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.694218] page dumped because: kasan: bad access detected
[   20.694260] 
[   20.694280] Memory state around the buggy address:
[   20.694328]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.694392]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.694437] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.694479]                                      ^
[   20.694901]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.694946]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.694986] ==================================================================
[   20.558770] ==================================================================
[   20.558837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   20.558889] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.558942] 
[   20.558972] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.559058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.559088] Hardware name: linux,dummy-virt (DT)
[   20.559122] Call trace:
[   20.559146]  show_stack+0x20/0x38 (C)
[   20.559211]  dump_stack_lvl+0x8c/0xd0
[   20.559285]  print_report+0x118/0x608
[   20.559338]  kasan_report+0xdc/0x128
[   20.559387]  __asan_report_load8_noabort+0x20/0x30
[   20.559749]  kasan_atomics_helper+0x3f58/0x4858
[   20.559813]  kasan_atomics+0x198/0x2e0
[   20.560031]  kunit_try_run_case+0x170/0x3f0
[   20.560278]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.560852]  kthread+0x328/0x630
[   20.560914]  ret_from_fork+0x10/0x20
[   20.561098] 
[   20.561121] Allocated by task 265:
[   20.561151]  kasan_save_stack+0x3c/0x68
[   20.561211]  kasan_save_track+0x20/0x40
[   20.561406]  kasan_save_alloc_info+0x40/0x58
[   20.561606]  __kasan_kmalloc+0xd4/0xd8
[   20.561651]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.561721]  kasan_atomics+0xb8/0x2e0
[   20.561797]  kunit_try_run_case+0x170/0x3f0
[   20.561838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.561882]  kthread+0x328/0x630
[   20.561920]  ret_from_fork+0x10/0x20
[   20.561958] 
[   20.561981] The buggy address belongs to the object at fff00000c7832f80
[   20.561981]  which belongs to the cache kmalloc-64 of size 64
[   20.562269] The buggy address is located 0 bytes to the right of
[   20.562269]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.562566] 
[   20.562890] The buggy address belongs to the physical page:
[   20.562929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.562984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.563034] page_type: f5(slab)
[   20.563092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.563203] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.563566] page dumped because: kasan: bad access detected
[   20.563604] 
[   20.563626] Memory state around the buggy address:
[   20.563667]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.563841]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.563886] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.563926]                                      ^
[   20.564038]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.564167]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.564226] ==================================================================
[   20.665859] ==================================================================
[   20.665903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   20.665952] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.666003] 
[   20.666034] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.666118] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.666146] Hardware name: linux,dummy-virt (DT)
[   20.666193] Call trace:
[   20.666216]  show_stack+0x20/0x38 (C)
[   20.666266]  dump_stack_lvl+0x8c/0xd0
[   20.666314]  print_report+0x118/0x608
[   20.666376]  kasan_report+0xdc/0x128
[   20.666472]  __asan_report_load8_noabort+0x20/0x30
[   20.666525]  kasan_atomics_helper+0x3db0/0x4858
[   20.666579]  kasan_atomics+0x198/0x2e0
[   20.666702]  kunit_try_run_case+0x170/0x3f0
[   20.666760]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.666846]  kthread+0x328/0x630
[   20.666894]  ret_from_fork+0x10/0x20
[   20.667032] 
[   20.667062] Allocated by task 265:
[   20.667094]  kasan_save_stack+0x3c/0x68
[   20.667136]  kasan_save_track+0x20/0x40
[   20.667209]  kasan_save_alloc_info+0x40/0x58
[   20.667356]  __kasan_kmalloc+0xd4/0xd8
[   20.667528]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.667628]  kasan_atomics+0xb8/0x2e0
[   20.667724]  kunit_try_run_case+0x170/0x3f0
[   20.667790]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.667866]  kthread+0x328/0x630
[   20.667929]  ret_from_fork+0x10/0x20
[   20.667995] 
[   20.668035] The buggy address belongs to the object at fff00000c7832f80
[   20.668035]  which belongs to the cache kmalloc-64 of size 64
[   20.668100] The buggy address is located 0 bytes to the right of
[   20.668100]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.668176] 
[   20.668198] The buggy address belongs to the physical page:
[   20.668230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.668284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.668330] page_type: f5(slab)
[   20.668368] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.668419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.668479] page dumped because: kasan: bad access detected
[   20.668558] 
[   20.668598] Memory state around the buggy address:
[   20.668647]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.668693]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.668745] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.668786]                                      ^
[   20.668820]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.668865]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.669109] ==================================================================
[   20.492101] ==================================================================
[   20.492169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   20.492222] Write of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.492274] 
[   20.492621] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.492793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.492825] Hardware name: linux,dummy-virt (DT)
[   20.492857] Call trace:
[   20.492885]  show_stack+0x20/0x38 (C)
[   20.493318]  dump_stack_lvl+0x8c/0xd0
[   20.493370]  print_report+0x118/0x608
[   20.493419]  kasan_report+0xdc/0x128
[   20.493973]  kasan_check_range+0x100/0x1a8
[   20.494043]  __kasan_check_write+0x20/0x30
[   20.494243]  kasan_atomics_helper+0xad4/0x4858
[   20.494330]  kasan_atomics+0x198/0x2e0
[   20.494473]  kunit_try_run_case+0x170/0x3f0
[   20.494523]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.494801]  kthread+0x328/0x630
[   20.495253]  ret_from_fork+0x10/0x20
[   20.495342] 
[   20.495402] Allocated by task 265:
[   20.495431]  kasan_save_stack+0x3c/0x68
[   20.495507]  kasan_save_track+0x20/0x40
[   20.495547]  kasan_save_alloc_info+0x40/0x58
[   20.495589]  __kasan_kmalloc+0xd4/0xd8
[   20.495649]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.496004]  kasan_atomics+0xb8/0x2e0
[   20.496042]  kunit_try_run_case+0x170/0x3f0
[   20.496099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.497166] 
[   20.497225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.497278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.497597] page_type: f5(slab)
[   20.497743] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.498332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.498394] page dumped because: kasan: bad access detected
[   20.498452] 
[   20.498475] Memory state around the buggy address:
[   20.498510]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.498554]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.498633] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.498719]                                      ^
[   20.498768]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.498990]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.499041] ==================================================================
[   20.624488] ==================================================================
[   20.624538] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   20.624586] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.624636] 
[   20.624667] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.624752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.624781] Hardware name: linux,dummy-virt (DT)
[   20.624812] Call trace:
[   20.624836]  show_stack+0x20/0x38 (C)
[   20.624884]  dump_stack_lvl+0x8c/0xd0
[   20.624964]  print_report+0x118/0x608
[   20.625026]  kasan_report+0xdc/0x128
[   20.625091]  kasan_check_range+0x100/0x1a8
[   20.625142]  __kasan_check_write+0x20/0x30
[   20.625240]  kasan_atomics_helper+0x126c/0x4858
[   20.625408]  kasan_atomics+0x198/0x2e0
[   20.625562]  kunit_try_run_case+0x170/0x3f0
[   20.625631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.625704]  kthread+0x328/0x630
[   20.625943]  ret_from_fork+0x10/0x20
[   20.626101] 
[   20.626224] Allocated by task 265:
[   20.626325]  kasan_save_stack+0x3c/0x68
[   20.626412]  kasan_save_track+0x20/0x40
[   20.626533]  kasan_save_alloc_info+0x40/0x58
[   20.626578]  __kasan_kmalloc+0xd4/0xd8
[   20.626640]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.626683]  kasan_atomics+0xb8/0x2e0
[   20.626721]  kunit_try_run_case+0x170/0x3f0
[   20.627043]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.627166]  kthread+0x328/0x630
[   20.627224]  ret_from_fork+0x10/0x20
[   20.627263] 
[   20.627293] The buggy address belongs to the object at fff00000c7832f80
[   20.627293]  which belongs to the cache kmalloc-64 of size 64
[   20.627353] The buggy address is located 0 bytes to the right of
[   20.627353]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.627435] 
[   20.627459] The buggy address belongs to the physical page:
[   20.627491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.627554] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.627607] page_type: f5(slab)
[   20.627650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.627702] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.627744] page dumped because: kasan: bad access detected
[   20.627794] 
[   20.627815] Memory state around the buggy address:
[   20.627848]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.627898]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.627941] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.627995]                                      ^
[   20.628042]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.628108]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.628149] ==================================================================
[   20.674501] ==================================================================
[   20.674550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   20.674599] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.674649] 
[   20.674681] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.674770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.674801] Hardware name: linux,dummy-virt (DT)
[   20.674832] Call trace:
[   20.674857]  show_stack+0x20/0x38 (C)
[   20.674905]  dump_stack_lvl+0x8c/0xd0
[   20.674954]  print_report+0x118/0x608
[   20.675001]  kasan_report+0xdc/0x128
[   20.675049]  __asan_report_load8_noabort+0x20/0x30
[   20.675102]  kasan_atomics_helper+0x3df4/0x4858
[   20.675150]  kasan_atomics+0x198/0x2e0
[   20.675223]  kunit_try_run_case+0x170/0x3f0
[   20.675294]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.675350]  kthread+0x328/0x630
[   20.675414]  ret_from_fork+0x10/0x20
[   20.675465] 
[   20.675495] Allocated by task 265:
[   20.675526]  kasan_save_stack+0x3c/0x68
[   20.675569]  kasan_save_track+0x20/0x40
[   20.675609]  kasan_save_alloc_info+0x40/0x58
[   20.675650]  __kasan_kmalloc+0xd4/0xd8
[   20.675687]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.675728]  kasan_atomics+0xb8/0x2e0
[   20.675764]  kunit_try_run_case+0x170/0x3f0
[   20.675812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.675858]  kthread+0x328/0x630
[   20.675894]  ret_from_fork+0x10/0x20
[   20.675933] 
[   20.675962] The buggy address belongs to the object at fff00000c7832f80
[   20.675962]  which belongs to the cache kmalloc-64 of size 64
[   20.676021] The buggy address is located 0 bytes to the right of
[   20.676021]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.676096] 
[   20.676119] The buggy address belongs to the physical page:
[   20.676150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.676212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.676260] page_type: f5(slab)
[   20.676297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.676349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.676404] page dumped because: kasan: bad access detected
[   20.676438] 
[   20.676458] Memory state around the buggy address:
[   20.676490]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.676534]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.676579] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.676618]                                      ^
[   20.676656]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.676700]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.676742] ==================================================================
[   20.686646] ==================================================================
[   20.686696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   20.686912] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.686970] 
[   20.687002] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.687088] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.687117] Hardware name: linux,dummy-virt (DT)
[   20.687148] Call trace:
[   20.687186]  show_stack+0x20/0x38 (C)
[   20.687426]  dump_stack_lvl+0x8c/0xd0
[   20.687505]  print_report+0x118/0x608
[   20.687602]  kasan_report+0xdc/0x128
[   20.687684]  kasan_check_range+0x100/0x1a8
[   20.687751]  __kasan_check_write+0x20/0x30
[   20.687828]  kasan_atomics_helper+0x175c/0x4858
[   20.687879]  kasan_atomics+0x198/0x2e0
[   20.688051]  kunit_try_run_case+0x170/0x3f0
[   20.688101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.688199]  kthread+0x328/0x630
[   20.688276]  ret_from_fork+0x10/0x20
[   20.688342] 
[   20.688372] Allocated by task 265:
[   20.688430]  kasan_save_stack+0x3c/0x68
[   20.688548]  kasan_save_track+0x20/0x40
[   20.688606]  kasan_save_alloc_info+0x40/0x58
[   20.688675]  __kasan_kmalloc+0xd4/0xd8
[   20.688714]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.688837]  kasan_atomics+0xb8/0x2e0
[   20.688964]  kunit_try_run_case+0x170/0x3f0
[   20.689005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.689209]  kthread+0x328/0x630
[   20.689252]  ret_from_fork+0x10/0x20
[   20.689290] 
[   20.689312] The buggy address belongs to the object at fff00000c7832f80
[   20.689312]  which belongs to the cache kmalloc-64 of size 64
[   20.689372] The buggy address is located 0 bytes to the right of
[   20.689372]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.689470] 
[   20.689541] The buggy address belongs to the physical page:
[   20.689693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.689762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.689862] page_type: f5(slab)
[   20.689914] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.690176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.690219] page dumped because: kasan: bad access detected
[   20.690254] 
[   20.690274] Memory state around the buggy address:
[   20.690308]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.690378]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.690468] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.690540]                                      ^
[   20.690592]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.690671]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.690720] ==================================================================
[   20.457649] ==================================================================
[   20.458124] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   20.458327] Read of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.458401] 
[   20.458445] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.458781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.458934] Hardware name: linux,dummy-virt (DT)
[   20.459117] Call trace:
[   20.464568]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.469507]  __kasan_kmalloc+0xd4/0xd8
[   20.469545]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.469586]  kasan_atomics+0xb8/0x2e0
[   20.469624]  kunit_try_run_case+0x170/0x3f0
[   20.469663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.469709]  kthread+0x328/0x630
[   20.469747]  ret_from_fork+0x10/0x20
[   20.469785] 
[   20.469835] The buggy address belongs to the object at fff00000c7832f80
[   20.469835]  which belongs to the cache kmalloc-64 of size 64
[   20.469899] The buggy address is located 0 bytes to the right of
[   20.469899]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.469964] 
[   20.469986] The buggy address belongs to the physical page:
[   20.470019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.470072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.470216] page_type: f5(slab)
[   20.470282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.470405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.470493] page dumped because: kasan: bad access detected
[   20.470959] 
[   20.471009] Memory state around the buggy address:
[   20.471063]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.471142]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.471195] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.471263]                                      ^
[   20.471299]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.471344]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.471385] ==================================================================
[   20.647040] ==================================================================
[   20.647086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   20.647132] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.647199] 
[   20.647229] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.647317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.647344] Hardware name: linux,dummy-virt (DT)
[   20.647377] Call trace:
[   20.647401]  show_stack+0x20/0x38 (C)
[   20.647451]  dump_stack_lvl+0x8c/0xd0
[   20.647497]  print_report+0x118/0x608
[   20.647545]  kasan_report+0xdc/0x128
[   20.647592]  kasan_check_range+0x100/0x1a8
[   20.647640]  __kasan_check_write+0x20/0x30
[   20.647690]  kasan_atomics_helper+0x147c/0x4858
[   20.647752]  kasan_atomics+0x198/0x2e0
[   20.647809]  kunit_try_run_case+0x170/0x3f0
[   20.647858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.647913]  kthread+0x328/0x630
[   20.647958]  ret_from_fork+0x10/0x20
[   20.648015] 
[   20.648038] Allocated by task 265:
[   20.648076]  kasan_save_stack+0x3c/0x68
[   20.648117]  kasan_save_track+0x20/0x40
[   20.648166]  kasan_save_alloc_info+0x40/0x58
[   20.648209]  __kasan_kmalloc+0xd4/0xd8
[   20.648248]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.648290]  kasan_atomics+0xb8/0x2e0
[   20.648328]  kunit_try_run_case+0x170/0x3f0
[   20.648367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.648413]  kthread+0x328/0x630
[   20.648451]  ret_from_fork+0x10/0x20
[   20.648490] 
[   20.648511] The buggy address belongs to the object at fff00000c7832f80
[   20.648511]  which belongs to the cache kmalloc-64 of size 64
[   20.648569] The buggy address is located 0 bytes to the right of
[   20.648569]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.648634] 
[   20.648655] The buggy address belongs to the physical page:
[   20.648698] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.648758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.648806] page_type: f5(slab)
[   20.648844] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.648893] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.648936] page dumped because: kasan: bad access detected
[   20.648970] 
[   20.648991] Memory state around the buggy address:
[   20.649023]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.649068]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.649120] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.649176]                                      ^
[   20.649209]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.649253]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.649292] ==================================================================
[   20.631711] ==================================================================
[   20.631759] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   20.631860] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.631959] 
[   20.632024] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.632169] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.632235] Hardware name: linux,dummy-virt (DT)
[   20.632285] Call trace:
[   20.632311]  show_stack+0x20/0x38 (C)
[   20.632545]  dump_stack_lvl+0x8c/0xd0
[   20.632623]  print_report+0x118/0x608
[   20.632689]  kasan_report+0xdc/0x128
[   20.632765]  kasan_check_range+0x100/0x1a8
[   20.632832]  __kasan_check_write+0x20/0x30
[   20.632882]  kasan_atomics_helper+0x1384/0x4858
[   20.632970]  kasan_atomics+0x198/0x2e0
[   20.633090]  kunit_try_run_case+0x170/0x3f0
[   20.633140]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.633221]  kthread+0x328/0x630
[   20.633479]  ret_from_fork+0x10/0x20
[   20.633529] 
[   20.633571] Allocated by task 265:
[   20.633629]  kasan_save_stack+0x3c/0x68
[   20.633688]  kasan_save_track+0x20/0x40
[   20.633768]  kasan_save_alloc_info+0x40/0x58
[   20.633846]  __kasan_kmalloc+0xd4/0xd8
[   20.633916]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.634085]  kasan_atomics+0xb8/0x2e0
[   20.634294]  kunit_try_run_case+0x170/0x3f0
[   20.634441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.634532]  kthread+0x328/0x630
[   20.634590]  ret_from_fork+0x10/0x20
[   20.634638] 
[   20.634661] The buggy address belongs to the object at fff00000c7832f80
[   20.634661]  which belongs to the cache kmalloc-64 of size 64
[   20.634719] The buggy address is located 0 bytes to the right of
[   20.634719]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.634790] 
[   20.634812] The buggy address belongs to the physical page:
[   20.634846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.634897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.635223] page_type: f5(slab)
[   20.635299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.635437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.635552] page dumped because: kasan: bad access detected
[   20.635600] 
[   20.635641] Memory state around the buggy address:
[   20.635737]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.635782]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.635825] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.635998]                                      ^
[   20.636038]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.636171]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.636273] ==================================================================
[   20.484676] ==================================================================
[   20.484842] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   20.484906] Write of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.485067] 
[   20.485193] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.485722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.485841] Hardware name: linux,dummy-virt (DT)
[   20.485875] Call trace:
[   20.485900]  show_stack+0x20/0x38 (C)
[   20.485955]  dump_stack_lvl+0x8c/0xd0
[   20.486007]  print_report+0x118/0x608
[   20.486056]  kasan_report+0xdc/0x128
[   20.486103]  kasan_check_range+0x100/0x1a8
[   20.486151]  __kasan_check_write+0x20/0x30
[   20.486225]  kasan_atomics_helper+0xa6c/0x4858
[   20.486275]  kasan_atomics+0x198/0x2e0
[   20.486505]  kunit_try_run_case+0x170/0x3f0
[   20.486789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.487436]  kthread+0x328/0x630
[   20.487770]  ret_from_fork+0x10/0x20
[   20.487822] 
[   20.487844] Allocated by task 265:
[   20.487878]  kasan_save_stack+0x3c/0x68
[   20.488338]  kasan_save_track+0x20/0x40
[   20.488418]  kasan_save_alloc_info+0x40/0x58
[   20.488524]  __kasan_kmalloc+0xd4/0xd8
[   20.488596]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.488666]  kasan_atomics+0xb8/0x2e0
[   20.488846]  kunit_try_run_case+0x170/0x3f0
[   20.488887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.488932]  kthread+0x328/0x630
[   20.488969]  ret_from_fork+0x10/0x20
[   20.489008] 
[   20.489031] The buggy address belongs to the object at fff00000c7832f80
[   20.489031]  which belongs to the cache kmalloc-64 of size 64
[   20.489102] The buggy address is located 0 bytes to the right of
[   20.489102]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.489178] 
[   20.489200] The buggy address belongs to the physical page:
[   20.489233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.489309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.489360] page_type: f5(slab)
[   20.489397] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.489450] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.490440] page dumped because: kasan: bad access detected
[   20.490541] 
[   20.490581] Memory state around the buggy address:
[   20.490635]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.490825]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.490992] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.491044]                                      ^
[   20.491083]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.491253]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.491295] ==================================================================
[   20.636696] ==================================================================
[   20.636742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   20.636790] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.636884] 
[   20.637013] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.637109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.637310] Hardware name: linux,dummy-virt (DT)
[   20.637354] Call trace:
[   20.637394]  show_stack+0x20/0x38 (C)
[   20.637467]  dump_stack_lvl+0x8c/0xd0
[   20.637560]  print_report+0x118/0x608
[   20.637627]  kasan_report+0xdc/0x128
[   20.637719]  __asan_report_load8_noabort+0x20/0x30
[   20.637780]  kasan_atomics_helper+0x3f04/0x4858
[   20.637831]  kasan_atomics+0x198/0x2e0
[   20.637878]  kunit_try_run_case+0x170/0x3f0
[   20.637928]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.638004]  kthread+0x328/0x630
[   20.638053]  ret_from_fork+0x10/0x20
[   20.638103] 
[   20.638142] Allocated by task 265:
[   20.638304]  kasan_save_stack+0x3c/0x68
[   20.638410]  kasan_save_track+0x20/0x40
[   20.638744]  kasan_save_alloc_info+0x40/0x58
[   20.638817]  __kasan_kmalloc+0xd4/0xd8
[   20.638879]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.638920]  kasan_atomics+0xb8/0x2e0
[   20.638958]  kunit_try_run_case+0x170/0x3f0
[   20.638997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.639042]  kthread+0x328/0x630
[   20.639252]  ret_from_fork+0x10/0x20
[   20.639342] 
[   20.639489] The buggy address belongs to the object at fff00000c7832f80
[   20.639489]  which belongs to the cache kmalloc-64 of size 64
[   20.639619] The buggy address is located 0 bytes to the right of
[   20.639619]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.639965] 
[   20.640076] The buggy address belongs to the physical page:
[   20.640167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.640222] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.640269] page_type: f5(slab)
[   20.640317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.640369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.640411] page dumped because: kasan: bad access detected
[   20.640444] 
[   20.640472] Memory state around the buggy address:
[   20.640506]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.640558]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.640602] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.640651]                                      ^
[   20.640701]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.640756]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.640806] ==================================================================
[   20.534855] ==================================================================
[   20.534918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   20.535058] Read of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.535168] 
[   20.535201] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.535288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.535318] Hardware name: linux,dummy-virt (DT)
[   20.535350] Call trace:
[   20.535375]  show_stack+0x20/0x38 (C)
[   20.535427]  dump_stack_lvl+0x8c/0xd0
[   20.535480]  print_report+0x118/0x608
[   20.535609]  kasan_report+0xdc/0x128
[   20.535688]  __asan_report_load4_noabort+0x20/0x30
[   20.535948]  kasan_atomics_helper+0x3dd8/0x4858
[   20.536472]  kasan_atomics+0x198/0x2e0
[   20.536670]  kunit_try_run_case+0x170/0x3f0
[   20.536720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.537353]  kthread+0x328/0x630
[   20.537572]  ret_from_fork+0x10/0x20
[   20.537637] 
[   20.537781] Allocated by task 265:
[   20.537816]  kasan_save_stack+0x3c/0x68
[   20.537858]  kasan_save_track+0x20/0x40
[   20.537898]  kasan_save_alloc_info+0x40/0x58
[   20.537941]  __kasan_kmalloc+0xd4/0xd8
[   20.537980]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.538020]  kasan_atomics+0xb8/0x2e0
[   20.538258]  kunit_try_run_case+0x170/0x3f0
[   20.538300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.538343]  kthread+0x328/0x630
[   20.539312]  ret_from_fork+0x10/0x20
[   20.539372] 
[   20.539395] The buggy address belongs to the object at fff00000c7832f80
[   20.539395]  which belongs to the cache kmalloc-64 of size 64
[   20.539953] The buggy address is located 0 bytes to the right of
[   20.539953]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.540043] 
[   20.540065] The buggy address belongs to the physical page:
[   20.540099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.540151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.540414] page_type: f5(slab)
[   20.540456] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.540766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.540820] page dumped because: kasan: bad access detected
[   20.540866] 
[   20.540888] Memory state around the buggy address:
[   20.540920]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.541082]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.541181] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.541222]                                      ^
[   20.541336]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.541452]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.541493] ==================================================================
[   20.661322] ==================================================================
[   20.661369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   20.661427] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.661478] 
[   20.661508] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.661594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.661621] Hardware name: linux,dummy-virt (DT)
[   20.661653] Call trace:
[   20.661677]  show_stack+0x20/0x38 (C)
[   20.661727]  dump_stack_lvl+0x8c/0xd0
[   20.661812]  print_report+0x118/0x608
[   20.661861]  kasan_report+0xdc/0x128
[   20.661908]  kasan_check_range+0x100/0x1a8
[   20.661956]  __kasan_check_write+0x20/0x30
[   20.662007]  kasan_atomics_helper+0x15b4/0x4858
[   20.662057]  kasan_atomics+0x198/0x2e0
[   20.662103]  kunit_try_run_case+0x170/0x3f0
[   20.662200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.662430]  kthread+0x328/0x630
[   20.662585]  ret_from_fork+0x10/0x20
[   20.662776] 
[   20.662865] Allocated by task 265:
[   20.662897]  kasan_save_stack+0x3c/0x68
[   20.662938]  kasan_save_track+0x20/0x40
[   20.662978]  kasan_save_alloc_info+0x40/0x58
[   20.663020]  __kasan_kmalloc+0xd4/0xd8
[   20.663059]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.663116]  kasan_atomics+0xb8/0x2e0
[   20.663164]  kunit_try_run_case+0x170/0x3f0
[   20.663203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.663373]  kthread+0x328/0x630
[   20.663532]  ret_from_fork+0x10/0x20
[   20.663689] 
[   20.663809] The buggy address belongs to the object at fff00000c7832f80
[   20.663809]  which belongs to the cache kmalloc-64 of size 64
[   20.663886] The buggy address is located 0 bytes to the right of
[   20.663886]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.664179] 
[   20.664292] The buggy address belongs to the physical page:
[   20.664413] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.664524] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.664571] page_type: f5(slab)
[   20.664611] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.664952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.665082] page dumped because: kasan: bad access detected
[   20.665396] 
[   20.665418] Memory state around the buggy address:
[   20.665452]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.665498]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.665542] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.665581]                                      ^
[   20.665614]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.665659]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.665699] ==================================================================
[   20.681340] ==================================================================
[   20.681406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   20.681494] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.681546] 
[   20.681599] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.681722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.681751] Hardware name: linux,dummy-virt (DT)
[   20.681831] Call trace:
[   20.681966]  show_stack+0x20/0x38 (C)
[   20.682085]  dump_stack_lvl+0x8c/0xd0
[   20.682259]  print_report+0x118/0x608
[   20.682326]  kasan_report+0xdc/0x128
[   20.682372]  __asan_report_load8_noabort+0x20/0x30
[   20.682587]  kasan_atomics_helper+0x3e10/0x4858
[   20.682638]  kasan_atomics+0x198/0x2e0
[   20.682684]  kunit_try_run_case+0x170/0x3f0
[   20.682739]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.682794]  kthread+0x328/0x630
[   20.682841]  ret_from_fork+0x10/0x20
[   20.682983] 
[   20.683146] Allocated by task 265:
[   20.683237]  kasan_save_stack+0x3c/0x68
[   20.683301]  kasan_save_track+0x20/0x40
[   20.683372]  kasan_save_alloc_info+0x40/0x58
[   20.683763]  __kasan_kmalloc+0xd4/0xd8
[   20.683827]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.683969]  kasan_atomics+0xb8/0x2e0
[   20.684087]  kunit_try_run_case+0x170/0x3f0
[   20.684217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.684271]  kthread+0x328/0x630
[   20.684310]  ret_from_fork+0x10/0x20
[   20.684391] 
[   20.684556] The buggy address belongs to the object at fff00000c7832f80
[   20.684556]  which belongs to the cache kmalloc-64 of size 64
[   20.684617] The buggy address is located 0 bytes to the right of
[   20.684617]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.684722] 
[   20.684857] The buggy address belongs to the physical page:
[   20.684917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.685145] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.685208] page_type: f5(slab)
[   20.685246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.685342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.685466] page dumped because: kasan: bad access detected
[   20.685539] 
[   20.685668] Memory state around the buggy address:
[   20.685751]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.685796]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.685840] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.685879]                                      ^
[   20.685914]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.685958]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.686149] ==================================================================
[   20.695344] ==================================================================
[   20.695450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   20.695533] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.695585] 
[   20.695645] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.695840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.695870] Hardware name: linux,dummy-virt (DT)
[   20.695903] Call trace:
[   20.695926]  show_stack+0x20/0x38 (C)
[   20.695977]  dump_stack_lvl+0x8c/0xd0
[   20.696032]  print_report+0x118/0x608
[   20.696110]  kasan_report+0xdc/0x128
[   20.696169]  kasan_check_range+0x100/0x1a8
[   20.696219]  __kasan_check_write+0x20/0x30
[   20.696287]  kasan_atomics_helper+0x17ec/0x4858
[   20.696355]  kasan_atomics+0x198/0x2e0
[   20.696447]  kunit_try_run_case+0x170/0x3f0
[   20.696544]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.696653]  kthread+0x328/0x630
[   20.696739]  ret_from_fork+0x10/0x20
[   20.696799] 
[   20.696841] Allocated by task 265:
[   20.696937]  kasan_save_stack+0x3c/0x68
[   20.697005]  kasan_save_track+0x20/0x40
[   20.697047]  kasan_save_alloc_info+0x40/0x58
[   20.697089]  __kasan_kmalloc+0xd4/0xd8
[   20.697128]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.697327]  kasan_atomics+0xb8/0x2e0
[   20.697368]  kunit_try_run_case+0x170/0x3f0
[   20.697505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.697582]  kthread+0x328/0x630
[   20.697649]  ret_from_fork+0x10/0x20
[   20.697704] 
[   20.697727] The buggy address belongs to the object at fff00000c7832f80
[   20.697727]  which belongs to the cache kmalloc-64 of size 64
[   20.697990] The buggy address is located 0 bytes to the right of
[   20.697990]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.698186] 
[   20.698222] The buggy address belongs to the physical page:
[   20.698269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.698322] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.698370] page_type: f5(slab)
[   20.698635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.698692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.698739] page dumped because: kasan: bad access detected
[   20.698772] 
[   20.698792] Memory state around the buggy address:
[   20.698826]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.698914]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.699023] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.699177]                                      ^
[   20.699269]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.699354]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.699446] ==================================================================
[   20.552618] ==================================================================
[   20.552979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   20.553259] Read of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.553342] 
[   20.553374] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.553467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.553613] Hardware name: linux,dummy-virt (DT)
[   20.553781] Call trace:
[   20.553807]  show_stack+0x20/0x38 (C)
[   20.553860]  dump_stack_lvl+0x8c/0xd0
[   20.554086]  print_report+0x118/0x608
[   20.554144]  kasan_report+0xdc/0x128
[   20.554203]  kasan_check_range+0x100/0x1a8
[   20.554255]  __kasan_check_read+0x20/0x30
[   20.554308]  kasan_atomics_helper+0xdd4/0x4858
[   20.554521]  kasan_atomics+0x198/0x2e0
[   20.554735]  kunit_try_run_case+0x170/0x3f0
[   20.554850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.554965]  kthread+0x328/0x630
[   20.555140]  ret_from_fork+0x10/0x20
[   20.555217] 
[   20.555238] Allocated by task 265:
[   20.555269]  kasan_save_stack+0x3c/0x68
[   20.555364]  kasan_save_track+0x20/0x40
[   20.555553]  kasan_save_alloc_info+0x40/0x58
[   20.555734]  __kasan_kmalloc+0xd4/0xd8
[   20.555774]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.555815]  kasan_atomics+0xb8/0x2e0
[   20.555851]  kunit_try_run_case+0x170/0x3f0
[   20.555891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.555937]  kthread+0x328/0x630
[   20.555973]  ret_from_fork+0x10/0x20
[   20.556010] 
[   20.556031] The buggy address belongs to the object at fff00000c7832f80
[   20.556031]  which belongs to the cache kmalloc-64 of size 64
[   20.556115] The buggy address is located 0 bytes to the right of
[   20.556115]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.556223] 
[   20.556244] The buggy address belongs to the physical page:
[   20.556277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.556328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.556375] page_type: f5(slab)
[   20.556414] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.556610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.556658] page dumped because: kasan: bad access detected
[   20.556692] 
[   20.557144] Memory state around the buggy address:
[   20.557567]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.557779]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.557838] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.557880]                                      ^
[   20.557915]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.557959]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.557999] ==================================================================
[   20.472097] ==================================================================
[   20.472278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   20.472331] Write of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.472441] 
[   20.472556] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.472646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.472675] Hardware name: linux,dummy-virt (DT)
[   20.472734] Call trace:
[   20.472789]  show_stack+0x20/0x38 (C)
[   20.472857]  dump_stack_lvl+0x8c/0xd0
[   20.472916]  print_report+0x118/0x608
[   20.472974]  kasan_report+0xdc/0x128
[   20.473023]  kasan_check_range+0x100/0x1a8
[   20.473072]  __kasan_check_write+0x20/0x30
[   20.473122]  kasan_atomics_helper+0x99c/0x4858
[   20.473181]  kasan_atomics+0x198/0x2e0
[   20.473227]  kunit_try_run_case+0x170/0x3f0
[   20.473274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.473336]  kthread+0x328/0x630
[   20.473382]  ret_from_fork+0x10/0x20
[   20.473431] 
[   20.473451] Allocated by task 265:
[   20.473481]  kasan_save_stack+0x3c/0x68
[   20.473521]  kasan_save_track+0x20/0x40
[   20.473561]  kasan_save_alloc_info+0x40/0x58
[   20.473601]  __kasan_kmalloc+0xd4/0xd8
[   20.473640]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.474005]  kasan_atomics+0xb8/0x2e0
[   20.474354]  kunit_try_run_case+0x170/0x3f0
[   20.474441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.474522]  kthread+0x328/0x630
[   20.474637]  ret_from_fork+0x10/0x20
[   20.474719] 
[   20.474841] The buggy address belongs to the object at fff00000c7832f80
[   20.474841]  which belongs to the cache kmalloc-64 of size 64
[   20.474945] The buggy address is located 0 bytes to the right of
[   20.474945]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.475018] 
[   20.475251] The buggy address belongs to the physical page:
[   20.475343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.475532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.475759] page_type: f5(slab)
[   20.475836] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.475917] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.476033] page dumped because: kasan: bad access detected
[   20.476129] 
[   20.476178] Memory state around the buggy address:
[   20.476214]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.476427]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.476578] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.476721]                                      ^
[   20.476779]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.476847]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.477028] ==================================================================
[   20.589590] ==================================================================
[   20.589757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   20.589948] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.590026] 
[   20.590169] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.590322] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.590369] Hardware name: linux,dummy-virt (DT)
[   20.590401] Call trace:
[   20.590557]  show_stack+0x20/0x38 (C)
[   20.590784]  dump_stack_lvl+0x8c/0xd0
[   20.590891]  print_report+0x118/0x608
[   20.591025]  kasan_report+0xdc/0x128
[   20.591102]  kasan_check_range+0x100/0x1a8
[   20.591206]  __kasan_check_write+0x20/0x30
[   20.591284]  kasan_atomics_helper+0xf88/0x4858
[   20.591335]  kasan_atomics+0x198/0x2e0
[   20.591420]  kunit_try_run_case+0x170/0x3f0
[   20.591470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.591715]  kthread+0x328/0x630
[   20.591826]  ret_from_fork+0x10/0x20
[   20.591963] 
[   20.592087] Allocated by task 265:
[   20.592118]  kasan_save_stack+0x3c/0x68
[   20.592169]  kasan_save_track+0x20/0x40
[   20.592209]  kasan_save_alloc_info+0x40/0x58
[   20.592251]  __kasan_kmalloc+0xd4/0xd8
[   20.592290]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.592332]  kasan_atomics+0xb8/0x2e0
[   20.592370]  kunit_try_run_case+0x170/0x3f0
[   20.592410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.592454]  kthread+0x328/0x630
[   20.592492]  ret_from_fork+0x10/0x20
[   20.592880] 
[   20.592904] The buggy address belongs to the object at fff00000c7832f80
[   20.592904]  which belongs to the cache kmalloc-64 of size 64
[   20.592965] The buggy address is located 0 bytes to the right of
[   20.592965]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.593497] 
[   20.593523] The buggy address belongs to the physical page:
[   20.593555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.593609] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.593658] page_type: f5(slab)
[   20.593697] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.594301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.594517] page dumped because: kasan: bad access detected
[   20.594580] 
[   20.594601] Memory state around the buggy address:
[   20.594681]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.594881]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.594996] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.595039]                                      ^
[   20.595072]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.595139]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.595189] ==================================================================
[   20.578236] ==================================================================
[   20.578287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   20.578344] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.578587] 
[   20.578710] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.578804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.578834] Hardware name: linux,dummy-virt (DT)
[   20.578901] Call trace:
[   20.579014]  show_stack+0x20/0x38 (C)
[   20.579146]  dump_stack_lvl+0x8c/0xd0
[   20.579204]  print_report+0x118/0x608
[   20.579258]  kasan_report+0xdc/0x128
[   20.579408]  kasan_check_range+0x100/0x1a8
[   20.579509]  __kasan_check_write+0x20/0x30
[   20.579695]  kasan_atomics_helper+0xeb8/0x4858
[   20.579751]  kasan_atomics+0x198/0x2e0
[   20.579956]  kunit_try_run_case+0x170/0x3f0
[   20.580013]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.580075]  kthread+0x328/0x630
[   20.580126]  ret_from_fork+0x10/0x20
[   20.580497] 
[   20.580524] Allocated by task 265:
[   20.580645]  kasan_save_stack+0x3c/0x68
[   20.581199]  kasan_save_track+0x20/0x40
[   20.581256]  kasan_save_alloc_info+0x40/0x58
[   20.581301]  __kasan_kmalloc+0xd4/0xd8
[   20.581340]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.581381]  kasan_atomics+0xb8/0x2e0
[   20.581419]  kunit_try_run_case+0x170/0x3f0
[   20.581459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.581504]  kthread+0x328/0x630
[   20.581543]  ret_from_fork+0x10/0x20
[   20.581581] 
[   20.581604] The buggy address belongs to the object at fff00000c7832f80
[   20.581604]  which belongs to the cache kmalloc-64 of size 64
[   20.581663] The buggy address is located 0 bytes to the right of
[   20.581663]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.581727] 
[   20.581757] The buggy address belongs to the physical page:
[   20.581789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.581840] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.581889] page_type: f5(slab)
[   20.581927] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.581979] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.582022] page dumped because: kasan: bad access detected
[   20.582057] 
[   20.582077] Memory state around the buggy address:
[   20.582110]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.582164]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.582288] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.582400]                                      ^
[   20.582478]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.582530]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.582571] ==================================================================
[   20.656371] ==================================================================
[   20.656433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   20.656558] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.656635] 
[   20.656700] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.656792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.656838] Hardware name: linux,dummy-virt (DT)
[   20.656872] Call trace:
[   20.656895]  show_stack+0x20/0x38 (C)
[   20.656945]  dump_stack_lvl+0x8c/0xd0
[   20.656991]  print_report+0x118/0x608
[   20.657172]  kasan_report+0xdc/0x128
[   20.657374]  kasan_check_range+0x100/0x1a8
[   20.657451]  __kasan_check_write+0x20/0x30
[   20.657508]  kasan_atomics_helper+0x154c/0x4858
[   20.657558]  kasan_atomics+0x198/0x2e0
[   20.657665]  kunit_try_run_case+0x170/0x3f0
[   20.657716]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.657776]  kthread+0x328/0x630
[   20.657822]  ret_from_fork+0x10/0x20
[   20.657871] 
[   20.657893] Allocated by task 265:
[   20.657923]  kasan_save_stack+0x3c/0x68
[   20.657982]  kasan_save_track+0x20/0x40
[   20.658024]  kasan_save_alloc_info+0x40/0x58
[   20.658067]  __kasan_kmalloc+0xd4/0xd8
[   20.658106]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.658147]  kasan_atomics+0xb8/0x2e0
[   20.658197]  kunit_try_run_case+0x170/0x3f0
[   20.658236]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.658281]  kthread+0x328/0x630
[   20.658320]  ret_from_fork+0x10/0x20
[   20.658358] 
[   20.658408] The buggy address belongs to the object at fff00000c7832f80
[   20.658408]  which belongs to the cache kmalloc-64 of size 64
[   20.658524] The buggy address is located 0 bytes to the right of
[   20.658524]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.658715] 
[   20.658897] The buggy address belongs to the physical page:
[   20.659074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.659212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.659356] page_type: f5(slab)
[   20.659477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.659527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.659593] page dumped because: kasan: bad access detected
[   20.659627] 
[   20.659648] Memory state around the buggy address:
[   20.659681]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.659993]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.660111] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.660275]                                      ^
[   20.660350]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.660544]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.660805] ==================================================================
[   20.564963] ==================================================================
[   20.565067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   20.565118] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.565235] 
[   20.565273] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.565540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.565688] Hardware name: linux,dummy-virt (DT)
[   20.565824] Call trace:
[   20.566087]  show_stack+0x20/0x38 (C)
[   20.566368]  dump_stack_lvl+0x8c/0xd0
[   20.566524]  print_report+0x118/0x608
[   20.566829]  kasan_report+0xdc/0x128
[   20.566883]  kasan_check_range+0x100/0x1a8
[   20.566990]  __kasan_check_write+0x20/0x30
[   20.567113]  kasan_atomics_helper+0xe44/0x4858
[   20.567236]  kasan_atomics+0x198/0x2e0
[   20.567454]  kunit_try_run_case+0x170/0x3f0
[   20.567504]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.567643]  kthread+0x328/0x630
[   20.567711]  ret_from_fork+0x10/0x20
[   20.567761] 
[   20.567866] Allocated by task 265:
[   20.567900]  kasan_save_stack+0x3c/0x68
[   20.567980]  kasan_save_track+0x20/0x40
[   20.568114]  kasan_save_alloc_info+0x40/0x58
[   20.568171]  __kasan_kmalloc+0xd4/0xd8
[   20.568212]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.568253]  kasan_atomics+0xb8/0x2e0
[   20.568291]  kunit_try_run_case+0x170/0x3f0
[   20.568331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.568375]  kthread+0x328/0x630
[   20.568414]  ret_from_fork+0x10/0x20
[   20.568452] 
[   20.568850] The buggy address belongs to the object at fff00000c7832f80
[   20.568850]  which belongs to the cache kmalloc-64 of size 64
[   20.569004] The buggy address is located 0 bytes to the right of
[   20.569004]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.569142] 
[   20.569200] The buggy address belongs to the physical page:
[   20.569302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.569393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.569580] page_type: f5(slab)
[   20.569621] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.569679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.569807] page dumped because: kasan: bad access detected
[   20.569842] 
[   20.569862] Memory state around the buggy address:
[   20.569897]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.569957]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.570000] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.570040]                                      ^
[   20.570074]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.570253]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.570305] ==================================================================
[   20.669245] ==================================================================
[   20.669288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   20.669333] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.669383] 
[   20.669413] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.669498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.669527] Hardware name: linux,dummy-virt (DT)
[   20.669558] Call trace:
[   20.669582]  show_stack+0x20/0x38 (C)
[   20.669630]  dump_stack_lvl+0x8c/0xd0
[   20.669695]  print_report+0x118/0x608
[   20.669744]  kasan_report+0xdc/0x128
[   20.669791]  kasan_check_range+0x100/0x1a8
[   20.669841]  __kasan_check_write+0x20/0x30
[   20.669898]  kasan_atomics_helper+0x1644/0x4858
[   20.669947]  kasan_atomics+0x198/0x2e0
[   20.669994]  kunit_try_run_case+0x170/0x3f0
[   20.670042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.670143]  kthread+0x328/0x630
[   20.670220]  ret_from_fork+0x10/0x20
[   20.670270] 
[   20.670292] Allocated by task 265:
[   20.670321]  kasan_save_stack+0x3c/0x68
[   20.670362]  kasan_save_track+0x20/0x40
[   20.670401]  kasan_save_alloc_info+0x40/0x58
[   20.670443]  __kasan_kmalloc+0xd4/0xd8
[   20.670481]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.670643]  kasan_atomics+0xb8/0x2e0
[   20.670682]  kunit_try_run_case+0x170/0x3f0
[   20.670721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.670773]  kthread+0x328/0x630
[   20.670871]  ret_from_fork+0x10/0x20
[   20.671044] 
[   20.671164] The buggy address belongs to the object at fff00000c7832f80
[   20.671164]  which belongs to the cache kmalloc-64 of size 64
[   20.671437] The buggy address is located 0 bytes to the right of
[   20.671437]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.671648] 
[   20.671785] The buggy address belongs to the physical page:
[   20.671882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.672016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.672064] page_type: f5(slab)
[   20.672102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.672320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.672480] page dumped because: kasan: bad access detected
[   20.672660] 
[   20.672794] Memory state around the buggy address:
[   20.672922]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.673161]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.673287] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.673407]                                      ^
[   20.673509]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.673561]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.673717] ==================================================================
[   20.628362] ==================================================================
[   20.628409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   20.628455] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.628505] 
[   20.628535] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.628618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.628647] Hardware name: linux,dummy-virt (DT)
[   20.628678] Call trace:
[   20.628702]  show_stack+0x20/0x38 (C)
[   20.628748]  dump_stack_lvl+0x8c/0xd0
[   20.628796]  print_report+0x118/0x608
[   20.628842]  kasan_report+0xdc/0x128
[   20.628889]  kasan_check_range+0x100/0x1a8
[   20.628971]  __kasan_check_write+0x20/0x30
[   20.629035]  kasan_atomics_helper+0x12d8/0x4858
[   20.629092]  kasan_atomics+0x198/0x2e0
[   20.629192]  kunit_try_run_case+0x170/0x3f0
[   20.629289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.629346]  kthread+0x328/0x630
[   20.629398]  ret_from_fork+0x10/0x20
[   20.629494] 
[   20.629538] Allocated by task 265:
[   20.629586]  kasan_save_stack+0x3c/0x68
[   20.629643]  kasan_save_track+0x20/0x40
[   20.629682]  kasan_save_alloc_info+0x40/0x58
[   20.629723]  __kasan_kmalloc+0xd4/0xd8
[   20.629786]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.629837]  kasan_atomics+0xb8/0x2e0
[   20.629876]  kunit_try_run_case+0x170/0x3f0
[   20.629926]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.629971]  kthread+0x328/0x630
[   20.630010]  ret_from_fork+0x10/0x20
[   20.630072] 
[   20.630184] The buggy address belongs to the object at fff00000c7832f80
[   20.630184]  which belongs to the cache kmalloc-64 of size 64
[   20.630326] The buggy address is located 0 bytes to the right of
[   20.630326]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.630412] 
[   20.630472] The buggy address belongs to the physical page:
[   20.630542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.630596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.630642] page_type: f5(slab)
[   20.630688] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.630743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.630806] page dumped because: kasan: bad access detected
[   20.630917] 
[   20.631006] Memory state around the buggy address:
[   20.631091]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.631207]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.631282] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.631322]                                      ^
[   20.631357]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.631402]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.631451] ==================================================================
[   20.570834] ==================================================================
[   20.571010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   20.571064] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.571116] 
[   20.571146] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.571407] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.571442] Hardware name: linux,dummy-virt (DT)
[   20.571476] Call trace:
[   20.571501]  show_stack+0x20/0x38 (C)
[   20.571563]  dump_stack_lvl+0x8c/0xd0
[   20.571612]  print_report+0x118/0x608
[   20.571661]  kasan_report+0xdc/0x128
[   20.571955]  __asan_report_store8_noabort+0x20/0x30
[   20.572066]  kasan_atomics_helper+0x3e5c/0x4858
[   20.572270]  kasan_atomics+0x198/0x2e0
[   20.572332]  kunit_try_run_case+0x170/0x3f0
[   20.572382]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.572436]  kthread+0x328/0x630
[   20.572484]  ret_from_fork+0x10/0x20
[   20.572830] 
[   20.573057] Allocated by task 265:
[   20.573433]  kasan_save_stack+0x3c/0x68
[   20.573543]  kasan_save_track+0x20/0x40
[   20.573874]  kasan_save_alloc_info+0x40/0x58
[   20.574007]  __kasan_kmalloc+0xd4/0xd8
[   20.574048]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.574257]  kasan_atomics+0xb8/0x2e0
[   20.574305]  kunit_try_run_case+0x170/0x3f0
[   20.574345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.574446]  kthread+0x328/0x630
[   20.574714]  ret_from_fork+0x10/0x20
[   20.574836] 
[   20.574861] The buggy address belongs to the object at fff00000c7832f80
[   20.574861]  which belongs to the cache kmalloc-64 of size 64
[   20.575199] The buggy address is located 0 bytes to the right of
[   20.575199]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.575302] 
[   20.575325] The buggy address belongs to the physical page:
[   20.575357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.575421] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.575470] page_type: f5(slab)
[   20.575509] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.576062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.576417] page dumped because: kasan: bad access detected
[   20.576690] 
[   20.576714] Memory state around the buggy address:
[   20.576749]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.576842]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.577268] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.577446]                                      ^
[   20.577598]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.577699]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.577767] ==================================================================
[   20.619435] ==================================================================
[   20.619519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   20.619623] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.619730] 
[   20.619762] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.619847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.619876] Hardware name: linux,dummy-virt (DT)
[   20.620145] Call trace:
[   20.620182]  show_stack+0x20/0x38 (C)
[   20.620261]  dump_stack_lvl+0x8c/0xd0
[   20.620327]  print_report+0x118/0x608
[   20.620390]  kasan_report+0xdc/0x128
[   20.620474]  kasan_check_range+0x100/0x1a8
[   20.620530]  __kasan_check_write+0x20/0x30
[   20.620616]  kasan_atomics_helper+0x11f8/0x4858
[   20.620668]  kasan_atomics+0x198/0x2e0
[   20.620831]  kunit_try_run_case+0x170/0x3f0
[   20.620978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.621036]  kthread+0x328/0x630
[   20.621081]  ret_from_fork+0x10/0x20
[   20.621149] 
[   20.621208] Allocated by task 265:
[   20.621282]  kasan_save_stack+0x3c/0x68
[   20.621325]  kasan_save_track+0x20/0x40
[   20.621402]  kasan_save_alloc_info+0x40/0x58
[   20.621446]  __kasan_kmalloc+0xd4/0xd8
[   20.621764]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.622033]  kasan_atomics+0xb8/0x2e0
[   20.622639]  kunit_try_run_case+0x170/0x3f0
[   20.622695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.622773]  kthread+0x328/0x630
[   20.622812]  ret_from_fork+0x10/0x20
[   20.622851] 
[   20.622874] The buggy address belongs to the object at fff00000c7832f80
[   20.622874]  which belongs to the cache kmalloc-64 of size 64
[   20.622934] The buggy address is located 0 bytes to the right of
[   20.622934]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.622999] 
[   20.623022] The buggy address belongs to the physical page:
[   20.623055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.623108] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.623164] page_type: f5(slab)
[   20.623289] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.623410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.623522] page dumped because: kasan: bad access detected
[   20.623557] 
[   20.623578] Memory state around the buggy address:
[   20.623611]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.623944]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.624076] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.624127]                                      ^
[   20.624185]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.624242]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.624291] ==================================================================
[   20.649393] ==================================================================
[   20.649433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   20.649476] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.649525] 
[   20.649553] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.650075] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.650262] Hardware name: linux,dummy-virt (DT)
[   20.650316] Call trace:
[   20.650340]  show_stack+0x20/0x38 (C)
[   20.650392]  dump_stack_lvl+0x8c/0xd0
[   20.650438]  print_report+0x118/0x608
[   20.650499]  kasan_report+0xdc/0x128
[   20.650554]  kasan_check_range+0x100/0x1a8
[   20.650603]  __kasan_check_write+0x20/0x30
[   20.650654]  kasan_atomics_helper+0x14e4/0x4858
[   20.650703]  kasan_atomics+0x198/0x2e0
[   20.650777]  kunit_try_run_case+0x170/0x3f0
[   20.650828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.650902]  kthread+0x328/0x630
[   20.651023]  ret_from_fork+0x10/0x20
[   20.651233] 
[   20.651313] Allocated by task 265:
[   20.651636]  kasan_save_stack+0x3c/0x68
[   20.651710]  kasan_save_track+0x20/0x40
[   20.651854]  kasan_save_alloc_info+0x40/0x58
[   20.651916]  __kasan_kmalloc+0xd4/0xd8
[   20.651955]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.652253]  kasan_atomics+0xb8/0x2e0
[   20.652364]  kunit_try_run_case+0x170/0x3f0
[   20.652499]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.652632]  kthread+0x328/0x630
[   20.652912]  ret_from_fork+0x10/0x20
[   20.652963] 
[   20.653095] The buggy address belongs to the object at fff00000c7832f80
[   20.653095]  which belongs to the cache kmalloc-64 of size 64
[   20.653296] The buggy address is located 0 bytes to the right of
[   20.653296]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.653465] 
[   20.653572] The buggy address belongs to the physical page:
[   20.653625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.653677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.653961] page_type: f5(slab)
[   20.654298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.654435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.654627] page dumped because: kasan: bad access detected
[   20.654844] 
[   20.654935] Memory state around the buggy address:
[   20.655056]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.655123]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.655177] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.655243]                                      ^
[   20.655334]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.655489]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.655677] ==================================================================
[   20.595877] ==================================================================
[   20.595955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   20.596151] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.596215] 
[   20.596247] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.596336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.596367] Hardware name: linux,dummy-virt (DT)
[   20.596398] Call trace:
[   20.596422]  show_stack+0x20/0x38 (C)
[   20.596526]  dump_stack_lvl+0x8c/0xd0
[   20.596827]  print_report+0x118/0x608
[   20.596893]  kasan_report+0xdc/0x128
[   20.596981]  kasan_check_range+0x100/0x1a8
[   20.597032]  __kasan_check_write+0x20/0x30
[   20.597299]  kasan_atomics_helper+0xff0/0x4858
[   20.597353]  kasan_atomics+0x198/0x2e0
[   20.597401]  kunit_try_run_case+0x170/0x3f0
[   20.597451]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.597505]  kthread+0x328/0x630
[   20.597552]  ret_from_fork+0x10/0x20
[   20.597601] 
[   20.597623] Allocated by task 265:
[   20.597658]  kasan_save_stack+0x3c/0x68
[   20.597816]  kasan_save_track+0x20/0x40
[   20.597858]  kasan_save_alloc_info+0x40/0x58
[   20.597900]  __kasan_kmalloc+0xd4/0xd8
[   20.597937]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.597979]  kasan_atomics+0xb8/0x2e0
[   20.598593]  kunit_try_run_case+0x170/0x3f0
[   20.598722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.598776]  kthread+0x328/0x630
[   20.598816]  ret_from_fork+0x10/0x20
[   20.598866] 
[   20.598888] The buggy address belongs to the object at fff00000c7832f80
[   20.598888]  which belongs to the cache kmalloc-64 of size 64
[   20.598955] The buggy address is located 0 bytes to the right of
[   20.598955]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.599355] 
[   20.599410] The buggy address belongs to the physical page:
[   20.599445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.599521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.599729] page_type: f5(slab)
[   20.599767] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.599905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.600014] page dumped because: kasan: bad access detected
[   20.600099] 
[   20.600153] Memory state around the buggy address:
[   20.600197]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.600332]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.600411] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.600518]                                      ^
[   20.600620]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.600718]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.600841] ==================================================================
[   20.676876] ==================================================================
[   20.676919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   20.676964] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.677014] 
[   20.677042] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.677127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.677166] Hardware name: linux,dummy-virt (DT)
[   20.677199] Call trace:
[   20.677221]  show_stack+0x20/0x38 (C)
[   20.677271]  dump_stack_lvl+0x8c/0xd0
[   20.677317]  print_report+0x118/0x608
[   20.677364]  kasan_report+0xdc/0x128
[   20.677410]  kasan_check_range+0x100/0x1a8
[   20.677460]  __kasan_check_write+0x20/0x30
[   20.677509]  kasan_atomics_helper+0x16d0/0x4858
[   20.677567]  kasan_atomics+0x198/0x2e0
[   20.677615]  kunit_try_run_case+0x170/0x3f0
[   20.677662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.677716]  kthread+0x328/0x630
[   20.677772]  ret_from_fork+0x10/0x20
[   20.677821] 
[   20.677843] Allocated by task 265:
[   20.677872]  kasan_save_stack+0x3c/0x68
[   20.677914]  kasan_save_track+0x20/0x40
[   20.677954]  kasan_save_alloc_info+0x40/0x58
[   20.677996]  __kasan_kmalloc+0xd4/0xd8
[   20.678033]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.678075]  kasan_atomics+0xb8/0x2e0
[   20.678184]  kunit_try_run_case+0x170/0x3f0
[   20.678265]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.678466]  kthread+0x328/0x630
[   20.678633]  ret_from_fork+0x10/0x20
[   20.678702] 
[   20.678727] The buggy address belongs to the object at fff00000c7832f80
[   20.678727]  which belongs to the cache kmalloc-64 of size 64
[   20.678801] The buggy address is located 0 bytes to the right of
[   20.678801]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.678882] 
[   20.678906] The buggy address belongs to the physical page:
[   20.678938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.678989] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.679323] page_type: f5(slab)
[   20.679428] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.679553] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.679724] page dumped because: kasan: bad access detected
[   20.679785] 
[   20.680091] Memory state around the buggy address:
[   20.680168]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.680215]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.680260] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.680591]                                      ^
[   20.680673]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.680810]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.680929] ==================================================================
[   20.582817] ==================================================================
[   20.582870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   20.582944] Write of size 8 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.583003] 
[   20.583131] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.583229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.583259] Hardware name: linux,dummy-virt (DT)
[   20.583299] Call trace:
[   20.583423]  show_stack+0x20/0x38 (C)
[   20.584018]  dump_stack_lvl+0x8c/0xd0
[   20.584067]  print_report+0x118/0x608
[   20.584115]  kasan_report+0xdc/0x128
[   20.584172]  kasan_check_range+0x100/0x1a8
[   20.584222]  __kasan_check_write+0x20/0x30
[   20.584273]  kasan_atomics_helper+0xf20/0x4858
[   20.584323]  kasan_atomics+0x198/0x2e0
[   20.584369]  kunit_try_run_case+0x170/0x3f0
[   20.584419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.584480]  kthread+0x328/0x630
[   20.584709]  ret_from_fork+0x10/0x20
[   20.584954] 
[   20.585059] Allocated by task 265:
[   20.585134]  kasan_save_stack+0x3c/0x68
[   20.585184]  kasan_save_track+0x20/0x40
[   20.585222]  kasan_save_alloc_info+0x40/0x58
[   20.585265]  __kasan_kmalloc+0xd4/0xd8
[   20.585304]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.585346]  kasan_atomics+0xb8/0x2e0
[   20.585384]  kunit_try_run_case+0x170/0x3f0
[   20.585423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.585468]  kthread+0x328/0x630
[   20.585517]  ret_from_fork+0x10/0x20
[   20.586020] 
[   20.586169] The buggy address belongs to the object at fff00000c7832f80
[   20.586169]  which belongs to the cache kmalloc-64 of size 64
[   20.586348] The buggy address is located 0 bytes to the right of
[   20.586348]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.586418] 
[   20.586893] The buggy address belongs to the physical page:
[   20.586930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.586984] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.587035] page_type: f5(slab)
[   20.587074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.587125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.587566] page dumped because: kasan: bad access detected
[   20.587981] 
[   20.588005] Memory state around the buggy address:
[   20.588109]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.588527]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.588591] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.588723]                                      ^
[   20.588992]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.589184]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.589267] ==================================================================
[   20.542553] ==================================================================
[   20.542623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   20.542685] Write of size 4 at addr fff00000c7832fb0 by task kunit_try_catch/265
[   20.542865] 
[   20.542899] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT 
[   20.542990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.543281] Hardware name: linux,dummy-virt (DT)
[   20.543357] Call trace:
[   20.543381]  show_stack+0x20/0x38 (C)
[   20.543441]  dump_stack_lvl+0x8c/0xd0
[   20.543702]  print_report+0x118/0x608
[   20.543833]  kasan_report+0xdc/0x128
[   20.543880]  kasan_check_range+0x100/0x1a8
[   20.543930]  __kasan_check_write+0x20/0x30
[   20.543980]  kasan_atomics_helper+0xd3c/0x4858
[   20.544037]  kasan_atomics+0x198/0x2e0
[   20.544306]  kunit_try_run_case+0x170/0x3f0
[   20.544476]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.544593]  kthread+0x328/0x630
[   20.544817]  ret_from_fork+0x10/0x20
[   20.545002] 
[   20.545059] Allocated by task 265:
[   20.545090]  kasan_save_stack+0x3c/0x68
[   20.545141]  kasan_save_track+0x20/0x40
[   20.545200]  kasan_save_alloc_info+0x40/0x58
[   20.545243]  __kasan_kmalloc+0xd4/0xd8
[   20.545282]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.545323]  kasan_atomics+0xb8/0x2e0
[   20.545361]  kunit_try_run_case+0x170/0x3f0
[   20.545400]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.545443]  kthread+0x328/0x630
[   20.545480]  ret_from_fork+0x10/0x20
[   20.545518] 
[   20.545539] The buggy address belongs to the object at fff00000c7832f80
[   20.545539]  which belongs to the cache kmalloc-64 of size 64
[   20.545597] The buggy address is located 0 bytes to the right of
[   20.545597]  allocated 48-byte region [fff00000c7832f80, fff00000c7832fb0)
[   20.545661] 
[   20.545682] The buggy address belongs to the physical page:
[   20.545714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107832
[   20.545790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.545839] page_type: f5(slab)
[   20.545878] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.545931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.545973] page dumped because: kasan: bad access detected
[   20.546007] 
[   20.546027] Memory state around the buggy address:
[   20.546060]  fff00000c7832e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.546104]  fff00000c7832f00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
[   20.546148] >fff00000c7832f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.546197]                                      ^
[   20.546231]  fff00000c7833000: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.546274]  fff00000c7833080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc
[   20.546313] ==================================================================


[   17.087873] ==================================================================
[   17.088038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   17.088183] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.088329] 
[   17.088541] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.088598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.088613] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.088636] Call Trace:
[   17.088654]  <TASK>
[   17.088673]  dump_stack_lvl+0x73/0xb0
[   17.088704]  print_report+0xd1/0x650
[   17.088727]  ? __virt_addr_valid+0x1db/0x2d0
[   17.088753]  ? kasan_atomics_helper+0xa2b/0x5450
[   17.088775]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.088798]  ? kasan_atomics_helper+0xa2b/0x5450
[   17.088819]  kasan_report+0x141/0x180
[   17.088843]  ? kasan_atomics_helper+0xa2b/0x5450
[   17.088869]  kasan_check_range+0x10c/0x1c0
[   17.088894]  __kasan_check_write+0x18/0x20
[   17.088915]  kasan_atomics_helper+0xa2b/0x5450
[   17.088938]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.088961]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.088983]  ? kasan_atomics+0x152/0x310
[   17.089010]  kasan_atomics+0x1dc/0x310
[   17.089034]  ? __pfx_kasan_atomics+0x10/0x10
[   17.089058]  ? __pfx_read_tsc+0x10/0x10
[   17.089080]  ? ktime_get_ts64+0x86/0x230
[   17.089105]  kunit_try_run_case+0x1a5/0x480
[   17.089131]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.089153]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.089176]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.089198]  ? __kthread_parkme+0x82/0x180
[   17.089226]  ? preempt_count_sub+0x50/0x80
[   17.089257]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.089282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.089306]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.089330]  kthread+0x337/0x6f0
[   17.089351]  ? trace_preempt_on+0x20/0xc0
[   17.089376]  ? __pfx_kthread+0x10/0x10
[   17.089398]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.089420]  ? calculate_sigpending+0x7b/0xa0
[   17.089446]  ? __pfx_kthread+0x10/0x10
[   17.089535]  ret_from_fork+0x116/0x1d0
[   17.089556]  ? __pfx_kthread+0x10/0x10
[   17.089579]  ret_from_fork_asm+0x1a/0x30
[   17.089613]  </TASK>
[   17.089627] 
[   17.096374] Allocated by task 283:
[   17.096534]  kasan_save_stack+0x45/0x70
[   17.096811]  kasan_save_track+0x18/0x40
[   17.097067]  kasan_save_alloc_info+0x3b/0x50
[   17.097317]  __kasan_kmalloc+0xb7/0xc0
[   17.097557]  __kmalloc_cache_noprof+0x189/0x420
[   17.097747]  kasan_atomics+0x95/0x310
[   17.097870]  kunit_try_run_case+0x1a5/0x480
[   17.098050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.098265]  kthread+0x337/0x6f0
[   17.098403]  ret_from_fork+0x116/0x1d0
[   17.098792]  ret_from_fork_asm+0x1a/0x30
[   17.098968] 
[   17.099097] The buggy address belongs to the object at ffff888102b6b880
[   17.099097]  which belongs to the cache kmalloc-64 of size 64
[   17.099399] The buggy address is located 0 bytes to the right of
[   17.099399]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.099689] 
[   17.099748] The buggy address belongs to the physical page:
[   17.099856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.100003] flags: 0x200000000000000(node=0|zone=2)
[   17.100107] page_type: f5(slab)
[   17.100293] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.100815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.101243] page dumped because: kasan: bad access detected
[   17.101617] 
[   17.101740] Memory state around the buggy address:
[   17.102021]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.102441]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.102780] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.102910]                                      ^
[   17.103011]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.103432]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.104019] ==================================================================
[   17.398548] ==================================================================
[   17.398902] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   17.399083] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.399237] 
[   17.399322] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.399379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.399395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.399422] Call Trace:
[   17.399448]  <TASK>
[   17.399471]  dump_stack_lvl+0x73/0xb0
[   17.399503]  print_report+0xd1/0x650
[   17.399529]  ? __virt_addr_valid+0x1db/0x2d0
[   17.399555]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.399581]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.399605]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.399629]  kasan_report+0x141/0x180
[   17.399654]  ? kasan_atomics_helper+0x13b5/0x5450
[   17.399683]  kasan_check_range+0x10c/0x1c0
[   17.399709]  __kasan_check_read+0x15/0x20
[   17.399730]  kasan_atomics_helper+0x13b5/0x5450
[   17.399755]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.399779]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.399802]  ? kasan_atomics+0x152/0x310
[   17.399831]  kasan_atomics+0x1dc/0x310
[   17.399856]  ? __pfx_kasan_atomics+0x10/0x10
[   17.399882]  ? __pfx_read_tsc+0x10/0x10
[   17.399905]  ? ktime_get_ts64+0x86/0x230
[   17.399930]  kunit_try_run_case+0x1a5/0x480
[   17.399955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.399978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.400002]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.400026]  ? __kthread_parkme+0x82/0x180
[   17.400047]  ? preempt_count_sub+0x50/0x80
[   17.400071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.400095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.400118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.400142]  kthread+0x337/0x6f0
[   17.400162]  ? trace_preempt_on+0x20/0xc0
[   17.400186]  ? __pfx_kthread+0x10/0x10
[   17.400209]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.400250]  ? calculate_sigpending+0x7b/0xa0
[   17.400991]  ? __pfx_kthread+0x10/0x10
[   17.401033]  ret_from_fork+0x116/0x1d0
[   17.401056]  ? __pfx_kthread+0x10/0x10
[   17.401079]  ret_from_fork_asm+0x1a/0x30
[   17.401113]  </TASK>
[   17.401126] 
[   17.408960] Allocated by task 283:
[   17.409161]  kasan_save_stack+0x45/0x70
[   17.409385]  kasan_save_track+0x18/0x40
[   17.409617]  kasan_save_alloc_info+0x3b/0x50
[   17.409854]  __kasan_kmalloc+0xb7/0xc0
[   17.409985]  __kmalloc_cache_noprof+0x189/0x420
[   17.410098]  kasan_atomics+0x95/0x310
[   17.410314]  kunit_try_run_case+0x1a5/0x480
[   17.410514]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.410746]  kthread+0x337/0x6f0
[   17.410975]  ret_from_fork+0x116/0x1d0
[   17.411165]  ret_from_fork_asm+0x1a/0x30
[   17.411315] 
[   17.411422] The buggy address belongs to the object at ffff888102b6b880
[   17.411422]  which belongs to the cache kmalloc-64 of size 64
[   17.411842] The buggy address is located 0 bytes to the right of
[   17.411842]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.412216] 
[   17.412329] The buggy address belongs to the physical page:
[   17.412534] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.412847] flags: 0x200000000000000(node=0|zone=2)
[   17.413096] page_type: f5(slab)
[   17.413212] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.413397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.413837] page dumped because: kasan: bad access detected
[   17.414065] 
[   17.414121] Memory state around the buggy address:
[   17.414229]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.414376]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.414698] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.414986]                                      ^
[   17.415216]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.415472]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.415651] ==================================================================
[   17.241979] ==================================================================
[   17.242455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   17.243492] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.243939] 
[   17.244048] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.244101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.244113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.244137] Call Trace:
[   17.244153]  <TASK>
[   17.244172]  dump_stack_lvl+0x73/0xb0
[   17.244201]  print_report+0xd1/0x650
[   17.244234]  ? __virt_addr_valid+0x1db/0x2d0
[   17.244261]  ? kasan_atomics_helper+0xfa9/0x5450
[   17.244284]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.244307]  ? kasan_atomics_helper+0xfa9/0x5450
[   17.244330]  kasan_report+0x141/0x180
[   17.244353]  ? kasan_atomics_helper+0xfa9/0x5450
[   17.244380]  kasan_check_range+0x10c/0x1c0
[   17.244404]  __kasan_check_write+0x18/0x20
[   17.244425]  kasan_atomics_helper+0xfa9/0x5450
[   17.244447]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.244471]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.244493]  ? kasan_atomics+0x152/0x310
[   17.244521]  kasan_atomics+0x1dc/0x310
[   17.244544]  ? __pfx_kasan_atomics+0x10/0x10
[   17.244569]  ? __pfx_read_tsc+0x10/0x10
[   17.244591]  ? ktime_get_ts64+0x86/0x230
[   17.244615]  kunit_try_run_case+0x1a5/0x480
[   17.244640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.244663]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.244687]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.244709]  ? __kthread_parkme+0x82/0x180
[   17.244730]  ? preempt_count_sub+0x50/0x80
[   17.244755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.244779]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.244802]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.244825]  kthread+0x337/0x6f0
[   17.244845]  ? trace_preempt_on+0x20/0xc0
[   17.244868]  ? __pfx_kthread+0x10/0x10
[   17.244890]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.244911]  ? calculate_sigpending+0x7b/0xa0
[   17.244937]  ? __pfx_kthread+0x10/0x10
[   17.244959]  ret_from_fork+0x116/0x1d0
[   17.244978]  ? __pfx_kthread+0x10/0x10
[   17.244999]  ret_from_fork_asm+0x1a/0x30
[   17.245031]  </TASK>
[   17.245044] 
[   17.250610] Allocated by task 283:
[   17.250696]  kasan_save_stack+0x45/0x70
[   17.250791]  kasan_save_track+0x18/0x40
[   17.250881]  kasan_save_alloc_info+0x3b/0x50
[   17.250973]  __kasan_kmalloc+0xb7/0xc0
[   17.251057]  __kmalloc_cache_noprof+0x189/0x420
[   17.251148]  kasan_atomics+0x95/0x310
[   17.251245]  kunit_try_run_case+0x1a5/0x480
[   17.251391]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.251685]  kthread+0x337/0x6f0
[   17.251896]  ret_from_fork+0x116/0x1d0
[   17.252133]  ret_from_fork_asm+0x1a/0x30
[   17.252386] 
[   17.252504] The buggy address belongs to the object at ffff888102b6b880
[   17.252504]  which belongs to the cache kmalloc-64 of size 64
[   17.253022] The buggy address is located 0 bytes to the right of
[   17.253022]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.253612] 
[   17.253669] The buggy address belongs to the physical page:
[   17.253774] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.253915] flags: 0x200000000000000(node=0|zone=2)
[   17.254168] page_type: f5(slab)
[   17.254381] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.254784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.255127] page dumped because: kasan: bad access detected
[   17.255337] 
[   17.255408] Memory state around the buggy address:
[   17.255510]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.255635]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.255760] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.255876]                                      ^
[   17.255968]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.256090]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.256210] ==================================================================
[   16.946760] ==================================================================
[   16.947073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   16.947406] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.947623] 
[   16.947767] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.947822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.947836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.947859] Call Trace:
[   16.947878]  <TASK>
[   16.947898]  dump_stack_lvl+0x73/0xb0
[   16.947928]  print_report+0xd1/0x650
[   16.947953]  ? __virt_addr_valid+0x1db/0x2d0
[   16.947978]  ? kasan_atomics_helper+0x565/0x5450
[   16.948000]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.948024]  ? kasan_atomics_helper+0x565/0x5450
[   16.948048]  kasan_report+0x141/0x180
[   16.948073]  ? kasan_atomics_helper+0x565/0x5450
[   16.948102]  kasan_check_range+0x10c/0x1c0
[   16.948128]  __kasan_check_write+0x18/0x20
[   16.948149]  kasan_atomics_helper+0x565/0x5450
[   16.948173]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.948203]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.948238]  ? kasan_atomics+0x152/0x310
[   16.948270]  kasan_atomics+0x1dc/0x310
[   16.948295]  ? __pfx_kasan_atomics+0x10/0x10
[   16.948321]  ? __pfx_read_tsc+0x10/0x10
[   16.948343]  ? ktime_get_ts64+0x86/0x230
[   16.948369]  kunit_try_run_case+0x1a5/0x480
[   16.948396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.948418]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.948442]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.948527]  ? __kthread_parkme+0x82/0x180
[   16.948551]  ? preempt_count_sub+0x50/0x80
[   16.948578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.948603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.948640]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.948664]  kthread+0x337/0x6f0
[   16.948696]  ? trace_preempt_on+0x20/0xc0
[   16.948723]  ? __pfx_kthread+0x10/0x10
[   16.948746]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.948768]  ? calculate_sigpending+0x7b/0xa0
[   16.948793]  ? __pfx_kthread+0x10/0x10
[   16.948816]  ret_from_fork+0x116/0x1d0
[   16.948835]  ? __pfx_kthread+0x10/0x10
[   16.948858]  ret_from_fork_asm+0x1a/0x30
[   16.948889]  </TASK>
[   16.948901] 
[   16.955056] Allocated by task 283:
[   16.955285]  kasan_save_stack+0x45/0x70
[   16.955528]  kasan_save_track+0x18/0x40
[   16.955778]  kasan_save_alloc_info+0x3b/0x50
[   16.956017]  __kasan_kmalloc+0xb7/0xc0
[   16.956200]  __kmalloc_cache_noprof+0x189/0x420
[   16.956423]  kasan_atomics+0x95/0x310
[   16.956669]  kunit_try_run_case+0x1a5/0x480
[   16.956889]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.957120]  kthread+0x337/0x6f0
[   16.957302]  ret_from_fork+0x116/0x1d0
[   16.957526]  ret_from_fork_asm+0x1a/0x30
[   16.957733] 
[   16.958126] The buggy address belongs to the object at ffff888102b6b880
[   16.958126]  which belongs to the cache kmalloc-64 of size 64
[   16.958355] The buggy address is located 0 bytes to the right of
[   16.958355]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.958637] 
[   16.958698] The buggy address belongs to the physical page:
[   16.958861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.959336] flags: 0x200000000000000(node=0|zone=2)
[   16.959662] page_type: f5(slab)
[   16.959895] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.960333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.960638] page dumped because: kasan: bad access detected
[   16.960907] 
[   16.960965] Memory state around the buggy address:
[   16.961062]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.961189]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.961604] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.962008]                                      ^
[   16.962179]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.962697]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.962845] ==================================================================
[   17.014961] ==================================================================
[   17.015300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   17.015703] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.016007] 
[   17.016118] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.016171] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.016185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.016208] Call Trace:
[   17.016234]  <TASK>
[   17.016258]  dump_stack_lvl+0x73/0xb0
[   17.016288]  print_report+0xd1/0x650
[   17.016312]  ? __virt_addr_valid+0x1db/0x2d0
[   17.016337]  ? kasan_atomics_helper+0x7c7/0x5450
[   17.016360]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.016384]  ? kasan_atomics_helper+0x7c7/0x5450
[   17.016407]  kasan_report+0x141/0x180
[   17.016431]  ? kasan_atomics_helper+0x7c7/0x5450
[   17.016475]  kasan_check_range+0x10c/0x1c0
[   17.016581]  __kasan_check_write+0x18/0x20
[   17.016605]  kasan_atomics_helper+0x7c7/0x5450
[   17.016631]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.016655]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.016678]  ? kasan_atomics+0x152/0x310
[   17.016706]  kasan_atomics+0x1dc/0x310
[   17.016731]  ? __pfx_kasan_atomics+0x10/0x10
[   17.016757]  ? __pfx_read_tsc+0x10/0x10
[   17.016779]  ? ktime_get_ts64+0x86/0x230
[   17.016806]  kunit_try_run_case+0x1a5/0x480
[   17.016831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.016855]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.016879]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.016903]  ? __kthread_parkme+0x82/0x180
[   17.016925]  ? preempt_count_sub+0x50/0x80
[   17.016950]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.016976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.017000]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.017024]  kthread+0x337/0x6f0
[   17.017045]  ? trace_preempt_on+0x20/0xc0
[   17.017070]  ? __pfx_kthread+0x10/0x10
[   17.017093]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.017115]  ? calculate_sigpending+0x7b/0xa0
[   17.017140]  ? __pfx_kthread+0x10/0x10
[   17.017163]  ret_from_fork+0x116/0x1d0
[   17.017182]  ? __pfx_kthread+0x10/0x10
[   17.017203]  ret_from_fork_asm+0x1a/0x30
[   17.017252]  </TASK>
[   17.017268] 
[   17.024825] Allocated by task 283:
[   17.025008]  kasan_save_stack+0x45/0x70
[   17.025138]  kasan_save_track+0x18/0x40
[   17.025401]  kasan_save_alloc_info+0x3b/0x50
[   17.025703]  __kasan_kmalloc+0xb7/0xc0
[   17.026031]  __kmalloc_cache_noprof+0x189/0x420
[   17.026326]  kasan_atomics+0x95/0x310
[   17.026527]  kunit_try_run_case+0x1a5/0x480
[   17.026663]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.026776]  kthread+0x337/0x6f0
[   17.026908]  ret_from_fork+0x116/0x1d0
[   17.027137]  ret_from_fork_asm+0x1a/0x30
[   17.027384] 
[   17.027497] The buggy address belongs to the object at ffff888102b6b880
[   17.027497]  which belongs to the cache kmalloc-64 of size 64
[   17.027709] The buggy address is located 0 bytes to the right of
[   17.027709]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.028166] 
[   17.028319] The buggy address belongs to the physical page:
[   17.028826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.029202] flags: 0x200000000000000(node=0|zone=2)
[   17.029465] page_type: f5(slab)
[   17.029596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.029842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.030213] page dumped because: kasan: bad access detected
[   17.030331] 
[   17.030399] Memory state around the buggy address:
[   17.030503]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.030631]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.030761] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.030963]                                      ^
[   17.031215]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.031763]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.031995] ==================================================================
[   17.336134] ==================================================================
[   17.336387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   17.336801] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.336970] 
[   17.337112] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.337163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.337177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.337200] Call Trace:
[   17.337216]  <TASK>
[   17.337245]  dump_stack_lvl+0x73/0xb0
[   17.337274]  print_report+0xd1/0x650
[   17.337298]  ? __virt_addr_valid+0x1db/0x2d0
[   17.337322]  ? kasan_atomics_helper+0x1217/0x5450
[   17.337345]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.337369]  ? kasan_atomics_helper+0x1217/0x5450
[   17.337392]  kasan_report+0x141/0x180
[   17.337416]  ? kasan_atomics_helper+0x1217/0x5450
[   17.337444]  kasan_check_range+0x10c/0x1c0
[   17.337469]  __kasan_check_write+0x18/0x20
[   17.337490]  kasan_atomics_helper+0x1217/0x5450
[   17.337515]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.337539]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.337561]  ? kasan_atomics+0x152/0x310
[   17.337588]  kasan_atomics+0x1dc/0x310
[   17.337613]  ? __pfx_kasan_atomics+0x10/0x10
[   17.337638]  ? __pfx_read_tsc+0x10/0x10
[   17.337659]  ? ktime_get_ts64+0x86/0x230
[   17.337684]  kunit_try_run_case+0x1a5/0x480
[   17.337708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.337731]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.337755]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.337778]  ? __kthread_parkme+0x82/0x180
[   17.337799]  ? preempt_count_sub+0x50/0x80
[   17.337824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.337849]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.337872]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.337896]  kthread+0x337/0x6f0
[   17.337917]  ? trace_preempt_on+0x20/0xc0
[   17.337942]  ? __pfx_kthread+0x10/0x10
[   17.337963]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.337985]  ? calculate_sigpending+0x7b/0xa0
[   17.338010]  ? __pfx_kthread+0x10/0x10
[   17.338032]  ret_from_fork+0x116/0x1d0
[   17.338051]  ? __pfx_kthread+0x10/0x10
[   17.338073]  ret_from_fork_asm+0x1a/0x30
[   17.338135]  </TASK>
[   17.338146] 
[   17.344104] Allocated by task 283:
[   17.344191]  kasan_save_stack+0x45/0x70
[   17.344298]  kasan_save_track+0x18/0x40
[   17.344389]  kasan_save_alloc_info+0x3b/0x50
[   17.344483]  __kasan_kmalloc+0xb7/0xc0
[   17.344569]  __kmalloc_cache_noprof+0x189/0x420
[   17.344662]  kasan_atomics+0x95/0x310
[   17.344748]  kunit_try_run_case+0x1a5/0x480
[   17.344838]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.344942]  kthread+0x337/0x6f0
[   17.345019]  ret_from_fork+0x116/0x1d0
[   17.345102]  ret_from_fork_asm+0x1a/0x30
[   17.345187] 
[   17.345255] The buggy address belongs to the object at ffff888102b6b880
[   17.345255]  which belongs to the cache kmalloc-64 of size 64
[   17.345875] The buggy address is located 0 bytes to the right of
[   17.345875]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.346598] 
[   17.346730] The buggy address belongs to the physical page:
[   17.347079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.347563] flags: 0x200000000000000(node=0|zone=2)
[   17.347861] page_type: f5(slab)
[   17.348075] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.348262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.348441] page dumped because: kasan: bad access detected
[   17.348572] 
[   17.348633] Memory state around the buggy address:
[   17.348758]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.348928]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.349273] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.349685]                                      ^
[   17.349990]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.350438]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.350826] ==================================================================
[   17.712197] ==================================================================
[   17.712605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   17.712989] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.713376] 
[   17.713510] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.713562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.713577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.713601] Call Trace:
[   17.713619]  <TASK>
[   17.713636]  dump_stack_lvl+0x73/0xb0
[   17.713664]  print_report+0xd1/0x650
[   17.713688]  ? __virt_addr_valid+0x1db/0x2d0
[   17.713712]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.713735]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.713759]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.713782]  kasan_report+0x141/0x180
[   17.713806]  ? kasan_atomics_helper+0x1eaa/0x5450
[   17.713834]  kasan_check_range+0x10c/0x1c0
[   17.713859]  __kasan_check_write+0x18/0x20
[   17.713880]  kasan_atomics_helper+0x1eaa/0x5450
[   17.713904]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.713928]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.713950]  ? kasan_atomics+0x152/0x310
[   17.713978]  kasan_atomics+0x1dc/0x310
[   17.714003]  ? __pfx_kasan_atomics+0x10/0x10
[   17.714029]  ? __pfx_read_tsc+0x10/0x10
[   17.714050]  ? ktime_get_ts64+0x86/0x230
[   17.714075]  kunit_try_run_case+0x1a5/0x480
[   17.714099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.714121]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.714145]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.714168]  ? __kthread_parkme+0x82/0x180
[   17.714189]  ? preempt_count_sub+0x50/0x80
[   17.714213]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.714272]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.714307]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.714347]  kthread+0x337/0x6f0
[   17.714380]  ? trace_preempt_on+0x20/0xc0
[   17.714406]  ? __pfx_kthread+0x10/0x10
[   17.714440]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.714464]  ? calculate_sigpending+0x7b/0xa0
[   17.714489]  ? __pfx_kthread+0x10/0x10
[   17.714514]  ret_from_fork+0x116/0x1d0
[   17.714534]  ? __pfx_kthread+0x10/0x10
[   17.714559]  ret_from_fork_asm+0x1a/0x30
[   17.714591]  </TASK>
[   17.714604] 
[   17.720203] Allocated by task 283:
[   17.720368]  kasan_save_stack+0x45/0x70
[   17.720564]  kasan_save_track+0x18/0x40
[   17.720787]  kasan_save_alloc_info+0x3b/0x50
[   17.720924]  __kasan_kmalloc+0xb7/0xc0
[   17.721069]  __kmalloc_cache_noprof+0x189/0x420
[   17.721279]  kasan_atomics+0x95/0x310
[   17.721436]  kunit_try_run_case+0x1a5/0x480
[   17.721603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.721754]  kthread+0x337/0x6f0
[   17.721924]  ret_from_fork+0x116/0x1d0
[   17.722056]  ret_from_fork_asm+0x1a/0x30
[   17.722213] 
[   17.722316] The buggy address belongs to the object at ffff888102b6b880
[   17.722316]  which belongs to the cache kmalloc-64 of size 64
[   17.722671] The buggy address is located 0 bytes to the right of
[   17.722671]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.723039] 
[   17.723123] The buggy address belongs to the physical page:
[   17.723281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.723464] flags: 0x200000000000000(node=0|zone=2)
[   17.723607] page_type: f5(slab)
[   17.723711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.723892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.724136] page dumped because: kasan: bad access detected
[   17.724362] 
[   17.724449] Memory state around the buggy address:
[   17.724656]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.724931]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.725205] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.725487]                                      ^
[   17.725693]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.725984]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.726262] ==================================================================
[   17.530094] ==================================================================
[   17.530844] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   17.531288] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.531755] 
[   17.531904] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.531955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.531968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.531991] Call Trace:
[   17.532008]  <TASK>
[   17.532024]  dump_stack_lvl+0x73/0xb0
[   17.532051]  print_report+0xd1/0x650
[   17.532075]  ? __virt_addr_valid+0x1db/0x2d0
[   17.532100]  ? kasan_atomics_helper+0x177f/0x5450
[   17.532122]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.532147]  ? kasan_atomics_helper+0x177f/0x5450
[   17.532170]  kasan_report+0x141/0x180
[   17.532193]  ? kasan_atomics_helper+0x177f/0x5450
[   17.532232]  kasan_check_range+0x10c/0x1c0
[   17.532262]  __kasan_check_write+0x18/0x20
[   17.532282]  kasan_atomics_helper+0x177f/0x5450
[   17.532306]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.532330]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.532365]  ? kasan_atomics+0x152/0x310
[   17.532395]  kasan_atomics+0x1dc/0x310
[   17.532420]  ? __pfx_kasan_atomics+0x10/0x10
[   17.532460]  ? __pfx_read_tsc+0x10/0x10
[   17.532483]  ? ktime_get_ts64+0x86/0x230
[   17.532518]  kunit_try_run_case+0x1a5/0x480
[   17.532546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.532569]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.532605]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.532630]  ? __kthread_parkme+0x82/0x180
[   17.532665]  ? preempt_count_sub+0x50/0x80
[   17.532689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.532725]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.532752]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.532784]  kthread+0x337/0x6f0
[   17.532810]  ? trace_preempt_on+0x20/0xc0
[   17.532835]  ? __pfx_kthread+0x10/0x10
[   17.532869]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.532893]  ? calculate_sigpending+0x7b/0xa0
[   17.532929]  ? __pfx_kthread+0x10/0x10
[   17.532954]  ret_from_fork+0x116/0x1d0
[   17.532975]  ? __pfx_kthread+0x10/0x10
[   17.533009]  ret_from_fork_asm+0x1a/0x30
[   17.533043]  </TASK>
[   17.533066] 
[   17.539081] Allocated by task 283:
[   17.539196]  kasan_save_stack+0x45/0x70
[   17.539481]  kasan_save_track+0x18/0x40
[   17.539736]  kasan_save_alloc_info+0x3b/0x50
[   17.539950]  __kasan_kmalloc+0xb7/0xc0
[   17.540040]  __kmalloc_cache_noprof+0x189/0x420
[   17.540138]  kasan_atomics+0x95/0x310
[   17.540234]  kunit_try_run_case+0x1a5/0x480
[   17.540332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.540439]  kthread+0x337/0x6f0
[   17.540519]  ret_from_fork+0x116/0x1d0
[   17.540602]  ret_from_fork_asm+0x1a/0x30
[   17.540691] 
[   17.540745] The buggy address belongs to the object at ffff888102b6b880
[   17.540745]  which belongs to the cache kmalloc-64 of size 64
[   17.540941] The buggy address is located 0 bytes to the right of
[   17.540941]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.541365] 
[   17.541493] The buggy address belongs to the physical page:
[   17.541821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.542279] flags: 0x200000000000000(node=0|zone=2)
[   17.542575] page_type: f5(slab)
[   17.542801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.543244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.543692] page dumped because: kasan: bad access detected
[   17.544001] 
[   17.544113] Memory state around the buggy address:
[   17.544337]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.544646]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.544773] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.544894]                                      ^
[   17.544987]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.545108]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.545238] ==================================================================
[   17.741403] ==================================================================
[   17.741723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   17.742016] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.742347] 
[   17.742483] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.742541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.742555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.742577] Call Trace:
[   17.742601]  <TASK>
[   17.742618]  dump_stack_lvl+0x73/0xb0
[   17.742653]  print_report+0xd1/0x650
[   17.742678]  ? __virt_addr_valid+0x1db/0x2d0
[   17.742703]  ? kasan_atomics_helper+0x4f71/0x5450
[   17.742725]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.742748]  ? kasan_atomics_helper+0x4f71/0x5450
[   17.742771]  kasan_report+0x141/0x180
[   17.742794]  ? kasan_atomics_helper+0x4f71/0x5450
[   17.742822]  __asan_report_load8_noabort+0x18/0x20
[   17.742844]  kasan_atomics_helper+0x4f71/0x5450
[   17.742867]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.742890]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.742912]  ? kasan_atomics+0x152/0x310
[   17.742940]  kasan_atomics+0x1dc/0x310
[   17.742963]  ? __pfx_kasan_atomics+0x10/0x10
[   17.742988]  ? __pfx_read_tsc+0x10/0x10
[   17.743009]  ? ktime_get_ts64+0x86/0x230
[   17.743034]  kunit_try_run_case+0x1a5/0x480
[   17.743058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.743080]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.743103]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.743126]  ? __kthread_parkme+0x82/0x180
[   17.743146]  ? preempt_count_sub+0x50/0x80
[   17.743169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.743193]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.743215]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.743250]  kthread+0x337/0x6f0
[   17.743270]  ? trace_preempt_on+0x20/0xc0
[   17.743294]  ? __pfx_kthread+0x10/0x10
[   17.743315]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.743336]  ? calculate_sigpending+0x7b/0xa0
[   17.743360]  ? __pfx_kthread+0x10/0x10
[   17.743381]  ret_from_fork+0x116/0x1d0
[   17.743400]  ? __pfx_kthread+0x10/0x10
[   17.743421]  ret_from_fork_asm+0x1a/0x30
[   17.743469]  </TASK>
[   17.743483] 
[   17.748264] Allocated by task 283:
[   17.748418]  kasan_save_stack+0x45/0x70
[   17.748594]  kasan_save_track+0x18/0x40
[   17.748797]  kasan_save_alloc_info+0x3b/0x50
[   17.749003]  __kasan_kmalloc+0xb7/0xc0
[   17.749183]  __kmalloc_cache_noprof+0x189/0x420
[   17.749389]  kasan_atomics+0x95/0x310
[   17.749579]  kunit_try_run_case+0x1a5/0x480
[   17.749767]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.750003]  kthread+0x337/0x6f0
[   17.750160]  ret_from_fork+0x116/0x1d0
[   17.750351]  ret_from_fork_asm+0x1a/0x30
[   17.750536] 
[   17.750651] The buggy address belongs to the object at ffff888102b6b880
[   17.750651]  which belongs to the cache kmalloc-64 of size 64
[   17.751060] The buggy address is located 0 bytes to the right of
[   17.751060]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.751336] 
[   17.751411] The buggy address belongs to the physical page:
[   17.751543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.751730] flags: 0x200000000000000(node=0|zone=2)
[   17.751857] page_type: f5(slab)
[   17.752021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.752325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.752636] page dumped because: kasan: bad access detected
[   17.752843] 
[   17.752927] Memory state around the buggy address:
[   17.753131]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.753430]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.753719] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.753993]                                      ^
[   17.754249]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.754384]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.754514] ==================================================================
[   17.447343] ==================================================================
[   17.447951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   17.448279] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.448579] 
[   17.448694] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.448746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.448759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.448782] Call Trace:
[   17.448801]  <TASK>
[   17.448817]  dump_stack_lvl+0x73/0xb0
[   17.448845]  print_report+0xd1/0x650
[   17.448868]  ? __virt_addr_valid+0x1db/0x2d0
[   17.448891]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.448913]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.448937]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.448960]  kasan_report+0x141/0x180
[   17.448983]  ? kasan_atomics_helper+0x50d4/0x5450
[   17.449011]  __asan_report_store8_noabort+0x1b/0x30
[   17.449033]  kasan_atomics_helper+0x50d4/0x5450
[   17.449057]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.449080]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.449102]  ? kasan_atomics+0x152/0x310
[   17.449129]  kasan_atomics+0x1dc/0x310
[   17.449152]  ? __pfx_kasan_atomics+0x10/0x10
[   17.449177]  ? __pfx_read_tsc+0x10/0x10
[   17.449199]  ? ktime_get_ts64+0x86/0x230
[   17.449234]  kunit_try_run_case+0x1a5/0x480
[   17.449262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.449287]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.449310]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.449334]  ? __kthread_parkme+0x82/0x180
[   17.449356]  ? preempt_count_sub+0x50/0x80
[   17.449381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.449405]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.449429]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.449454]  kthread+0x337/0x6f0
[   17.449474]  ? trace_preempt_on+0x20/0xc0
[   17.449499]  ? __pfx_kthread+0x10/0x10
[   17.449522]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.449545]  ? calculate_sigpending+0x7b/0xa0
[   17.449571]  ? __pfx_kthread+0x10/0x10
[   17.449593]  ret_from_fork+0x116/0x1d0
[   17.449613]  ? __pfx_kthread+0x10/0x10
[   17.449635]  ret_from_fork_asm+0x1a/0x30
[   17.449668]  </TASK>
[   17.449681] 
[   17.454488] Allocated by task 283:
[   17.454682]  kasan_save_stack+0x45/0x70
[   17.454863]  kasan_save_track+0x18/0x40
[   17.455075]  kasan_save_alloc_info+0x3b/0x50
[   17.455308]  __kasan_kmalloc+0xb7/0xc0
[   17.455534]  __kmalloc_cache_noprof+0x189/0x420
[   17.455735]  kasan_atomics+0x95/0x310
[   17.455916]  kunit_try_run_case+0x1a5/0x480
[   17.456134]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.456296]  kthread+0x337/0x6f0
[   17.456491]  ret_from_fork+0x116/0x1d0
[   17.456711]  ret_from_fork_asm+0x1a/0x30
[   17.456890] 
[   17.456999] The buggy address belongs to the object at ffff888102b6b880
[   17.456999]  which belongs to the cache kmalloc-64 of size 64
[   17.457378] The buggy address is located 0 bytes to the right of
[   17.457378]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.457759] 
[   17.457875] The buggy address belongs to the physical page:
[   17.458042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.458361] flags: 0x200000000000000(node=0|zone=2)
[   17.458495] page_type: f5(slab)
[   17.458586] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.458929] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.459219] page dumped because: kasan: bad access detected
[   17.459334] 
[   17.459388] Memory state around the buggy address:
[   17.459486]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.459614]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.459742] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.459864]                                      ^
[   17.459958]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.460081]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.460202] ==================================================================
[   17.366635] ==================================================================
[   17.366962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   17.367154] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.367335] 
[   17.367438] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.367507] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.367522] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.367547] Call Trace:
[   17.367568]  <TASK>
[   17.367586]  dump_stack_lvl+0x73/0xb0
[   17.367616]  print_report+0xd1/0x650
[   17.367640]  ? __virt_addr_valid+0x1db/0x2d0
[   17.367666]  ? kasan_atomics_helper+0x12e6/0x5450
[   17.367689]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.367713]  ? kasan_atomics_helper+0x12e6/0x5450
[   17.367737]  kasan_report+0x141/0x180
[   17.367761]  ? kasan_atomics_helper+0x12e6/0x5450
[   17.367789]  kasan_check_range+0x10c/0x1c0
[   17.367815]  __kasan_check_write+0x18/0x20
[   17.367836]  kasan_atomics_helper+0x12e6/0x5450
[   17.367861]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.367885]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.367907]  ? kasan_atomics+0x152/0x310
[   17.367934]  kasan_atomics+0x1dc/0x310
[   17.367958]  ? __pfx_kasan_atomics+0x10/0x10
[   17.367983]  ? __pfx_read_tsc+0x10/0x10
[   17.368005]  ? ktime_get_ts64+0x86/0x230
[   17.368030]  kunit_try_run_case+0x1a5/0x480
[   17.368079]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.368106]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.368146]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.368173]  ? __kthread_parkme+0x82/0x180
[   17.368193]  ? preempt_count_sub+0x50/0x80
[   17.368218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.368255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.368297]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.368323]  kthread+0x337/0x6f0
[   17.368345]  ? trace_preempt_on+0x20/0xc0
[   17.368369]  ? __pfx_kthread+0x10/0x10
[   17.368393]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.368414]  ? calculate_sigpending+0x7b/0xa0
[   17.368439]  ? __pfx_kthread+0x10/0x10
[   17.368462]  ret_from_fork+0x116/0x1d0
[   17.368482]  ? __pfx_kthread+0x10/0x10
[   17.368504]  ret_from_fork_asm+0x1a/0x30
[   17.368536]  </TASK>
[   17.368548] 
[   17.373741] Allocated by task 283:
[   17.373857]  kasan_save_stack+0x45/0x70
[   17.373976]  kasan_save_track+0x18/0x40
[   17.374089]  kasan_save_alloc_info+0x3b/0x50
[   17.374206]  __kasan_kmalloc+0xb7/0xc0
[   17.374439]  __kmalloc_cache_noprof+0x189/0x420
[   17.374736]  kasan_atomics+0x95/0x310
[   17.374972]  kunit_try_run_case+0x1a5/0x480
[   17.375198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.375496]  kthread+0x337/0x6f0
[   17.375689]  ret_from_fork+0x116/0x1d0
[   17.375911]  ret_from_fork_asm+0x1a/0x30
[   17.376129] 
[   17.376247] The buggy address belongs to the object at ffff888102b6b880
[   17.376247]  which belongs to the cache kmalloc-64 of size 64
[   17.376822] The buggy address is located 0 bytes to the right of
[   17.376822]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.377427] 
[   17.377543] The buggy address belongs to the physical page:
[   17.377738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.377881] flags: 0x200000000000000(node=0|zone=2)
[   17.377984] page_type: f5(slab)
[   17.378073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.378206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.378355] page dumped because: kasan: bad access detected
[   17.378466] 
[   17.378561] Memory state around the buggy address:
[   17.378790]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.379086]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.379410] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.379692]                                      ^
[   17.379898]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.380187]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.380475] ==================================================================
[   16.875740] ==================================================================
[   16.876087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   16.876390] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.876773] 
[   16.876895] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.876954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.876969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.876994] Call Trace:
[   16.877019]  <TASK>
[   16.877042]  dump_stack_lvl+0x73/0xb0
[   16.877074]  print_report+0xd1/0x650
[   16.877101]  ? __virt_addr_valid+0x1db/0x2d0
[   16.877127]  ? kasan_atomics_helper+0x3df/0x5450
[   16.877158]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.877190]  ? kasan_atomics_helper+0x3df/0x5450
[   16.877214]  kasan_report+0x141/0x180
[   16.877258]  ? kasan_atomics_helper+0x3df/0x5450
[   16.877289]  kasan_check_range+0x10c/0x1c0
[   16.877315]  __kasan_check_read+0x15/0x20
[   16.877335]  kasan_atomics_helper+0x3df/0x5450
[   16.877360]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.877384]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.877406]  ? kasan_atomics+0x152/0x310
[   16.877435]  kasan_atomics+0x1dc/0x310
[   16.877459]  ? __pfx_kasan_atomics+0x10/0x10
[   16.877485]  ? __pfx_read_tsc+0x10/0x10
[   16.877508]  ? ktime_get_ts64+0x86/0x230
[   16.877536]  kunit_try_run_case+0x1a5/0x480
[   16.877563]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.877586]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.877611]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.877635]  ? __kthread_parkme+0x82/0x180
[   16.877658]  ? preempt_count_sub+0x50/0x80
[   16.877684]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.877709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.877734]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.877760]  kthread+0x337/0x6f0
[   16.877783]  ? trace_preempt_on+0x20/0xc0
[   16.877809]  ? __pfx_kthread+0x10/0x10
[   16.877833]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.877890]  ? calculate_sigpending+0x7b/0xa0
[   16.877917]  ? __pfx_kthread+0x10/0x10
[   16.877942]  ret_from_fork+0x116/0x1d0
[   16.877963]  ? __pfx_kthread+0x10/0x10
[   16.877985]  ret_from_fork_asm+0x1a/0x30
[   16.878019]  </TASK>
[   16.878032] 
[   16.884871] Allocated by task 283:
[   16.884990]  kasan_save_stack+0x45/0x70
[   16.885247]  kasan_save_track+0x18/0x40
[   16.885481]  kasan_save_alloc_info+0x3b/0x50
[   16.885753]  __kasan_kmalloc+0xb7/0xc0
[   16.885995]  __kmalloc_cache_noprof+0x189/0x420
[   16.886189]  kasan_atomics+0x95/0x310
[   16.886292]  kunit_try_run_case+0x1a5/0x480
[   16.886402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.886589]  kthread+0x337/0x6f0
[   16.886832]  ret_from_fork+0x116/0x1d0
[   16.887146]  ret_from_fork_asm+0x1a/0x30
[   16.887396] 
[   16.887582] The buggy address belongs to the object at ffff888102b6b880
[   16.887582]  which belongs to the cache kmalloc-64 of size 64
[   16.887827] The buggy address is located 0 bytes to the right of
[   16.887827]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.888404] 
[   16.888578] The buggy address belongs to the physical page:
[   16.888835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.889140] flags: 0x200000000000000(node=0|zone=2)
[   16.889702] page_type: f5(slab)
[   16.889898] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.890141] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.890422] page dumped because: kasan: bad access detected
[   16.890870] 
[   16.890928] Memory state around the buggy address:
[   16.891030]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.891159]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.891296] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.891421]                                      ^
[   16.891733]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.892164]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.893007] ==================================================================
[   17.669961] ==================================================================
[   17.670290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   17.670448] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.670580] 
[   17.670648] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.670697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.670710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.670734] Call Trace:
[   17.670751]  <TASK>
[   17.670767]  dump_stack_lvl+0x73/0xb0
[   17.670795]  print_report+0xd1/0x650
[   17.670818]  ? __virt_addr_valid+0x1db/0x2d0
[   17.670842]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.670864]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.670887]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.670910]  kasan_report+0x141/0x180
[   17.670933]  ? kasan_atomics_helper+0x1ce1/0x5450
[   17.670961]  kasan_check_range+0x10c/0x1c0
[   17.670985]  __kasan_check_write+0x18/0x20
[   17.671004]  kasan_atomics_helper+0x1ce1/0x5450
[   17.671028]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.671050]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.671071]  ? kasan_atomics+0x152/0x310
[   17.671098]  kasan_atomics+0x1dc/0x310
[   17.671122]  ? __pfx_kasan_atomics+0x10/0x10
[   17.671146]  ? __pfx_read_tsc+0x10/0x10
[   17.671167]  ? ktime_get_ts64+0x86/0x230
[   17.671190]  kunit_try_run_case+0x1a5/0x480
[   17.671214]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.671248]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.671272]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.671294]  ? __kthread_parkme+0x82/0x180
[   17.671314]  ? preempt_count_sub+0x50/0x80
[   17.671338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.671361]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.671383]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.671406]  kthread+0x337/0x6f0
[   17.671426]  ? trace_preempt_on+0x20/0xc0
[   17.671448]  ? __pfx_kthread+0x10/0x10
[   17.671469]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.671491]  ? calculate_sigpending+0x7b/0xa0
[   17.671513]  ? __pfx_kthread+0x10/0x10
[   17.671535]  ret_from_fork+0x116/0x1d0
[   17.671553]  ? __pfx_kthread+0x10/0x10
[   17.671574]  ret_from_fork_asm+0x1a/0x30
[   17.671605]  </TASK>
[   17.671616] 
[   17.676849] Allocated by task 283:
[   17.677022]  kasan_save_stack+0x45/0x70
[   17.677227]  kasan_save_track+0x18/0x40
[   17.677407]  kasan_save_alloc_info+0x3b/0x50
[   17.677608]  __kasan_kmalloc+0xb7/0xc0
[   17.677835]  __kmalloc_cache_noprof+0x189/0x420
[   17.678072]  kasan_atomics+0x95/0x310
[   17.678256]  kunit_try_run_case+0x1a5/0x480
[   17.678467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.678696]  kthread+0x337/0x6f0
[   17.678856]  ret_from_fork+0x116/0x1d0
[   17.679030]  ret_from_fork_asm+0x1a/0x30
[   17.679212] 
[   17.679331] The buggy address belongs to the object at ffff888102b6b880
[   17.679331]  which belongs to the cache kmalloc-64 of size 64
[   17.679807] The buggy address is located 0 bytes to the right of
[   17.679807]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.680010] 
[   17.680065] The buggy address belongs to the physical page:
[   17.680171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.680468] flags: 0x200000000000000(node=0|zone=2)
[   17.680696] page_type: f5(slab)
[   17.680870] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.681156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.681479] page dumped because: kasan: bad access detected
[   17.681700] 
[   17.681783] Memory state around the buggy address:
[   17.681942]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.682145]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.682323] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.682459]                                      ^
[   17.682558]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.682684]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.683042] ==================================================================
[   17.070237] ==================================================================
[   17.070656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   17.071200] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.072277] 
[   17.072377] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.072449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.072463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.072488] Call Trace:
[   17.072505]  <TASK>
[   17.072524]  dump_stack_lvl+0x73/0xb0
[   17.072559]  print_report+0xd1/0x650
[   17.072584]  ? __virt_addr_valid+0x1db/0x2d0
[   17.072691]  ? kasan_atomics_helper+0x992/0x5450
[   17.072715]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.072739]  ? kasan_atomics_helper+0x992/0x5450
[   17.072761]  kasan_report+0x141/0x180
[   17.072785]  ? kasan_atomics_helper+0x992/0x5450
[   17.072811]  kasan_check_range+0x10c/0x1c0
[   17.072836]  __kasan_check_write+0x18/0x20
[   17.072857]  kasan_atomics_helper+0x992/0x5450
[   17.072881]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.072904]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.072926]  ? kasan_atomics+0x152/0x310
[   17.072953]  kasan_atomics+0x1dc/0x310
[   17.072976]  ? __pfx_kasan_atomics+0x10/0x10
[   17.073001]  ? __pfx_read_tsc+0x10/0x10
[   17.073025]  ? ktime_get_ts64+0x86/0x230
[   17.073050]  kunit_try_run_case+0x1a5/0x480
[   17.073075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.073097]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.073121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.073144]  ? __kthread_parkme+0x82/0x180
[   17.073164]  ? preempt_count_sub+0x50/0x80
[   17.073188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.073212]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.073256]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.073280]  kthread+0x337/0x6f0
[   17.073301]  ? trace_preempt_on+0x20/0xc0
[   17.073328]  ? __pfx_kthread+0x10/0x10
[   17.073350]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.073372]  ? calculate_sigpending+0x7b/0xa0
[   17.073400]  ? __pfx_kthread+0x10/0x10
[   17.073423]  ret_from_fork+0x116/0x1d0
[   17.073443]  ? __pfx_kthread+0x10/0x10
[   17.073465]  ret_from_fork_asm+0x1a/0x30
[   17.073601]  </TASK>
[   17.073620] 
[   17.079770] Allocated by task 283:
[   17.079989]  kasan_save_stack+0x45/0x70
[   17.080228]  kasan_save_track+0x18/0x40
[   17.080522]  kasan_save_alloc_info+0x3b/0x50
[   17.080736]  __kasan_kmalloc+0xb7/0xc0
[   17.080883]  __kmalloc_cache_noprof+0x189/0x420
[   17.081007]  kasan_atomics+0x95/0x310
[   17.081098]  kunit_try_run_case+0x1a5/0x480
[   17.081203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.081778]  kthread+0x337/0x6f0
[   17.081976]  ret_from_fork+0x116/0x1d0
[   17.082184]  ret_from_fork_asm+0x1a/0x30
[   17.082290] 
[   17.082423] The buggy address belongs to the object at ffff888102b6b880
[   17.082423]  which belongs to the cache kmalloc-64 of size 64
[   17.082894] The buggy address is located 0 bytes to the right of
[   17.082894]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.083311] 
[   17.083434] The buggy address belongs to the physical page:
[   17.083686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.083872] flags: 0x200000000000000(node=0|zone=2)
[   17.084095] page_type: f5(slab)
[   17.084284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.084419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.084601] page dumped because: kasan: bad access detected
[   17.084706] 
[   17.084757] Memory state around the buggy address:
[   17.084851]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.084975]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.085308] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.085804]                                      ^
[   17.086116]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.086744]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.087184] ==================================================================
[   17.190019] ==================================================================
[   17.190414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   17.191476] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.191791] 
[   17.191868] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.191923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.191937] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.191960] Call Trace:
[   17.191984]  <TASK>
[   17.192004]  dump_stack_lvl+0x73/0xb0
[   17.192039]  print_report+0xd1/0x650
[   17.192064]  ? __virt_addr_valid+0x1db/0x2d0
[   17.192089]  ? kasan_atomics_helper+0xde0/0x5450
[   17.192112]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.192148]  ? kasan_atomics_helper+0xde0/0x5450
[   17.192172]  kasan_report+0x141/0x180
[   17.192206]  ? kasan_atomics_helper+0xde0/0x5450
[   17.192246]  kasan_check_range+0x10c/0x1c0
[   17.192273]  __kasan_check_write+0x18/0x20
[   17.192295]  kasan_atomics_helper+0xde0/0x5450
[   17.192318]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.192342]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.192364]  ? kasan_atomics+0x152/0x310
[   17.192392]  kasan_atomics+0x1dc/0x310
[   17.192415]  ? __pfx_kasan_atomics+0x10/0x10
[   17.192440]  ? __pfx_read_tsc+0x10/0x10
[   17.192480]  ? ktime_get_ts64+0x86/0x230
[   17.192508]  kunit_try_run_case+0x1a5/0x480
[   17.192534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.192557]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.192583]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.192618]  ? __kthread_parkme+0x82/0x180
[   17.192640]  ? preempt_count_sub+0x50/0x80
[   17.192674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.192711]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.192805]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.192831]  kthread+0x337/0x6f0
[   17.192853]  ? trace_preempt_on+0x20/0xc0
[   17.192879]  ? __pfx_kthread+0x10/0x10
[   17.192901]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.192923]  ? calculate_sigpending+0x7b/0xa0
[   17.192949]  ? __pfx_kthread+0x10/0x10
[   17.192971]  ret_from_fork+0x116/0x1d0
[   17.192991]  ? __pfx_kthread+0x10/0x10
[   17.193012]  ret_from_fork_asm+0x1a/0x30
[   17.193045]  </TASK>
[   17.193058] 
[   17.200153] Allocated by task 283:
[   17.200268]  kasan_save_stack+0x45/0x70
[   17.200372]  kasan_save_track+0x18/0x40
[   17.200880]  kasan_save_alloc_info+0x3b/0x50
[   17.201132]  __kasan_kmalloc+0xb7/0xc0
[   17.201370]  __kmalloc_cache_noprof+0x189/0x420
[   17.201711]  kasan_atomics+0x95/0x310
[   17.201937]  kunit_try_run_case+0x1a5/0x480
[   17.202141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.202298]  kthread+0x337/0x6f0
[   17.202574]  ret_from_fork+0x116/0x1d0
[   17.202670]  ret_from_fork_asm+0x1a/0x30
[   17.202804] 
[   17.202930] The buggy address belongs to the object at ffff888102b6b880
[   17.202930]  which belongs to the cache kmalloc-64 of size 64
[   17.203420] The buggy address is located 0 bytes to the right of
[   17.203420]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.204007] 
[   17.204067] The buggy address belongs to the physical page:
[   17.204344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.204694] flags: 0x200000000000000(node=0|zone=2)
[   17.204859] page_type: f5(slab)
[   17.205070] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.205326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.205852] page dumped because: kasan: bad access detected
[   17.206125] 
[   17.206193] Memory state around the buggy address:
[   17.206582]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.206763]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.206895] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.207021]                                      ^
[   17.207301]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.207797]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.208149] ==================================================================
[   17.461154] ==================================================================
[   17.462377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   17.463831] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.464164] 
[   17.464288] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.464338] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.464353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.464376] Call Trace:
[   17.464395]  <TASK>
[   17.464413]  dump_stack_lvl+0x73/0xb0
[   17.464443]  print_report+0xd1/0x650
[   17.464467]  ? __virt_addr_valid+0x1db/0x2d0
[   17.464491]  ? kasan_atomics_helper+0x151d/0x5450
[   17.464514]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.464537]  ? kasan_atomics_helper+0x151d/0x5450
[   17.464560]  kasan_report+0x141/0x180
[   17.464583]  ? kasan_atomics_helper+0x151d/0x5450
[   17.464610]  kasan_check_range+0x10c/0x1c0
[   17.464634]  __kasan_check_write+0x18/0x20
[   17.464655]  kasan_atomics_helper+0x151d/0x5450
[   17.464678]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.464701]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.464723]  ? kasan_atomics+0x152/0x310
[   17.464750]  kasan_atomics+0x1dc/0x310
[   17.464773]  ? __pfx_kasan_atomics+0x10/0x10
[   17.464798]  ? __pfx_read_tsc+0x10/0x10
[   17.464819]  ? ktime_get_ts64+0x86/0x230
[   17.464844]  kunit_try_run_case+0x1a5/0x480
[   17.464868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.465587]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.465693]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.465721]  ? __kthread_parkme+0x82/0x180
[   17.465746]  ? preempt_count_sub+0x50/0x80
[   17.465773]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.465801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.465829]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.465854]  kthread+0x337/0x6f0
[   17.465876]  ? trace_preempt_on+0x20/0xc0
[   17.465903]  ? __pfx_kthread+0x10/0x10
[   17.465927]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.465951]  ? calculate_sigpending+0x7b/0xa0
[   17.465977]  ? __pfx_kthread+0x10/0x10
[   17.466002]  ret_from_fork+0x116/0x1d0
[   17.466023]  ? __pfx_kthread+0x10/0x10
[   17.466046]  ret_from_fork_asm+0x1a/0x30
[   17.466081]  </TASK>
[   17.466096] 
[   17.473137] Allocated by task 283:
[   17.473404]  kasan_save_stack+0x45/0x70
[   17.473617]  kasan_save_track+0x18/0x40
[   17.473860]  kasan_save_alloc_info+0x3b/0x50
[   17.474076]  __kasan_kmalloc+0xb7/0xc0
[   17.474285]  __kmalloc_cache_noprof+0x189/0x420
[   17.474519]  kasan_atomics+0x95/0x310
[   17.474692]  kunit_try_run_case+0x1a5/0x480
[   17.474843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.475094]  kthread+0x337/0x6f0
[   17.475185]  ret_from_fork+0x116/0x1d0
[   17.475286]  ret_from_fork_asm+0x1a/0x30
[   17.475385] 
[   17.475444] The buggy address belongs to the object at ffff888102b6b880
[   17.475444]  which belongs to the cache kmalloc-64 of size 64
[   17.475655] The buggy address is located 0 bytes to the right of
[   17.475655]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.476053] 
[   17.476184] The buggy address belongs to the physical page:
[   17.476524] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.476971] flags: 0x200000000000000(node=0|zone=2)
[   17.477301] page_type: f5(slab)
[   17.477531] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.477738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.477875] page dumped because: kasan: bad access detected
[   17.477980] 
[   17.478033] Memory state around the buggy address:
[   17.478309]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.478508]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.478643] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.478768]                                      ^
[   17.478866]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.478991]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.479150] ==================================================================
[   17.138850] ==================================================================
[   17.139148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   17.139892] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.140290] 
[   17.140410] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.140521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.140538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.140563] Call Trace:
[   17.140585]  <TASK>
[   17.140605]  dump_stack_lvl+0x73/0xb0
[   17.140639]  print_report+0xd1/0x650
[   17.140664]  ? __virt_addr_valid+0x1db/0x2d0
[   17.140691]  ? kasan_atomics_helper+0xc70/0x5450
[   17.140714]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.140737]  ? kasan_atomics_helper+0xc70/0x5450
[   17.140760]  kasan_report+0x141/0x180
[   17.140784]  ? kasan_atomics_helper+0xc70/0x5450
[   17.140811]  kasan_check_range+0x10c/0x1c0
[   17.140836]  __kasan_check_write+0x18/0x20
[   17.140857]  kasan_atomics_helper+0xc70/0x5450
[   17.140880]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.140904]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.140926]  ? kasan_atomics+0x152/0x310
[   17.140954]  kasan_atomics+0x1dc/0x310
[   17.140978]  ? __pfx_kasan_atomics+0x10/0x10
[   17.141004]  ? __pfx_read_tsc+0x10/0x10
[   17.141025]  ? ktime_get_ts64+0x86/0x230
[   17.141050]  kunit_try_run_case+0x1a5/0x480
[   17.141075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.141097]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.141121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.141144]  ? __kthread_parkme+0x82/0x180
[   17.141165]  ? preempt_count_sub+0x50/0x80
[   17.141190]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.141214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.141256]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.141280]  kthread+0x337/0x6f0
[   17.141300]  ? trace_preempt_on+0x20/0xc0
[   17.141326]  ? __pfx_kthread+0x10/0x10
[   17.141348]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.141371]  ? calculate_sigpending+0x7b/0xa0
[   17.141397]  ? __pfx_kthread+0x10/0x10
[   17.141420]  ret_from_fork+0x116/0x1d0
[   17.141439]  ? __pfx_kthread+0x10/0x10
[   17.141476]  ret_from_fork_asm+0x1a/0x30
[   17.141583]  </TASK>
[   17.141615] 
[   17.147696] Allocated by task 283:
[   17.147942]  kasan_save_stack+0x45/0x70
[   17.148185]  kasan_save_track+0x18/0x40
[   17.148435]  kasan_save_alloc_info+0x3b/0x50
[   17.148866]  __kasan_kmalloc+0xb7/0xc0
[   17.149034]  __kmalloc_cache_noprof+0x189/0x420
[   17.149227]  kasan_atomics+0x95/0x310
[   17.149422]  kunit_try_run_case+0x1a5/0x480
[   17.149672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.149820]  kthread+0x337/0x6f0
[   17.149989]  ret_from_fork+0x116/0x1d0
[   17.150167]  ret_from_fork_asm+0x1a/0x30
[   17.150341] 
[   17.150402] The buggy address belongs to the object at ffff888102b6b880
[   17.150402]  which belongs to the cache kmalloc-64 of size 64
[   17.150916] The buggy address is located 0 bytes to the right of
[   17.150916]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.151275] 
[   17.151334] The buggy address belongs to the physical page:
[   17.151497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.151889] flags: 0x200000000000000(node=0|zone=2)
[   17.152128] page_type: f5(slab)
[   17.152217] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.152367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.152748] page dumped because: kasan: bad access detected
[   17.153008] 
[   17.153110] Memory state around the buggy address:
[   17.153281]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.153810]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.154131] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.154330]                                      ^
[   17.154438]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.154641]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.154763] ==================================================================
[   17.497305] ==================================================================
[   17.498035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   17.498499] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.498912] 
[   17.499079] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.499137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.499152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.499177] Call Trace:
[   17.499198]  <TASK>
[   17.499218]  dump_stack_lvl+0x73/0xb0
[   17.499259]  print_report+0xd1/0x650
[   17.499284]  ? __virt_addr_valid+0x1db/0x2d0
[   17.499310]  ? kasan_atomics_helper+0x164f/0x5450
[   17.499348]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.499373]  ? kasan_atomics_helper+0x164f/0x5450
[   17.499410]  kasan_report+0x141/0x180
[   17.499437]  ? kasan_atomics_helper+0x164f/0x5450
[   17.499466]  kasan_check_range+0x10c/0x1c0
[   17.499492]  __kasan_check_write+0x18/0x20
[   17.499514]  kasan_atomics_helper+0x164f/0x5450
[   17.499539]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.499563]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.499587]  ? kasan_atomics+0x152/0x310
[   17.499616]  kasan_atomics+0x1dc/0x310
[   17.499641]  ? __pfx_kasan_atomics+0x10/0x10
[   17.499668]  ? __pfx_read_tsc+0x10/0x10
[   17.499690]  ? ktime_get_ts64+0x86/0x230
[   17.499717]  kunit_try_run_case+0x1a5/0x480
[   17.499744]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.499778]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.499807]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.499832]  ? __kthread_parkme+0x82/0x180
[   17.499869]  ? preempt_count_sub+0x50/0x80
[   17.499896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.499933]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.499959]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.499995]  kthread+0x337/0x6f0
[   17.500020]  ? trace_preempt_on+0x20/0xc0
[   17.500056]  ? __pfx_kthread+0x10/0x10
[   17.500082]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.500106]  ? calculate_sigpending+0x7b/0xa0
[   17.500144]  ? __pfx_kthread+0x10/0x10
[   17.500169]  ret_from_fork+0x116/0x1d0
[   17.500195]  ? __pfx_kthread+0x10/0x10
[   17.500218]  ret_from_fork_asm+0x1a/0x30
[   17.500268]  </TASK>
[   17.500281] 
[   17.506769] Allocated by task 283:
[   17.506945]  kasan_save_stack+0x45/0x70
[   17.507071]  kasan_save_track+0x18/0x40
[   17.507277]  kasan_save_alloc_info+0x3b/0x50
[   17.507443]  __kasan_kmalloc+0xb7/0xc0
[   17.507539]  __kmalloc_cache_noprof+0x189/0x420
[   17.507889]  kasan_atomics+0x95/0x310
[   17.508051]  kunit_try_run_case+0x1a5/0x480
[   17.508334]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.508593]  kthread+0x337/0x6f0
[   17.508743]  ret_from_fork+0x116/0x1d0
[   17.508833]  ret_from_fork_asm+0x1a/0x30
[   17.508927] 
[   17.508982] The buggy address belongs to the object at ffff888102b6b880
[   17.508982]  which belongs to the cache kmalloc-64 of size 64
[   17.509183] The buggy address is located 0 bytes to the right of
[   17.509183]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.509400] 
[   17.509458] The buggy address belongs to the physical page:
[   17.509567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.509820] flags: 0x200000000000000(node=0|zone=2)
[   17.510043] page_type: f5(slab)
[   17.510210] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.510553] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.510861] page dumped because: kasan: bad access detected
[   17.511090] 
[   17.511181] Memory state around the buggy address:
[   17.511400]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.511721]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.512019] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.512368]                                      ^
[   17.512624]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.512977]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.513335] ==================================================================
[   17.121989] ==================================================================
[   17.122192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   17.122357] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.122615] 
[   17.122737] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.122792] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.122807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.122831] Call Trace:
[   17.122853]  <TASK>
[   17.122874]  dump_stack_lvl+0x73/0xb0
[   17.122905]  print_report+0xd1/0x650
[   17.122931]  ? __virt_addr_valid+0x1db/0x2d0
[   17.122955]  ? kasan_atomics_helper+0xb6a/0x5450
[   17.122977]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.123000]  ? kasan_atomics_helper+0xb6a/0x5450
[   17.123022]  kasan_report+0x141/0x180
[   17.123044]  ? kasan_atomics_helper+0xb6a/0x5450
[   17.123072]  kasan_check_range+0x10c/0x1c0
[   17.123097]  __kasan_check_write+0x18/0x20
[   17.123117]  kasan_atomics_helper+0xb6a/0x5450
[   17.123140]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.123164]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.123185]  ? kasan_atomics+0x152/0x310
[   17.123212]  kasan_atomics+0x1dc/0x310
[   17.123247]  ? __pfx_kasan_atomics+0x10/0x10
[   17.123273]  ? __pfx_read_tsc+0x10/0x10
[   17.123296]  ? ktime_get_ts64+0x86/0x230
[   17.123322]  kunit_try_run_case+0x1a5/0x480
[   17.123348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.123370]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.123394]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.123417]  ? __kthread_parkme+0x82/0x180
[   17.123438]  ? preempt_count_sub+0x50/0x80
[   17.123525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.123550]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.123574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.123597]  kthread+0x337/0x6f0
[   17.123618]  ? trace_preempt_on+0x20/0xc0
[   17.123643]  ? __pfx_kthread+0x10/0x10
[   17.123664]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.123686]  ? calculate_sigpending+0x7b/0xa0
[   17.123712]  ? __pfx_kthread+0x10/0x10
[   17.123734]  ret_from_fork+0x116/0x1d0
[   17.123752]  ? __pfx_kthread+0x10/0x10
[   17.123774]  ret_from_fork_asm+0x1a/0x30
[   17.123805]  </TASK>
[   17.123819] 
[   17.130898] Allocated by task 283:
[   17.131047]  kasan_save_stack+0x45/0x70
[   17.131243]  kasan_save_track+0x18/0x40
[   17.131434]  kasan_save_alloc_info+0x3b/0x50
[   17.131640]  __kasan_kmalloc+0xb7/0xc0
[   17.131834]  __kmalloc_cache_noprof+0x189/0x420
[   17.131995]  kasan_atomics+0x95/0x310
[   17.132181]  kunit_try_run_case+0x1a5/0x480
[   17.132308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.132781]  kthread+0x337/0x6f0
[   17.132975]  ret_from_fork+0x116/0x1d0
[   17.133075]  ret_from_fork_asm+0x1a/0x30
[   17.133167] 
[   17.133273] The buggy address belongs to the object at ffff888102b6b880
[   17.133273]  which belongs to the cache kmalloc-64 of size 64
[   17.133757] The buggy address is located 0 bytes to the right of
[   17.133757]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.134183] 
[   17.134308] The buggy address belongs to the physical page:
[   17.134434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.134631] flags: 0x200000000000000(node=0|zone=2)
[   17.134736] page_type: f5(slab)
[   17.134822] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.134954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.135081] page dumped because: kasan: bad access detected
[   17.135181] 
[   17.135846] Memory state around the buggy address:
[   17.136251]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.136718]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.137178] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.137535]                                      ^
[   17.137823]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.138048]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.138246] ==================================================================
[   17.032712] ==================================================================
[   17.032975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   17.033134] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.034021] 
[   17.034247] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.034427] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.034449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.034496] Call Trace:
[   17.034527]  <TASK>
[   17.034548]  dump_stack_lvl+0x73/0xb0
[   17.034593]  print_report+0xd1/0x650
[   17.034618]  ? __virt_addr_valid+0x1db/0x2d0
[   17.034641]  ? kasan_atomics_helper+0x860/0x5450
[   17.034664]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.034687]  ? kasan_atomics_helper+0x860/0x5450
[   17.034710]  kasan_report+0x141/0x180
[   17.034733]  ? kasan_atomics_helper+0x860/0x5450
[   17.034760]  kasan_check_range+0x10c/0x1c0
[   17.034784]  __kasan_check_write+0x18/0x20
[   17.034805]  kasan_atomics_helper+0x860/0x5450
[   17.034829]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.034852]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.034875]  ? kasan_atomics+0x152/0x310
[   17.034903]  kasan_atomics+0x1dc/0x310
[   17.034926]  ? __pfx_kasan_atomics+0x10/0x10
[   17.034951]  ? __pfx_read_tsc+0x10/0x10
[   17.034973]  ? ktime_get_ts64+0x86/0x230
[   17.034998]  kunit_try_run_case+0x1a5/0x480
[   17.035022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.035045]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.035068]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.035091]  ? __kthread_parkme+0x82/0x180
[   17.035112]  ? preempt_count_sub+0x50/0x80
[   17.035137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.035161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.035185]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.035208]  kthread+0x337/0x6f0
[   17.035247]  ? trace_preempt_on+0x20/0xc0
[   17.035274]  ? __pfx_kthread+0x10/0x10
[   17.035296]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.035318]  ? calculate_sigpending+0x7b/0xa0
[   17.035344]  ? __pfx_kthread+0x10/0x10
[   17.035366]  ret_from_fork+0x116/0x1d0
[   17.035385]  ? __pfx_kthread+0x10/0x10
[   17.035407]  ret_from_fork_asm+0x1a/0x30
[   17.035440]  </TASK>
[   17.035465] 
[   17.043023] Allocated by task 283:
[   17.043236]  kasan_save_stack+0x45/0x70
[   17.043439]  kasan_save_track+0x18/0x40
[   17.043602]  kasan_save_alloc_info+0x3b/0x50
[   17.044084]  __kasan_kmalloc+0xb7/0xc0
[   17.044256]  __kmalloc_cache_noprof+0x189/0x420
[   17.044413]  kasan_atomics+0x95/0x310
[   17.044730]  kunit_try_run_case+0x1a5/0x480
[   17.044971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.045110]  kthread+0x337/0x6f0
[   17.045261]  ret_from_fork+0x116/0x1d0
[   17.045568]  ret_from_fork_asm+0x1a/0x30
[   17.045715] 
[   17.045841] The buggy address belongs to the object at ffff888102b6b880
[   17.045841]  which belongs to the cache kmalloc-64 of size 64
[   17.046116] The buggy address is located 0 bytes to the right of
[   17.046116]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.046477] 
[   17.046864] The buggy address belongs to the physical page:
[   17.047149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.047324] flags: 0x200000000000000(node=0|zone=2)
[   17.047731] page_type: f5(slab)
[   17.047935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.048571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.049098] page dumped because: kasan: bad access detected
[   17.049243] 
[   17.049300] Memory state around the buggy address:
[   17.049583]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.049866]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.050193] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.050351]                                      ^
[   17.050610]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.050890]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.051142] ==================================================================
[   16.910987] ==================================================================
[   16.911743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   16.912006] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.912275] 
[   16.912396] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.912503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.912520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.912545] Call Trace:
[   16.912568]  <TASK>
[   16.912590]  dump_stack_lvl+0x73/0xb0
[   16.912619]  print_report+0xd1/0x650
[   16.912643]  ? __virt_addr_valid+0x1db/0x2d0
[   16.912668]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.912690]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.912713]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.912735]  kasan_report+0x141/0x180
[   16.912758]  ? kasan_atomics_helper+0x4a0/0x5450
[   16.912785]  kasan_check_range+0x10c/0x1c0
[   16.912810]  __kasan_check_write+0x18/0x20
[   16.912831]  kasan_atomics_helper+0x4a0/0x5450
[   16.912854]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.912879]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.912902]  ? kasan_atomics+0x152/0x310
[   16.912928]  kasan_atomics+0x1dc/0x310
[   16.912952]  ? __pfx_kasan_atomics+0x10/0x10
[   16.912976]  ? __pfx_read_tsc+0x10/0x10
[   16.912998]  ? ktime_get_ts64+0x86/0x230
[   16.913023]  kunit_try_run_case+0x1a5/0x480
[   16.913048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.913070]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.913094]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.913116]  ? __kthread_parkme+0x82/0x180
[   16.913137]  ? preempt_count_sub+0x50/0x80
[   16.913162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.913186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.913208]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.913240]  kthread+0x337/0x6f0
[   16.913263]  ? trace_preempt_on+0x20/0xc0
[   16.913287]  ? __pfx_kthread+0x10/0x10
[   16.913309]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.913330]  ? calculate_sigpending+0x7b/0xa0
[   16.913355]  ? __pfx_kthread+0x10/0x10
[   16.913377]  ret_from_fork+0x116/0x1d0
[   16.913396]  ? __pfx_kthread+0x10/0x10
[   16.913417]  ret_from_fork_asm+0x1a/0x30
[   16.913499]  </TASK>
[   16.913516] 
[   16.919733] Allocated by task 283:
[   16.919899]  kasan_save_stack+0x45/0x70
[   16.920090]  kasan_save_track+0x18/0x40
[   16.920234]  kasan_save_alloc_info+0x3b/0x50
[   16.920417]  __kasan_kmalloc+0xb7/0xc0
[   16.920742]  __kmalloc_cache_noprof+0x189/0x420
[   16.920853]  kasan_atomics+0x95/0x310
[   16.920939]  kunit_try_run_case+0x1a5/0x480
[   16.921032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.921137]  kthread+0x337/0x6f0
[   16.921216]  ret_from_fork+0x116/0x1d0
[   16.921422]  ret_from_fork_asm+0x1a/0x30
[   16.921747] 
[   16.921876] The buggy address belongs to the object at ffff888102b6b880
[   16.921876]  which belongs to the cache kmalloc-64 of size 64
[   16.922624] The buggy address is located 0 bytes to the right of
[   16.922624]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.922940] 
[   16.923061] The buggy address belongs to the physical page:
[   16.923682] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.923924] flags: 0x200000000000000(node=0|zone=2)
[   16.924112] page_type: f5(slab)
[   16.924277] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.925855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.926134] page dumped because: kasan: bad access detected
[   16.926329] 
[   16.926540] Memory state around the buggy address:
[   16.926704]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.926944]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.927127] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.927422]                                      ^
[   16.927581]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.927710]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.928003] ==================================================================
[   17.155075] ==================================================================
[   17.155561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   17.156013] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.156527] 
[   17.156673] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.156727] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.156741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.156765] Call Trace:
[   17.156786]  <TASK>
[   17.156807]  dump_stack_lvl+0x73/0xb0
[   17.156837]  print_report+0xd1/0x650
[   17.156862]  ? __virt_addr_valid+0x1db/0x2d0
[   17.156888]  ? kasan_atomics_helper+0x4a84/0x5450
[   17.156912]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.156937]  ? kasan_atomics_helper+0x4a84/0x5450
[   17.156960]  kasan_report+0x141/0x180
[   17.156985]  ? kasan_atomics_helper+0x4a84/0x5450
[   17.157013]  __asan_report_load4_noabort+0x18/0x20
[   17.157036]  kasan_atomics_helper+0x4a84/0x5450
[   17.157060]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.157084]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.157107]  ? kasan_atomics+0x152/0x310
[   17.157135]  kasan_atomics+0x1dc/0x310
[   17.157159]  ? __pfx_kasan_atomics+0x10/0x10
[   17.157186]  ? __pfx_read_tsc+0x10/0x10
[   17.157208]  ? ktime_get_ts64+0x86/0x230
[   17.157245]  kunit_try_run_case+0x1a5/0x480
[   17.157273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.157295]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.157319]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.157342]  ? __kthread_parkme+0x82/0x180
[   17.157363]  ? preempt_count_sub+0x50/0x80
[   17.157388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.157412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.157435]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.157529]  kthread+0x337/0x6f0
[   17.157554]  ? trace_preempt_on+0x20/0xc0
[   17.157582]  ? __pfx_kthread+0x10/0x10
[   17.157603]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.157626]  ? calculate_sigpending+0x7b/0xa0
[   17.157653]  ? __pfx_kthread+0x10/0x10
[   17.157676]  ret_from_fork+0x116/0x1d0
[   17.157696]  ? __pfx_kthread+0x10/0x10
[   17.157718]  ret_from_fork_asm+0x1a/0x30
[   17.157752]  </TASK>
[   17.157764] 
[   17.163847] Allocated by task 283:
[   17.164068]  kasan_save_stack+0x45/0x70
[   17.164271]  kasan_save_track+0x18/0x40
[   17.164551]  kasan_save_alloc_info+0x3b/0x50
[   17.164827]  __kasan_kmalloc+0xb7/0xc0
[   17.165034]  __kmalloc_cache_noprof+0x189/0x420
[   17.165204]  kasan_atomics+0x95/0x310
[   17.165305]  kunit_try_run_case+0x1a5/0x480
[   17.165400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.165884]  kthread+0x337/0x6f0
[   17.166090]  ret_from_fork+0x116/0x1d0
[   17.166355]  ret_from_fork_asm+0x1a/0x30
[   17.167375] 
[   17.167521] The buggy address belongs to the object at ffff888102b6b880
[   17.167521]  which belongs to the cache kmalloc-64 of size 64
[   17.167921] The buggy address is located 0 bytes to the right of
[   17.167921]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.168124] 
[   17.168521] The buggy address belongs to the physical page:
[   17.168944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.169502] flags: 0x200000000000000(node=0|zone=2)
[   17.169890] page_type: f5(slab)
[   17.170012] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.170153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.170344] page dumped because: kasan: bad access detected
[   17.170594] 
[   17.170662] Memory state around the buggy address:
[   17.170816]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.171112]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.171385] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.171603]                                      ^
[   17.171701]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.172044]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.172780] ==================================================================
[   17.546019] ==================================================================
[   17.546463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   17.546889] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.547200] 
[   17.547339] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.547389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.547404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.547424] Call Trace:
[   17.547440]  <TASK>
[   17.547454]  dump_stack_lvl+0x73/0xb0
[   17.547480]  print_report+0xd1/0x650
[   17.547501]  ? __virt_addr_valid+0x1db/0x2d0
[   17.547525]  ? kasan_atomics_helper+0x1818/0x5450
[   17.547547]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.547568]  ? kasan_atomics_helper+0x1818/0x5450
[   17.547590]  kasan_report+0x141/0x180
[   17.547614]  ? kasan_atomics_helper+0x1818/0x5450
[   17.547640]  kasan_check_range+0x10c/0x1c0
[   17.547664]  __kasan_check_write+0x18/0x20
[   17.547684]  kasan_atomics_helper+0x1818/0x5450
[   17.547707]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.547730]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.547751]  ? kasan_atomics+0x152/0x310
[   17.547777]  kasan_atomics+0x1dc/0x310
[   17.547801]  ? __pfx_kasan_atomics+0x10/0x10
[   17.547825]  ? __pfx_read_tsc+0x10/0x10
[   17.547846]  ? ktime_get_ts64+0x86/0x230
[   17.547869]  kunit_try_run_case+0x1a5/0x480
[   17.547893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.547915]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.547938]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.547959]  ? __kthread_parkme+0x82/0x180
[   17.547980]  ? preempt_count_sub+0x50/0x80
[   17.548002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.548026]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.548048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.548071]  kthread+0x337/0x6f0
[   17.548091]  ? trace_preempt_on+0x20/0xc0
[   17.548113]  ? __pfx_kthread+0x10/0x10
[   17.548135]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.548156]  ? calculate_sigpending+0x7b/0xa0
[   17.548179]  ? __pfx_kthread+0x10/0x10
[   17.548200]  ret_from_fork+0x116/0x1d0
[   17.548219]  ? __pfx_kthread+0x10/0x10
[   17.548498]  ret_from_fork_asm+0x1a/0x30
[   17.548531]  </TASK>
[   17.548543] 
[   17.554827] Allocated by task 283:
[   17.554932]  kasan_save_stack+0x45/0x70
[   17.555120]  kasan_save_track+0x18/0x40
[   17.555285]  kasan_save_alloc_info+0x3b/0x50
[   17.555383]  __kasan_kmalloc+0xb7/0xc0
[   17.555471]  __kmalloc_cache_noprof+0x189/0x420
[   17.555566]  kasan_atomics+0x95/0x310
[   17.555650]  kunit_try_run_case+0x1a5/0x480
[   17.555740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.555841]  kthread+0x337/0x6f0
[   17.555918]  ret_from_fork+0x116/0x1d0
[   17.556000]  ret_from_fork_asm+0x1a/0x30
[   17.556091] 
[   17.556144] The buggy address belongs to the object at ffff888102b6b880
[   17.556144]  which belongs to the cache kmalloc-64 of size 64
[   17.556678] The buggy address is located 0 bytes to the right of
[   17.556678]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.557415] 
[   17.557544] The buggy address belongs to the physical page:
[   17.557887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.558358] flags: 0x200000000000000(node=0|zone=2)
[   17.558589] page_type: f5(slab)
[   17.558682] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.558824] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.558956] page dumped because: kasan: bad access detected
[   17.559060] 
[   17.559112] Memory state around the buggy address:
[   17.559212]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.559544]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.559974] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.560378]                                      ^
[   17.560684]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.561106]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.561270] ==================================================================
[   16.981097] ==================================================================
[   16.981402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   16.981793] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.982140] 
[   16.982273] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.982346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.982363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.982397] Call Trace:
[   16.982420]  <TASK>
[   16.982440]  dump_stack_lvl+0x73/0xb0
[   16.982552]  print_report+0xd1/0x650
[   16.982577]  ? __virt_addr_valid+0x1db/0x2d0
[   16.982615]  ? kasan_atomics_helper+0x697/0x5450
[   16.982638]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.982672]  ? kasan_atomics_helper+0x697/0x5450
[   16.982698]  kasan_report+0x141/0x180
[   16.982722]  ? kasan_atomics_helper+0x697/0x5450
[   16.982761]  kasan_check_range+0x10c/0x1c0
[   16.982788]  __kasan_check_write+0x18/0x20
[   16.982818]  kasan_atomics_helper+0x697/0x5450
[   16.982846]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.982870]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.982903]  ? kasan_atomics+0x152/0x310
[   16.982933]  kasan_atomics+0x1dc/0x310
[   16.982958]  ? __pfx_kasan_atomics+0x10/0x10
[   16.982997]  ? __pfx_read_tsc+0x10/0x10
[   16.983019]  ? ktime_get_ts64+0x86/0x230
[   16.983055]  kunit_try_run_case+0x1a5/0x480
[   16.983082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.983115]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.983142]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.983167]  ? __kthread_parkme+0x82/0x180
[   16.983194]  ? preempt_count_sub+0x50/0x80
[   16.983233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.983261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.983285]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.983319]  kthread+0x337/0x6f0
[   16.983341]  ? trace_preempt_on+0x20/0xc0
[   16.983367]  ? __pfx_kthread+0x10/0x10
[   16.983389]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.983411]  ? calculate_sigpending+0x7b/0xa0
[   16.983436]  ? __pfx_kthread+0x10/0x10
[   16.983516]  ret_from_fork+0x116/0x1d0
[   16.983540]  ? __pfx_kthread+0x10/0x10
[   16.983563]  ret_from_fork_asm+0x1a/0x30
[   16.983595]  </TASK>
[   16.983609] 
[   16.989042] Allocated by task 283:
[   16.989251]  kasan_save_stack+0x45/0x70
[   16.989556]  kasan_save_track+0x18/0x40
[   16.989814]  kasan_save_alloc_info+0x3b/0x50
[   16.990086]  __kasan_kmalloc+0xb7/0xc0
[   16.990318]  __kmalloc_cache_noprof+0x189/0x420
[   16.990672]  kasan_atomics+0x95/0x310
[   16.990920]  kunit_try_run_case+0x1a5/0x480
[   16.991076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.991194]  kthread+0x337/0x6f0
[   16.991291]  ret_from_fork+0x116/0x1d0
[   16.991407]  ret_from_fork_asm+0x1a/0x30
[   16.991835] 
[   16.991961] The buggy address belongs to the object at ffff888102b6b880
[   16.991961]  which belongs to the cache kmalloc-64 of size 64
[   16.992442] The buggy address is located 0 bytes to the right of
[   16.992442]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.992952] 
[   16.993024] The buggy address belongs to the physical page:
[   16.993199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.993638] flags: 0x200000000000000(node=0|zone=2)
[   16.994985] page_type: f5(slab)
[   16.995234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.995398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.995932] page dumped because: kasan: bad access detected
[   16.996350] 
[   16.996449] Memory state around the buggy address:
[   16.996879]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.997201]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.997483] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.997719]                                      ^
[   16.997909]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.998139]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.998379] ==================================================================
[   16.963147] ==================================================================
[   16.963584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   16.964103] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.964589] 
[   16.964727] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.964783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.964807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.964831] Call Trace:
[   16.964851]  <TASK>
[   16.964870]  dump_stack_lvl+0x73/0xb0
[   16.964899]  print_report+0xd1/0x650
[   16.964923]  ? __virt_addr_valid+0x1db/0x2d0
[   16.964947]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.964971]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.964995]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.965018]  kasan_report+0x141/0x180
[   16.965041]  ? kasan_atomics_helper+0x5fe/0x5450
[   16.965069]  kasan_check_range+0x10c/0x1c0
[   16.965094]  __kasan_check_write+0x18/0x20
[   16.965114]  kasan_atomics_helper+0x5fe/0x5450
[   16.965138]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.965161]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.965184]  ? kasan_atomics+0x152/0x310
[   16.965211]  kasan_atomics+0x1dc/0x310
[   16.965246]  ? __pfx_kasan_atomics+0x10/0x10
[   16.965272]  ? __pfx_read_tsc+0x10/0x10
[   16.965294]  ? ktime_get_ts64+0x86/0x230
[   16.965319]  kunit_try_run_case+0x1a5/0x480
[   16.965344]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.965367]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.965391]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.965415]  ? __kthread_parkme+0x82/0x180
[   16.965437]  ? preempt_count_sub+0x50/0x80
[   16.965546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.965573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.965608]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.965635]  kthread+0x337/0x6f0
[   16.965656]  ? trace_preempt_on+0x20/0xc0
[   16.965682]  ? __pfx_kthread+0x10/0x10
[   16.965705]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.965727]  ? calculate_sigpending+0x7b/0xa0
[   16.965753]  ? __pfx_kthread+0x10/0x10
[   16.965777]  ret_from_fork+0x116/0x1d0
[   16.965795]  ? __pfx_kthread+0x10/0x10
[   16.965818]  ret_from_fork_asm+0x1a/0x30
[   16.965850]  </TASK>
[   16.965862] 
[   16.972509] Allocated by task 283:
[   16.972681]  kasan_save_stack+0x45/0x70
[   16.972820]  kasan_save_track+0x18/0x40
[   16.972990]  kasan_save_alloc_info+0x3b/0x50
[   16.973196]  __kasan_kmalloc+0xb7/0xc0
[   16.973310]  __kmalloc_cache_noprof+0x189/0x420
[   16.973425]  kasan_atomics+0x95/0x310
[   16.973826]  kunit_try_run_case+0x1a5/0x480
[   16.974116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.974536]  kthread+0x337/0x6f0
[   16.974768]  ret_from_fork+0x116/0x1d0
[   16.975025]  ret_from_fork_asm+0x1a/0x30
[   16.975231] 
[   16.975290] The buggy address belongs to the object at ffff888102b6b880
[   16.975290]  which belongs to the cache kmalloc-64 of size 64
[   16.975768] The buggy address is located 0 bytes to the right of
[   16.975768]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.976271] 
[   16.976361] The buggy address belongs to the physical page:
[   16.976603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.976835] flags: 0x200000000000000(node=0|zone=2)
[   16.976940] page_type: f5(slab)
[   16.977030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.977163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.977300] page dumped because: kasan: bad access detected
[   16.977403] 
[   16.977503] Memory state around the buggy address:
[   16.977714]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.978017]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.978356] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.978877]                                      ^
[   16.979098]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.979566]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.979915] ==================================================================
[   17.514110] ==================================================================
[   17.514297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   17.515135] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.515471] 
[   17.515631] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.515685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.515699] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.515733] Call Trace:
[   17.515753]  <TASK>
[   17.515771]  dump_stack_lvl+0x73/0xb0
[   17.515816]  print_report+0xd1/0x650
[   17.515842]  ? __virt_addr_valid+0x1db/0x2d0
[   17.515877]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.515905]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.515929]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.515966]  kasan_report+0x141/0x180
[   17.515992]  ? kasan_atomics_helper+0x16e7/0x5450
[   17.516022]  kasan_check_range+0x10c/0x1c0
[   17.516048]  __kasan_check_write+0x18/0x20
[   17.516068]  kasan_atomics_helper+0x16e7/0x5450
[   17.516094]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.516118]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.516141]  ? kasan_atomics+0x152/0x310
[   17.516170]  kasan_atomics+0x1dc/0x310
[   17.516202]  ? __pfx_kasan_atomics+0x10/0x10
[   17.516241]  ? __pfx_read_tsc+0x10/0x10
[   17.516267]  ? ktime_get_ts64+0x86/0x230
[   17.516293]  kunit_try_run_case+0x1a5/0x480
[   17.516320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.516342]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.516367]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.516391]  ? __kthread_parkme+0x82/0x180
[   17.516412]  ? preempt_count_sub+0x50/0x80
[   17.516437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.516462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.516486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.516510]  kthread+0x337/0x6f0
[   17.516530]  ? trace_preempt_on+0x20/0xc0
[   17.516556]  ? __pfx_kthread+0x10/0x10
[   17.516577]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.516600]  ? calculate_sigpending+0x7b/0xa0
[   17.516625]  ? __pfx_kthread+0x10/0x10
[   17.516648]  ret_from_fork+0x116/0x1d0
[   17.516669]  ? __pfx_kthread+0x10/0x10
[   17.516691]  ret_from_fork_asm+0x1a/0x30
[   17.516725]  </TASK>
[   17.516738] 
[   17.522859] Allocated by task 283:
[   17.523058]  kasan_save_stack+0x45/0x70
[   17.523283]  kasan_save_track+0x18/0x40
[   17.523463]  kasan_save_alloc_info+0x3b/0x50
[   17.523658]  __kasan_kmalloc+0xb7/0xc0
[   17.523859]  __kmalloc_cache_noprof+0x189/0x420
[   17.524044]  kasan_atomics+0x95/0x310
[   17.524245]  kunit_try_run_case+0x1a5/0x480
[   17.524451]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.524634]  kthread+0x337/0x6f0
[   17.524819]  ret_from_fork+0x116/0x1d0
[   17.524909]  ret_from_fork_asm+0x1a/0x30
[   17.525115] 
[   17.525256] The buggy address belongs to the object at ffff888102b6b880
[   17.525256]  which belongs to the cache kmalloc-64 of size 64
[   17.525706] The buggy address is located 0 bytes to the right of
[   17.525706]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.526040] 
[   17.526099] The buggy address belongs to the physical page:
[   17.526206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.526674] flags: 0x200000000000000(node=0|zone=2)
[   17.526990] page_type: f5(slab)
[   17.527089] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.527244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.527624] page dumped because: kasan: bad access detected
[   17.527911] 
[   17.528033] Memory state around the buggy address:
[   17.528359]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.528599]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.528818] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.529067]                                      ^
[   17.529309]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.529486]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.529616] ==================================================================
[   16.856663] ==================================================================
[   16.857053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   16.857284] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.857420] 
[   16.857522] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.857854] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.857880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.857905] Call Trace:
[   16.857929]  <TASK>
[   16.857980]  dump_stack_lvl+0x73/0xb0
[   16.858017]  print_report+0xd1/0x650
[   16.858051]  ? __virt_addr_valid+0x1db/0x2d0
[   16.858108]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.858131]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.858165]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.858189]  kasan_report+0x141/0x180
[   16.858254]  ? kasan_atomics_helper+0x4b6e/0x5450
[   16.858286]  __asan_report_store4_noabort+0x1b/0x30
[   16.858317]  kasan_atomics_helper+0x4b6e/0x5450
[   16.858351]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.858375]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.858397]  ? kasan_atomics+0x152/0x310
[   16.858424]  kasan_atomics+0x1dc/0x310
[   16.858447]  ? __pfx_kasan_atomics+0x10/0x10
[   16.858471]  ? __pfx_read_tsc+0x10/0x10
[   16.858493]  ? ktime_get_ts64+0x86/0x230
[   16.858518]  kunit_try_run_case+0x1a5/0x480
[   16.858543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.858707]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.858738]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.858798]  ? __kthread_parkme+0x82/0x180
[   16.858822]  ? preempt_count_sub+0x50/0x80
[   16.858848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.858873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.858899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.858925]  kthread+0x337/0x6f0
[   16.858947]  ? trace_preempt_on+0x20/0xc0
[   16.858974]  ? __pfx_kthread+0x10/0x10
[   16.858997]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.859020]  ? calculate_sigpending+0x7b/0xa0
[   16.859047]  ? __pfx_kthread+0x10/0x10
[   16.859071]  ret_from_fork+0x116/0x1d0
[   16.859092]  ? __pfx_kthread+0x10/0x10
[   16.859116]  ret_from_fork_asm+0x1a/0x30
[   16.859152]  </TASK>
[   16.859166] 
[   16.866583] Allocated by task 283:
[   16.866980]  kasan_save_stack+0x45/0x70
[   16.867372]  kasan_save_track+0x18/0x40
[   16.867844]  kasan_save_alloc_info+0x3b/0x50
[   16.868060]  __kasan_kmalloc+0xb7/0xc0
[   16.868333]  __kmalloc_cache_noprof+0x189/0x420
[   16.868840]  kasan_atomics+0x95/0x310
[   16.869051]  kunit_try_run_case+0x1a5/0x480
[   16.869278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.869477]  kthread+0x337/0x6f0
[   16.869657]  ret_from_fork+0x116/0x1d0
[   16.869839]  ret_from_fork_asm+0x1a/0x30
[   16.869965] 
[   16.870090] The buggy address belongs to the object at ffff888102b6b880
[   16.870090]  which belongs to the cache kmalloc-64 of size 64
[   16.870385] The buggy address is located 0 bytes to the right of
[   16.870385]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.870814] 
[   16.870917] The buggy address belongs to the physical page:
[   16.871109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.871631] flags: 0x200000000000000(node=0|zone=2)
[   16.871807] page_type: f5(slab)
[   16.871976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.872270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.872602] page dumped because: kasan: bad access detected
[   16.872773] 
[   16.872915] Memory state around the buggy address:
[   16.873077]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.873327]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.873756] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.874177]                                      ^
[   16.874448]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.874750]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.875039] ==================================================================
[   17.052010] ==================================================================
[   17.052629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   17.052825] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.053216] 
[   17.053349] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.053414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.053429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.053475] Call Trace:
[   17.053494]  <TASK>
[   17.053514]  dump_stack_lvl+0x73/0xb0
[   17.053610]  print_report+0xd1/0x650
[   17.053662]  ? __virt_addr_valid+0x1db/0x2d0
[   17.053688]  ? kasan_atomics_helper+0x8f9/0x5450
[   17.053720]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.053746]  ? kasan_atomics_helper+0x8f9/0x5450
[   17.053769]  kasan_report+0x141/0x180
[   17.053793]  ? kasan_atomics_helper+0x8f9/0x5450
[   17.053820]  kasan_check_range+0x10c/0x1c0
[   17.053845]  __kasan_check_write+0x18/0x20
[   17.053865]  kasan_atomics_helper+0x8f9/0x5450
[   17.053890]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.053913]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.053934]  ? kasan_atomics+0x152/0x310
[   17.053962]  kasan_atomics+0x1dc/0x310
[   17.053986]  ? __pfx_kasan_atomics+0x10/0x10
[   17.054010]  ? __pfx_read_tsc+0x10/0x10
[   17.054032]  ? ktime_get_ts64+0x86/0x230
[   17.054057]  kunit_try_run_case+0x1a5/0x480
[   17.054082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.054104]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.054128]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.054151]  ? __kthread_parkme+0x82/0x180
[   17.054172]  ? preempt_count_sub+0x50/0x80
[   17.054197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.054236]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.054264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.054288]  kthread+0x337/0x6f0
[   17.054309]  ? trace_preempt_on+0x20/0xc0
[   17.054342]  ? __pfx_kthread+0x10/0x10
[   17.054368]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.054391]  ? calculate_sigpending+0x7b/0xa0
[   17.054417]  ? __pfx_kthread+0x10/0x10
[   17.054440]  ret_from_fork+0x116/0x1d0
[   17.054461]  ? __pfx_kthread+0x10/0x10
[   17.054582]  ret_from_fork_asm+0x1a/0x30
[   17.054623]  </TASK>
[   17.054639] 
[   17.060459] Allocated by task 283:
[   17.061407]  kasan_save_stack+0x45/0x70
[   17.061749]  kasan_save_track+0x18/0x40
[   17.061905]  kasan_save_alloc_info+0x3b/0x50
[   17.062001]  __kasan_kmalloc+0xb7/0xc0
[   17.062123]  __kmalloc_cache_noprof+0x189/0x420
[   17.062352]  kasan_atomics+0x95/0x310
[   17.062919]  kunit_try_run_case+0x1a5/0x480
[   17.063207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.063340]  kthread+0x337/0x6f0
[   17.063619]  ret_from_fork+0x116/0x1d0
[   17.064130]  ret_from_fork_asm+0x1a/0x30
[   17.064282] 
[   17.064378] The buggy address belongs to the object at ffff888102b6b880
[   17.064378]  which belongs to the cache kmalloc-64 of size 64
[   17.064907] The buggy address is located 0 bytes to the right of
[   17.064907]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.065292] 
[   17.065413] The buggy address belongs to the physical page:
[   17.065847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.066016] flags: 0x200000000000000(node=0|zone=2)
[   17.066135] page_type: f5(slab)
[   17.066342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.066836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.067050] page dumped because: kasan: bad access detected
[   17.067158] 
[   17.067212] Memory state around the buggy address:
[   17.067485]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.067920]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.068085] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.068427]                                      ^
[   17.068960]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.069123]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.069329] ==================================================================
[   17.257066] ==================================================================
[   17.257424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   17.257770] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.258170] 
[   17.258296] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.258355] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.258370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.258393] Call Trace:
[   17.258409]  <TASK>
[   17.258426]  dump_stack_lvl+0x73/0xb0
[   17.258453]  print_report+0xd1/0x650
[   17.258478]  ? __virt_addr_valid+0x1db/0x2d0
[   17.258503]  ? kasan_atomics_helper+0x4a36/0x5450
[   17.258526]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.258549]  ? kasan_atomics_helper+0x4a36/0x5450
[   17.258572]  kasan_report+0x141/0x180
[   17.258596]  ? kasan_atomics_helper+0x4a36/0x5450
[   17.258624]  __asan_report_load4_noabort+0x18/0x20
[   17.258646]  kasan_atomics_helper+0x4a36/0x5450
[   17.258670]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.258694]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.258715]  ? kasan_atomics+0x152/0x310
[   17.258743]  kasan_atomics+0x1dc/0x310
[   17.258768]  ? __pfx_kasan_atomics+0x10/0x10
[   17.258793]  ? __pfx_read_tsc+0x10/0x10
[   17.258814]  ? ktime_get_ts64+0x86/0x230
[   17.258840]  kunit_try_run_case+0x1a5/0x480
[   17.258865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.258888]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.258912]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.258936]  ? __kthread_parkme+0x82/0x180
[   17.258958]  ? preempt_count_sub+0x50/0x80
[   17.258982]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.259007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.259030]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.259054]  kthread+0x337/0x6f0
[   17.259075]  ? trace_preempt_on+0x20/0xc0
[   17.259098]  ? __pfx_kthread+0x10/0x10
[   17.259121]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.259143]  ? calculate_sigpending+0x7b/0xa0
[   17.259169]  ? __pfx_kthread+0x10/0x10
[   17.259192]  ret_from_fork+0x116/0x1d0
[   17.259211]  ? __pfx_kthread+0x10/0x10
[   17.259245]  ret_from_fork_asm+0x1a/0x30
[   17.259278]  </TASK>
[   17.259290] 
[   17.267599] Allocated by task 283:
[   17.267745]  kasan_save_stack+0x45/0x70
[   17.267864]  kasan_save_track+0x18/0x40
[   17.267956]  kasan_save_alloc_info+0x3b/0x50
[   17.268176]  __kasan_kmalloc+0xb7/0xc0
[   17.268331]  __kmalloc_cache_noprof+0x189/0x420
[   17.268593]  kasan_atomics+0x95/0x310
[   17.268744]  kunit_try_run_case+0x1a5/0x480
[   17.268871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.268988]  kthread+0x337/0x6f0
[   17.269094]  ret_from_fork+0x116/0x1d0
[   17.269291]  ret_from_fork_asm+0x1a/0x30
[   17.269544] 
[   17.269677] The buggy address belongs to the object at ffff888102b6b880
[   17.269677]  which belongs to the cache kmalloc-64 of size 64
[   17.270194] The buggy address is located 0 bytes to the right of
[   17.270194]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.270660] 
[   17.270726] The buggy address belongs to the physical page:
[   17.271005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.271320] flags: 0x200000000000000(node=0|zone=2)
[   17.271511] page_type: f5(slab)
[   17.271611] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.271939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.272172] page dumped because: kasan: bad access detected
[   17.272394] 
[   17.272512] Memory state around the buggy address:
[   17.272699]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.272927]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.273207] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.273547]                                      ^
[   17.273763]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.274057]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.274418] ==================================================================
[   17.808162] ==================================================================
[   17.808721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   17.809161] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.809619] 
[   17.810165] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.810235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.810251] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.810275] Call Trace:
[   17.810302]  <TASK>
[   17.810320]  dump_stack_lvl+0x73/0xb0
[   17.810364]  print_report+0xd1/0x650
[   17.810390]  ? __virt_addr_valid+0x1db/0x2d0
[   17.810417]  ? kasan_atomics_helper+0x4fb2/0x5450
[   17.810441]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.810467]  ? kasan_atomics_helper+0x4fb2/0x5450
[   17.810491]  kasan_report+0x141/0x180
[   17.810514]  ? kasan_atomics_helper+0x4fb2/0x5450
[   17.810542]  __asan_report_load8_noabort+0x18/0x20
[   17.810564]  kasan_atomics_helper+0x4fb2/0x5450
[   17.810588]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.810611]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.810634]  ? kasan_atomics+0x152/0x310
[   17.810662]  kasan_atomics+0x1dc/0x310
[   17.810686]  ? __pfx_kasan_atomics+0x10/0x10
[   17.810711]  ? __pfx_read_tsc+0x10/0x10
[   17.810732]  ? ktime_get_ts64+0x86/0x230
[   17.810757]  kunit_try_run_case+0x1a5/0x480
[   17.810782]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.810804]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.810828]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.810851]  ? __kthread_parkme+0x82/0x180
[   17.810872]  ? preempt_count_sub+0x50/0x80
[   17.810897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.810921]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.810948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.810972]  kthread+0x337/0x6f0
[   17.810992]  ? trace_preempt_on+0x20/0xc0
[   17.811017]  ? __pfx_kthread+0x10/0x10
[   17.811041]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.811062]  ? calculate_sigpending+0x7b/0xa0
[   17.811087]  ? __pfx_kthread+0x10/0x10
[   17.811109]  ret_from_fork+0x116/0x1d0
[   17.811128]  ? __pfx_kthread+0x10/0x10
[   17.811150]  ret_from_fork_asm+0x1a/0x30
[   17.811212]  </TASK>
[   17.811233] 
[   17.817141] Allocated by task 283:
[   17.817395]  kasan_save_stack+0x45/0x70
[   17.817648]  kasan_save_track+0x18/0x40
[   17.817891]  kasan_save_alloc_info+0x3b/0x50
[   17.818023]  __kasan_kmalloc+0xb7/0xc0
[   17.818114]  __kmalloc_cache_noprof+0x189/0x420
[   17.818211]  kasan_atomics+0x95/0x310
[   17.818460]  kunit_try_run_case+0x1a5/0x480
[   17.818749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.818901]  kthread+0x337/0x6f0
[   17.818986]  ret_from_fork+0x116/0x1d0
[   17.819070]  ret_from_fork_asm+0x1a/0x30
[   17.819156] 
[   17.819209] The buggy address belongs to the object at ffff888102b6b880
[   17.819209]  which belongs to the cache kmalloc-64 of size 64
[   17.819929] The buggy address is located 0 bytes to the right of
[   17.819929]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.820429] 
[   17.820486] The buggy address belongs to the physical page:
[   17.820590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.820731] flags: 0x200000000000000(node=0|zone=2)
[   17.820834] page_type: f5(slab)
[   17.820919] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.821266] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.821752] page dumped because: kasan: bad access detected
[   17.822137] 
[   17.822312] Memory state around the buggy address:
[   17.822655]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.822917]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.823046] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.823171]                                      ^
[   17.823385]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.823819]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.824237] ==================================================================
[   17.656898] ==================================================================
[   17.657196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   17.657487] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.657670] 
[   17.657802] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.657866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.657880] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.657902] Call Trace:
[   17.657919]  <TASK>
[   17.657935]  dump_stack_lvl+0x73/0xb0
[   17.657975]  print_report+0xd1/0x650
[   17.658008]  ? __virt_addr_valid+0x1db/0x2d0
[   17.658032]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.658063]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.658094]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.658118]  kasan_report+0x141/0x180
[   17.658150]  ? kasan_atomics_helper+0x4f30/0x5450
[   17.658186]  __asan_report_load8_noabort+0x18/0x20
[   17.658216]  kasan_atomics_helper+0x4f30/0x5450
[   17.658251]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.658276]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.658299]  ? kasan_atomics+0x152/0x310
[   17.658327]  kasan_atomics+0x1dc/0x310
[   17.658360]  ? __pfx_kasan_atomics+0x10/0x10
[   17.658387]  ? __pfx_read_tsc+0x10/0x10
[   17.658410]  ? ktime_get_ts64+0x86/0x230
[   17.658437]  kunit_try_run_case+0x1a5/0x480
[   17.658461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.658483]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.658506]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.658529]  ? __kthread_parkme+0x82/0x180
[   17.658551]  ? preempt_count_sub+0x50/0x80
[   17.658575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.658599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.658622]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.658646]  kthread+0x337/0x6f0
[   17.658666]  ? trace_preempt_on+0x20/0xc0
[   17.658711]  ? __pfx_kthread+0x10/0x10
[   17.658733]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.658755]  ? calculate_sigpending+0x7b/0xa0
[   17.658780]  ? __pfx_kthread+0x10/0x10
[   17.658802]  ret_from_fork+0x116/0x1d0
[   17.658838]  ? __pfx_kthread+0x10/0x10
[   17.658862]  ret_from_fork_asm+0x1a/0x30
[   17.658895]  </TASK>
[   17.658907] 
[   17.663311] Allocated by task 283:
[   17.663450]  kasan_save_stack+0x45/0x70
[   17.663542]  kasan_save_track+0x18/0x40
[   17.663631]  kasan_save_alloc_info+0x3b/0x50
[   17.663792]  __kasan_kmalloc+0xb7/0xc0
[   17.663951]  __kmalloc_cache_noprof+0x189/0x420
[   17.664149]  kasan_atomics+0x95/0x310
[   17.664276]  kunit_try_run_case+0x1a5/0x480
[   17.664451]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.664558]  kthread+0x337/0x6f0
[   17.664638]  ret_from_fork+0x116/0x1d0
[   17.664720]  ret_from_fork_asm+0x1a/0x30
[   17.664808] 
[   17.664859] The buggy address belongs to the object at ffff888102b6b880
[   17.664859]  which belongs to the cache kmalloc-64 of size 64
[   17.665049] The buggy address is located 0 bytes to the right of
[   17.665049]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.665255] 
[   17.665311] The buggy address belongs to the physical page:
[   17.665414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.665662] flags: 0x200000000000000(node=0|zone=2)
[   17.665874] page_type: f5(slab)
[   17.666030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.666350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.666682] page dumped because: kasan: bad access detected
[   17.666913] 
[   17.667017] Memory state around the buggy address:
[   17.667217]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.667558]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.667837] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.668119]                                      ^
[   17.668357]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.668640]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.668851] ==================================================================
[   17.275491] ==================================================================
[   17.275862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   17.276097] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.276357] 
[   17.276478] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.276535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.276549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.276572] Call Trace:
[   17.276596]  <TASK>
[   17.276637]  dump_stack_lvl+0x73/0xb0
[   17.276678]  print_report+0xd1/0x650
[   17.276704]  ? __virt_addr_valid+0x1db/0x2d0
[   17.276728]  ? kasan_atomics_helper+0x1079/0x5450
[   17.276759]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.276792]  ? kasan_atomics_helper+0x1079/0x5450
[   17.276816]  kasan_report+0x141/0x180
[   17.276839]  ? kasan_atomics_helper+0x1079/0x5450
[   17.276866]  kasan_check_range+0x10c/0x1c0
[   17.276891]  __kasan_check_write+0x18/0x20
[   17.276912]  kasan_atomics_helper+0x1079/0x5450
[   17.276936]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.276959]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.276982]  ? kasan_atomics+0x152/0x310
[   17.277009]  kasan_atomics+0x1dc/0x310
[   17.277033]  ? __pfx_kasan_atomics+0x10/0x10
[   17.277057]  ? __pfx_read_tsc+0x10/0x10
[   17.277080]  ? ktime_get_ts64+0x86/0x230
[   17.277105]  kunit_try_run_case+0x1a5/0x480
[   17.277130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.277152]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.277175]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.277197]  ? __kthread_parkme+0x82/0x180
[   17.277218]  ? preempt_count_sub+0x50/0x80
[   17.277264]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.277290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.277315]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.277340]  kthread+0x337/0x6f0
[   17.277360]  ? trace_preempt_on+0x20/0xc0
[   17.277387]  ? __pfx_kthread+0x10/0x10
[   17.277409]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.277432]  ? calculate_sigpending+0x7b/0xa0
[   17.277459]  ? __pfx_kthread+0x10/0x10
[   17.277482]  ret_from_fork+0x116/0x1d0
[   17.277502]  ? __pfx_kthread+0x10/0x10
[   17.277525]  ret_from_fork_asm+0x1a/0x30
[   17.277559]  </TASK>
[   17.277573] 
[   17.283076] Allocated by task 283:
[   17.283207]  kasan_save_stack+0x45/0x70
[   17.283360]  kasan_save_track+0x18/0x40
[   17.283483]  kasan_save_alloc_info+0x3b/0x50
[   17.283659]  __kasan_kmalloc+0xb7/0xc0
[   17.283837]  __kmalloc_cache_noprof+0x189/0x420
[   17.284054]  kasan_atomics+0x95/0x310
[   17.284251]  kunit_try_run_case+0x1a5/0x480
[   17.284464]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.284722]  kthread+0x337/0x6f0
[   17.284884]  ret_from_fork+0x116/0x1d0
[   17.285061]  ret_from_fork_asm+0x1a/0x30
[   17.285263] 
[   17.285363] The buggy address belongs to the object at ffff888102b6b880
[   17.285363]  which belongs to the cache kmalloc-64 of size 64
[   17.285834] The buggy address is located 0 bytes to the right of
[   17.285834]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.286345] 
[   17.286459] The buggy address belongs to the physical page:
[   17.286630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.286777] flags: 0x200000000000000(node=0|zone=2)
[   17.286886] page_type: f5(slab)
[   17.286976] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.287240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.287627] page dumped because: kasan: bad access detected
[   17.287922] 
[   17.288027] Memory state around the buggy address:
[   17.288311]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.288597]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.288845] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.289043]                                      ^
[   17.289210]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.289490]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.289706] ==================================================================
[   17.208875] ==================================================================
[   17.209606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   17.210167] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.210468] 
[   17.210584] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.210651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.210667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.210693] Call Trace:
[   17.210709]  <TASK>
[   17.210738]  dump_stack_lvl+0x73/0xb0
[   17.210774]  print_report+0xd1/0x650
[   17.210812]  ? __virt_addr_valid+0x1db/0x2d0
[   17.210841]  ? kasan_atomics_helper+0xe78/0x5450
[   17.210864]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.210889]  ? kasan_atomics_helper+0xe78/0x5450
[   17.210914]  kasan_report+0x141/0x180
[   17.210939]  ? kasan_atomics_helper+0xe78/0x5450
[   17.210968]  kasan_check_range+0x10c/0x1c0
[   17.210995]  __kasan_check_write+0x18/0x20
[   17.211017]  kasan_atomics_helper+0xe78/0x5450
[   17.211042]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.211066]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.211090]  ? kasan_atomics+0x152/0x310
[   17.211119]  kasan_atomics+0x1dc/0x310
[   17.211144]  ? __pfx_kasan_atomics+0x10/0x10
[   17.211170]  ? __pfx_read_tsc+0x10/0x10
[   17.211193]  ? ktime_get_ts64+0x86/0x230
[   17.211228]  kunit_try_run_case+0x1a5/0x480
[   17.211270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.211297]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.211322]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.211360]  ? __kthread_parkme+0x82/0x180
[   17.211383]  ? preempt_count_sub+0x50/0x80
[   17.211409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.211434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.211459]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.211484]  kthread+0x337/0x6f0
[   17.211505]  ? trace_preempt_on+0x20/0xc0
[   17.211531]  ? __pfx_kthread+0x10/0x10
[   17.211553]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.211576]  ? calculate_sigpending+0x7b/0xa0
[   17.211603]  ? __pfx_kthread+0x10/0x10
[   17.211627]  ret_from_fork+0x116/0x1d0
[   17.211646]  ? __pfx_kthread+0x10/0x10
[   17.211669]  ret_from_fork_asm+0x1a/0x30
[   17.211703]  </TASK>
[   17.211716] 
[   17.217549] Allocated by task 283:
[   17.217688]  kasan_save_stack+0x45/0x70
[   17.217790]  kasan_save_track+0x18/0x40
[   17.217883]  kasan_save_alloc_info+0x3b/0x50
[   17.217977]  __kasan_kmalloc+0xb7/0xc0
[   17.218063]  __kmalloc_cache_noprof+0x189/0x420
[   17.218160]  kasan_atomics+0x95/0x310
[   17.218391]  kunit_try_run_case+0x1a5/0x480
[   17.218670]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.219020]  kthread+0x337/0x6f0
[   17.219264]  ret_from_fork+0x116/0x1d0
[   17.219533]  ret_from_fork_asm+0x1a/0x30
[   17.219711] 
[   17.219768] The buggy address belongs to the object at ffff888102b6b880
[   17.219768]  which belongs to the cache kmalloc-64 of size 64
[   17.220104] The buggy address is located 0 bytes to the right of
[   17.220104]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.220641] 
[   17.220743] The buggy address belongs to the physical page:
[   17.220958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.221105] flags: 0x200000000000000(node=0|zone=2)
[   17.221213] page_type: f5(slab)
[   17.221312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.221452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.221588] page dumped because: kasan: bad access detected
[   17.221698] 
[   17.221755] Memory state around the buggy address:
[   17.221993]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.222448]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.222890] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.223296]                                      ^
[   17.223587]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.224002]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.224260] ==================================================================
[   17.641244] ==================================================================
[   17.641893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   17.642300] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.642725] 
[   17.642877] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.642931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.642945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.642969] Call Trace:
[   17.642988]  <TASK>
[   17.643005]  dump_stack_lvl+0x73/0xb0
[   17.643034]  print_report+0xd1/0x650
[   17.643059]  ? __virt_addr_valid+0x1db/0x2d0
[   17.643084]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.643137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.643167]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.643191]  kasan_report+0x141/0x180
[   17.643215]  ? kasan_atomics_helper+0x1c18/0x5450
[   17.643258]  kasan_check_range+0x10c/0x1c0
[   17.643300]  __kasan_check_write+0x18/0x20
[   17.643327]  kasan_atomics_helper+0x1c18/0x5450
[   17.643353]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.643378]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.643401]  ? kasan_atomics+0x152/0x310
[   17.643428]  kasan_atomics+0x1dc/0x310
[   17.643470]  ? __pfx_kasan_atomics+0x10/0x10
[   17.643496]  ? __pfx_read_tsc+0x10/0x10
[   17.643518]  ? ktime_get_ts64+0x86/0x230
[   17.643542]  kunit_try_run_case+0x1a5/0x480
[   17.643566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.643598]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.643622]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.643645]  ? __kthread_parkme+0x82/0x180
[   17.643666]  ? preempt_count_sub+0x50/0x80
[   17.643690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.643728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.643755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.643779]  kthread+0x337/0x6f0
[   17.643799]  ? trace_preempt_on+0x20/0xc0
[   17.643824]  ? __pfx_kthread+0x10/0x10
[   17.643845]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.643884]  ? calculate_sigpending+0x7b/0xa0
[   17.643908]  ? __pfx_kthread+0x10/0x10
[   17.643931]  ret_from_fork+0x116/0x1d0
[   17.643950]  ? __pfx_kthread+0x10/0x10
[   17.643971]  ret_from_fork_asm+0x1a/0x30
[   17.644019]  </TASK>
[   17.644032] 
[   17.649928] Allocated by task 283:
[   17.650122]  kasan_save_stack+0x45/0x70
[   17.650356]  kasan_save_track+0x18/0x40
[   17.650575]  kasan_save_alloc_info+0x3b/0x50
[   17.650781]  __kasan_kmalloc+0xb7/0xc0
[   17.650932]  __kmalloc_cache_noprof+0x189/0x420
[   17.651032]  kasan_atomics+0x95/0x310
[   17.651122]  kunit_try_run_case+0x1a5/0x480
[   17.651214]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.651334]  kthread+0x337/0x6f0
[   17.651417]  ret_from_fork+0x116/0x1d0
[   17.651502]  ret_from_fork_asm+0x1a/0x30
[   17.651592] 
[   17.651698] The buggy address belongs to the object at ffff888102b6b880
[   17.651698]  which belongs to the cache kmalloc-64 of size 64
[   17.652152] The buggy address is located 0 bytes to the right of
[   17.652152]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.652646] 
[   17.652760] The buggy address belongs to the physical page:
[   17.653011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.653344] flags: 0x200000000000000(node=0|zone=2)
[   17.653570] page_type: f5(slab)
[   17.653760] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.653980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.654109] page dumped because: kasan: bad access detected
[   17.654363] 
[   17.654476] Memory state around the buggy address:
[   17.654698]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.654930]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.655181] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.655424]                                      ^
[   17.655626]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.655858]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.656110] ==================================================================
[   17.225612] ==================================================================
[   17.226109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   17.226887] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.227363] 
[   17.227511] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.227580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.227710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.227747] Call Trace:
[   17.227771]  <TASK>
[   17.227794]  dump_stack_lvl+0x73/0xb0
[   17.227842]  print_report+0xd1/0x650
[   17.227869]  ? __virt_addr_valid+0x1db/0x2d0
[   17.227909]  ? kasan_atomics_helper+0xf10/0x5450
[   17.227934]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.227970]  ? kasan_atomics_helper+0xf10/0x5450
[   17.227995]  kasan_report+0x141/0x180
[   17.228031]  ? kasan_atomics_helper+0xf10/0x5450
[   17.228063]  kasan_check_range+0x10c/0x1c0
[   17.228089]  __kasan_check_write+0x18/0x20
[   17.228122]  kasan_atomics_helper+0xf10/0x5450
[   17.228147]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.228181]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.228206]  ? kasan_atomics+0x152/0x310
[   17.228252]  kasan_atomics+0x1dc/0x310
[   17.228280]  ? __pfx_kasan_atomics+0x10/0x10
[   17.228307]  ? __pfx_read_tsc+0x10/0x10
[   17.228342]  ? ktime_get_ts64+0x86/0x230
[   17.228369]  kunit_try_run_case+0x1a5/0x480
[   17.228405]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.228431]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.228457]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.228493]  ? __kthread_parkme+0x82/0x180
[   17.228516]  ? preempt_count_sub+0x50/0x80
[   17.228541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.228566]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.228590]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.228613]  kthread+0x337/0x6f0
[   17.228634]  ? trace_preempt_on+0x20/0xc0
[   17.228659]  ? __pfx_kthread+0x10/0x10
[   17.228681]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.228703]  ? calculate_sigpending+0x7b/0xa0
[   17.228729]  ? __pfx_kthread+0x10/0x10
[   17.228752]  ret_from_fork+0x116/0x1d0
[   17.228772]  ? __pfx_kthread+0x10/0x10
[   17.228793]  ret_from_fork_asm+0x1a/0x30
[   17.228828]  </TASK>
[   17.228841] 
[   17.235110] Allocated by task 283:
[   17.235328]  kasan_save_stack+0x45/0x70
[   17.235458]  kasan_save_track+0x18/0x40
[   17.235652]  kasan_save_alloc_info+0x3b/0x50
[   17.235828]  __kasan_kmalloc+0xb7/0xc0
[   17.236061]  __kmalloc_cache_noprof+0x189/0x420
[   17.236191]  kasan_atomics+0x95/0x310
[   17.236363]  kunit_try_run_case+0x1a5/0x480
[   17.236459]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.236564]  kthread+0x337/0x6f0
[   17.236646]  ret_from_fork+0x116/0x1d0
[   17.236729]  ret_from_fork_asm+0x1a/0x30
[   17.236949] 
[   17.237069] The buggy address belongs to the object at ffff888102b6b880
[   17.237069]  which belongs to the cache kmalloc-64 of size 64
[   17.237676] The buggy address is located 0 bytes to the right of
[   17.237676]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.238094] 
[   17.238152] The buggy address belongs to the physical page:
[   17.238361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.238798] flags: 0x200000000000000(node=0|zone=2)
[   17.238999] page_type: f5(slab)
[   17.239209] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.239481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.239759] page dumped because: kasan: bad access detected
[   17.239992] 
[   17.240092] Memory state around the buggy address:
[   17.240326]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.240453]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.240578] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.240697]                                      ^
[   17.240789]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.240910]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.241029] ==================================================================
[   17.593455] ==================================================================
[   17.593925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   17.594374] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.594842] 
[   17.594989] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.595048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.595063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.595086] Call Trace:
[   17.595102]  <TASK>
[   17.595128]  dump_stack_lvl+0x73/0xb0
[   17.595156]  print_report+0xd1/0x650
[   17.595186]  ? __virt_addr_valid+0x1db/0x2d0
[   17.595210]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.595247]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.595271]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.595294]  kasan_report+0x141/0x180
[   17.595340]  ? kasan_atomics_helper+0x19e3/0x5450
[   17.595369]  kasan_check_range+0x10c/0x1c0
[   17.595405]  __kasan_check_write+0x18/0x20
[   17.595427]  kasan_atomics_helper+0x19e3/0x5450
[   17.595462]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.595486]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.595508]  ? kasan_atomics+0x152/0x310
[   17.595550]  kasan_atomics+0x1dc/0x310
[   17.595574]  ? __pfx_kasan_atomics+0x10/0x10
[   17.595613]  ? __pfx_read_tsc+0x10/0x10
[   17.595637]  ? ktime_get_ts64+0x86/0x230
[   17.595661]  kunit_try_run_case+0x1a5/0x480
[   17.595696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.595719]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.595741]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.595765]  ? __kthread_parkme+0x82/0x180
[   17.595786]  ? preempt_count_sub+0x50/0x80
[   17.595810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.595833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.595856]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.595879]  kthread+0x337/0x6f0
[   17.595899]  ? trace_preempt_on+0x20/0xc0
[   17.595923]  ? __pfx_kthread+0x10/0x10
[   17.595944]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.595966]  ? calculate_sigpending+0x7b/0xa0
[   17.595989]  ? __pfx_kthread+0x10/0x10
[   17.596011]  ret_from_fork+0x116/0x1d0
[   17.596030]  ? __pfx_kthread+0x10/0x10
[   17.596052]  ret_from_fork_asm+0x1a/0x30
[   17.596082]  </TASK>
[   17.596094] 
[   17.601631] Allocated by task 283:
[   17.601830]  kasan_save_stack+0x45/0x70
[   17.602038]  kasan_save_track+0x18/0x40
[   17.602184]  kasan_save_alloc_info+0x3b/0x50
[   17.602438]  __kasan_kmalloc+0xb7/0xc0
[   17.602605]  __kmalloc_cache_noprof+0x189/0x420
[   17.602774]  kasan_atomics+0x95/0x310
[   17.602960]  kunit_try_run_case+0x1a5/0x480
[   17.603096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.604501]  kthread+0x337/0x6f0
[   17.604866]  ret_from_fork+0x116/0x1d0
[   17.605253]  ret_from_fork_asm+0x1a/0x30
[   17.605363] 
[   17.605422] The buggy address belongs to the object at ffff888102b6b880
[   17.605422]  which belongs to the cache kmalloc-64 of size 64
[   17.605626] The buggy address is located 0 bytes to the right of
[   17.605626]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.605835] 
[   17.605895] The buggy address belongs to the physical page:
[   17.606012] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.606290] flags: 0x200000000000000(node=0|zone=2)
[   17.606627] page_type: f5(slab)
[   17.606893] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.607332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.607696] page dumped because: kasan: bad access detected
[   17.608017] 
[   17.608163] Memory state around the buggy address:
[   17.608499]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.608909]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.609216] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.609574]                                      ^
[   17.609862]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.610111]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.610365] ==================================================================
[   16.820070] ==================================================================
[   16.820407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   16.820811] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.821065] 
[   16.821203] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.821265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.821297] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.821320] Call Trace:
[   16.821335]  <TASK>
[   16.821355]  dump_stack_lvl+0x73/0xb0
[   16.821385]  print_report+0xd1/0x650
[   16.821425]  ? __virt_addr_valid+0x1db/0x2d0
[   16.821520]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.821545]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.821588]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.821612]  kasan_report+0x141/0x180
[   16.821635]  ? kasan_atomics_helper+0x4ba2/0x5450
[   16.821662]  __asan_report_store4_noabort+0x1b/0x30
[   16.821683]  kasan_atomics_helper+0x4ba2/0x5450
[   16.821720]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.821746]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.821769]  ? kasan_atomics+0x152/0x310
[   16.821796]  kasan_atomics+0x1dc/0x310
[   16.821819]  ? __pfx_kasan_atomics+0x10/0x10
[   16.821843]  ? __pfx_read_tsc+0x10/0x10
[   16.821865]  ? ktime_get_ts64+0x86/0x230
[   16.821890]  kunit_try_run_case+0x1a5/0x480
[   16.821913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.821961]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.821987]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.822009]  ? __kthread_parkme+0x82/0x180
[   16.822030]  ? preempt_count_sub+0x50/0x80
[   16.822055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.822080]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.822103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.822125]  kthread+0x337/0x6f0
[   16.822144]  ? trace_preempt_on+0x20/0xc0
[   16.822169]  ? __pfx_kthread+0x10/0x10
[   16.822190]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.822212]  ? calculate_sigpending+0x7b/0xa0
[   16.822248]  ? __pfx_kthread+0x10/0x10
[   16.822271]  ret_from_fork+0x116/0x1d0
[   16.822290]  ? __pfx_kthread+0x10/0x10
[   16.822311]  ret_from_fork_asm+0x1a/0x30
[   16.822352]  </TASK>
[   16.822367] 
[   16.829780] Allocated by task 283:
[   16.829996]  kasan_save_stack+0x45/0x70
[   16.830215]  kasan_save_track+0x18/0x40
[   16.830401]  kasan_save_alloc_info+0x3b/0x50
[   16.830913]  __kasan_kmalloc+0xb7/0xc0
[   16.831161]  __kmalloc_cache_noprof+0x189/0x420
[   16.831388]  kasan_atomics+0x95/0x310
[   16.831654]  kunit_try_run_case+0x1a5/0x480
[   16.831822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.831929]  kthread+0x337/0x6f0
[   16.832008]  ret_from_fork+0x116/0x1d0
[   16.832247]  ret_from_fork_asm+0x1a/0x30
[   16.832612] 
[   16.832755] The buggy address belongs to the object at ffff888102b6b880
[   16.832755]  which belongs to the cache kmalloc-64 of size 64
[   16.833205] The buggy address is located 0 bytes to the right of
[   16.833205]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.833682] 
[   16.833740] The buggy address belongs to the physical page:
[   16.833849] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.834276] flags: 0x200000000000000(node=0|zone=2)
[   16.834654] page_type: f5(slab)
[   16.834823] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.834988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.835442] page dumped because: kasan: bad access detected
[   16.835871] 
[   16.835929] Memory state around the buggy address:
[   16.836031]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.836444]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.836914] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.837208]                                      ^
[   16.837553]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.837714]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.837839] ==================================================================
[   16.929741] ==================================================================
[   16.930488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   16.930974] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.931249] 
[   16.931395] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.931466] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.931482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.931506] Call Trace:
[   16.931546]  <TASK>
[   16.931569]  dump_stack_lvl+0x73/0xb0
[   16.931603]  print_report+0xd1/0x650
[   16.931626]  ? __virt_addr_valid+0x1db/0x2d0
[   16.931651]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.931673]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.931696]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.931796]  kasan_report+0x141/0x180
[   16.931822]  ? kasan_atomics_helper+0x4b3a/0x5450
[   16.931850]  __asan_report_store4_noabort+0x1b/0x30
[   16.931872]  kasan_atomics_helper+0x4b3a/0x5450
[   16.931896]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.931920]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.931943]  ? kasan_atomics+0x152/0x310
[   16.931971]  kasan_atomics+0x1dc/0x310
[   16.932004]  ? __pfx_kasan_atomics+0x10/0x10
[   16.932033]  ? __pfx_read_tsc+0x10/0x10
[   16.932056]  ? ktime_get_ts64+0x86/0x230
[   16.932093]  kunit_try_run_case+0x1a5/0x480
[   16.932119]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.932142]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.932166]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.932189]  ? __kthread_parkme+0x82/0x180
[   16.932210]  ? preempt_count_sub+0x50/0x80
[   16.932253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.932279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.932303]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.932326]  kthread+0x337/0x6f0
[   16.932348]  ? trace_preempt_on+0x20/0xc0
[   16.932374]  ? __pfx_kthread+0x10/0x10
[   16.932396]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.932419]  ? calculate_sigpending+0x7b/0xa0
[   16.932444]  ? __pfx_kthread+0x10/0x10
[   16.932480]  ret_from_fork+0x116/0x1d0
[   16.932500]  ? __pfx_kthread+0x10/0x10
[   16.932523]  ret_from_fork_asm+0x1a/0x30
[   16.932555]  </TASK>
[   16.932569] 
[   16.938945] Allocated by task 283:
[   16.939085]  kasan_save_stack+0x45/0x70
[   16.939190]  kasan_save_track+0x18/0x40
[   16.939505]  kasan_save_alloc_info+0x3b/0x50
[   16.939785]  __kasan_kmalloc+0xb7/0xc0
[   16.939891]  __kmalloc_cache_noprof+0x189/0x420
[   16.940090]  kasan_atomics+0x95/0x310
[   16.940233]  kunit_try_run_case+0x1a5/0x480
[   16.940419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.940816]  kthread+0x337/0x6f0
[   16.941012]  ret_from_fork+0x116/0x1d0
[   16.941190]  ret_from_fork_asm+0x1a/0x30
[   16.941347] 
[   16.941543] The buggy address belongs to the object at ffff888102b6b880
[   16.941543]  which belongs to the cache kmalloc-64 of size 64
[   16.941774] The buggy address is located 0 bytes to the right of
[   16.941774]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.941974] 
[   16.942030] The buggy address belongs to the physical page:
[   16.942134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.942419] flags: 0x200000000000000(node=0|zone=2)
[   16.942783] page_type: f5(slab)
[   16.943007] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.943510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.943864] page dumped because: kasan: bad access detected
[   16.943968] 
[   16.944018] Memory state around the buggy address:
[   16.944113]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.944410]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.944821] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.945115]                                      ^
[   16.945354]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.945863]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.946143] ==================================================================
[   17.480573] ==================================================================
[   17.480977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   17.481322] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.482003] 
[   17.482244] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.482315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.482337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.482367] Call Trace:
[   17.482393]  <TASK>
[   17.482417]  dump_stack_lvl+0x73/0xb0
[   17.482453]  print_report+0xd1/0x650
[   17.482480]  ? __virt_addr_valid+0x1db/0x2d0
[   17.482507]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.482529]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.482552]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.482576]  kasan_report+0x141/0x180
[   17.482614]  ? kasan_atomics_helper+0x15b6/0x5450
[   17.482644]  kasan_check_range+0x10c/0x1c0
[   17.482685]  __kasan_check_write+0x18/0x20
[   17.482707]  kasan_atomics_helper+0x15b6/0x5450
[   17.482733]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.482756]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.482779]  ? kasan_atomics+0x152/0x310
[   17.482807]  kasan_atomics+0x1dc/0x310
[   17.482832]  ? __pfx_kasan_atomics+0x10/0x10
[   17.482857]  ? __pfx_read_tsc+0x10/0x10
[   17.482881]  ? ktime_get_ts64+0x86/0x230
[   17.482907]  kunit_try_run_case+0x1a5/0x480
[   17.482933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.482956]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.482981]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.483004]  ? __kthread_parkme+0x82/0x180
[   17.483026]  ? preempt_count_sub+0x50/0x80
[   17.483051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.483076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.483100]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.483123]  kthread+0x337/0x6f0
[   17.483143]  ? trace_preempt_on+0x20/0xc0
[   17.483169]  ? __pfx_kthread+0x10/0x10
[   17.483190]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.483213]  ? calculate_sigpending+0x7b/0xa0
[   17.483258]  ? __pfx_kthread+0x10/0x10
[   17.483281]  ret_from_fork+0x116/0x1d0
[   17.483301]  ? __pfx_kthread+0x10/0x10
[   17.483323]  ret_from_fork_asm+0x1a/0x30
[   17.483357]  </TASK>
[   17.483371] 
[   17.489534] Allocated by task 283:
[   17.489656]  kasan_save_stack+0x45/0x70
[   17.489771]  kasan_save_track+0x18/0x40
[   17.489871]  kasan_save_alloc_info+0x3b/0x50
[   17.489976]  __kasan_kmalloc+0xb7/0xc0
[   17.490203]  __kmalloc_cache_noprof+0x189/0x420
[   17.490554]  kasan_atomics+0x95/0x310
[   17.490835]  kunit_try_run_case+0x1a5/0x480
[   17.491149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.491510]  kthread+0x337/0x6f0
[   17.491728]  ret_from_fork+0x116/0x1d0
[   17.491844]  ret_from_fork_asm+0x1a/0x30
[   17.491943] 
[   17.492004] The buggy address belongs to the object at ffff888102b6b880
[   17.492004]  which belongs to the cache kmalloc-64 of size 64
[   17.492584] The buggy address is located 0 bytes to the right of
[   17.492584]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.492803] 
[   17.492932] The buggy address belongs to the physical page:
[   17.493299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.493708] flags: 0x200000000000000(node=0|zone=2)
[   17.493957] page_type: f5(slab)
[   17.494114] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.494404] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.494704] page dumped because: kasan: bad access detected
[   17.494918] 
[   17.495061] Memory state around the buggy address:
[   17.495237]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.495549]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.495827] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.496130]                                      ^
[   17.496351]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.496556]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.496684] ==================================================================
[   16.802025] ==================================================================
[   16.802458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   16.802838] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.803104] 
[   16.803212] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.803297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.803310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.803335] Call Trace:
[   16.803349]  <TASK>
[   16.803385]  dump_stack_lvl+0x73/0xb0
[   16.803416]  print_report+0xd1/0x650
[   16.803439]  ? __virt_addr_valid+0x1db/0x2d0
[   16.803482]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.803505]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.803527]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.803549]  kasan_report+0x141/0x180
[   16.803573]  ? kasan_atomics_helper+0x4bbc/0x5450
[   16.803599]  __asan_report_load4_noabort+0x18/0x20
[   16.803627]  kasan_atomics_helper+0x4bbc/0x5450
[   16.803651]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.803674]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.803696]  ? kasan_atomics+0x152/0x310
[   16.803722]  kasan_atomics+0x1dc/0x310
[   16.803746]  ? __pfx_kasan_atomics+0x10/0x10
[   16.803769]  ? __pfx_read_tsc+0x10/0x10
[   16.803789]  ? ktime_get_ts64+0x86/0x230
[   16.803814]  kunit_try_run_case+0x1a5/0x480
[   16.803836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.803857]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.803881]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.803903]  ? __kthread_parkme+0x82/0x180
[   16.803922]  ? preempt_count_sub+0x50/0x80
[   16.803946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.803969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.803991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.804014]  kthread+0x337/0x6f0
[   16.804032]  ? trace_preempt_on+0x20/0xc0
[   16.804056]  ? __pfx_kthread+0x10/0x10
[   16.804076]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.804097]  ? calculate_sigpending+0x7b/0xa0
[   16.804121]  ? __pfx_kthread+0x10/0x10
[   16.804142]  ret_from_fork+0x116/0x1d0
[   16.804159]  ? __pfx_kthread+0x10/0x10
[   16.804179]  ret_from_fork_asm+0x1a/0x30
[   16.804210]  </TASK>
[   16.804230] 
[   16.811059] Allocated by task 283:
[   16.811311]  kasan_save_stack+0x45/0x70
[   16.811663]  kasan_save_track+0x18/0x40
[   16.811882]  kasan_save_alloc_info+0x3b/0x50
[   16.812150]  __kasan_kmalloc+0xb7/0xc0
[   16.812247]  __kmalloc_cache_noprof+0x189/0x420
[   16.812346]  kasan_atomics+0x95/0x310
[   16.812434]  kunit_try_run_case+0x1a5/0x480
[   16.812590]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.812699]  kthread+0x337/0x6f0
[   16.812780]  ret_from_fork+0x116/0x1d0
[   16.812864]  ret_from_fork_asm+0x1a/0x30
[   16.813070] 
[   16.813203] The buggy address belongs to the object at ffff888102b6b880
[   16.813203]  which belongs to the cache kmalloc-64 of size 64
[   16.813963] The buggy address is located 0 bytes to the right of
[   16.813963]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.814947] 
[   16.815073] The buggy address belongs to the physical page:
[   16.815580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.815854] flags: 0x200000000000000(node=0|zone=2)
[   16.816010] page_type: f5(slab)
[   16.816232] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.816392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.816585] page dumped because: kasan: bad access detected
[   16.816689] 
[   16.816740] Memory state around the buggy address:
[   16.816937]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.817240]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.817623] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.818041]                                      ^
[   16.818408]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.818623]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.818964] ==================================================================
[   17.104446] ==================================================================
[   17.104767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   17.105077] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.105347] 
[   17.105583] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.105708] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.105725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.105749] Call Trace:
[   17.105770]  <TASK>
[   17.105808]  dump_stack_lvl+0x73/0xb0
[   17.105848]  print_report+0xd1/0x650
[   17.105890]  ? __virt_addr_valid+0x1db/0x2d0
[   17.106172]  ? kasan_atomics_helper+0xac7/0x5450
[   17.106208]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.106246]  ? kasan_atomics_helper+0xac7/0x5450
[   17.106271]  kasan_report+0x141/0x180
[   17.106295]  ? kasan_atomics_helper+0xac7/0x5450
[   17.106324]  kasan_check_range+0x10c/0x1c0
[   17.106360]  __kasan_check_write+0x18/0x20
[   17.106381]  kasan_atomics_helper+0xac7/0x5450
[   17.106406]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.106430]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.106452]  ? kasan_atomics+0x152/0x310
[   17.106480]  kasan_atomics+0x1dc/0x310
[   17.106505]  ? __pfx_kasan_atomics+0x10/0x10
[   17.106530]  ? __pfx_read_tsc+0x10/0x10
[   17.106554]  ? ktime_get_ts64+0x86/0x230
[   17.106582]  kunit_try_run_case+0x1a5/0x480
[   17.106705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.106737]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.106764]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.106788]  ? __kthread_parkme+0x82/0x180
[   17.106812]  ? preempt_count_sub+0x50/0x80
[   17.106839]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.106865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.106890]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.106915]  kthread+0x337/0x6f0
[   17.106937]  ? trace_preempt_on+0x20/0xc0
[   17.106963]  ? __pfx_kthread+0x10/0x10
[   17.106987]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.107011]  ? calculate_sigpending+0x7b/0xa0
[   17.107039]  ? __pfx_kthread+0x10/0x10
[   17.107062]  ret_from_fork+0x116/0x1d0
[   17.107083]  ? __pfx_kthread+0x10/0x10
[   17.107105]  ret_from_fork_asm+0x1a/0x30
[   17.107139]  </TASK>
[   17.107153] 
[   17.113734] Allocated by task 283:
[   17.113846]  kasan_save_stack+0x45/0x70
[   17.113989]  kasan_save_track+0x18/0x40
[   17.114181]  kasan_save_alloc_info+0x3b/0x50
[   17.114447]  __kasan_kmalloc+0xb7/0xc0
[   17.114725]  __kmalloc_cache_noprof+0x189/0x420
[   17.115028]  kasan_atomics+0x95/0x310
[   17.115284]  kunit_try_run_case+0x1a5/0x480
[   17.115564]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.115902]  kthread+0x337/0x6f0
[   17.116044]  ret_from_fork+0x116/0x1d0
[   17.116134]  ret_from_fork_asm+0x1a/0x30
[   17.116304] 
[   17.116365] The buggy address belongs to the object at ffff888102b6b880
[   17.116365]  which belongs to the cache kmalloc-64 of size 64
[   17.116614] The buggy address is located 0 bytes to the right of
[   17.116614]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.117103] 
[   17.117216] The buggy address belongs to the physical page:
[   17.117610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.118013] flags: 0x200000000000000(node=0|zone=2)
[   17.118284] page_type: f5(slab)
[   17.118574] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.118952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.119085] page dumped because: kasan: bad access detected
[   17.119187] 
[   17.119247] Memory state around the buggy address:
[   17.119346]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.120070]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.120539] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.120859]                                      ^
[   17.121070]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.121245]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.121591] ==================================================================
[   16.893735] ==================================================================
[   16.894428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   16.895154] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.895551] 
[   16.895740] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.895808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.895822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.895846] Call Trace:
[   16.895871]  <TASK>
[   16.895893]  dump_stack_lvl+0x73/0xb0
[   16.895924]  print_report+0xd1/0x650
[   16.895973]  ? __virt_addr_valid+0x1db/0x2d0
[   16.896001]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.896024]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.896060]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.896085]  kasan_report+0x141/0x180
[   16.896109]  ? kasan_atomics_helper+0x4b54/0x5450
[   16.896138]  __asan_report_load4_noabort+0x18/0x20
[   16.896161]  kasan_atomics_helper+0x4b54/0x5450
[   16.896185]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.896209]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.896243]  ? kasan_atomics+0x152/0x310
[   16.896290]  kasan_atomics+0x1dc/0x310
[   16.896316]  ? __pfx_kasan_atomics+0x10/0x10
[   16.896342]  ? __pfx_read_tsc+0x10/0x10
[   16.896365]  ? ktime_get_ts64+0x86/0x230
[   16.896391]  kunit_try_run_case+0x1a5/0x480
[   16.896417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.896440]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.896551]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.896577]  ? __kthread_parkme+0x82/0x180
[   16.896600]  ? preempt_count_sub+0x50/0x80
[   16.896625]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.896667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.896693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.896718]  kthread+0x337/0x6f0
[   16.896738]  ? trace_preempt_on+0x20/0xc0
[   16.896763]  ? __pfx_kthread+0x10/0x10
[   16.896784]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.896807]  ? calculate_sigpending+0x7b/0xa0
[   16.896851]  ? __pfx_kthread+0x10/0x10
[   16.896874]  ret_from_fork+0x116/0x1d0
[   16.896894]  ? __pfx_kthread+0x10/0x10
[   16.896917]  ret_from_fork_asm+0x1a/0x30
[   16.896950]  </TASK>
[   16.896963] 
[   16.903411] Allocated by task 283:
[   16.903807]  kasan_save_stack+0x45/0x70
[   16.904002]  kasan_save_track+0x18/0x40
[   16.904093]  kasan_save_alloc_info+0x3b/0x50
[   16.904186]  __kasan_kmalloc+0xb7/0xc0
[   16.904282]  __kmalloc_cache_noprof+0x189/0x420
[   16.904565]  kasan_atomics+0x95/0x310
[   16.904810]  kunit_try_run_case+0x1a5/0x480
[   16.905057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.905294]  kthread+0x337/0x6f0
[   16.905520]  ret_from_fork+0x116/0x1d0
[   16.905634]  ret_from_fork_asm+0x1a/0x30
[   16.905728] 
[   16.905831] The buggy address belongs to the object at ffff888102b6b880
[   16.905831]  which belongs to the cache kmalloc-64 of size 64
[   16.906285] The buggy address is located 0 bytes to the right of
[   16.906285]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.906709] 
[   16.906770] The buggy address belongs to the physical page:
[   16.906881] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.907030] flags: 0x200000000000000(node=0|zone=2)
[   16.907135] page_type: f5(slab)
[   16.907230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.907373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.907876] page dumped because: kasan: bad access detected
[   16.908217] 
[   16.908353] Memory state around the buggy address:
[   16.908877]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.909312]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.909546] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.909817]                                      ^
[   16.909992]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.910118]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.910251] ==================================================================
[   17.871240] ==================================================================
[   17.872168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   17.872516] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.872922] 
[   17.873069] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.873121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.873134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.873157] Call Trace:
[   17.873174]  <TASK>
[   17.873190]  dump_stack_lvl+0x73/0xb0
[   17.873217]  print_report+0xd1/0x650
[   17.873252]  ? __virt_addr_valid+0x1db/0x2d0
[   17.873277]  ? kasan_atomics_helper+0x5115/0x5450
[   17.873299]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.873325]  ? kasan_atomics_helper+0x5115/0x5450
[   17.873348]  kasan_report+0x141/0x180
[   17.873370]  ? kasan_atomics_helper+0x5115/0x5450
[   17.873422]  __asan_report_load8_noabort+0x18/0x20
[   17.873448]  kasan_atomics_helper+0x5115/0x5450
[   17.873472]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.873495]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.873517]  ? kasan_atomics+0x152/0x310
[   17.873545]  kasan_atomics+0x1dc/0x310
[   17.873589]  ? __pfx_kasan_atomics+0x10/0x10
[   17.873615]  ? __pfx_read_tsc+0x10/0x10
[   17.873636]  ? ktime_get_ts64+0x86/0x230
[   17.873661]  kunit_try_run_case+0x1a5/0x480
[   17.873686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.873728]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.873753]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.873776]  ? __kthread_parkme+0x82/0x180
[   17.873797]  ? preempt_count_sub+0x50/0x80
[   17.873822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.873846]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.873887]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.873913]  kthread+0x337/0x6f0
[   17.873934]  ? trace_preempt_on+0x20/0xc0
[   17.873958]  ? __pfx_kthread+0x10/0x10
[   17.873979]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.874000]  ? calculate_sigpending+0x7b/0xa0
[   17.874044]  ? __pfx_kthread+0x10/0x10
[   17.874067]  ret_from_fork+0x116/0x1d0
[   17.874086]  ? __pfx_kthread+0x10/0x10
[   17.874107]  ret_from_fork_asm+0x1a/0x30
[   17.874139]  </TASK>
[   17.874170] 
[   17.879950] Allocated by task 283:
[   17.880035]  kasan_save_stack+0x45/0x70
[   17.880127]  kasan_save_track+0x18/0x40
[   17.880216]  kasan_save_alloc_info+0x3b/0x50
[   17.880319]  __kasan_kmalloc+0xb7/0xc0
[   17.880405]  __kmalloc_cache_noprof+0x189/0x420
[   17.880499]  kasan_atomics+0x95/0x310
[   17.880586]  kunit_try_run_case+0x1a5/0x480
[   17.880678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.880778]  kthread+0x337/0x6f0
[   17.880852]  ret_from_fork+0x116/0x1d0
[   17.880934]  ret_from_fork_asm+0x1a/0x30
[   17.881018] 
[   17.881069] The buggy address belongs to the object at ffff888102b6b880
[   17.881069]  which belongs to the cache kmalloc-64 of size 64
[   17.881343] The buggy address is located 0 bytes to the right of
[   17.881343]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.882019] 
[   17.882139] The buggy address belongs to the physical page:
[   17.882482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.882929] flags: 0x200000000000000(node=0|zone=2)
[   17.883262] page_type: f5(slab)
[   17.883460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.883857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.884273] page dumped because: kasan: bad access detected
[   17.884549] 
[   17.884657] Memory state around the buggy address:
[   17.884810]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.885057]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.885267] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.885388]                                      ^
[   17.885483]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.885604]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.885724] ==================================================================
[   17.697957] ==================================================================
[   17.698213] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   17.698556] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.698783] 
[   17.698905] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.698958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.698973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.698997] Call Trace:
[   17.699014]  <TASK>
[   17.699030]  dump_stack_lvl+0x73/0xb0
[   17.699060]  print_report+0xd1/0x650
[   17.699085]  ? __virt_addr_valid+0x1db/0x2d0
[   17.699111]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.699135]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.699161]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.699186]  kasan_report+0x141/0x180
[   17.699211]  ? kasan_atomics_helper+0x1e12/0x5450
[   17.699518]  kasan_check_range+0x10c/0x1c0
[   17.699550]  __kasan_check_write+0x18/0x20
[   17.699573]  kasan_atomics_helper+0x1e12/0x5450
[   17.699600]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.699626]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.699651]  ? kasan_atomics+0x152/0x310
[   17.699681]  kasan_atomics+0x1dc/0x310
[   17.699707]  ? __pfx_kasan_atomics+0x10/0x10
[   17.699733]  ? __pfx_read_tsc+0x10/0x10
[   17.699754]  ? ktime_get_ts64+0x86/0x230
[   17.699779]  kunit_try_run_case+0x1a5/0x480
[   17.699804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.699827]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.699852]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.699876]  ? __kthread_parkme+0x82/0x180
[   17.699897]  ? preempt_count_sub+0x50/0x80
[   17.699922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.699946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.699969]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.699993]  kthread+0x337/0x6f0
[   17.700014]  ? trace_preempt_on+0x20/0xc0
[   17.700039]  ? __pfx_kthread+0x10/0x10
[   17.700061]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.700083]  ? calculate_sigpending+0x7b/0xa0
[   17.700107]  ? __pfx_kthread+0x10/0x10
[   17.700155]  ret_from_fork+0x116/0x1d0
[   17.700176]  ? __pfx_kthread+0x10/0x10
[   17.700197]  ret_from_fork_asm+0x1a/0x30
[   17.700238]  </TASK>
[   17.700253] 
[   17.705479] Allocated by task 283:
[   17.705643]  kasan_save_stack+0x45/0x70
[   17.705829]  kasan_save_track+0x18/0x40
[   17.706005]  kasan_save_alloc_info+0x3b/0x50
[   17.706196]  __kasan_kmalloc+0xb7/0xc0
[   17.706390]  __kmalloc_cache_noprof+0x189/0x420
[   17.706600]  kasan_atomics+0x95/0x310
[   17.706782]  kunit_try_run_case+0x1a5/0x480
[   17.706985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.707232]  kthread+0x337/0x6f0
[   17.707396]  ret_from_fork+0x116/0x1d0
[   17.707574]  ret_from_fork_asm+0x1a/0x30
[   17.707673] 
[   17.707729] The buggy address belongs to the object at ffff888102b6b880
[   17.707729]  which belongs to the cache kmalloc-64 of size 64
[   17.707929] The buggy address is located 0 bytes to the right of
[   17.707929]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.708133] 
[   17.708188] The buggy address belongs to the physical page:
[   17.708407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.708721] flags: 0x200000000000000(node=0|zone=2)
[   17.708929] page_type: f5(slab)
[   17.709087] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.709385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.709672] page dumped because: kasan: bad access detected
[   17.709928] 
[   17.710022] Memory state around the buggy address:
[   17.710235]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.710533]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.710800] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.711060]                                      ^
[   17.711178]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.711318]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.711447] ==================================================================
[   17.290483] ==================================================================
[   17.290865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   17.291270] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.291568] 
[   17.291678] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.291746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.291761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.291785] Call Trace:
[   17.291817]  <TASK>
[   17.291838]  dump_stack_lvl+0x73/0xb0
[   17.291867]  print_report+0xd1/0x650
[   17.291890]  ? __virt_addr_valid+0x1db/0x2d0
[   17.291914]  ? kasan_atomics_helper+0x4a1c/0x5450
[   17.291951]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.291978]  ? kasan_atomics_helper+0x4a1c/0x5450
[   17.292001]  kasan_report+0x141/0x180
[   17.292025]  ? kasan_atomics_helper+0x4a1c/0x5450
[   17.292053]  __asan_report_load4_noabort+0x18/0x20
[   17.292089]  kasan_atomics_helper+0x4a1c/0x5450
[   17.292116]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.292139]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.292161]  ? kasan_atomics+0x152/0x310
[   17.292188]  kasan_atomics+0x1dc/0x310
[   17.292232]  ? __pfx_kasan_atomics+0x10/0x10
[   17.292268]  ? __pfx_read_tsc+0x10/0x10
[   17.292290]  ? ktime_get_ts64+0x86/0x230
[   17.292324]  kunit_try_run_case+0x1a5/0x480
[   17.292356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.292378]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.292409]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.292441]  ? __kthread_parkme+0x82/0x180
[   17.292470]  ? preempt_count_sub+0x50/0x80
[   17.292494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.292526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.292557]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.292589]  kthread+0x337/0x6f0
[   17.292609]  ? trace_preempt_on+0x20/0xc0
[   17.292633]  ? __pfx_kthread+0x10/0x10
[   17.292655]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.292676]  ? calculate_sigpending+0x7b/0xa0
[   17.292701]  ? __pfx_kthread+0x10/0x10
[   17.292723]  ret_from_fork+0x116/0x1d0
[   17.292742]  ? __pfx_kthread+0x10/0x10
[   17.292764]  ret_from_fork_asm+0x1a/0x30
[   17.292796]  </TASK>
[   17.292808] 
[   17.298768] Allocated by task 283:
[   17.298905]  kasan_save_stack+0x45/0x70
[   17.299103]  kasan_save_track+0x18/0x40
[   17.299240]  kasan_save_alloc_info+0x3b/0x50
[   17.299426]  __kasan_kmalloc+0xb7/0xc0
[   17.299539]  __kmalloc_cache_noprof+0x189/0x420
[   17.299781]  kasan_atomics+0x95/0x310
[   17.299901]  kunit_try_run_case+0x1a5/0x480
[   17.300086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.300308]  kthread+0x337/0x6f0
[   17.300476]  ret_from_fork+0x116/0x1d0
[   17.300630]  ret_from_fork_asm+0x1a/0x30
[   17.300800] 
[   17.300855] The buggy address belongs to the object at ffff888102b6b880
[   17.300855]  which belongs to the cache kmalloc-64 of size 64
[   17.301327] The buggy address is located 0 bytes to the right of
[   17.301327]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.301665] 
[   17.301768] The buggy address belongs to the physical page:
[   17.301960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.302216] flags: 0x200000000000000(node=0|zone=2)
[   17.302412] page_type: f5(slab)
[   17.302590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.302761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.303098] page dumped because: kasan: bad access detected
[   17.303254] 
[   17.303356] Memory state around the buggy address:
[   17.303580]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.303831]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.304031] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.304308]                                      ^
[   17.304516]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.304718]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.304866] ==================================================================
[   17.416613] ==================================================================
[   17.416894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   17.417140] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.417433] 
[   17.417640] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.417694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.417708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.417732] Call Trace:
[   17.417755]  <TASK>
[   17.417773]  dump_stack_lvl+0x73/0xb0
[   17.417803]  print_report+0xd1/0x650
[   17.417827]  ? __virt_addr_valid+0x1db/0x2d0
[   17.417852]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.417875]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.417899]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.417941]  kasan_report+0x141/0x180
[   17.417967]  ? kasan_atomics_helper+0x4eae/0x5450
[   17.417995]  __asan_report_load8_noabort+0x18/0x20
[   17.418017]  kasan_atomics_helper+0x4eae/0x5450
[   17.418042]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.418084]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.418108]  ? kasan_atomics+0x152/0x310
[   17.418136]  kasan_atomics+0x1dc/0x310
[   17.418160]  ? __pfx_kasan_atomics+0x10/0x10
[   17.418186]  ? __pfx_read_tsc+0x10/0x10
[   17.418209]  ? ktime_get_ts64+0x86/0x230
[   17.418262]  kunit_try_run_case+0x1a5/0x480
[   17.418288]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.418311]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.418342]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.418368]  ? __kthread_parkme+0x82/0x180
[   17.418410]  ? preempt_count_sub+0x50/0x80
[   17.418437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.418461]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.418486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.418510]  kthread+0x337/0x6f0
[   17.418531]  ? trace_preempt_on+0x20/0xc0
[   17.418556]  ? __pfx_kthread+0x10/0x10
[   17.418597]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.418620]  ? calculate_sigpending+0x7b/0xa0
[   17.418664]  ? __pfx_kthread+0x10/0x10
[   17.418688]  ret_from_fork+0x116/0x1d0
[   17.418708]  ? __pfx_kthread+0x10/0x10
[   17.418729]  ret_from_fork_asm+0x1a/0x30
[   17.418763]  </TASK>
[   17.418777] 
[   17.424710] Allocated by task 283:
[   17.424892]  kasan_save_stack+0x45/0x70
[   17.425027]  kasan_save_track+0x18/0x40
[   17.425206]  kasan_save_alloc_info+0x3b/0x50
[   17.425403]  __kasan_kmalloc+0xb7/0xc0
[   17.425609]  __kmalloc_cache_noprof+0x189/0x420
[   17.425812]  kasan_atomics+0x95/0x310
[   17.425973]  kunit_try_run_case+0x1a5/0x480
[   17.426204]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.426410]  kthread+0x337/0x6f0
[   17.426550]  ret_from_fork+0x116/0x1d0
[   17.426750]  ret_from_fork_asm+0x1a/0x30
[   17.426879] 
[   17.426980] The buggy address belongs to the object at ffff888102b6b880
[   17.426980]  which belongs to the cache kmalloc-64 of size 64
[   17.427345] The buggy address is located 0 bytes to the right of
[   17.427345]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.427757] 
[   17.427871] The buggy address belongs to the physical page:
[   17.428090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.428348] flags: 0x200000000000000(node=0|zone=2)
[   17.428515] page_type: f5(slab)
[   17.428645] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.428934] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.429069] page dumped because: kasan: bad access detected
[   17.429172] 
[   17.429232] Memory state around the buggy address:
[   17.429442]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.429757]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.430045] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.430366]                                      ^
[   17.430474]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.430604]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.430732] ==================================================================
[   17.824779] ==================================================================
[   17.825373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   17.826081] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.826228] 
[   17.826382] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.826437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.826451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.826474] Call Trace:
[   17.826494]  <TASK>
[   17.826511]  dump_stack_lvl+0x73/0xb0
[   17.826540]  print_report+0xd1/0x650
[   17.826566]  ? __virt_addr_valid+0x1db/0x2d0
[   17.826591]  ? kasan_atomics_helper+0x218a/0x5450
[   17.826615]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.826639]  ? kasan_atomics_helper+0x218a/0x5450
[   17.826662]  kasan_report+0x141/0x180
[   17.826685]  ? kasan_atomics_helper+0x218a/0x5450
[   17.826714]  kasan_check_range+0x10c/0x1c0
[   17.826739]  __kasan_check_write+0x18/0x20
[   17.826801]  kasan_atomics_helper+0x218a/0x5450
[   17.826830]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.826854]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.826876]  ? kasan_atomics+0x152/0x310
[   17.826906]  kasan_atomics+0x1dc/0x310
[   17.826958]  ? __pfx_kasan_atomics+0x10/0x10
[   17.826984]  ? __pfx_read_tsc+0x10/0x10
[   17.827007]  ? ktime_get_ts64+0x86/0x230
[   17.827032]  kunit_try_run_case+0x1a5/0x480
[   17.827085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.827110]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.827135]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.827160]  ? __kthread_parkme+0x82/0x180
[   17.827206]  ? preempt_count_sub+0x50/0x80
[   17.827244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.827270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.827294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.827319]  kthread+0x337/0x6f0
[   17.827368]  ? trace_preempt_on+0x20/0xc0
[   17.827395]  ? __pfx_kthread+0x10/0x10
[   17.827417]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.827439]  ? calculate_sigpending+0x7b/0xa0
[   17.827492]  ? __pfx_kthread+0x10/0x10
[   17.827518]  ret_from_fork+0x116/0x1d0
[   17.827539]  ? __pfx_kthread+0x10/0x10
[   17.827563]  ret_from_fork_asm+0x1a/0x30
[   17.827617]  </TASK>
[   17.827633] 
[   17.833366] Allocated by task 283:
[   17.833582]  kasan_save_stack+0x45/0x70
[   17.833822]  kasan_save_track+0x18/0x40
[   17.834073]  kasan_save_alloc_info+0x3b/0x50
[   17.834337]  __kasan_kmalloc+0xb7/0xc0
[   17.834433]  __kmalloc_cache_noprof+0x189/0x420
[   17.834533]  kasan_atomics+0x95/0x310
[   17.834621]  kunit_try_run_case+0x1a5/0x480
[   17.834713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.834819]  kthread+0x337/0x6f0
[   17.834897]  ret_from_fork+0x116/0x1d0
[   17.834982]  ret_from_fork_asm+0x1a/0x30
[   17.835069] 
[   17.835121] The buggy address belongs to the object at ffff888102b6b880
[   17.835121]  which belongs to the cache kmalloc-64 of size 64
[   17.835821] The buggy address is located 0 bytes to the right of
[   17.835821]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.836568] 
[   17.836692] The buggy address belongs to the physical page:
[   17.837032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.837423] flags: 0x200000000000000(node=0|zone=2)
[   17.837531] page_type: f5(slab)
[   17.837618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.837754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.837884] page dumped because: kasan: bad access detected
[   17.837985] 
[   17.838035] Memory state around the buggy address:
[   17.838132]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.838268]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.838404] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.838531]                                      ^
[   17.838629]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.838913]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.839289] ==================================================================
[   17.840294] ==================================================================
[   17.840721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   17.841166] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.841600] 
[   17.841737] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.841788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.841802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.841825] Call Trace:
[   17.841843]  <TASK>
[   17.841858]  dump_stack_lvl+0x73/0xb0
[   17.841887]  print_report+0xd1/0x650
[   17.841911]  ? __virt_addr_valid+0x1db/0x2d0
[   17.841936]  ? kasan_atomics_helper+0x4fa5/0x5450
[   17.841960]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.841984]  ? kasan_atomics_helper+0x4fa5/0x5450
[   17.842007]  kasan_report+0x141/0x180
[   17.842031]  ? kasan_atomics_helper+0x4fa5/0x5450
[   17.842059]  __asan_report_load8_noabort+0x18/0x20
[   17.842082]  kasan_atomics_helper+0x4fa5/0x5450
[   17.842106]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.842130]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.842153]  ? kasan_atomics+0x152/0x310
[   17.842180]  kasan_atomics+0x1dc/0x310
[   17.842204]  ? __pfx_kasan_atomics+0x10/0x10
[   17.842243]  ? __pfx_read_tsc+0x10/0x10
[   17.842266]  ? ktime_get_ts64+0x86/0x230
[   17.842292]  kunit_try_run_case+0x1a5/0x480
[   17.842317]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.842347]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.842374]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.842397]  ? __kthread_parkme+0x82/0x180
[   17.842420]  ? preempt_count_sub+0x50/0x80
[   17.842446]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.842473]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.842497]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.842521]  kthread+0x337/0x6f0
[   17.842542]  ? trace_preempt_on+0x20/0xc0
[   17.842566]  ? __pfx_kthread+0x10/0x10
[   17.842590]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.842611]  ? calculate_sigpending+0x7b/0xa0
[   17.842636]  ? __pfx_kthread+0x10/0x10
[   17.842659]  ret_from_fork+0x116/0x1d0
[   17.842678]  ? __pfx_kthread+0x10/0x10
[   17.842699]  ret_from_fork_asm+0x1a/0x30
[   17.842758]  </TASK>
[   17.842772] 
[   17.848445] Allocated by task 283:
[   17.848677]  kasan_save_stack+0x45/0x70
[   17.848938]  kasan_save_track+0x18/0x40
[   17.849198]  kasan_save_alloc_info+0x3b/0x50
[   17.849354]  __kasan_kmalloc+0xb7/0xc0
[   17.849446]  __kmalloc_cache_noprof+0x189/0x420
[   17.849543]  kasan_atomics+0x95/0x310
[   17.849630]  kunit_try_run_case+0x1a5/0x480
[   17.849722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.849824]  kthread+0x337/0x6f0
[   17.849901]  ret_from_fork+0x116/0x1d0
[   17.850021]  ret_from_fork_asm+0x1a/0x30
[   17.850203] 
[   17.850337] The buggy address belongs to the object at ffff888102b6b880
[   17.850337]  which belongs to the cache kmalloc-64 of size 64
[   17.851057] The buggy address is located 0 bytes to the right of
[   17.851057]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.851571] 
[   17.851698] The buggy address belongs to the physical page:
[   17.851876] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.852099] flags: 0x200000000000000(node=0|zone=2)
[   17.852381] page_type: f5(slab)
[   17.852469] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.852749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.852878] page dumped because: kasan: bad access detected
[   17.852977] 
[   17.853028] Memory state around the buggy address:
[   17.853122]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.853255]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.853379] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.853497]                                      ^
[   17.853589]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.853709]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.853827] ==================================================================
[   17.626681] ==================================================================
[   17.627025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   17.627425] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.627743] 
[   17.627872] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.627926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.627941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.627964] Call Trace:
[   17.627999]  <TASK>
[   17.628021]  dump_stack_lvl+0x73/0xb0
[   17.628049]  print_report+0xd1/0x650
[   17.628074]  ? __virt_addr_valid+0x1db/0x2d0
[   17.628099]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.628140]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.628165]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.628189]  kasan_report+0x141/0x180
[   17.628213]  ? kasan_atomics_helper+0x1b22/0x5450
[   17.628253]  kasan_check_range+0x10c/0x1c0
[   17.628298]  __kasan_check_write+0x18/0x20
[   17.628320]  kasan_atomics_helper+0x1b22/0x5450
[   17.628345]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.628369]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.628391]  ? kasan_atomics+0x152/0x310
[   17.628436]  kasan_atomics+0x1dc/0x310
[   17.628462]  ? __pfx_kasan_atomics+0x10/0x10
[   17.628489]  ? __pfx_read_tsc+0x10/0x10
[   17.628511]  ? ktime_get_ts64+0x86/0x230
[   17.628536]  kunit_try_run_case+0x1a5/0x480
[   17.628561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.628585]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.628610]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.628633]  ? __kthread_parkme+0x82/0x180
[   17.628654]  ? preempt_count_sub+0x50/0x80
[   17.628679]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.628703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.628726]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.628766]  kthread+0x337/0x6f0
[   17.628792]  ? trace_preempt_on+0x20/0xc0
[   17.628817]  ? __pfx_kthread+0x10/0x10
[   17.628840]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.628862]  ? calculate_sigpending+0x7b/0xa0
[   17.628887]  ? __pfx_kthread+0x10/0x10
[   17.628928]  ret_from_fork+0x116/0x1d0
[   17.628949]  ? __pfx_kthread+0x10/0x10
[   17.628971]  ret_from_fork_asm+0x1a/0x30
[   17.629005]  </TASK>
[   17.629018] 
[   17.634992] Allocated by task 283:
[   17.635141]  kasan_save_stack+0x45/0x70
[   17.635309]  kasan_save_track+0x18/0x40
[   17.635414]  kasan_save_alloc_info+0x3b/0x50
[   17.635616]  __kasan_kmalloc+0xb7/0xc0
[   17.635790]  __kmalloc_cache_noprof+0x189/0x420
[   17.635915]  kasan_atomics+0x95/0x310
[   17.636101]  kunit_try_run_case+0x1a5/0x480
[   17.636248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.636461]  kthread+0x337/0x6f0
[   17.636640]  ret_from_fork+0x116/0x1d0
[   17.636791]  ret_from_fork_asm+0x1a/0x30
[   17.637010] 
[   17.637080] The buggy address belongs to the object at ffff888102b6b880
[   17.637080]  which belongs to the cache kmalloc-64 of size 64
[   17.637450] The buggy address is located 0 bytes to the right of
[   17.637450]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.637842] 
[   17.637938] The buggy address belongs to the physical page:
[   17.638171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.638438] flags: 0x200000000000000(node=0|zone=2)
[   17.638605] page_type: f5(slab)
[   17.638764] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.638932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.639094] page dumped because: kasan: bad access detected
[   17.639230] 
[   17.639305] Memory state around the buggy address:
[   17.639429]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.639591]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.639750] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.639898]                                      ^
[   17.640019]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.640178]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.640549] ==================================================================
[   17.562190] ==================================================================
[   17.562402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   17.563551] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.563785] 
[   17.563930] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.563994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.564009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.564034] Call Trace:
[   17.564055]  <TASK>
[   17.564073]  dump_stack_lvl+0x73/0xb0
[   17.564104]  print_report+0xd1/0x650
[   17.564128]  ? __virt_addr_valid+0x1db/0x2d0
[   17.564153]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.564176]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.564200]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.564272]  kasan_report+0x141/0x180
[   17.564299]  ? kasan_atomics_helper+0x18b1/0x5450
[   17.564327]  kasan_check_range+0x10c/0x1c0
[   17.564354]  __kasan_check_write+0x18/0x20
[   17.564374]  kasan_atomics_helper+0x18b1/0x5450
[   17.564399]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.564422]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.564443]  ? kasan_atomics+0x152/0x310
[   17.564471]  kasan_atomics+0x1dc/0x310
[   17.564496]  ? __pfx_kasan_atomics+0x10/0x10
[   17.564521]  ? __pfx_read_tsc+0x10/0x10
[   17.564544]  ? ktime_get_ts64+0x86/0x230
[   17.564570]  kunit_try_run_case+0x1a5/0x480
[   17.564596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.564618]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.564642]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.564666]  ? __kthread_parkme+0x82/0x180
[   17.564687]  ? preempt_count_sub+0x50/0x80
[   17.564710]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.564734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.564757]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.564794]  kthread+0x337/0x6f0
[   17.564816]  ? trace_preempt_on+0x20/0xc0
[   17.564840]  ? __pfx_kthread+0x10/0x10
[   17.564878]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.564900]  ? calculate_sigpending+0x7b/0xa0
[   17.564926]  ? __pfx_kthread+0x10/0x10
[   17.564949]  ret_from_fork+0x116/0x1d0
[   17.564969]  ? __pfx_kthread+0x10/0x10
[   17.564991]  ret_from_fork_asm+0x1a/0x30
[   17.565024]  </TASK>
[   17.565036] 
[   17.571131] Allocated by task 283:
[   17.571217]  kasan_save_stack+0x45/0x70
[   17.571440]  kasan_save_track+0x18/0x40
[   17.571693]  kasan_save_alloc_info+0x3b/0x50
[   17.571964]  __kasan_kmalloc+0xb7/0xc0
[   17.572056]  __kmalloc_cache_noprof+0x189/0x420
[   17.572153]  kasan_atomics+0x95/0x310
[   17.572406]  kunit_try_run_case+0x1a5/0x480
[   17.572644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.572853]  kthread+0x337/0x6f0
[   17.573063]  ret_from_fork+0x116/0x1d0
[   17.573197]  ret_from_fork_asm+0x1a/0x30
[   17.573416] 
[   17.573499] The buggy address belongs to the object at ffff888102b6b880
[   17.573499]  which belongs to the cache kmalloc-64 of size 64
[   17.573912] The buggy address is located 0 bytes to the right of
[   17.573912]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.574296] 
[   17.574438] The buggy address belongs to the physical page:
[   17.574549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.574894] flags: 0x200000000000000(node=0|zone=2)
[   17.575065] page_type: f5(slab)
[   17.575274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.575525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.575683] page dumped because: kasan: bad access detected
[   17.575785] 
[   17.575836] Memory state around the buggy address:
[   17.575932]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.576053]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.576176] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.576305]                                      ^
[   17.576401]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.576523]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.576643] ==================================================================
[   17.305773] ==================================================================
[   17.306111] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   17.306462] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.306766] 
[   17.306888] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.306941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.306955] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.306978] Call Trace:
[   17.306996]  <TASK>
[   17.307014]  dump_stack_lvl+0x73/0xb0
[   17.307041]  print_report+0xd1/0x650
[   17.307064]  ? __virt_addr_valid+0x1db/0x2d0
[   17.307089]  ? kasan_atomics_helper+0x1148/0x5450
[   17.307111]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.307135]  ? kasan_atomics_helper+0x1148/0x5450
[   17.307157]  kasan_report+0x141/0x180
[   17.307180]  ? kasan_atomics_helper+0x1148/0x5450
[   17.307207]  kasan_check_range+0x10c/0x1c0
[   17.307243]  __kasan_check_write+0x18/0x20
[   17.307266]  kasan_atomics_helper+0x1148/0x5450
[   17.307289]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.307313]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.307335]  ? kasan_atomics+0x152/0x310
[   17.307363]  kasan_atomics+0x1dc/0x310
[   17.307387]  ? __pfx_kasan_atomics+0x10/0x10
[   17.307411]  ? __pfx_read_tsc+0x10/0x10
[   17.307433]  ? ktime_get_ts64+0x86/0x230
[   17.307476]  kunit_try_run_case+0x1a5/0x480
[   17.307529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.307577]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.307604]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.307642]  ? __kthread_parkme+0x82/0x180
[   17.307668]  ? preempt_count_sub+0x50/0x80
[   17.307704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.307729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.307753]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.307788]  kthread+0x337/0x6f0
[   17.307817]  ? trace_preempt_on+0x20/0xc0
[   17.307843]  ? __pfx_kthread+0x10/0x10
[   17.307864]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.307888]  ? calculate_sigpending+0x7b/0xa0
[   17.307914]  ? __pfx_kthread+0x10/0x10
[   17.307938]  ret_from_fork+0x116/0x1d0
[   17.307973]  ? __pfx_kthread+0x10/0x10
[   17.307997]  ret_from_fork_asm+0x1a/0x30
[   17.308029]  </TASK>
[   17.308041] 
[   17.314063] Allocated by task 283:
[   17.314212]  kasan_save_stack+0x45/0x70
[   17.314400]  kasan_save_track+0x18/0x40
[   17.314597]  kasan_save_alloc_info+0x3b/0x50
[   17.314831]  __kasan_kmalloc+0xb7/0xc0
[   17.314976]  __kmalloc_cache_noprof+0x189/0x420
[   17.315141]  kasan_atomics+0x95/0x310
[   17.315315]  kunit_try_run_case+0x1a5/0x480
[   17.315466]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.315653]  kthread+0x337/0x6f0
[   17.315786]  ret_from_fork+0x116/0x1d0
[   17.315933]  ret_from_fork_asm+0x1a/0x30
[   17.316120] 
[   17.316197] The buggy address belongs to the object at ffff888102b6b880
[   17.316197]  which belongs to the cache kmalloc-64 of size 64
[   17.316461] The buggy address is located 0 bytes to the right of
[   17.316461]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.316733] 
[   17.316812] The buggy address belongs to the physical page:
[   17.316946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.317312] flags: 0x200000000000000(node=0|zone=2)
[   17.317546] page_type: f5(slab)
[   17.317717] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.318038] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.318366] page dumped because: kasan: bad access detected
[   17.318612] 
[   17.318737] Memory state around the buggy address:
[   17.318962]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.319255]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.319499] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.319626]                                      ^
[   17.319723]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.319863]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.320243] ==================================================================
[   17.793887] ==================================================================
[   17.794603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   17.794866] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.795067] 
[   17.795164] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.795237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.795254] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.795280] Call Trace:
[   17.795305]  <TASK>
[   17.795329]  dump_stack_lvl+0x73/0xb0
[   17.795360]  print_report+0xd1/0x650
[   17.795387]  ? __virt_addr_valid+0x1db/0x2d0
[   17.795413]  ? kasan_atomics_helper+0x20c8/0x5450
[   17.795437]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.795461]  ? kasan_atomics_helper+0x20c8/0x5450
[   17.795485]  kasan_report+0x141/0x180
[   17.795508]  ? kasan_atomics_helper+0x20c8/0x5450
[   17.795535]  kasan_check_range+0x10c/0x1c0
[   17.795561]  __kasan_check_write+0x18/0x20
[   17.795581]  kasan_atomics_helper+0x20c8/0x5450
[   17.795605]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.795628]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.795650]  ? kasan_atomics+0x152/0x310
[   17.795678]  kasan_atomics+0x1dc/0x310
[   17.795702]  ? __pfx_kasan_atomics+0x10/0x10
[   17.795728]  ? __pfx_read_tsc+0x10/0x10
[   17.795749]  ? ktime_get_ts64+0x86/0x230
[   17.795774]  kunit_try_run_case+0x1a5/0x480
[   17.795800]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.795823]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.795848]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.795872]  ? __kthread_parkme+0x82/0x180
[   17.795894]  ? preempt_count_sub+0x50/0x80
[   17.795919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.795943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.795965]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.795989]  kthread+0x337/0x6f0
[   17.796010]  ? trace_preempt_on+0x20/0xc0
[   17.796033]  ? __pfx_kthread+0x10/0x10
[   17.796055]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.796077]  ? calculate_sigpending+0x7b/0xa0
[   17.796102]  ? __pfx_kthread+0x10/0x10
[   17.796125]  ret_from_fork+0x116/0x1d0
[   17.796143]  ? __pfx_kthread+0x10/0x10
[   17.796165]  ret_from_fork_asm+0x1a/0x30
[   17.796198]  </TASK>
[   17.796209] 
[   17.801747] Allocated by task 283:
[   17.801847]  kasan_save_stack+0x45/0x70
[   17.801942]  kasan_save_track+0x18/0x40
[   17.802030]  kasan_save_alloc_info+0x3b/0x50
[   17.802121]  __kasan_kmalloc+0xb7/0xc0
[   17.802206]  __kmalloc_cache_noprof+0x189/0x420
[   17.802434]  kasan_atomics+0x95/0x310
[   17.802678]  kunit_try_run_case+0x1a5/0x480
[   17.802947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.803277]  kthread+0x337/0x6f0
[   17.803491]  ret_from_fork+0x116/0x1d0
[   17.803738]  ret_from_fork_asm+0x1a/0x30
[   17.804009] 
[   17.804140] The buggy address belongs to the object at ffff888102b6b880
[   17.804140]  which belongs to the cache kmalloc-64 of size 64
[   17.804439] The buggy address is located 0 bytes to the right of
[   17.804439]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.804856] 
[   17.804969] The buggy address belongs to the physical page:
[   17.805161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.805400] flags: 0x200000000000000(node=0|zone=2)
[   17.805603] page_type: f5(slab)
[   17.805779] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.805976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.806255] page dumped because: kasan: bad access detected
[   17.806399] 
[   17.806502] Memory state around the buggy address:
[   17.806684]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.806937]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.807198] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.807340]                                      ^
[   17.807445]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.807576]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.807703] ==================================================================
[   17.854553] ==================================================================
[   17.855534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   17.856022] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.856473] 
[   17.856617] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.856668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.856682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.856704] Call Trace:
[   17.856722]  <TASK>
[   17.856738]  dump_stack_lvl+0x73/0xb0
[   17.856766]  print_report+0xd1/0x650
[   17.856790]  ? __virt_addr_valid+0x1db/0x2d0
[   17.856815]  ? kasan_atomics_helper+0x224c/0x5450
[   17.856838]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.856862]  ? kasan_atomics_helper+0x224c/0x5450
[   17.856885]  kasan_report+0x141/0x180
[   17.856909]  ? kasan_atomics_helper+0x224c/0x5450
[   17.856937]  kasan_check_range+0x10c/0x1c0
[   17.856963]  __kasan_check_write+0x18/0x20
[   17.856984]  kasan_atomics_helper+0x224c/0x5450
[   17.857008]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.857031]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.857057]  ? kasan_atomics+0x152/0x310
[   17.857084]  kasan_atomics+0x1dc/0x310
[   17.857109]  ? __pfx_kasan_atomics+0x10/0x10
[   17.857134]  ? __pfx_read_tsc+0x10/0x10
[   17.857156]  ? ktime_get_ts64+0x86/0x230
[   17.857210]  kunit_try_run_case+0x1a5/0x480
[   17.857247]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.857270]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.857295]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.857319]  ? __kthread_parkme+0x82/0x180
[   17.857361]  ? preempt_count_sub+0x50/0x80
[   17.857387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.857412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.857437]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.857462]  kthread+0x337/0x6f0
[   17.857502]  ? trace_preempt_on+0x20/0xc0
[   17.857528]  ? __pfx_kthread+0x10/0x10
[   17.857549]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.857572]  ? calculate_sigpending+0x7b/0xa0
[   17.857597]  ? __pfx_kthread+0x10/0x10
[   17.857619]  ret_from_fork+0x116/0x1d0
[   17.857639]  ? __pfx_kthread+0x10/0x10
[   17.857660]  ret_from_fork_asm+0x1a/0x30
[   17.857692]  </TASK>
[   17.857704] 
[   17.863744] Allocated by task 283:
[   17.863975]  kasan_save_stack+0x45/0x70
[   17.864248]  kasan_save_track+0x18/0x40
[   17.864503]  kasan_save_alloc_info+0x3b/0x50
[   17.864597]  __kasan_kmalloc+0xb7/0xc0
[   17.864684]  __kmalloc_cache_noprof+0x189/0x420
[   17.864778]  kasan_atomics+0x95/0x310
[   17.864881]  kunit_try_run_case+0x1a5/0x480
[   17.865152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.865501]  kthread+0x337/0x6f0
[   17.865731]  ret_from_fork+0x116/0x1d0
[   17.865856]  ret_from_fork_asm+0x1a/0x30
[   17.865947] 
[   17.865999] The buggy address belongs to the object at ffff888102b6b880
[   17.865999]  which belongs to the cache kmalloc-64 of size 64
[   17.866189] The buggy address is located 0 bytes to the right of
[   17.866189]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.866931] 
[   17.867049] The buggy address belongs to the physical page:
[   17.867325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.867477] flags: 0x200000000000000(node=0|zone=2)
[   17.867588] page_type: f5(slab)
[   17.867681] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.867819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.867953] page dumped because: kasan: bad access detected
[   17.868053] 
[   17.868174] Memory state around the buggy address:
[   17.868466]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.868896]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.869292] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.869698]                                      ^
[   17.869968]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.870347]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.870519] ==================================================================
[   17.321128] ==================================================================
[   17.321573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   17.321714] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.321843] 
[   17.321966] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.322036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.322050] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.322089] Call Trace:
[   17.322107]  <TASK>
[   17.322139]  dump_stack_lvl+0x73/0xb0
[   17.322168]  print_report+0xd1/0x650
[   17.322191]  ? __virt_addr_valid+0x1db/0x2d0
[   17.322216]  ? kasan_atomics_helper+0x4a02/0x5450
[   17.322252]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.322293]  ? kasan_atomics_helper+0x4a02/0x5450
[   17.322319]  kasan_report+0x141/0x180
[   17.322349]  ? kasan_atomics_helper+0x4a02/0x5450
[   17.322379]  __asan_report_load4_noabort+0x18/0x20
[   17.322401]  kasan_atomics_helper+0x4a02/0x5450
[   17.322446]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.322471]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.322493]  ? kasan_atomics+0x152/0x310
[   17.322522]  kasan_atomics+0x1dc/0x310
[   17.322546]  ? __pfx_kasan_atomics+0x10/0x10
[   17.322572]  ? __pfx_read_tsc+0x10/0x10
[   17.322593]  ? ktime_get_ts64+0x86/0x230
[   17.322618]  kunit_try_run_case+0x1a5/0x480
[   17.322643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.322665]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.322688]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.322712]  ? __kthread_parkme+0x82/0x180
[   17.322733]  ? preempt_count_sub+0x50/0x80
[   17.322758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.322781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.322805]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.322828]  kthread+0x337/0x6f0
[   17.322850]  ? trace_preempt_on+0x20/0xc0
[   17.322874]  ? __pfx_kthread+0x10/0x10
[   17.322897]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.322918]  ? calculate_sigpending+0x7b/0xa0
[   17.322943]  ? __pfx_kthread+0x10/0x10
[   17.322966]  ret_from_fork+0x116/0x1d0
[   17.322985]  ? __pfx_kthread+0x10/0x10
[   17.323007]  ret_from_fork_asm+0x1a/0x30
[   17.323039]  </TASK>
[   17.323052] 
[   17.329011] Allocated by task 283:
[   17.329126]  kasan_save_stack+0x45/0x70
[   17.329264]  kasan_save_track+0x18/0x40
[   17.329386]  kasan_save_alloc_info+0x3b/0x50
[   17.329507]  __kasan_kmalloc+0xb7/0xc0
[   17.329614]  __kmalloc_cache_noprof+0x189/0x420
[   17.329747]  kasan_atomics+0x95/0x310
[   17.329854]  kunit_try_run_case+0x1a5/0x480
[   17.329976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.330119]  kthread+0x337/0x6f0
[   17.330310]  ret_from_fork+0x116/0x1d0
[   17.330527]  ret_from_fork_asm+0x1a/0x30
[   17.330809] 
[   17.330944] The buggy address belongs to the object at ffff888102b6b880
[   17.330944]  which belongs to the cache kmalloc-64 of size 64
[   17.331629] The buggy address is located 0 bytes to the right of
[   17.331629]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.332348] 
[   17.332474] The buggy address belongs to the physical page:
[   17.332800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.332953] flags: 0x200000000000000(node=0|zone=2)
[   17.333058] page_type: f5(slab)
[   17.333145] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.333288] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.333421] page dumped because: kasan: bad access detected
[   17.333524] 
[   17.333574] Memory state around the buggy address:
[   17.333720]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.334033]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.334352] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.334648]                                      ^
[   17.334870]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.335164]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.335464] ==================================================================
[   16.998896] ==================================================================
[   16.999141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   16.999591] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.000027] 
[   17.000169] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.000235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.000250] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.000276] Call Trace:
[   17.000296]  <TASK>
[   17.000316]  dump_stack_lvl+0x73/0xb0
[   17.000349]  print_report+0xd1/0x650
[   17.000373]  ? __virt_addr_valid+0x1db/0x2d0
[   17.000397]  ? kasan_atomics_helper+0x72f/0x5450
[   17.000420]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.000444]  ? kasan_atomics_helper+0x72f/0x5450
[   17.000467]  kasan_report+0x141/0x180
[   17.000491]  ? kasan_atomics_helper+0x72f/0x5450
[   17.000519]  kasan_check_range+0x10c/0x1c0
[   17.000544]  __kasan_check_write+0x18/0x20
[   17.000565]  kasan_atomics_helper+0x72f/0x5450
[   17.000590]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.000615]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.000638]  ? kasan_atomics+0x152/0x310
[   17.000666]  kasan_atomics+0x1dc/0x310
[   17.000690]  ? __pfx_kasan_atomics+0x10/0x10
[   17.000716]  ? __pfx_read_tsc+0x10/0x10
[   17.000738]  ? ktime_get_ts64+0x86/0x230
[   17.000764]  kunit_try_run_case+0x1a5/0x480
[   17.000789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.000895]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.000920]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.000945]  ? __kthread_parkme+0x82/0x180
[   17.000967]  ? preempt_count_sub+0x50/0x80
[   17.000991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.001015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.001037]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.001060]  kthread+0x337/0x6f0
[   17.001081]  ? trace_preempt_on+0x20/0xc0
[   17.001106]  ? __pfx_kthread+0x10/0x10
[   17.001127]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.001277]  ? calculate_sigpending+0x7b/0xa0
[   17.001316]  ? __pfx_kthread+0x10/0x10
[   17.001343]  ret_from_fork+0x116/0x1d0
[   17.001369]  ? __pfx_kthread+0x10/0x10
[   17.001391]  ret_from_fork_asm+0x1a/0x30
[   17.001423]  </TASK>
[   17.001436] 
[   17.007672] Allocated by task 283:
[   17.007803]  kasan_save_stack+0x45/0x70
[   17.008011]  kasan_save_track+0x18/0x40
[   17.008187]  kasan_save_alloc_info+0x3b/0x50
[   17.008334]  __kasan_kmalloc+0xb7/0xc0
[   17.008596]  __kmalloc_cache_noprof+0x189/0x420
[   17.008779]  kasan_atomics+0x95/0x310
[   17.008980]  kunit_try_run_case+0x1a5/0x480
[   17.009130]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.009359]  kthread+0x337/0x6f0
[   17.009827]  ret_from_fork+0x116/0x1d0
[   17.009953]  ret_from_fork_asm+0x1a/0x30
[   17.010109] 
[   17.010213] The buggy address belongs to the object at ffff888102b6b880
[   17.010213]  which belongs to the cache kmalloc-64 of size 64
[   17.010606] The buggy address is located 0 bytes to the right of
[   17.010606]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.010959] 
[   17.011084] The buggy address belongs to the physical page:
[   17.011302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.011617] flags: 0x200000000000000(node=0|zone=2)
[   17.011721] page_type: f5(slab)
[   17.011807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.011938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.012065] page dumped because: kasan: bad access detected
[   17.012162] 
[   17.012210] Memory state around the buggy address:
[   17.012423]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.012766]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.013050] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.013345]                                      ^
[   17.013611]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.013897]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.014174] ==================================================================
[   17.683829] ==================================================================
[   17.684145] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   17.684485] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.684677] 
[   17.684751] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.684802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.684816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.684840] Call Trace:
[   17.684861]  <TASK>
[   17.684881]  dump_stack_lvl+0x73/0xb0
[   17.684910]  print_report+0xd1/0x650
[   17.684933]  ? __virt_addr_valid+0x1db/0x2d0
[   17.684957]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.684979]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.685002]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.685025]  kasan_report+0x141/0x180
[   17.685049]  ? kasan_atomics_helper+0x1d7a/0x5450
[   17.685076]  kasan_check_range+0x10c/0x1c0
[   17.685100]  __kasan_check_write+0x18/0x20
[   17.685121]  kasan_atomics_helper+0x1d7a/0x5450
[   17.685145]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.685168]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.685189]  ? kasan_atomics+0x152/0x310
[   17.685216]  kasan_atomics+0x1dc/0x310
[   17.685251]  ? __pfx_kasan_atomics+0x10/0x10
[   17.685277]  ? __pfx_read_tsc+0x10/0x10
[   17.685299]  ? ktime_get_ts64+0x86/0x230
[   17.685324]  kunit_try_run_case+0x1a5/0x480
[   17.685348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.685370]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.685394]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.685417]  ? __kthread_parkme+0x82/0x180
[   17.685438]  ? preempt_count_sub+0x50/0x80
[   17.685462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.685486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.685510]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.685533]  kthread+0x337/0x6f0
[   17.685553]  ? trace_preempt_on+0x20/0xc0
[   17.685577]  ? __pfx_kthread+0x10/0x10
[   17.685598]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.685619]  ? calculate_sigpending+0x7b/0xa0
[   17.685643]  ? __pfx_kthread+0x10/0x10
[   17.685665]  ret_from_fork+0x116/0x1d0
[   17.685684]  ? __pfx_kthread+0x10/0x10
[   17.685705]  ret_from_fork_asm+0x1a/0x30
[   17.685737]  </TASK>
[   17.685749] 
[   17.691037] Allocated by task 283:
[   17.691126]  kasan_save_stack+0x45/0x70
[   17.691219]  kasan_save_track+0x18/0x40
[   17.691427]  kasan_save_alloc_info+0x3b/0x50
[   17.691626]  __kasan_kmalloc+0xb7/0xc0
[   17.691797]  __kmalloc_cache_noprof+0x189/0x420
[   17.691997]  kasan_atomics+0x95/0x310
[   17.692169]  kunit_try_run_case+0x1a5/0x480
[   17.692363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.692589]  kthread+0x337/0x6f0
[   17.692744]  ret_from_fork+0x116/0x1d0
[   17.692918]  ret_from_fork_asm+0x1a/0x30
[   17.693104] 
[   17.693213] The buggy address belongs to the object at ffff888102b6b880
[   17.693213]  which belongs to the cache kmalloc-64 of size 64
[   17.693677] The buggy address is located 0 bytes to the right of
[   17.693677]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.694124] 
[   17.694184] The buggy address belongs to the physical page:
[   17.694304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.694463] flags: 0x200000000000000(node=0|zone=2)
[   17.694575] page_type: f5(slab)
[   17.694738] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.695047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.695335] page dumped because: kasan: bad access detected
[   17.695560] 
[   17.695655] Memory state around the buggy address:
[   17.695861]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.696111]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.696361] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.696580]                                      ^
[   17.696745]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.696976]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.697212] ==================================================================
[   17.381097] ==================================================================
[   17.381266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   17.382112] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.382530] 
[   17.382657] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.382715] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.382730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.382755] Call Trace:
[   17.382775]  <TASK>
[   17.382793]  dump_stack_lvl+0x73/0xb0
[   17.382833]  print_report+0xd1/0x650
[   17.382859]  ? __virt_addr_valid+0x1db/0x2d0
[   17.382886]  ? kasan_atomics_helper+0x49ce/0x5450
[   17.382910]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.382935]  ? kasan_atomics_helper+0x49ce/0x5450
[   17.382961]  kasan_report+0x141/0x180
[   17.382985]  ? kasan_atomics_helper+0x49ce/0x5450
[   17.383013]  __asan_report_load4_noabort+0x18/0x20
[   17.383036]  kasan_atomics_helper+0x49ce/0x5450
[   17.383061]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.383087]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.383110]  ? kasan_atomics+0x152/0x310
[   17.383139]  kasan_atomics+0x1dc/0x310
[   17.383165]  ? __pfx_kasan_atomics+0x10/0x10
[   17.383192]  ? __pfx_read_tsc+0x10/0x10
[   17.383215]  ? ktime_get_ts64+0x86/0x230
[   17.383255]  kunit_try_run_case+0x1a5/0x480
[   17.383281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.383305]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.383330]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.383353]  ? __kthread_parkme+0x82/0x180
[   17.383376]  ? preempt_count_sub+0x50/0x80
[   17.383403]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.383427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.383452]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.383476]  kthread+0x337/0x6f0
[   17.383496]  ? trace_preempt_on+0x20/0xc0
[   17.383520]  ? __pfx_kthread+0x10/0x10
[   17.383542]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.383563]  ? calculate_sigpending+0x7b/0xa0
[   17.383588]  ? __pfx_kthread+0x10/0x10
[   17.383611]  ret_from_fork+0x116/0x1d0
[   17.383629]  ? __pfx_kthread+0x10/0x10
[   17.383651]  ret_from_fork_asm+0x1a/0x30
[   17.383683]  </TASK>
[   17.383695] 
[   17.389501] Allocated by task 283:
[   17.389716]  kasan_save_stack+0x45/0x70
[   17.389925]  kasan_save_track+0x18/0x40
[   17.390118]  kasan_save_alloc_info+0x3b/0x50
[   17.390380]  __kasan_kmalloc+0xb7/0xc0
[   17.390582]  __kmalloc_cache_noprof+0x189/0x420
[   17.390802]  kasan_atomics+0x95/0x310
[   17.390985]  kunit_try_run_case+0x1a5/0x480
[   17.391186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.391440]  kthread+0x337/0x6f0
[   17.391611]  ret_from_fork+0x116/0x1d0
[   17.391789]  ret_from_fork_asm+0x1a/0x30
[   17.391977] 
[   17.392071] The buggy address belongs to the object at ffff888102b6b880
[   17.392071]  which belongs to the cache kmalloc-64 of size 64
[   17.392734] The buggy address is located 0 bytes to the right of
[   17.392734]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.393330] 
[   17.393501] The buggy address belongs to the physical page:
[   17.393820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.394158] flags: 0x200000000000000(node=0|zone=2)
[   17.394482] page_type: f5(slab)
[   17.394679] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.395045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.395251] page dumped because: kasan: bad access detected
[   17.395361] 
[   17.395418] Memory state around the buggy address:
[   17.395667]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.396091]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.396318] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.396678]                                      ^
[   17.396925]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.397236]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.397630] ==================================================================
[   17.577126] ==================================================================
[   17.577988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   17.578470] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.578947] 
[   17.579100] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.579154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.579167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.579192] Call Trace:
[   17.579211]  <TASK>
[   17.579237]  dump_stack_lvl+0x73/0xb0
[   17.579267]  print_report+0xd1/0x650
[   17.579292]  ? __virt_addr_valid+0x1db/0x2d0
[   17.579319]  ? kasan_atomics_helper+0x194a/0x5450
[   17.579342]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.579367]  ? kasan_atomics_helper+0x194a/0x5450
[   17.579391]  kasan_report+0x141/0x180
[   17.579416]  ? kasan_atomics_helper+0x194a/0x5450
[   17.579446]  kasan_check_range+0x10c/0x1c0
[   17.579472]  __kasan_check_write+0x18/0x20
[   17.579494]  kasan_atomics_helper+0x194a/0x5450
[   17.579520]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.579545]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.579567]  ? kasan_atomics+0x152/0x310
[   17.579595]  kasan_atomics+0x1dc/0x310
[   17.579619]  ? __pfx_kasan_atomics+0x10/0x10
[   17.579645]  ? __pfx_read_tsc+0x10/0x10
[   17.579668]  ? ktime_get_ts64+0x86/0x230
[   17.579692]  kunit_try_run_case+0x1a5/0x480
[   17.579717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.579740]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.579763]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.579786]  ? __kthread_parkme+0x82/0x180
[   17.579807]  ? preempt_count_sub+0x50/0x80
[   17.579832]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.579856]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.579879]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.579902]  kthread+0x337/0x6f0
[   17.579922]  ? trace_preempt_on+0x20/0xc0
[   17.579947]  ? __pfx_kthread+0x10/0x10
[   17.579968]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.579990]  ? calculate_sigpending+0x7b/0xa0
[   17.580014]  ? __pfx_kthread+0x10/0x10
[   17.580037]  ret_from_fork+0x116/0x1d0
[   17.580075]  ? __pfx_kthread+0x10/0x10
[   17.580098]  ret_from_fork_asm+0x1a/0x30
[   17.580142]  </TASK>
[   17.580156] 
[   17.586833] Allocated by task 283:
[   17.587093]  kasan_save_stack+0x45/0x70
[   17.587261]  kasan_save_track+0x18/0x40
[   17.587358]  kasan_save_alloc_info+0x3b/0x50
[   17.587458]  __kasan_kmalloc+0xb7/0xc0
[   17.587550]  __kmalloc_cache_noprof+0x189/0x420
[   17.587649]  kasan_atomics+0x95/0x310
[   17.587736]  kunit_try_run_case+0x1a5/0x480
[   17.587828]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.587935]  kthread+0x337/0x6f0
[   17.588015]  ret_from_fork+0x116/0x1d0
[   17.588097]  ret_from_fork_asm+0x1a/0x30
[   17.588185] 
[   17.588249] The buggy address belongs to the object at ffff888102b6b880
[   17.588249]  which belongs to the cache kmalloc-64 of size 64
[   17.588447] The buggy address is located 0 bytes to the right of
[   17.588447]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.588853] 
[   17.588979] The buggy address belongs to the physical page:
[   17.589319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.589808] flags: 0x200000000000000(node=0|zone=2)
[   17.590118] page_type: f5(slab)
[   17.590351] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.590813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.591271] page dumped because: kasan: bad access detected
[   17.591615] 
[   17.591724] Memory state around the buggy address:
[   17.591823]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.591948]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.592071] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.592189]                                      ^
[   17.592292]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.592416]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.592535] ==================================================================
[   17.755156] ==================================================================
[   17.755438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   17.755777] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.756065] 
[   17.756178] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.756242] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.756256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.756277] Call Trace:
[   17.756301]  <TASK>
[   17.756316]  dump_stack_lvl+0x73/0xb0
[   17.756351]  print_report+0xd1/0x650
[   17.756375]  ? __virt_addr_valid+0x1db/0x2d0
[   17.756406]  ? kasan_atomics_helper+0x2006/0x5450
[   17.756437]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.756468]  ? kasan_atomics_helper+0x2006/0x5450
[   17.756491]  kasan_report+0x141/0x180
[   17.756522]  ? kasan_atomics_helper+0x2006/0x5450
[   17.756558]  kasan_check_range+0x10c/0x1c0
[   17.756591]  __kasan_check_write+0x18/0x20
[   17.756612]  kasan_atomics_helper+0x2006/0x5450
[   17.756643]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.756675]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.756697]  ? kasan_atomics+0x152/0x310
[   17.756733]  kasan_atomics+0x1dc/0x310
[   17.756765]  ? __pfx_kasan_atomics+0x10/0x10
[   17.756798]  ? __pfx_read_tsc+0x10/0x10
[   17.756827]  ? ktime_get_ts64+0x86/0x230
[   17.756851]  kunit_try_run_case+0x1a5/0x480
[   17.756884]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.756916]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.756946]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.756969]  ? __kthread_parkme+0x82/0x180
[   17.756998]  ? preempt_count_sub+0x50/0x80
[   17.757030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.757053]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.757084]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.757116]  kthread+0x337/0x6f0
[   17.757136]  ? trace_preempt_on+0x20/0xc0
[   17.757169]  ? __pfx_kthread+0x10/0x10
[   17.757199]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.757237]  ? calculate_sigpending+0x7b/0xa0
[   17.757266]  ? __pfx_kthread+0x10/0x10
[   17.757298]  ret_from_fork+0x116/0x1d0
[   17.757328]  ? __pfx_kthread+0x10/0x10
[   17.757351]  ret_from_fork_asm+0x1a/0x30
[   17.757394]  </TASK>
[   17.757415] 
[   17.762427] Allocated by task 283:
[   17.762653]  kasan_save_stack+0x45/0x70
[   17.762857]  kasan_save_track+0x18/0x40
[   17.763033]  kasan_save_alloc_info+0x3b/0x50
[   17.763300]  __kasan_kmalloc+0xb7/0xc0
[   17.763499]  __kmalloc_cache_noprof+0x189/0x420
[   17.763688]  kasan_atomics+0x95/0x310
[   17.763875]  kunit_try_run_case+0x1a5/0x480
[   17.764054]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.764392]  kthread+0x337/0x6f0
[   17.764505]  ret_from_fork+0x116/0x1d0
[   17.764595]  ret_from_fork_asm+0x1a/0x30
[   17.764799] 
[   17.764907] The buggy address belongs to the object at ffff888102b6b880
[   17.764907]  which belongs to the cache kmalloc-64 of size 64
[   17.766378] The buggy address is located 0 bytes to the right of
[   17.766378]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.767150] 
[   17.767324] The buggy address belongs to the physical page:
[   17.767584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.767905] flags: 0x200000000000000(node=0|zone=2)
[   17.768137] page_type: f5(slab)
[   17.769472] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.769641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.769779] page dumped because: kasan: bad access detected
[   17.769884] 
[   17.769935] Memory state around the buggy address:
[   17.770037]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.770449]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.770779] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.771117]                                      ^
[   17.771385]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.771715]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.771845] ==================================================================
[   17.431577] ==================================================================
[   17.431942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   17.432330] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.433013] 
[   17.433141] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.433193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.433206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.433238] Call Trace:
[   17.433258]  <TASK>
[   17.433290]  dump_stack_lvl+0x73/0xb0
[   17.433319]  print_report+0xd1/0x650
[   17.433343]  ? __virt_addr_valid+0x1db/0x2d0
[   17.433368]  ? kasan_atomics_helper+0x1467/0x5450
[   17.433389]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.433430]  ? kasan_atomics_helper+0x1467/0x5450
[   17.433454]  kasan_report+0x141/0x180
[   17.433477]  ? kasan_atomics_helper+0x1467/0x5450
[   17.433505]  kasan_check_range+0x10c/0x1c0
[   17.433529]  __kasan_check_write+0x18/0x20
[   17.433567]  kasan_atomics_helper+0x1467/0x5450
[   17.433592]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.433634]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.433657]  ? kasan_atomics+0x152/0x310
[   17.433683]  kasan_atomics+0x1dc/0x310
[   17.433707]  ? __pfx_kasan_atomics+0x10/0x10
[   17.433733]  ? __pfx_read_tsc+0x10/0x10
[   17.433754]  ? ktime_get_ts64+0x86/0x230
[   17.433779]  kunit_try_run_case+0x1a5/0x480
[   17.433804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.433826]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.433850]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.433873]  ? __kthread_parkme+0x82/0x180
[   17.433894]  ? preempt_count_sub+0x50/0x80
[   17.433918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.433942]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.433965]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.433988]  kthread+0x337/0x6f0
[   17.434008]  ? trace_preempt_on+0x20/0xc0
[   17.434032]  ? __pfx_kthread+0x10/0x10
[   17.434053]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.434075]  ? calculate_sigpending+0x7b/0xa0
[   17.434099]  ? __pfx_kthread+0x10/0x10
[   17.434121]  ret_from_fork+0x116/0x1d0
[   17.434139]  ? __pfx_kthread+0x10/0x10
[   17.434161]  ret_from_fork_asm+0x1a/0x30
[   17.434207]  </TASK>
[   17.434229] 
[   17.439506] Allocated by task 283:
[   17.439617]  kasan_save_stack+0x45/0x70
[   17.439850]  kasan_save_track+0x18/0x40
[   17.440066]  kasan_save_alloc_info+0x3b/0x50
[   17.440286]  __kasan_kmalloc+0xb7/0xc0
[   17.440545]  __kmalloc_cache_noprof+0x189/0x420
[   17.440818]  kasan_atomics+0x95/0x310
[   17.441019]  kunit_try_run_case+0x1a5/0x480
[   17.441271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.441475]  kthread+0x337/0x6f0
[   17.441560]  ret_from_fork+0x116/0x1d0
[   17.441645]  ret_from_fork_asm+0x1a/0x30
[   17.441888] 
[   17.442012] The buggy address belongs to the object at ffff888102b6b880
[   17.442012]  which belongs to the cache kmalloc-64 of size 64
[   17.442395] The buggy address is located 0 bytes to the right of
[   17.442395]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.442784] 
[   17.442865] The buggy address belongs to the physical page:
[   17.443044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.443342] flags: 0x200000000000000(node=0|zone=2)
[   17.443590] page_type: f5(slab)
[   17.443753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.443997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.444215] page dumped because: kasan: bad access detected
[   17.444454] 
[   17.444542] Memory state around the buggy address:
[   17.444675]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.444922]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.445151] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.445415]                                      ^
[   17.445560]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.445790]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.445948] ==================================================================
[   17.173251] ==================================================================
[   17.173579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   17.173731] Write of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.174043] 
[   17.174125] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.174179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.174193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.174216] Call Trace:
[   17.174249]  <TASK>
[   17.174270]  dump_stack_lvl+0x73/0xb0
[   17.174300]  print_report+0xd1/0x650
[   17.174324]  ? __virt_addr_valid+0x1db/0x2d0
[   17.174360]  ? kasan_atomics_helper+0xd47/0x5450
[   17.174384]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.174409]  ? kasan_atomics_helper+0xd47/0x5450
[   17.174432]  kasan_report+0x141/0x180
[   17.174457]  ? kasan_atomics_helper+0xd47/0x5450
[   17.174485]  kasan_check_range+0x10c/0x1c0
[   17.174510]  __kasan_check_write+0x18/0x20
[   17.174531]  kasan_atomics_helper+0xd47/0x5450
[   17.174555]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.174579]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.174602]  ? kasan_atomics+0x152/0x310
[   17.174631]  kasan_atomics+0x1dc/0x310
[   17.174655]  ? __pfx_kasan_atomics+0x10/0x10
[   17.174681]  ? __pfx_read_tsc+0x10/0x10
[   17.174706]  ? ktime_get_ts64+0x86/0x230
[   17.174732]  kunit_try_run_case+0x1a5/0x480
[   17.174758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.174781]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.174805]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.174829]  ? __kthread_parkme+0x82/0x180
[   17.174850]  ? preempt_count_sub+0x50/0x80
[   17.174875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.174900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.174924]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.175129]  kthread+0x337/0x6f0
[   17.175238]  ? trace_preempt_on+0x20/0xc0
[   17.175273]  ? __pfx_kthread+0x10/0x10
[   17.175297]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.175322]  ? calculate_sigpending+0x7b/0xa0
[   17.175348]  ? __pfx_kthread+0x10/0x10
[   17.175372]  ret_from_fork+0x116/0x1d0
[   17.175392]  ? __pfx_kthread+0x10/0x10
[   17.175415]  ret_from_fork_asm+0x1a/0x30
[   17.175448]  </TASK>
[   17.175550] 
[   17.181998] Allocated by task 283:
[   17.182101]  kasan_save_stack+0x45/0x70
[   17.182205]  kasan_save_track+0x18/0x40
[   17.182427]  kasan_save_alloc_info+0x3b/0x50
[   17.182747]  __kasan_kmalloc+0xb7/0xc0
[   17.182971]  __kmalloc_cache_noprof+0x189/0x420
[   17.183253]  kasan_atomics+0x95/0x310
[   17.183556]  kunit_try_run_case+0x1a5/0x480
[   17.183709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.183835]  kthread+0x337/0x6f0
[   17.183918]  ret_from_fork+0x116/0x1d0
[   17.184004]  ret_from_fork_asm+0x1a/0x30
[   17.184092] 
[   17.184202] The buggy address belongs to the object at ffff888102b6b880
[   17.184202]  which belongs to the cache kmalloc-64 of size 64
[   17.184967] The buggy address is located 0 bytes to the right of
[   17.184967]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.185607] 
[   17.185669] The buggy address belongs to the physical page:
[   17.185799] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.186213] flags: 0x200000000000000(node=0|zone=2)
[   17.186528] page_type: f5(slab)
[   17.186666] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.186901] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.187089] page dumped because: kasan: bad access detected
[   17.187193] 
[   17.187256] Memory state around the buggy address:
[   17.187356]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.187543]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.187861] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.188286]                                      ^
[   17.188622]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.189035]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.189251] ==================================================================
[   17.727295] ==================================================================
[   17.727656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   17.727969] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.728286] 
[   17.728397] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.728464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.728478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.728501] Call Trace:
[   17.728518]  <TASK>
[   17.728534]  dump_stack_lvl+0x73/0xb0
[   17.728562]  print_report+0xd1/0x650
[   17.728586]  ? __virt_addr_valid+0x1db/0x2d0
[   17.728629]  ? kasan_atomics_helper+0x1f43/0x5450
[   17.728654]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.728678]  ? kasan_atomics_helper+0x1f43/0x5450
[   17.728701]  kasan_report+0x141/0x180
[   17.728726]  ? kasan_atomics_helper+0x1f43/0x5450
[   17.728754]  kasan_check_range+0x10c/0x1c0
[   17.728799]  __kasan_check_write+0x18/0x20
[   17.728821]  kasan_atomics_helper+0x1f43/0x5450
[   17.728846]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.728870]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.728893]  ? kasan_atomics+0x152/0x310
[   17.728921]  kasan_atomics+0x1dc/0x310
[   17.728945]  ? __pfx_kasan_atomics+0x10/0x10
[   17.728988]  ? __pfx_read_tsc+0x10/0x10
[   17.729012]  ? ktime_get_ts64+0x86/0x230
[   17.729038]  kunit_try_run_case+0x1a5/0x480
[   17.729064]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.729087]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.729111]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.729153]  ? __kthread_parkme+0x82/0x180
[   17.729174]  ? preempt_count_sub+0x50/0x80
[   17.729198]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.729231]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.729256]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.729297]  kthread+0x337/0x6f0
[   17.729320]  ? trace_preempt_on+0x20/0xc0
[   17.729354]  ? __pfx_kthread+0x10/0x10
[   17.729384]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.729414]  ? calculate_sigpending+0x7b/0xa0
[   17.729439]  ? __pfx_kthread+0x10/0x10
[   17.729470]  ret_from_fork+0x116/0x1d0
[   17.729498]  ? __pfx_kthread+0x10/0x10
[   17.729520]  ret_from_fork_asm+0x1a/0x30
[   17.729560]  </TASK>
[   17.729579] 
[   17.735029] Allocated by task 283:
[   17.735226]  kasan_save_stack+0x45/0x70
[   17.735382]  kasan_save_track+0x18/0x40
[   17.735569]  kasan_save_alloc_info+0x3b/0x50
[   17.735692]  __kasan_kmalloc+0xb7/0xc0
[   17.735779]  __kmalloc_cache_noprof+0x189/0x420
[   17.735873]  kasan_atomics+0x95/0x310
[   17.735957]  kunit_try_run_case+0x1a5/0x480
[   17.736046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.736149]  kthread+0x337/0x6f0
[   17.736246]  ret_from_fork+0x116/0x1d0
[   17.736439]  ret_from_fork_asm+0x1a/0x30
[   17.736640] 
[   17.736755] The buggy address belongs to the object at ffff888102b6b880
[   17.736755]  which belongs to the cache kmalloc-64 of size 64
[   17.737308] The buggy address is located 0 bytes to the right of
[   17.737308]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.737775] 
[   17.737888] The buggy address belongs to the physical page:
[   17.738049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.738316] flags: 0x200000000000000(node=0|zone=2)
[   17.738455] page_type: f5(slab)
[   17.738656] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.738892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.739130] page dumped because: kasan: bad access detected
[   17.739288] 
[   17.739363] Memory state around the buggy address:
[   17.739488]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.739648]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.739805] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.739965]                                      ^
[   17.740083]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.740367]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.740642] ==================================================================
[   17.351389] ==================================================================
[   17.351721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   17.352029] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.352343] 
[   17.352427] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.352497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.352511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.352535] Call Trace:
[   17.352552]  <TASK>
[   17.352569]  dump_stack_lvl+0x73/0xb0
[   17.352597]  print_report+0xd1/0x650
[   17.352621]  ? __virt_addr_valid+0x1db/0x2d0
[   17.353594]  ? kasan_atomics_helper+0x49e8/0x5450
[   17.353621]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.353646]  ? kasan_atomics_helper+0x49e8/0x5450
[   17.353671]  kasan_report+0x141/0x180
[   17.353696]  ? kasan_atomics_helper+0x49e8/0x5450
[   17.353725]  __asan_report_load4_noabort+0x18/0x20
[   17.353749]  kasan_atomics_helper+0x49e8/0x5450
[   17.353774]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.353797]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.353820]  ? kasan_atomics+0x152/0x310
[   17.353848]  kasan_atomics+0x1dc/0x310
[   17.353873]  ? __pfx_kasan_atomics+0x10/0x10
[   17.353898]  ? __pfx_read_tsc+0x10/0x10
[   17.354308]  ? ktime_get_ts64+0x86/0x230
[   17.354352]  kunit_try_run_case+0x1a5/0x480
[   17.354385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.354410]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.354436]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.354460]  ? __kthread_parkme+0x82/0x180
[   17.354483]  ? preempt_count_sub+0x50/0x80
[   17.354509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.354534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.354557]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.354581]  kthread+0x337/0x6f0
[   17.354602]  ? trace_preempt_on+0x20/0xc0
[   17.354627]  ? __pfx_kthread+0x10/0x10
[   17.354648]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.354671]  ? calculate_sigpending+0x7b/0xa0
[   17.354696]  ? __pfx_kthread+0x10/0x10
[   17.354719]  ret_from_fork+0x116/0x1d0
[   17.354739]  ? __pfx_kthread+0x10/0x10
[   17.354761]  ret_from_fork_asm+0x1a/0x30
[   17.354793]  </TASK>
[   17.354807] 
[   17.359719] Allocated by task 283:
[   17.359841]  kasan_save_stack+0x45/0x70
[   17.360068]  kasan_save_track+0x18/0x40
[   17.360260]  kasan_save_alloc_info+0x3b/0x50
[   17.360429]  __kasan_kmalloc+0xb7/0xc0
[   17.360575]  __kmalloc_cache_noprof+0x189/0x420
[   17.360783]  kasan_atomics+0x95/0x310
[   17.360907]  kunit_try_run_case+0x1a5/0x480
[   17.361101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.361303]  kthread+0x337/0x6f0
[   17.361444]  ret_from_fork+0x116/0x1d0
[   17.361591]  ret_from_fork_asm+0x1a/0x30
[   17.361761] 
[   17.361873] The buggy address belongs to the object at ffff888102b6b880
[   17.361873]  which belongs to the cache kmalloc-64 of size 64
[   17.362204] The buggy address is located 0 bytes to the right of
[   17.362204]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.362618] 
[   17.362735] The buggy address belongs to the physical page:
[   17.362910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.363165] flags: 0x200000000000000(node=0|zone=2)
[   17.363423] page_type: f5(slab)
[   17.363592] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.363851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.364040] page dumped because: kasan: bad access detected
[   17.364241] 
[   17.364340] Memory state around the buggy address:
[   17.364506]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.364746]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.364980] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.365173]                                      ^
[   17.365324]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.365485]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.365762] ==================================================================
[   17.775292] ==================================================================
[   17.777804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   17.778277] Read of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.778672] 
[   17.778820] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.778878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.778892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.778917] Call Trace:
[   17.778944]  <TASK>
[   17.778967]  dump_stack_lvl+0x73/0xb0
[   17.778997]  print_report+0xd1/0x650
[   17.779022]  ? __virt_addr_valid+0x1db/0x2d0
[   17.779047]  ? kasan_atomics_helper+0x4f98/0x5450
[   17.779069]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.779092]  ? kasan_atomics_helper+0x4f98/0x5450
[   17.779114]  kasan_report+0x141/0x180
[   17.779137]  ? kasan_atomics_helper+0x4f98/0x5450
[   17.779165]  __asan_report_load8_noabort+0x18/0x20
[   17.779187]  kasan_atomics_helper+0x4f98/0x5450
[   17.779211]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.779589]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.779624]  ? kasan_atomics+0x152/0x310
[   17.779652]  kasan_atomics+0x1dc/0x310
[   17.779680]  ? __pfx_kasan_atomics+0x10/0x10
[   17.779706]  ? __pfx_read_tsc+0x10/0x10
[   17.779728]  ? ktime_get_ts64+0x86/0x230
[   17.779754]  kunit_try_run_case+0x1a5/0x480
[   17.779781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.779804]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.779828]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.779852]  ? __kthread_parkme+0x82/0x180
[   17.779874]  ? preempt_count_sub+0x50/0x80
[   17.779900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.779924]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.779947]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.779971]  kthread+0x337/0x6f0
[   17.779990]  ? trace_preempt_on+0x20/0xc0
[   17.780015]  ? __pfx_kthread+0x10/0x10
[   17.780036]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.780057]  ? calculate_sigpending+0x7b/0xa0
[   17.780082]  ? __pfx_kthread+0x10/0x10
[   17.780105]  ret_from_fork+0x116/0x1d0
[   17.780124]  ? __pfx_kthread+0x10/0x10
[   17.780144]  ret_from_fork_asm+0x1a/0x30
[   17.780176]  </TASK>
[   17.780190] 
[   17.786628] Allocated by task 283:
[   17.786820]  kasan_save_stack+0x45/0x70
[   17.787029]  kasan_save_track+0x18/0x40
[   17.787214]  kasan_save_alloc_info+0x3b/0x50
[   17.787428]  __kasan_kmalloc+0xb7/0xc0
[   17.787610]  __kmalloc_cache_noprof+0x189/0x420
[   17.787823]  kasan_atomics+0x95/0x310
[   17.788005]  kunit_try_run_case+0x1a5/0x480
[   17.788203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.788478]  kthread+0x337/0x6f0
[   17.788607]  ret_from_fork+0x116/0x1d0
[   17.788725]  ret_from_fork_asm+0x1a/0x30
[   17.788923] 
[   17.789035] The buggy address belongs to the object at ffff888102b6b880
[   17.789035]  which belongs to the cache kmalloc-64 of size 64
[   17.789394] The buggy address is located 0 bytes to the right of
[   17.789394]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.789643] 
[   17.789762] The buggy address belongs to the physical page:
[   17.790082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.790341] flags: 0x200000000000000(node=0|zone=2)
[   17.790611] page_type: f5(slab)
[   17.790772] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.790996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.791256] page dumped because: kasan: bad access detected
[   17.791361] 
[   17.791413] Memory state around the buggy address:
[   17.791675]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.791973]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.792250] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.792517]                                      ^
[   17.792760]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.792910]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.793042] ==================================================================
[   17.611404] ==================================================================
[   17.611754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   17.612011] Write of size 8 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   17.612260] 
[   17.612410] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   17.612488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.612513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.612538] Call Trace:
[   17.612572]  <TASK>
[   17.612597]  dump_stack_lvl+0x73/0xb0
[   17.612627]  print_report+0xd1/0x650
[   17.612662]  ? __virt_addr_valid+0x1db/0x2d0
[   17.612689]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.612710]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.612752]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.612777]  kasan_report+0x141/0x180
[   17.612801]  ? kasan_atomics_helper+0x1a7f/0x5450
[   17.612830]  kasan_check_range+0x10c/0x1c0
[   17.612855]  __kasan_check_write+0x18/0x20
[   17.612875]  kasan_atomics_helper+0x1a7f/0x5450
[   17.612917]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.612943]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.612965]  ? kasan_atomics+0x152/0x310
[   17.612992]  kasan_atomics+0x1dc/0x310
[   17.613016]  ? __pfx_kasan_atomics+0x10/0x10
[   17.613041]  ? __pfx_read_tsc+0x10/0x10
[   17.613063]  ? ktime_get_ts64+0x86/0x230
[   17.613088]  kunit_try_run_case+0x1a5/0x480
[   17.613114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.613137]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.613161]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.613184]  ? __kthread_parkme+0x82/0x180
[   17.613206]  ? preempt_count_sub+0x50/0x80
[   17.613249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.613274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.613299]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.613322]  kthread+0x337/0x6f0
[   17.613343]  ? trace_preempt_on+0x20/0xc0
[   17.613369]  ? __pfx_kthread+0x10/0x10
[   17.613391]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.613413]  ? calculate_sigpending+0x7b/0xa0
[   17.613438]  ? __pfx_kthread+0x10/0x10
[   17.613460]  ret_from_fork+0x116/0x1d0
[   17.613480]  ? __pfx_kthread+0x10/0x10
[   17.613501]  ret_from_fork_asm+0x1a/0x30
[   17.613535]  </TASK>
[   17.613549] 
[   17.619077] Allocated by task 283:
[   17.619196]  kasan_save_stack+0x45/0x70
[   17.619331]  kasan_save_track+0x18/0x40
[   17.619465]  kasan_save_alloc_info+0x3b/0x50
[   17.619700]  __kasan_kmalloc+0xb7/0xc0
[   17.619945]  __kmalloc_cache_noprof+0x189/0x420
[   17.620200]  kasan_atomics+0x95/0x310
[   17.620441]  kunit_try_run_case+0x1a5/0x480
[   17.620697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.621009]  kthread+0x337/0x6f0
[   17.621229]  ret_from_fork+0x116/0x1d0
[   17.621447]  ret_from_fork_asm+0x1a/0x30
[   17.621680] 
[   17.621801] The buggy address belongs to the object at ffff888102b6b880
[   17.621801]  which belongs to the cache kmalloc-64 of size 64
[   17.621997] The buggy address is located 0 bytes to the right of
[   17.621997]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   17.622288] 
[   17.622400] The buggy address belongs to the physical page:
[   17.622704] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   17.623091] flags: 0x200000000000000(node=0|zone=2)
[   17.623260] page_type: f5(slab)
[   17.623350] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.623483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.623614] page dumped because: kasan: bad access detected
[   17.623713] 
[   17.623763] Memory state around the buggy address:
[   17.623859]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.624208]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.624622] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.624953]                                      ^
[   17.625190]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.625545]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.625725] ==================================================================
[   16.838281] ==================================================================
[   16.838766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   16.839205] Read of size 4 at addr ffff888102b6b8b0 by task kunit_try_catch/283
[   16.839659] 
[   16.839805] CPU: 0 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc6-next-20250515 #1 PREEMPT(voluntary) 
[   16.839860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   16.839874] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   16.839897] Call Trace:
[   16.839917]  <TASK>
[   16.839937]  dump_stack_lvl+0x73/0xb0
[   16.839965]  print_report+0xd1/0x650
[   16.839989]  ? __virt_addr_valid+0x1db/0x2d0
[   16.840013]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.840034]  ? kasan_complete_mode_report_info+0x2a/0x200
[   16.840056]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.840078]  kasan_report+0x141/0x180
[   16.840100]  ? kasan_atomics_helper+0x4b88/0x5450
[   16.840127]  __asan_report_load4_noabort+0x18/0x20
[   16.840147]  kasan_atomics_helper+0x4b88/0x5450
[   16.840170]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   16.840192]  ? __kmalloc_cache_noprof+0x189/0x420
[   16.840237]  ? kasan_atomics+0x152/0x310
[   16.840268]  kasan_atomics+0x1dc/0x310
[   16.840300]  ? __pfx_kasan_atomics+0x10/0x10
[   16.840325]  ? __pfx_read_tsc+0x10/0x10
[   16.840347]  ? ktime_get_ts64+0x86/0x230
[   16.840372]  kunit_try_run_case+0x1a5/0x480
[   16.840396]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.840418]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   16.840441]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   16.840531]  ? __kthread_parkme+0x82/0x180
[   16.840556]  ? preempt_count_sub+0x50/0x80
[   16.840597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   16.840625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.840648]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   16.840671]  kthread+0x337/0x6f0
[   16.840690]  ? trace_preempt_on+0x20/0xc0
[   16.840715]  ? __pfx_kthread+0x10/0x10
[   16.840752]  ? _raw_spin_unlock_irq+0x47/0x80
[   16.840776]  ? calculate_sigpending+0x7b/0xa0
[   16.840801]  ? __pfx_kthread+0x10/0x10
[   16.840823]  ret_from_fork+0x116/0x1d0
[   16.840842]  ? __pfx_kthread+0x10/0x10
[   16.840862]  ret_from_fork_asm+0x1a/0x30
[   16.840910]  </TASK>
[   16.840923] 
[   16.846944] Allocated by task 283:
[   16.847046]  kasan_save_stack+0x45/0x70
[   16.847296]  kasan_save_track+0x18/0x40
[   16.847606]  kasan_save_alloc_info+0x3b/0x50
[   16.847882]  __kasan_kmalloc+0xb7/0xc0
[   16.848102]  __kmalloc_cache_noprof+0x189/0x420
[   16.848393]  kasan_atomics+0x95/0x310
[   16.848693]  kunit_try_run_case+0x1a5/0x480
[   16.848958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   16.849096]  kthread+0x337/0x6f0
[   16.849307]  ret_from_fork+0x116/0x1d0
[   16.849414]  ret_from_fork_asm+0x1a/0x30
[   16.849818] 
[   16.849884] The buggy address belongs to the object at ffff888102b6b880
[   16.849884]  which belongs to the cache kmalloc-64 of size 64
[   16.850715] The buggy address is located 0 bytes to the right of
[   16.850715]  allocated 48-byte region [ffff888102b6b880, ffff888102b6b8b0)
[   16.851370] 
[   16.851427] The buggy address belongs to the physical page:
[   16.851588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b6b
[   16.851735] flags: 0x200000000000000(node=0|zone=2)
[   16.852055] page_type: f5(slab)
[   16.852240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   16.852740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   16.853101] page dumped because: kasan: bad access detected
[   16.853325] 
[   16.853440] Memory state around the buggy address:
[   16.853631]  ffff888102b6b780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.853964]  ffff888102b6b800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   16.854091] >ffff888102b6b880: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   16.854211]                                      ^
[   16.854316]  ffff888102b6b900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.855013]  ffff888102b6b980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   16.855585] ==================================================================