Hay
Date
May 26, 2025, 9:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   20.792864] ==================================================================
[   20.792989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   20.793106] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.793222] 
[   20.793301] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.794698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.794998] Hardware name: linux,dummy-virt (DT)
[   20.795103] Call trace:
[   20.795315]  show_stack+0x20/0x38 (C)
[   20.795441]  dump_stack_lvl+0x8c/0xd0
[   20.795537]  print_report+0x118/0x608
[   20.795636]  kasan_report+0xdc/0x128
[   20.796044]  kasan_check_range+0x100/0x1a8
[   20.796925]  __kasan_check_write+0x20/0x30
[   20.797046]  kasan_atomics_helper+0x1384/0x4858
[   20.797165]  kasan_atomics+0x198/0x2e0
[   20.797412]  kunit_try_run_case+0x170/0x3f0
[   20.797654]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.797797]  kthread+0x328/0x630
[   20.797899]  ret_from_fork+0x10/0x20
[   20.798017] 
[   20.798065] Allocated by task 265:
[   20.798150]  kasan_save_stack+0x3c/0x68
[   20.798253]  kasan_save_track+0x20/0x40
[   20.798623]  kasan_save_alloc_info+0x40/0x58
[   20.798751]  __kasan_kmalloc+0xd4/0xd8
[   20.798837]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.798925]  kasan_atomics+0xb8/0x2e0
[   20.798994]  kunit_try_run_case+0x170/0x3f0
[   20.799080]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.799186]  kthread+0x328/0x630
[   20.799266]  ret_from_fork+0x10/0x20
[   20.800821] 
[   20.800895] The buggy address belongs to the object at fff00000c7892700
[   20.800895]  which belongs to the cache kmalloc-64 of size 64
[   20.801885] The buggy address is located 0 bytes to the right of
[   20.801885]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.802604] 
[   20.802668] The buggy address belongs to the physical page:
[   20.803146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.803272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.803944] page_type: f5(slab)
[   20.804133] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.804746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.805176] page dumped because: kasan: bad access detected
[   20.805282] 
[   20.805482] Memory state around the buggy address:
[   20.805687]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.805796]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.805889] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.806267]                                      ^
[   20.806519]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.806978]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.807228] ==================================================================
[   20.711516] ==================================================================
[   20.711589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   20.711658] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.711715] 
[   20.711755] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.711849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.711882] Hardware name: linux,dummy-virt (DT)
[   20.711917] Call trace:
[   20.711946]  show_stack+0x20/0x38 (C)
[   20.712003]  dump_stack_lvl+0x8c/0xd0
[   20.712057]  print_report+0x118/0x608
[   20.712110]  kasan_report+0xdc/0x128
[   20.712163]  kasan_check_range+0x100/0x1a8
[   20.712218]  __kasan_check_write+0x20/0x30
[   20.712269]  kasan_atomics_helper+0xff0/0x4858
[   20.712337]  kasan_atomics+0x198/0x2e0
[   20.712398]  kunit_try_run_case+0x170/0x3f0
[   20.713333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.713856]  kthread+0x328/0x630
[   20.713952]  ret_from_fork+0x10/0x20
[   20.714011] 
[   20.714035] Allocated by task 265:
[   20.714067]  kasan_save_stack+0x3c/0x68
[   20.714116]  kasan_save_track+0x20/0x40
[   20.714289]  kasan_save_alloc_info+0x40/0x58
[   20.714404]  __kasan_kmalloc+0xd4/0xd8
[   20.714546]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.714670]  kasan_atomics+0xb8/0x2e0
[   20.714750]  kunit_try_run_case+0x170/0x3f0
[   20.714860]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.714922]  kthread+0x328/0x630
[   20.714963]  ret_from_fork+0x10/0x20
[   20.715005] 
[   20.715030] The buggy address belongs to the object at fff00000c7892700
[   20.715030]  which belongs to the cache kmalloc-64 of size 64
[   20.715093] The buggy address is located 0 bytes to the right of
[   20.715093]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.715158] 
[   20.715181] The buggy address belongs to the physical page:
[   20.715216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.715505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.715754] page_type: f5(slab)
[   20.715813] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.716025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.716087] page dumped because: kasan: bad access detected
[   20.716259] 
[   20.716287] Memory state around the buggy address:
[   20.716480]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.716543]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.716743] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.716861]                                      ^
[   20.716915]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.716965]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.717008] ==================================================================
[   20.954257] ==================================================================
[   20.954384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   20.954548] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.954789] 
[   20.954874] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.955061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.955152] Hardware name: linux,dummy-virt (DT)
[   20.955227] Call trace:
[   20.955274]  show_stack+0x20/0x38 (C)
[   20.955384]  dump_stack_lvl+0x8c/0xd0
[   20.955514]  print_report+0x118/0x608
[   20.955628]  kasan_report+0xdc/0x128
[   20.955731]  __asan_report_load8_noabort+0x20/0x30
[   20.955844]  kasan_atomics_helper+0x3e10/0x4858
[   20.955974]  kasan_atomics+0x198/0x2e0
[   20.956226]  kunit_try_run_case+0x170/0x3f0
[   20.956384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.956573]  kthread+0x328/0x630
[   20.956669]  ret_from_fork+0x10/0x20
[   20.956829] 
[   20.956930] Allocated by task 265:
[   20.957173]  kasan_save_stack+0x3c/0x68
[   20.957400]  kasan_save_track+0x20/0x40
[   20.957529]  kasan_save_alloc_info+0x40/0x58
[   20.957661]  __kasan_kmalloc+0xd4/0xd8
[   20.957782]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.957910]  kasan_atomics+0xb8/0x2e0
[   20.958007]  kunit_try_run_case+0x170/0x3f0
[   20.958106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.958204]  kthread+0x328/0x630
[   20.958279]  ret_from_fork+0x10/0x20
[   20.958406] 
[   20.958452] The buggy address belongs to the object at fff00000c7892700
[   20.958452]  which belongs to the cache kmalloc-64 of size 64
[   20.958827] The buggy address is located 0 bytes to the right of
[   20.958827]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.959050] 
[   20.959095] The buggy address belongs to the physical page:
[   20.959171] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.959561] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.959861] page_type: f5(slab)
[   20.960144] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.960291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.960417] page dumped because: kasan: bad access detected
[   20.960513] 
[   20.960611] Memory state around the buggy address:
[   20.960863]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.961291]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.961758] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.962187]                                      ^
[   20.962291]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.962406]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.963247] ==================================================================
[   20.827907] ==================================================================
[   20.828168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   20.828298] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.828534] 
[   20.828636] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.828842] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.828907] Hardware name: linux,dummy-virt (DT)
[   20.828978] Call trace:
[   20.829031]  show_stack+0x20/0x38 (C)
[   20.829145]  dump_stack_lvl+0x8c/0xd0
[   20.829910]  print_report+0x118/0x608
[   20.830338]  kasan_report+0xdc/0x128
[   20.830450]  kasan_check_range+0x100/0x1a8
[   20.830861]  __kasan_check_write+0x20/0x30
[   20.831008]  kasan_atomics_helper+0x1414/0x4858
[   20.831103]  kasan_atomics+0x198/0x2e0
[   20.831194]  kunit_try_run_case+0x170/0x3f0
[   20.831291]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.831394]  kthread+0x328/0x630
[   20.831481]  ret_from_fork+0x10/0x20
[   20.831590] 
[   20.832852] Allocated by task 265:
[   20.832952]  kasan_save_stack+0x3c/0x68
[   20.833063]  kasan_save_track+0x20/0x40
[   20.833159]  kasan_save_alloc_info+0x40/0x58
[   20.833761]  __kasan_kmalloc+0xd4/0xd8
[   20.833871]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.834369]  kasan_atomics+0xb8/0x2e0
[   20.834462]  kunit_try_run_case+0x170/0x3f0
[   20.834557]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.834671]  kthread+0x328/0x630
[   20.834759]  ret_from_fork+0x10/0x20
[   20.834842] 
[   20.835225] The buggy address belongs to the object at fff00000c7892700
[   20.835225]  which belongs to the cache kmalloc-64 of size 64
[   20.835388] The buggy address is located 0 bytes to the right of
[   20.835388]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.835518] 
[   20.835560] The buggy address belongs to the physical page:
[   20.835634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.835755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.836876] page_type: f5(slab)
[   20.837337] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.837582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.837703] page dumped because: kasan: bad access detected
[   20.837921] 
[   20.837983] Memory state around the buggy address:
[   20.838078]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.838186]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.838738] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.838843]                                      ^
[   20.839184]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.839331]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.839434] ==================================================================
[   20.718098] ==================================================================
[   20.718330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   20.718473] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.718539] 
[   20.718578] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.718666] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.718715] Hardware name: linux,dummy-virt (DT)
[   20.718796] Call trace:
[   20.718848]  show_stack+0x20/0x38 (C)
[   20.718921]  dump_stack_lvl+0x8c/0xd0
[   20.718976]  print_report+0x118/0x608
[   20.719026]  kasan_report+0xdc/0x128
[   20.719073]  kasan_check_range+0x100/0x1a8
[   20.719121]  __kasan_check_write+0x20/0x30
[   20.719180]  kasan_atomics_helper+0x1058/0x4858
[   20.719230]  kasan_atomics+0x198/0x2e0
[   20.719279]  kunit_try_run_case+0x170/0x3f0
[   20.719419]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.719536]  kthread+0x328/0x630
[   20.719654]  ret_from_fork+0x10/0x20
[   20.719711] 
[   20.719733] Allocated by task 265:
[   20.719773]  kasan_save_stack+0x3c/0x68
[   20.719823]  kasan_save_track+0x20/0x40
[   20.719863]  kasan_save_alloc_info+0x40/0x58
[   20.719908]  __kasan_kmalloc+0xd4/0xd8
[   20.720108]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.720173]  kasan_atomics+0xb8/0x2e0
[   20.720371]  kunit_try_run_case+0x170/0x3f0
[   20.720649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.720709]  kthread+0x328/0x630
[   20.720747]  ret_from_fork+0x10/0x20
[   20.720787] 
[   20.721119] The buggy address belongs to the object at fff00000c7892700
[   20.721119]  which belongs to the cache kmalloc-64 of size 64
[   20.721329] The buggy address is located 0 bytes to the right of
[   20.721329]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.721619] 
[   20.721844] The buggy address belongs to the physical page:
[   20.721896] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.721963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.722026] page_type: f5(slab)
[   20.722071] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.722505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.722832] page dumped because: kasan: bad access detected
[   20.722885] 
[   20.722907] Memory state around the buggy address:
[   20.722947]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.722992]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.723035] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.723076]                                      ^
[   20.723114]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.723176]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.723214] ==================================================================
[   20.841941] ==================================================================
[   20.842096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   20.842224] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.842354] 
[   20.842439] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.842654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.843667] Hardware name: linux,dummy-virt (DT)
[   20.843802] Call trace:
[   20.844519]  show_stack+0x20/0x38 (C)
[   20.845112]  dump_stack_lvl+0x8c/0xd0
[   20.845267]  print_report+0x118/0x608
[   20.845396]  kasan_report+0xdc/0x128
[   20.845516]  kasan_check_range+0x100/0x1a8
[   20.845634]  __kasan_check_write+0x20/0x30
[   20.845744]  kasan_atomics_helper+0x147c/0x4858
[   20.845864]  kasan_atomics+0x198/0x2e0
[   20.845970]  kunit_try_run_case+0x170/0x3f0
[   20.846098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.846231]  kthread+0x328/0x630
[   20.847445]  ret_from_fork+0x10/0x20
[   20.847957] 
[   20.848008] Allocated by task 265:
[   20.848074]  kasan_save_stack+0x3c/0x68
[   20.848169]  kasan_save_track+0x20/0x40
[   20.848260]  kasan_save_alloc_info+0x40/0x58
[   20.848373]  __kasan_kmalloc+0xd4/0xd8
[   20.848479]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.848585]  kasan_atomics+0xb8/0x2e0
[   20.848672]  kunit_try_run_case+0x170/0x3f0
[   20.849844]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.850021]  kthread+0x328/0x630
[   20.850104]  ret_from_fork+0x10/0x20
[   20.850193] 
[   20.850247] The buggy address belongs to the object at fff00000c7892700
[   20.850247]  which belongs to the cache kmalloc-64 of size 64
[   20.851076] The buggy address is located 0 bytes to the right of
[   20.851076]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.851263] 
[   20.851315] The buggy address belongs to the physical page:
[   20.852278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.852447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.852588] page_type: f5(slab)
[   20.852688] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.852808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.852921] page dumped because: kasan: bad access detected
[   20.853006] 
[   20.853054] Memory state around the buggy address:
[   20.854484]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.854621]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.855168] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.855283]                                      ^
[   20.855615]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.855728]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.855822] ==================================================================
[   20.605138] ==================================================================
[   20.605208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   20.605270] Write of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.605337] 
[   20.605374] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.605464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.605494] Hardware name: linux,dummy-virt (DT)
[   20.605526] Call trace:
[   20.605551]  show_stack+0x20/0x38 (C)
[   20.605602]  dump_stack_lvl+0x8c/0xd0
[   20.605653]  print_report+0x118/0x608
[   20.605700]  kasan_report+0xdc/0x128
[   20.605746]  kasan_check_range+0x100/0x1a8
[   20.605795]  __kasan_check_write+0x20/0x30
[   20.605841]  kasan_atomics_helper+0x934/0x4858
[   20.605889]  kasan_atomics+0x198/0x2e0
[   20.606964]  kunit_try_run_case+0x170/0x3f0
[   20.607069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.607176]  kthread+0x328/0x630
[   20.607222]  ret_from_fork+0x10/0x20
[   20.607270] 
[   20.607347] Allocated by task 265:
[   20.607419]  kasan_save_stack+0x3c/0x68
[   20.607524]  kasan_save_track+0x20/0x40
[   20.607574]  kasan_save_alloc_info+0x40/0x58
[   20.607616]  __kasan_kmalloc+0xd4/0xd8
[   20.607654]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.607696]  kasan_atomics+0xb8/0x2e0
[   20.607734]  kunit_try_run_case+0x170/0x3f0
[   20.607773]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.608005]  kthread+0x328/0x630
[   20.608075]  ret_from_fork+0x10/0x20
[   20.608253] 
[   20.608373] The buggy address belongs to the object at fff00000c7892700
[   20.608373]  which belongs to the cache kmalloc-64 of size 64
[   20.608444] The buggy address is located 0 bytes to the right of
[   20.608444]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.608521] 
[   20.608546] The buggy address belongs to the physical page:
[   20.608580] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.608637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.608691] page_type: f5(slab)
[   20.608736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.608788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.608831] page dumped because: kasan: bad access detected
[   20.609180] 
[   20.609209] Memory state around the buggy address:
[   20.609252]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.609679]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.609801] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.609847]                                      ^
[   20.609902]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.610119]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.610177] ==================================================================
[   20.964503] ==================================================================
[   20.964637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   20.964752] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.964867] 
[   20.964940] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.965130] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.965199] Hardware name: linux,dummy-virt (DT)
[   20.965271] Call trace:
[   20.965338]  show_stack+0x20/0x38 (C)
[   20.965809]  dump_stack_lvl+0x8c/0xd0
[   20.966187]  print_report+0x118/0x608
[   20.966326]  kasan_report+0xdc/0x128
[   20.966514]  kasan_check_range+0x100/0x1a8
[   20.966622]  __kasan_check_write+0x20/0x30
[   20.966813]  kasan_atomics_helper+0x175c/0x4858
[   20.967131]  kasan_atomics+0x198/0x2e0
[   20.967397]  kunit_try_run_case+0x170/0x3f0
[   20.967825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.967947]  kthread+0x328/0x630
[   20.968048]  ret_from_fork+0x10/0x20
[   20.968205] 
[   20.968276] Allocated by task 265:
[   20.968375]  kasan_save_stack+0x3c/0x68
[   20.968534]  kasan_save_track+0x20/0x40
[   20.968671]  kasan_save_alloc_info+0x40/0x58
[   20.968801]  __kasan_kmalloc+0xd4/0xd8
[   20.968922]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.969022]  kasan_atomics+0xb8/0x2e0
[   20.969121]  kunit_try_run_case+0x170/0x3f0
[   20.969225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.969357]  kthread+0x328/0x630
[   20.969426]  ret_from_fork+0x10/0x20
[   20.969501] 
[   20.969548] The buggy address belongs to the object at fff00000c7892700
[   20.969548]  which belongs to the cache kmalloc-64 of size 64
[   20.969677] The buggy address is located 0 bytes to the right of
[   20.969677]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.969818] 
[   20.969866] The buggy address belongs to the physical page:
[   20.969946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.970182] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.970613] page_type: f5(slab)
[   20.970737] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.971101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.971367] page dumped because: kasan: bad access detected
[   20.971449] 
[   20.971494] Memory state around the buggy address:
[   20.971555]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.971660]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.971756] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.971851]                                      ^
[   20.971927]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.972042]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.972140] ==================================================================
[   20.905541] ==================================================================
[   20.905661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   20.905769] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.905878] 
[   20.905955] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.907477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.907579] Hardware name: linux,dummy-virt (DT)
[   20.907677] Call trace:
[   20.907751]  show_stack+0x20/0x38 (C)
[   20.908008]  dump_stack_lvl+0x8c/0xd0
[   20.909108]  print_report+0x118/0x608
[   20.909639]  kasan_report+0xdc/0x128
[   20.909773]  __asan_report_load8_noabort+0x20/0x30
[   20.909890]  kasan_atomics_helper+0x3db0/0x4858
[   20.910001]  kasan_atomics+0x198/0x2e0
[   20.911117]  kunit_try_run_case+0x170/0x3f0
[   20.911267]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.911478]  kthread+0x328/0x630
[   20.911605]  ret_from_fork+0x10/0x20
[   20.911785] 
[   20.911861] Allocated by task 265:
[   20.912350]  kasan_save_stack+0x3c/0x68
[   20.912832]  kasan_save_track+0x20/0x40
[   20.912953]  kasan_save_alloc_info+0x40/0x58
[   20.913052]  __kasan_kmalloc+0xd4/0xd8
[   20.913137]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.913637]  kasan_atomics+0xb8/0x2e0
[   20.913753]  kunit_try_run_case+0x170/0x3f0
[   20.913850]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.913953]  kthread+0x328/0x630
[   20.914034]  ret_from_fork+0x10/0x20
[   20.914550] 
[   20.914800] The buggy address belongs to the object at fff00000c7892700
[   20.914800]  which belongs to the cache kmalloc-64 of size 64
[   20.915129] The buggy address is located 0 bytes to the right of
[   20.915129]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.915423] 
[   20.915465] The buggy address belongs to the physical page:
[   20.915903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.916051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.916568] page_type: f5(slab)
[   20.917001] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.917145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.917254] page dumped because: kasan: bad access detected
[   20.917701] 
[   20.917821] Memory state around the buggy address:
[   20.917951]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.918419]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.918586] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.918684]                                      ^
[   20.918802]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.918963]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.919047] ==================================================================
[   20.472076] ==================================================================
[   20.489587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   20.490126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.490390]  show_stack+0x20/0x38 (C)
[   20.490845]  kasan_atomics_helper+0x40a8/0x4858
[   20.491937]  kasan_save_stack+0x3c/0x68
[   20.492697] The buggy address is located 0 bytes to the right of
[   20.492697]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.493660]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.493720]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.494333] ==================================================================
[   20.859131] ==================================================================
[   20.859276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   20.859397] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.859982] 
[   20.860497] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.860734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.860916] Hardware name: linux,dummy-virt (DT)
[   20.860992] Call trace:
[   20.861044]  show_stack+0x20/0x38 (C)
[   20.861161]  dump_stack_lvl+0x8c/0xd0
[   20.861951]  print_report+0x118/0x608
[   20.862086]  kasan_report+0xdc/0x128
[   20.862194]  kasan_check_range+0x100/0x1a8
[   20.862412]  __kasan_check_write+0x20/0x30
[   20.862506]  kasan_atomics_helper+0x14e4/0x4858
[   20.863038]  kasan_atomics+0x198/0x2e0
[   20.863408]  kunit_try_run_case+0x170/0x3f0
[   20.863651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.863759]  kthread+0x328/0x630
[   20.863854]  ret_from_fork+0x10/0x20
[   20.864313] 
[   20.864657] Allocated by task 265:
[   20.864754]  kasan_save_stack+0x3c/0x68
[   20.864851]  kasan_save_track+0x20/0x40
[   20.865199]  kasan_save_alloc_info+0x40/0x58
[   20.865473]  __kasan_kmalloc+0xd4/0xd8
[   20.865570]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.865961]  kasan_atomics+0xb8/0x2e0
[   20.866085]  kunit_try_run_case+0x170/0x3f0
[   20.866186]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.866829]  kthread+0x328/0x630
[   20.866930]  ret_from_fork+0x10/0x20
[   20.866999] 
[   20.867627] The buggy address belongs to the object at fff00000c7892700
[   20.867627]  which belongs to the cache kmalloc-64 of size 64
[   20.867781] The buggy address is located 0 bytes to the right of
[   20.867781]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.868288] 
[   20.868373] The buggy address belongs to the physical page:
[   20.868468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.868906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.869494] page_type: f5(slab)
[   20.869620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.869738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.869851] page dumped because: kasan: bad access detected
[   20.869941] 
[   20.869989] Memory state around the buggy address:
[   20.870079]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.870188]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.870285] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.870390]                                      ^
[   20.870490]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.870935]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.871037] ==================================================================
[   20.733910] ==================================================================
[   20.734311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   20.734441] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.734623] 
[   20.735247] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.735438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.735635] Hardware name: linux,dummy-virt (DT)
[   20.735824] Call trace:
[   20.735929]  show_stack+0x20/0x38 (C)
[   20.735993]  dump_stack_lvl+0x8c/0xd0
[   20.736365]  print_report+0x118/0x608
[   20.736638]  kasan_report+0xdc/0x128
[   20.736701]  kasan_check_range+0x100/0x1a8
[   20.736777]  __kasan_check_write+0x20/0x30
[   20.737211]  kasan_atomics_helper+0x1128/0x4858
[   20.737336]  kasan_atomics+0x198/0x2e0
[   20.737389]  kunit_try_run_case+0x170/0x3f0
[   20.737444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.738070]  kthread+0x328/0x630
[   20.738139]  ret_from_fork+0x10/0x20
[   20.738198] 
[   20.738221] Allocated by task 265:
[   20.738315]  kasan_save_stack+0x3c/0x68
[   20.738479]  kasan_save_track+0x20/0x40
[   20.738636]  kasan_save_alloc_info+0x40/0x58
[   20.738717]  __kasan_kmalloc+0xd4/0xd8
[   20.739079]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.739373]  kasan_atomics+0xb8/0x2e0
[   20.739448]  kunit_try_run_case+0x170/0x3f0
[   20.739527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.739574]  kthread+0x328/0x630
[   20.739610]  ret_from_fork+0x10/0x20
[   20.739650] 
[   20.739675] The buggy address belongs to the object at fff00000c7892700
[   20.739675]  which belongs to the cache kmalloc-64 of size 64
[   20.739971] The buggy address is located 0 bytes to the right of
[   20.739971]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.740045] 
[   20.740071] The buggy address belongs to the physical page:
[   20.740109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.740528] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.740593] page_type: f5(slab)
[   20.740641] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.740964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.741342] page dumped because: kasan: bad access detected
[   20.741550] 
[   20.741578] Memory state around the buggy address:
[   20.741832]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.741930]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.741986] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.742029]                                      ^
[   20.742072]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.742120]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.742165] ==================================================================
[   20.701899] ==================================================================
[   20.701988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   20.702065] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.702561] 
[   20.702607] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.702713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.702746] Hardware name: linux,dummy-virt (DT)
[   20.703131] Call trace:
[   20.703176]  show_stack+0x20/0x38 (C)
[   20.703236]  dump_stack_lvl+0x8c/0xd0
[   20.703692]  print_report+0x118/0x608
[   20.703795]  kasan_report+0xdc/0x128
[   20.703850]  kasan_check_range+0x100/0x1a8
[   20.703900]  __kasan_check_write+0x20/0x30
[   20.703963]  kasan_atomics_helper+0xf88/0x4858
[   20.704013]  kasan_atomics+0x198/0x2e0
[   20.704059]  kunit_try_run_case+0x170/0x3f0
[   20.704111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.704165]  kthread+0x328/0x630
[   20.704207]  ret_from_fork+0x10/0x20
[   20.704258] 
[   20.704280] Allocated by task 265:
[   20.704314]  kasan_save_stack+0x3c/0x68
[   20.704540]  kasan_save_track+0x20/0x40
[   20.704914]  kasan_save_alloc_info+0x40/0x58
[   20.705212]  __kasan_kmalloc+0xd4/0xd8
[   20.705279]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.705343]  kasan_atomics+0xb8/0x2e0
[   20.705387]  kunit_try_run_case+0x170/0x3f0
[   20.706143]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.706229]  kthread+0x328/0x630
[   20.706279]  ret_from_fork+0x10/0x20
[   20.706328] 
[   20.706367] The buggy address belongs to the object at fff00000c7892700
[   20.706367]  which belongs to the cache kmalloc-64 of size 64
[   20.706430] The buggy address is located 0 bytes to the right of
[   20.706430]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.706696] 
[   20.706741] The buggy address belongs to the physical page:
[   20.706970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.707034] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.707409] page_type: f5(slab)
[   20.707629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.707720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.707942] page dumped because: kasan: bad access detected
[   20.708219] 
[   20.708246] Memory state around the buggy address:
[   20.708289]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.708421]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.708489] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.708685]                                      ^
[   20.708730]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.708790]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.709241] ==================================================================
[   20.809692] ==================================================================
[   20.809819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   20.809944] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.810062] 
[   20.810142] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.810350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.810422] Hardware name: linux,dummy-virt (DT)
[   20.810505] Call trace:
[   20.810560]  show_stack+0x20/0x38 (C)
[   20.810678]  dump_stack_lvl+0x8c/0xd0
[   20.812015]  print_report+0x118/0x608
[   20.812298]  kasan_report+0xdc/0x128
[   20.812589]  __asan_report_load8_noabort+0x20/0x30
[   20.812747]  kasan_atomics_helper+0x3f04/0x4858
[   20.813009]  kasan_atomics+0x198/0x2e0
[   20.813332]  kunit_try_run_case+0x170/0x3f0
[   20.814027]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.814176]  kthread+0x328/0x630
[   20.814277]  ret_from_fork+0x10/0x20
[   20.814803] 
[   20.814910] Allocated by task 265:
[   20.815086]  kasan_save_stack+0x3c/0x68
[   20.815183]  kasan_save_track+0x20/0x40
[   20.815754]  kasan_save_alloc_info+0x40/0x58
[   20.815875]  __kasan_kmalloc+0xd4/0xd8
[   20.815963]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.816056]  kasan_atomics+0xb8/0x2e0
[   20.816221]  kunit_try_run_case+0x170/0x3f0
[   20.816334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.817030]  kthread+0x328/0x630
[   20.817135]  ret_from_fork+0x10/0x20
[   20.817473] 
[   20.817769] The buggy address belongs to the object at fff00000c7892700
[   20.817769]  which belongs to the cache kmalloc-64 of size 64
[   20.818565] The buggy address is located 0 bytes to the right of
[   20.818565]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.818786] 
[   20.818868] The buggy address belongs to the physical page:
[   20.819495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.819698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.820030] page_type: f5(slab)
[   20.820590] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.820845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.821246] page dumped because: kasan: bad access detected
[   20.821365] 
[   20.821658] Memory state around the buggy address:
[   20.821743]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.822146]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.822426] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.822527]                                      ^
[   20.822834]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.823849]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.824289] ==================================================================
[   20.686819] ==================================================================
[   20.686895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   20.687097] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.687348] 
[   20.687544] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.687773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.687847] Hardware name: linux,dummy-virt (DT)
[   20.687951] Call trace:
[   20.688097]  show_stack+0x20/0x38 (C)
[   20.688158]  dump_stack_lvl+0x8c/0xd0
[   20.688217]  print_report+0x118/0x608
[   20.688308]  kasan_report+0xdc/0x128
[   20.688559]  kasan_check_range+0x100/0x1a8
[   20.688751]  __kasan_check_write+0x20/0x30
[   20.688801]  kasan_atomics_helper+0xeb8/0x4858
[   20.688987]  kasan_atomics+0x198/0x2e0
[   20.689077]  kunit_try_run_case+0x170/0x3f0
[   20.689334]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.689442]  kthread+0x328/0x630
[   20.689512]  ret_from_fork+0x10/0x20
[   20.689701] 
[   20.689743] Allocated by task 265:
[   20.689816]  kasan_save_stack+0x3c/0x68
[   20.689864]  kasan_save_track+0x20/0x40
[   20.689907]  kasan_save_alloc_info+0x40/0x58
[   20.689950]  __kasan_kmalloc+0xd4/0xd8
[   20.689988]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.690028]  kasan_atomics+0xb8/0x2e0
[   20.690065]  kunit_try_run_case+0x170/0x3f0
[   20.690104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.690654]  kthread+0x328/0x630
[   20.690700]  ret_from_fork+0x10/0x20
[   20.690791] 
[   20.691010] The buggy address belongs to the object at fff00000c7892700
[   20.691010]  which belongs to the cache kmalloc-64 of size 64
[   20.691658] The buggy address is located 0 bytes to the right of
[   20.691658]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.692118] 
[   20.692176] The buggy address belongs to the physical page:
[   20.692213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.692272] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.692339] page_type: f5(slab)
[   20.692386] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.692442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.693369] page dumped because: kasan: bad access detected
[   20.693430] 
[   20.693453] Memory state around the buggy address:
[   20.693492]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.693541]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.693628] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.693670]                                      ^
[   20.693747]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.693826]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.693866] ==================================================================
[   20.618357] ==================================================================
[   20.618415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   20.618474] Write of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.618526] 
[   20.618560] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.618648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.618676] Hardware name: linux,dummy-virt (DT)
[   20.618707] Call trace:
[   20.618732]  show_stack+0x20/0x38 (C)
[   20.619669]  dump_stack_lvl+0x8c/0xd0
[   20.619769]  print_report+0x118/0x608
[   20.619820]  kasan_report+0xdc/0x128
[   20.620014]  kasan_check_range+0x100/0x1a8
[   20.620074]  __kasan_check_write+0x20/0x30
[   20.620120]  kasan_atomics_helper+0xa04/0x4858
[   20.620264]  kasan_atomics+0x198/0x2e0
[   20.620422]  kunit_try_run_case+0x170/0x3f0
[   20.620548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.620754]  kthread+0x328/0x630
[   20.620862]  ret_from_fork+0x10/0x20
[   20.620993] 
[   20.621015] Allocated by task 265:
[   20.621049]  kasan_save_stack+0x3c/0x68
[   20.621095]  kasan_save_track+0x20/0x40
[   20.621164]  kasan_save_alloc_info+0x40/0x58
[   20.621348]  __kasan_kmalloc+0xd4/0xd8
[   20.621569]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.621667]  kasan_atomics+0xb8/0x2e0
[   20.621717]  kunit_try_run_case+0x170/0x3f0
[   20.621758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.621802]  kthread+0x328/0x630
[   20.621834]  ret_from_fork+0x10/0x20
[   20.621870] 
[   20.622176] The buggy address belongs to the object at fff00000c7892700
[   20.622176]  which belongs to the cache kmalloc-64 of size 64
[   20.622246] The buggy address is located 0 bytes to the right of
[   20.622246]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.622453] 
[   20.622481] The buggy address belongs to the physical page:
[   20.622525] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.622856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.622944] page_type: f5(slab)
[   20.622996] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.623140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.623185] page dumped because: kasan: bad access detected
[   20.623220] 
[   20.623241] Memory state around the buggy address:
[   20.623276]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.623352]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.623402] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.623448]                                      ^
[   20.623484]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.623526]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.623564] ==================================================================
[   20.873564] ==================================================================
[   20.873686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   20.873797] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.873907] 
[   20.874616] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.875426] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.875512] Hardware name: linux,dummy-virt (DT)
[   20.875604] Call trace:
[   20.875672]  show_stack+0x20/0x38 (C)
[   20.876071]  dump_stack_lvl+0x8c/0xd0
[   20.876205]  print_report+0x118/0x608
[   20.876314]  kasan_report+0xdc/0x128
[   20.876440]  kasan_check_range+0x100/0x1a8
[   20.876570]  __kasan_check_write+0x20/0x30
[   20.877363]  kasan_atomics_helper+0x154c/0x4858
[   20.877504]  kasan_atomics+0x198/0x2e0
[   20.877606]  kunit_try_run_case+0x170/0x3f0
[   20.877722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.877841]  kthread+0x328/0x630
[   20.878804]  ret_from_fork+0x10/0x20
[   20.879166] 
[   20.879231] Allocated by task 265:
[   20.879330]  kasan_save_stack+0x3c/0x68
[   20.879553]  kasan_save_track+0x20/0x40
[   20.879640]  kasan_save_alloc_info+0x40/0x58
[   20.879730]  __kasan_kmalloc+0xd4/0xd8
[   20.880271]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.880841]  kasan_atomics+0xb8/0x2e0
[   20.880943]  kunit_try_run_case+0x170/0x3f0
[   20.881493]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.881646]  kthread+0x328/0x630
[   20.881733]  ret_from_fork+0x10/0x20
[   20.882159] 
[   20.882468] The buggy address belongs to the object at fff00000c7892700
[   20.882468]  which belongs to the cache kmalloc-64 of size 64
[   20.882802] The buggy address is located 0 bytes to the right of
[   20.882802]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.882992] 
[   20.883044] The buggy address belongs to the physical page:
[   20.883684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.884055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.884594] page_type: f5(slab)
[   20.884859] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.884993] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.885096] page dumped because: kasan: bad access detected
[   20.885174] 
[   20.885220] Memory state around the buggy address:
[   20.885764]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.885889]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.885989] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.886523]                                      ^
[   20.886937]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.887248]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.887606] ==================================================================
[   20.778432] ==================================================================
[   20.778551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   20.778716] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.779067] 
[   20.779160] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.779368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.779449] Hardware name: linux,dummy-virt (DT)
[   20.779559] Call trace:
[   20.779622]  show_stack+0x20/0x38 (C)
[   20.779796]  dump_stack_lvl+0x8c/0xd0
[   20.779933]  print_report+0x118/0x608
[   20.780070]  kasan_report+0xdc/0x128
[   20.780173]  kasan_check_range+0x100/0x1a8
[   20.780432]  __kasan_check_write+0x20/0x30
[   20.780557]  kasan_atomics_helper+0x12d8/0x4858
[   20.780822]  kasan_atomics+0x198/0x2e0
[   20.781018]  kunit_try_run_case+0x170/0x3f0
[   20.781249]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.781386]  kthread+0x328/0x630
[   20.781488]  ret_from_fork+0x10/0x20
[   20.782074] 
[   20.782229] Allocated by task 265:
[   20.782446]  kasan_save_stack+0x3c/0x68
[   20.782911]  kasan_save_track+0x20/0x40
[   20.783548]  kasan_save_alloc_info+0x40/0x58
[   20.784019]  __kasan_kmalloc+0xd4/0xd8
[   20.784123]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.784647]  kasan_atomics+0xb8/0x2e0
[   20.784749]  kunit_try_run_case+0x170/0x3f0
[   20.784905]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.785387]  kthread+0x328/0x630
[   20.787067]  ret_from_fork+0x10/0x20
[   20.787204] 
[   20.787257] The buggy address belongs to the object at fff00000c7892700
[   20.787257]  which belongs to the cache kmalloc-64 of size 64
[   20.787570] The buggy address is located 0 bytes to the right of
[   20.787570]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.787710] 
[   20.787758] The buggy address belongs to the physical page:
[   20.787835] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.787963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.788085] page_type: f5(slab)
[   20.788182] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.788303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.788400] page dumped because: kasan: bad access detected
[   20.788477] 
[   20.788523] Memory state around the buggy address:
[   20.788600]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.788702]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.788816] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.788896]                                      ^
[   20.789199]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.789694]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.789807] ==================================================================
[   20.743400] ==================================================================
[   20.743665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   20.743881] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.743989] 
[   20.744031] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.744121] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.744152] Hardware name: linux,dummy-virt (DT)
[   20.744187] Call trace:
[   20.744213]  show_stack+0x20/0x38 (C)
[   20.744268]  dump_stack_lvl+0x8c/0xd0
[   20.744333]  print_report+0x118/0x608
[   20.744386]  kasan_report+0xdc/0x128
[   20.744437]  kasan_check_range+0x100/0x1a8
[   20.744631]  __kasan_check_write+0x20/0x30
[   20.744754]  kasan_atomics_helper+0x1190/0x4858
[   20.744874]  kasan_atomics+0x198/0x2e0
[   20.744983]  kunit_try_run_case+0x170/0x3f0
[   20.745103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.745233]  kthread+0x328/0x630
[   20.745382]  ret_from_fork+0x10/0x20
[   20.745505] 
[   20.745554] Allocated by task 265:
[   20.745626]  kasan_save_stack+0x3c/0x68
[   20.746209]  kasan_save_track+0x20/0x40
[   20.747155]  kasan_save_alloc_info+0x40/0x58
[   20.747294]  __kasan_kmalloc+0xd4/0xd8
[   20.747551]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.747675]  kasan_atomics+0xb8/0x2e0
[   20.747771]  kunit_try_run_case+0x170/0x3f0
[   20.747867]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.747975]  kthread+0x328/0x630
[   20.748063]  ret_from_fork+0x10/0x20
[   20.748157] 
[   20.748213] The buggy address belongs to the object at fff00000c7892700
[   20.748213]  which belongs to the cache kmalloc-64 of size 64
[   20.748356] The buggy address is located 0 bytes to the right of
[   20.748356]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.748750] 
[   20.748805] The buggy address belongs to the physical page:
[   20.748948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.749384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.749684] page_type: f5(slab)
[   20.749840] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.749956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.750056] page dumped because: kasan: bad access detected
[   20.750163] 
[   20.750216] Memory state around the buggy address:
[   20.750316]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.750483]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.750797] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.750891]                                      ^
[   20.750976]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.751184]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.751361] ==================================================================
[   20.973037] ==================================================================
[   20.973330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   20.973647] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.973830] 
[   20.973908] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.974109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.974178] Hardware name: linux,dummy-virt (DT)
[   20.974251] Call trace:
[   20.974302]  show_stack+0x20/0x38 (C)
[   20.974433]  dump_stack_lvl+0x8c/0xd0
[   20.974533]  print_report+0x118/0x608
[   20.974642]  kasan_report+0xdc/0x128
[   20.974749]  __asan_report_load8_noabort+0x20/0x30
[   20.974907]  kasan_atomics_helper+0x3e20/0x4858
[   20.975029]  kasan_atomics+0x198/0x2e0
[   20.975459]  kunit_try_run_case+0x170/0x3f0
[   20.975646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.975977]  kthread+0x328/0x630
[   20.976092]  ret_from_fork+0x10/0x20
[   20.976358] 
[   20.976546] Allocated by task 265:
[   20.976777]  kasan_save_stack+0x3c/0x68
[   20.976863]  kasan_save_track+0x20/0x40
[   20.976962]  kasan_save_alloc_info+0x40/0x58
[   20.977052]  __kasan_kmalloc+0xd4/0xd8
[   20.977150]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.977235]  kasan_atomics+0xb8/0x2e0
[   20.977329]  kunit_try_run_case+0x170/0x3f0
[   20.977422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.977530]  kthread+0x328/0x630
[   20.977604]  ret_from_fork+0x10/0x20
[   20.977683] 
[   20.977976] The buggy address belongs to the object at fff00000c7892700
[   20.977976]  which belongs to the cache kmalloc-64 of size 64
[   20.978741] The buggy address is located 0 bytes to the right of
[   20.978741]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.978942] 
[   20.978991] The buggy address belongs to the physical page:
[   20.979066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.979200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.979312] page_type: f5(slab)
[   20.979430] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.979724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.979886] page dumped because: kasan: bad access detected
[   20.980024] 
[   20.980072] Memory state around the buggy address:
[   20.980354]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.980489]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.980642] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.980754]                                      ^
[   20.980862]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.981028]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.981171] ==================================================================
[   20.921748] ==================================================================
[   20.922280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   20.922436] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.922545] 
[   20.923066] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.923395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.923534] Hardware name: linux,dummy-virt (DT)
[   20.923601] Call trace:
[   20.923820]  show_stack+0x20/0x38 (C)
[   20.923944]  dump_stack_lvl+0x8c/0xd0
[   20.924332]  print_report+0x118/0x608
[   20.924463]  kasan_report+0xdc/0x128
[   20.924573]  kasan_check_range+0x100/0x1a8
[   20.924897]  __kasan_check_write+0x20/0x30
[   20.925407]  kasan_atomics_helper+0x1644/0x4858
[   20.925745]  kasan_atomics+0x198/0x2e0
[   20.925858]  kunit_try_run_case+0x170/0x3f0
[   20.925982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.926105]  kthread+0x328/0x630
[   20.926204]  ret_from_fork+0x10/0x20
[   20.926309] 
[   20.926367] Allocated by task 265:
[   20.927119]  kasan_save_stack+0x3c/0x68
[   20.927619]  kasan_save_track+0x20/0x40
[   20.927866]  kasan_save_alloc_info+0x40/0x58
[   20.927971]  __kasan_kmalloc+0xd4/0xd8
[   20.928406]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.928521]  kasan_atomics+0xb8/0x2e0
[   20.928991]  kunit_try_run_case+0x170/0x3f0
[   20.929104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.929539]  kthread+0x328/0x630
[   20.929624]  ret_from_fork+0x10/0x20
[   20.929703] 
[   20.929750] The buggy address belongs to the object at fff00000c7892700
[   20.929750]  which belongs to the cache kmalloc-64 of size 64
[   20.930234] The buggy address is located 0 bytes to the right of
[   20.930234]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.930694] 
[   20.930750] The buggy address belongs to the physical page:
[   20.930821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.931287] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.931596] page_type: f5(slab)
[   20.931902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.932007] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.932228] page dumped because: kasan: bad access detected
[   20.932471] 
[   20.932684] Memory state around the buggy address:
[   20.932953]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.933213]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.933329] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.933473]                                      ^
[   20.933557]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.933686]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.933788] ==================================================================
[   20.664069] ==================================================================
[   20.664118] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   20.664195] Write of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.664248] 
[   20.664279] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.664379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.664410] Hardware name: linux,dummy-virt (DT)
[   20.664444] Call trace:
[   20.664484]  show_stack+0x20/0x38 (C)
[   20.664541]  dump_stack_lvl+0x8c/0xd0
[   20.664593]  print_report+0x118/0x608
[   20.664667]  kasan_report+0xdc/0x128
[   20.664723]  kasan_check_range+0x100/0x1a8
[   20.664778]  __kasan_check_write+0x20/0x30
[   20.664829]  kasan_atomics_helper+0xd3c/0x4858
[   20.664894]  kasan_atomics+0x198/0x2e0
[   20.665000]  kunit_try_run_case+0x170/0x3f0
[   20.665055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.665115]  kthread+0x328/0x630
[   20.665162]  ret_from_fork+0x10/0x20
[   20.665216] 
[   20.665241] Allocated by task 265:
[   20.665273]  kasan_save_stack+0x3c/0x68
[   20.665327]  kasan_save_track+0x20/0x40
[   20.665372]  kasan_save_alloc_info+0x40/0x58
[   20.665413]  __kasan_kmalloc+0xd4/0xd8
[   20.665451]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.665491]  kasan_atomics+0xb8/0x2e0
[   20.665527]  kunit_try_run_case+0x170/0x3f0
[   20.665563]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.665608]  kthread+0x328/0x630
[   20.665640]  ret_from_fork+0x10/0x20
[   20.665675] 
[   20.665698] The buggy address belongs to the object at fff00000c7892700
[   20.665698]  which belongs to the cache kmalloc-64 of size 64
[   20.665753] The buggy address is located 0 bytes to the right of
[   20.665753]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.665814] 
[   20.665838] The buggy address belongs to the physical page:
[   20.665869] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.665919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.665967] page_type: f5(slab)
[   20.666009] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.666060] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.666100] page dumped because: kasan: bad access detected
[   20.666132] 
[   20.666159] Memory state around the buggy address:
[   20.666228]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.666311]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.666369] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.666408]                                      ^
[   20.666442]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.666483]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.666533] ==================================================================
[   20.630225] ==================================================================
[   20.630275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   20.630667] Write of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.630774] 
[   20.630862] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.630969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.631000] Hardware name: linux,dummy-virt (DT)
[   20.631132] Call trace:
[   20.631162]  show_stack+0x20/0x38 (C)
[   20.631254]  dump_stack_lvl+0x8c/0xd0
[   20.631451]  print_report+0x118/0x608
[   20.631640]  kasan_report+0xdc/0x128
[   20.631830]  kasan_check_range+0x100/0x1a8
[   20.631950]  __kasan_check_write+0x20/0x30
[   20.632084]  kasan_atomics_helper+0xad4/0x4858
[   20.632312]  kasan_atomics+0x198/0x2e0
[   20.632398]  kunit_try_run_case+0x170/0x3f0
[   20.632613]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.632783]  kthread+0x328/0x630
[   20.632832]  ret_from_fork+0x10/0x20
[   20.632883] 
[   20.632905] Allocated by task 265:
[   20.633131]  kasan_save_stack+0x3c/0x68
[   20.633393]  kasan_save_track+0x20/0x40
[   20.633471]  kasan_save_alloc_info+0x40/0x58
[   20.633716]  __kasan_kmalloc+0xd4/0xd8
[   20.633782]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.633826]  kasan_atomics+0xb8/0x2e0
[   20.633908]  kunit_try_run_case+0x170/0x3f0
[   20.633955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.634005]  kthread+0x328/0x630
[   20.634077]  ret_from_fork+0x10/0x20
[   20.634588] 
[   20.634670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.634723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.634773] page_type: f5(slab)
[   20.634856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.634968] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.635030] page dumped because: kasan: bad access detected
[   20.635075] 
[   20.635130] Memory state around the buggy address:
[   20.635189]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.635233]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.635389]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.636144] Read of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.636602]  kasan_report+0xdc/0x128
[   20.638157]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.639199] 
[   20.639328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.643813] 
[   20.644124]  kunit_try_run_case+0x170/0x3f0
[   20.645046] 
[   20.645505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.645977]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.646421]                                      ^
[   20.647027] ==================================================================
[   20.598803] ==================================================================
[   20.598856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   20.599071] Read of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.599144] 
[   20.599181] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.599293] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.599336] Hardware name: linux,dummy-virt (DT)
[   20.599372] Call trace:
[   20.599395]  show_stack+0x20/0x38 (C)
[   20.599450]  dump_stack_lvl+0x8c/0xd0
[   20.599501]  print_report+0x118/0x608
[   20.599548]  kasan_report+0xdc/0x128
[   20.599769]  __asan_report_load4_noabort+0x20/0x30
[   20.599966]  kasan_atomics_helper+0x42d8/0x4858
[   20.600148]  kasan_atomics+0x198/0x2e0
[   20.600576]  kunit_try_run_case+0x170/0x3f0
[   20.600670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.600732]  kthread+0x328/0x630
[   20.600779]  ret_from_fork+0x10/0x20
[   20.600834] 
[   20.600857] Allocated by task 265:
[   20.600890]  kasan_save_stack+0x3c/0x68
[   20.600940]  kasan_save_track+0x20/0x40
[   20.600983]  kasan_save_alloc_info+0x40/0x58
[   20.601948]  __kasan_kmalloc+0xd4/0xd8
[   20.602218]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.602269]  kasan_atomics+0xb8/0x2e0
[   20.602306]  kunit_try_run_case+0x170/0x3f0
[   20.602363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.602410]  kthread+0x328/0x630
[   20.602446]  ret_from_fork+0x10/0x20
[   20.602484] 
[   20.602508] The buggy address belongs to the object at fff00000c7892700
[   20.602508]  which belongs to the cache kmalloc-64 of size 64
[   20.602568] The buggy address is located 0 bytes to the right of
[   20.602568]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.602632] 
[   20.602656] The buggy address belongs to the physical page:
[   20.602871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.603057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.603127] page_type: f5(slab)
[   20.603218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.603293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.603397] page dumped because: kasan: bad access detected
[   20.603446] 
[   20.603467] Memory state around the buggy address:
[   20.603554]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.603620]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.603664] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.603712]                                      ^
[   20.603968]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.604035]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.604078] ==================================================================
[   20.944686] ==================================================================
[   20.944822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   20.944990] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.945112] 
[   20.945188] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.945385] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.945440] Hardware name: linux,dummy-virt (DT)
[   20.945502] Call trace:
[   20.945548]  show_stack+0x20/0x38 (C)
[   20.945649]  dump_stack_lvl+0x8c/0xd0
[   20.945750]  print_report+0x118/0x608
[   20.945853]  kasan_report+0xdc/0x128
[   20.945956]  kasan_check_range+0x100/0x1a8
[   20.946087]  __kasan_check_write+0x20/0x30
[   20.946357]  kasan_atomics_helper+0x16d0/0x4858
[   20.946799]  kasan_atomics+0x198/0x2e0
[   20.947067]  kunit_try_run_case+0x170/0x3f0
[   20.947477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.947635]  kthread+0x328/0x630
[   20.947726]  ret_from_fork+0x10/0x20
[   20.947812] 
[   20.947849] Allocated by task 265:
[   20.947913]  kasan_save_stack+0x3c/0x68
[   20.948004]  kasan_save_track+0x20/0x40
[   20.948182]  kasan_save_alloc_info+0x40/0x58
[   20.948286]  __kasan_kmalloc+0xd4/0xd8
[   20.948482]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.949045]  kasan_atomics+0xb8/0x2e0
[   20.949139]  kunit_try_run_case+0x170/0x3f0
[   20.949300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.949432]  kthread+0x328/0x630
[   20.949514]  ret_from_fork+0x10/0x20
[   20.949604] 
[   20.949653] The buggy address belongs to the object at fff00000c7892700
[   20.949653]  which belongs to the cache kmalloc-64 of size 64
[   20.949795] The buggy address is located 0 bytes to the right of
[   20.949795]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.949982] 
[   20.950033] The buggy address belongs to the physical page:
[   20.950114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.950264] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.950400] page_type: f5(slab)
[   20.950528] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.950651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.950760] page dumped because: kasan: bad access detected
[   20.951013] 
[   20.951080] Memory state around the buggy address:
[   20.951164]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.951439]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.952005] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.952214]                                      ^
[   20.952601]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.952858]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.952963] ==================================================================
[   20.612568] ==================================================================
[   20.612657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   20.612759] Write of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.612814] 
[   20.612848] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.612936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.612965] Hardware name: linux,dummy-virt (DT)
[   20.612999] Call trace:
[   20.613023]  show_stack+0x20/0x38 (C)
[   20.613078]  dump_stack_lvl+0x8c/0xd0
[   20.613128]  print_report+0x118/0x608
[   20.613174]  kasan_report+0xdc/0x128
[   20.613221]  kasan_check_range+0x100/0x1a8
[   20.613268]  __kasan_check_write+0x20/0x30
[   20.613313]  kasan_atomics_helper+0x99c/0x4858
[   20.613377]  kasan_atomics+0x198/0x2e0
[   20.613424]  kunit_try_run_case+0x170/0x3f0
[   20.613496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.613679]  kthread+0x328/0x630
[   20.613883]  ret_from_fork+0x10/0x20
[   20.614247] 
[   20.614279] Allocated by task 265:
[   20.614312]  kasan_save_stack+0x3c/0x68
[   20.614438]  kasan_save_track+0x20/0x40
[   20.614491]  kasan_save_alloc_info+0x40/0x58
[   20.614646]  __kasan_kmalloc+0xd4/0xd8
[   20.614905]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.614986]  kasan_atomics+0xb8/0x2e0
[   20.615099]  kunit_try_run_case+0x170/0x3f0
[   20.615377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.615433]  kthread+0x328/0x630
[   20.615470]  ret_from_fork+0x10/0x20
[   20.615555] 
[   20.615581] The buggy address belongs to the object at fff00000c7892700
[   20.615581]  which belongs to the cache kmalloc-64 of size 64
[   20.615807] The buggy address is located 0 bytes to the right of
[   20.615807]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.616148] 
[   20.616178] The buggy address belongs to the physical page:
[   20.616213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.616268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.616341] page_type: f5(slab)
[   20.616390] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.616444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.616882] page dumped because: kasan: bad access detected
[   20.616931] 
[   20.616958] Memory state around the buggy address:
[   20.617019]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.617314]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.617379] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.617480]                                      ^
[   20.617520]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.617566]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.618027] ==================================================================
[   20.680153] ==================================================================
[   20.680205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   20.680259] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.680313] 
[   20.680358] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.680449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.680492] Hardware name: linux,dummy-virt (DT)
[   20.680527] Call trace:
[   20.680554]  show_stack+0x20/0x38 (C)
[   20.680607]  dump_stack_lvl+0x8c/0xd0
[   20.680657]  print_report+0x118/0x608
[   20.680706]  kasan_report+0xdc/0x128
[   20.680766]  kasan_check_range+0x100/0x1a8
[   20.680824]  __kasan_check_write+0x20/0x30
[   20.680869]  kasan_atomics_helper+0xe44/0x4858
[   20.680919]  kasan_atomics+0x198/0x2e0
[   20.680967]  kunit_try_run_case+0x170/0x3f0
[   20.681016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.681129]  kthread+0x328/0x630
[   20.681180]  ret_from_fork+0x10/0x20
[   20.681231] 
[   20.681252] Allocated by task 265:
[   20.681283]  kasan_save_stack+0x3c/0x68
[   20.681338]  kasan_save_track+0x20/0x40
[   20.681382]  kasan_save_alloc_info+0x40/0x58
[   20.681426]  __kasan_kmalloc+0xd4/0xd8
[   20.681465]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.681505]  kasan_atomics+0xb8/0x2e0
[   20.681542]  kunit_try_run_case+0x170/0x3f0
[   20.681582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.681626]  kthread+0x328/0x630
[   20.681660]  ret_from_fork+0x10/0x20
[   20.681708] 
[   20.681734] The buggy address belongs to the object at fff00000c7892700
[   20.681734]  which belongs to the cache kmalloc-64 of size 64
[   20.681794] The buggy address is located 0 bytes to the right of
[   20.681794]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.681857] 
[   20.681878] The buggy address belongs to the physical page:
[   20.681910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.681959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.682007] page_type: f5(slab)
[   20.682048] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.682169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.682239] page dumped because: kasan: bad access detected
[   20.682274] 
[   20.682294] Memory state around the buggy address:
[   20.682342]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.682388]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.682431] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.682469]                                      ^
[   20.682504]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.682545]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.682583] ==================================================================
[   20.671155] ==================================================================
[   20.671224] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   20.671287] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.671349] 
[   20.671385] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.671472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.671502] Hardware name: linux,dummy-virt (DT)
[   20.671536] Call trace:
[   20.671562]  show_stack+0x20/0x38 (C)
[   20.672539]  dump_stack_lvl+0x8c/0xd0
[   20.672754]  print_report+0x118/0x608
[   20.672805]  kasan_report+0xdc/0x128
[   20.672853]  kasan_check_range+0x100/0x1a8
[   20.672902]  __kasan_check_read+0x20/0x30
[   20.672948]  kasan_atomics_helper+0xdd4/0x4858
[   20.672997]  kasan_atomics+0x198/0x2e0
[   20.673044]  kunit_try_run_case+0x170/0x3f0
[   20.673094]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.673147]  kthread+0x328/0x630
[   20.673189]  ret_from_fork+0x10/0x20
[   20.673240] 
[   20.673261] Allocated by task 265:
[   20.673294]  kasan_save_stack+0x3c/0x68
[   20.673699]  kasan_save_track+0x20/0x40
[   20.673753]  kasan_save_alloc_info+0x40/0x58
[   20.673798]  __kasan_kmalloc+0xd4/0xd8
[   20.673848]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.674100]  kasan_atomics+0xb8/0x2e0
[   20.674148]  kunit_try_run_case+0x170/0x3f0
[   20.674207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.674467]  kthread+0x328/0x630
[   20.674505]  ret_from_fork+0x10/0x20
[   20.674562] 
[   20.674649] The buggy address belongs to the object at fff00000c7892700
[   20.674649]  which belongs to the cache kmalloc-64 of size 64
[   20.675155] The buggy address is located 0 bytes to the right of
[   20.675155]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.675240] 
[   20.675279] The buggy address belongs to the physical page:
[   20.675317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.675674] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.675804] page_type: f5(slab)
[   20.675912] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.676011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.676054] page dumped because: kasan: bad access detected
[   20.676088] 
[   20.676108] Memory state around the buggy address:
[   20.676164]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.676209]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.676252] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.676291]                                      ^
[   20.676336]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.676562]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.676630] ==================================================================
[   20.725675] ==================================================================
[   20.725746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   20.725811] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.725865] 
[   20.725899] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.725987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.726017] Hardware name: linux,dummy-virt (DT)
[   20.726050] Call trace:
[   20.726075]  show_stack+0x20/0x38 (C)
[   20.726127]  dump_stack_lvl+0x8c/0xd0
[   20.726178]  print_report+0x118/0x608
[   20.726228]  kasan_report+0xdc/0x128
[   20.726273]  kasan_check_range+0x100/0x1a8
[   20.729098]  __kasan_check_write+0x20/0x30
[   20.729478]  kasan_atomics_helper+0x10c0/0x4858
[   20.729753]  kasan_atomics+0x198/0x2e0
[   20.729970]  kunit_try_run_case+0x170/0x3f0
[   20.730307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.730456]  kthread+0x328/0x630
[   20.730562]  ret_from_fork+0x10/0x20
[   20.730665] 
[   20.730688] Allocated by task 265:
[   20.730721]  kasan_save_stack+0x3c/0x68
[   20.731087]  kasan_save_track+0x20/0x40
[   20.731162]  kasan_save_alloc_info+0x40/0x58
[   20.731214]  __kasan_kmalloc+0xd4/0xd8
[   20.731281]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.731333]  kasan_atomics+0xb8/0x2e0
[   20.731393]  kunit_try_run_case+0x170/0x3f0
[   20.731439]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.731485]  kthread+0x328/0x630
[   20.731519]  ret_from_fork+0x10/0x20
[   20.731559] 
[   20.731606] The buggy address belongs to the object at fff00000c7892700
[   20.731606]  which belongs to the cache kmalloc-64 of size 64
[   20.731670] The buggy address is located 0 bytes to the right of
[   20.731670]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.731734] 
[   20.731758] The buggy address belongs to the physical page:
[   20.731793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.731847] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.731929] page_type: f5(slab)
[   20.732270] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.732357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.732414] page dumped because: kasan: bad access detected
[   20.732513] 
[   20.732540] Memory state around the buggy address:
[   20.732578]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.732665]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.732727] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.732798]                                      ^
[   20.732838]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.732885]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.732926] ==================================================================
[   20.761864] ==================================================================
[   20.762022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   20.762179] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.762345] 
[   20.762434] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.762632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.762696] Hardware name: linux,dummy-virt (DT)
[   20.762799] Call trace:
[   20.762848]  show_stack+0x20/0x38 (C)
[   20.762950]  dump_stack_lvl+0x8c/0xd0
[   20.763297]  print_report+0x118/0x608
[   20.763441]  kasan_report+0xdc/0x128
[   20.763532]  kasan_check_range+0x100/0x1a8
[   20.763636]  __kasan_check_write+0x20/0x30
[   20.763964]  kasan_atomics_helper+0x126c/0x4858
[   20.764120]  kasan_atomics+0x198/0x2e0
[   20.764296]  kunit_try_run_case+0x170/0x3f0
[   20.764655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.764849]  kthread+0x328/0x630
[   20.764950]  ret_from_fork+0x10/0x20
[   20.765271] 
[   20.765436] Allocated by task 265:
[   20.765538]  kasan_save_stack+0x3c/0x68
[   20.765765]  kasan_save_track+0x20/0x40
[   20.766081]  kasan_save_alloc_info+0x40/0x58
[   20.766246]  __kasan_kmalloc+0xd4/0xd8
[   20.766552]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.766752]  kasan_atomics+0xb8/0x2e0
[   20.766872]  kunit_try_run_case+0x170/0x3f0
[   20.766971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.767079]  kthread+0x328/0x630
[   20.767163]  ret_from_fork+0x10/0x20
[   20.767251] 
[   20.767302] The buggy address belongs to the object at fff00000c7892700
[   20.767302]  which belongs to the cache kmalloc-64 of size 64
[   20.767451] The buggy address is located 0 bytes to the right of
[   20.767451]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.767606] 
[   20.768441] The buggy address belongs to the physical page:
[   20.768570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.769099] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.769405] page_type: f5(slab)
[   20.769730] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.770466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.770981] page dumped because: kasan: bad access detected
[   20.771862] 
[   20.771972] Memory state around the buggy address:
[   20.772222]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.773009]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.773504] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.774217]                                      ^
[   20.774315]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.774438]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.774536] ==================================================================
[   20.661132] ==================================================================
[   20.661224] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   20.661283] Read of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.661351] 
[   20.661386] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.661476] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.661506] Hardware name: linux,dummy-virt (DT)
[   20.661541] Call trace:
[   20.661567]  show_stack+0x20/0x38 (C)
[   20.661616]  dump_stack_lvl+0x8c/0xd0
[   20.661665]  print_report+0x118/0x608
[   20.661713]  kasan_report+0xdc/0x128
[   20.661760]  __asan_report_load4_noabort+0x20/0x30
[   20.661813]  kasan_atomics_helper+0x3dd8/0x4858
[   20.661861]  kasan_atomics+0x198/0x2e0
[   20.661907]  kunit_try_run_case+0x170/0x3f0
[   20.661956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.662011]  kthread+0x328/0x630
[   20.662052]  ret_from_fork+0x10/0x20
[   20.662101] 
[   20.662122] Allocated by task 265:
[   20.662151]  kasan_save_stack+0x3c/0x68
[   20.662194]  kasan_save_track+0x20/0x40
[   20.662233]  kasan_save_alloc_info+0x40/0x58
[   20.662274]  __kasan_kmalloc+0xd4/0xd8
[   20.662313]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.662365]  kasan_atomics+0xb8/0x2e0
[   20.662402]  kunit_try_run_case+0x170/0x3f0
[   20.662442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.662484]  kthread+0x328/0x630
[   20.662517]  ret_from_fork+0x10/0x20
[   20.662734] 
[   20.662811] The buggy address belongs to the object at fff00000c7892700
[   20.662811]  which belongs to the cache kmalloc-64 of size 64
[   20.662872] The buggy address is located 0 bytes to the right of
[   20.662872]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.662936] 
[   20.662958] The buggy address belongs to the physical page:
[   20.662990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.663041] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.663092] page_type: f5(slab)
[   20.663132] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.663184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.663225] page dumped because: kasan: bad access detected
[   20.663255] 
[   20.663276] Memory state around the buggy address:
[   20.663306]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.663362]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.663407] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.663446]                                      ^
[   20.663480]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.663522]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.663617] ==================================================================
[   20.695499] ==================================================================
[   20.695665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   20.695778] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.695843] 
[   20.695878] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.695963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.695994] Hardware name: linux,dummy-virt (DT)
[   20.696026] Call trace:
[   20.696050]  show_stack+0x20/0x38 (C)
[   20.696102]  dump_stack_lvl+0x8c/0xd0
[   20.696151]  print_report+0x118/0x608
[   20.696199]  kasan_report+0xdc/0x128
[   20.696246]  kasan_check_range+0x100/0x1a8
[   20.696295]  __kasan_check_write+0x20/0x30
[   20.696354]  kasan_atomics_helper+0xf20/0x4858
[   20.696405]  kasan_atomics+0x198/0x2e0
[   20.696463]  kunit_try_run_case+0x170/0x3f0
[   20.697407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.697920]  kthread+0x328/0x630
[   20.697973]  ret_from_fork+0x10/0x20
[   20.698103] 
[   20.698128] Allocated by task 265:
[   20.698160]  kasan_save_stack+0x3c/0x68
[   20.698205]  kasan_save_track+0x20/0x40
[   20.698244]  kasan_save_alloc_info+0x40/0x58
[   20.698337]  __kasan_kmalloc+0xd4/0xd8
[   20.698461]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.698507]  kasan_atomics+0xb8/0x2e0
[   20.698545]  kunit_try_run_case+0x170/0x3f0
[   20.698597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.698946]  kthread+0x328/0x630
[   20.699347]  ret_from_fork+0x10/0x20
[   20.699430] 
[   20.699689] The buggy address belongs to the object at fff00000c7892700
[   20.699689]  which belongs to the cache kmalloc-64 of size 64
[   20.699775] The buggy address is located 0 bytes to the right of
[   20.699775]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.699846] 
[   20.699869] The buggy address belongs to the physical page:
[   20.699918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.699969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.700031] page_type: f5(slab)
[   20.700090] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.700161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.700219] page dumped because: kasan: bad access detected
[   20.700269] 
[   20.700507] Memory state around the buggy address:
[   20.700563]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.700615]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.701002] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.701065]                                      ^
[   20.701108]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.701152]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.701192] ==================================================================
[   20.982922] ==================================================================
[   20.983200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   20.983382] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.983526] 
[   20.983600] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.983764] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.983829] Hardware name: linux,dummy-virt (DT)
[   20.984471] Call trace:
[   20.984755]  show_stack+0x20/0x38 (C)
[   20.984949]  dump_stack_lvl+0x8c/0xd0
[   20.985077]  print_report+0x118/0x608
[   20.985203]  kasan_report+0xdc/0x128
[   20.985311]  kasan_check_range+0x100/0x1a8
[   20.985645]  __kasan_check_write+0x20/0x30
[   20.986016]  kasan_atomics_helper+0x17ec/0x4858
[   20.986381]  kasan_atomics+0x198/0x2e0
[   20.986494]  kunit_try_run_case+0x170/0x3f0
[   20.986620]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.986733]  kthread+0x328/0x630
[   20.986993]  ret_from_fork+0x10/0x20
[   20.987141] 
[   20.987354] Allocated by task 265:
[   20.987440]  kasan_save_stack+0x3c/0x68
[   20.987545]  kasan_save_track+0x20/0x40
[   20.987634]  kasan_save_alloc_info+0x40/0x58
[   20.987768]  __kasan_kmalloc+0xd4/0xd8
[   20.987853]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.988005]  kasan_atomics+0xb8/0x2e0
[   20.988077]  kunit_try_run_case+0x170/0x3f0
[   20.988495]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.988726]  kthread+0x328/0x630
[   20.988820]  ret_from_fork+0x10/0x20
[   20.989112] 
[   20.989216] The buggy address belongs to the object at fff00000c7892700
[   20.989216]  which belongs to the cache kmalloc-64 of size 64
[   20.989451] The buggy address is located 0 bytes to the right of
[   20.989451]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.989598] 
[   20.989650] The buggy address belongs to the physical page:
[   20.989716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.989833] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.990259] page_type: f5(slab)
[   20.990655] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.990844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.990937] page dumped because: kasan: bad access detected
[   20.990997] 
[   20.991083] Memory state around the buggy address:
[   20.991159]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.991258]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.991374] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.991711]                                      ^
[   20.991827]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.992010]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.992213] ==================================================================
[   20.624573] ==================================================================
[   20.624646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   20.625092] Write of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.625161] 
[   20.625210] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.625346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.625386] Hardware name: linux,dummy-virt (DT)
[   20.625620] Call trace:
[   20.625673]  show_stack+0x20/0x38 (C)
[   20.625823]  dump_stack_lvl+0x8c/0xd0
[   20.625878]  print_report+0x118/0x608
[   20.626031]  kasan_report+0xdc/0x128
[   20.626084]  kasan_check_range+0x100/0x1a8
[   20.626400]  __kasan_check_write+0x20/0x30
[   20.626484]  kasan_atomics_helper+0xa6c/0x4858
[   20.626538]  kasan_atomics+0x198/0x2e0
[   20.626585]  kunit_try_run_case+0x170/0x3f0
[   20.626637]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.626692]  kthread+0x328/0x630
[   20.626736]  ret_from_fork+0x10/0x20
[   20.626823] 
[   20.626846] Allocated by task 265:
[   20.626879]  kasan_save_stack+0x3c/0x68
[   20.626950]  kasan_save_track+0x20/0x40
[   20.627049]  kasan_save_alloc_info+0x40/0x58
[   20.627126]  __kasan_kmalloc+0xd4/0xd8
[   20.627192]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.627234]  kasan_atomics+0xb8/0x2e0
[   20.627270]  kunit_try_run_case+0x170/0x3f0
[   20.627310]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.627367]  kthread+0x328/0x630
[   20.627403]  ret_from_fork+0x10/0x20
[   20.627440] 
[   20.627979] The buggy address belongs to the object at fff00000c7892700
[   20.627979]  which belongs to the cache kmalloc-64 of size 64
[   20.628050] The buggy address is located 0 bytes to the right of
[   20.628050]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.628126] 
[   20.628151] The buggy address belongs to the physical page:
[   20.628437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.628582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.628635] page_type: f5(slab)
[   20.628947] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.629003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.629085] page dumped because: kasan: bad access detected
[   20.629291] 
[   20.629437] Memory state around the buggy address:
[   20.629573]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.629746]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.629794] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.629834]                                      ^
[   20.629870]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.629925]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.629966] ==================================================================
[   20.890691] ==================================================================
[   20.890958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   20.891103] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.891207] 
[   20.891283] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.892235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.892625] Hardware name: linux,dummy-virt (DT)
[   20.892723] Call trace:
[   20.892795]  show_stack+0x20/0x38 (C)
[   20.892920]  dump_stack_lvl+0x8c/0xd0
[   20.893043]  print_report+0x118/0x608
[   20.893582]  kasan_report+0xdc/0x128
[   20.893984]  kasan_check_range+0x100/0x1a8
[   20.894174]  __kasan_check_write+0x20/0x30
[   20.894445]  kasan_atomics_helper+0x15b4/0x4858
[   20.894827]  kasan_atomics+0x198/0x2e0
[   20.895142]  kunit_try_run_case+0x170/0x3f0
[   20.895698]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.895834]  kthread+0x328/0x630
[   20.895918]  ret_from_fork+0x10/0x20
[   20.896720] 
[   20.896804] Allocated by task 265:
[   20.897046]  kasan_save_stack+0x3c/0x68
[   20.897594]  kasan_save_track+0x20/0x40
[   20.897990]  kasan_save_alloc_info+0x40/0x58
[   20.898532]  __kasan_kmalloc+0xd4/0xd8
[   20.898684]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.898962]  kasan_atomics+0xb8/0x2e0
[   20.899053]  kunit_try_run_case+0x170/0x3f0
[   20.899470]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.899674]  kthread+0x328/0x630
[   20.899751]  ret_from_fork+0x10/0x20
[   20.899832] 
[   20.900651] The buggy address belongs to the object at fff00000c7892700
[   20.900651]  which belongs to the cache kmalloc-64 of size 64
[   20.900807] The buggy address is located 0 bytes to the right of
[   20.900807]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.901329] 
[   20.901546] The buggy address belongs to the physical page:
[   20.901635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.901758] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.901872] page_type: f5(slab)
[   20.902195] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.902341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.902460] page dumped because: kasan: bad access detected
[   20.902542] 
[   20.902593] Memory state around the buggy address:
[   20.902671]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.902772]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.902867] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.902969]                                      ^
[   20.903078]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.903209]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.903303] ==================================================================
[   20.677494] ==================================================================
[   20.677559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   20.677622] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.677672] 
[   20.677707] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.677817] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.677848] Hardware name: linux,dummy-virt (DT)
[   20.677883] Call trace:
[   20.677908]  show_stack+0x20/0x38 (C)
[   20.677961]  dump_stack_lvl+0x8c/0xd0
[   20.678009]  print_report+0x118/0x608
[   20.678058]  kasan_report+0xdc/0x128
[   20.678107]  __asan_report_load8_noabort+0x20/0x30
[   20.678160]  kasan_atomics_helper+0x3f58/0x4858
[   20.678211]  kasan_atomics+0x198/0x2e0
[   20.678259]  kunit_try_run_case+0x170/0x3f0
[   20.678308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.678380]  kthread+0x328/0x630
[   20.678426]  ret_from_fork+0x10/0x20
[   20.678474] 
[   20.678494] Allocated by task 265:
[   20.678525]  kasan_save_stack+0x3c/0x68
[   20.678568]  kasan_save_track+0x20/0x40
[   20.678608]  kasan_save_alloc_info+0x40/0x58
[   20.678649]  __kasan_kmalloc+0xd4/0xd8
[   20.678686]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.678732]  kasan_atomics+0xb8/0x2e0
[   20.678803]  kunit_try_run_case+0x170/0x3f0
[   20.678840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.678884]  kthread+0x328/0x630
[   20.678918]  ret_from_fork+0x10/0x20
[   20.678962] 
[   20.678999] The buggy address belongs to the object at fff00000c7892700
[   20.678999]  which belongs to the cache kmalloc-64 of size 64
[   20.679093] The buggy address is located 0 bytes to the right of
[   20.679093]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.679159] 
[   20.679198] The buggy address belongs to the physical page:
[   20.679271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.679337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.679392] page_type: f5(slab)
[   20.679432] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.679484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.679525] page dumped because: kasan: bad access detected
[   20.679558] 
[   20.679578] Memory state around the buggy address:
[   20.679609]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.679652]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.679695] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.679733]                                      ^
[   20.679780]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.679832]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.679873] ==================================================================
[   20.682685] ==================================================================
[   20.682730] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   20.682793] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.682845] 
[   20.682879] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.682963] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.682992] Hardware name: linux,dummy-virt (DT)
[   20.683026] Call trace:
[   20.683051]  show_stack+0x20/0x38 (C)
[   20.683102]  dump_stack_lvl+0x8c/0xd0
[   20.683163]  print_report+0x118/0x608
[   20.683266]  kasan_report+0xdc/0x128
[   20.683314]  __asan_report_store8_noabort+0x20/0x30
[   20.683376]  kasan_atomics_helper+0x3e5c/0x4858
[   20.683426]  kasan_atomics+0x198/0x2e0
[   20.683473]  kunit_try_run_case+0x170/0x3f0
[   20.683521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.683575]  kthread+0x328/0x630
[   20.683620]  ret_from_fork+0x10/0x20
[   20.683669] 
[   20.683694] Allocated by task 265:
[   20.683725]  kasan_save_stack+0x3c/0x68
[   20.683769]  kasan_save_track+0x20/0x40
[   20.683811]  kasan_save_alloc_info+0x40/0x58
[   20.683854]  __kasan_kmalloc+0xd4/0xd8
[   20.683893]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.683935]  kasan_atomics+0xb8/0x2e0
[   20.683985]  kunit_try_run_case+0x170/0x3f0
[   20.684028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.684073]  kthread+0x328/0x630
[   20.684105]  ret_from_fork+0x10/0x20
[   20.684143] 
[   20.684164] The buggy address belongs to the object at fff00000c7892700
[   20.684164]  which belongs to the cache kmalloc-64 of size 64
[   20.684224] The buggy address is located 0 bytes to the right of
[   20.684224]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.684289] 
[   20.684310] The buggy address belongs to the physical page:
[   20.684351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.684957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.685032] page_type: f5(slab)
[   20.685081] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.685137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.685180] page dumped because: kasan: bad access detected
[   20.685256] 
[   20.685315] Memory state around the buggy address:
[   20.685425]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.685481]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.685526] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.685564]                                      ^
[   20.685600]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.685642]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.685680] ==================================================================
[   20.753135] ==================================================================
[   20.753291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   20.753421] Write of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.753542] 
[   20.753616] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.754288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.754391] Hardware name: linux,dummy-virt (DT)
[   20.754462] Call trace:
[   20.754513]  show_stack+0x20/0x38 (C)
[   20.754632]  dump_stack_lvl+0x8c/0xd0
[   20.754737]  print_report+0x118/0x608
[   20.754882]  kasan_report+0xdc/0x128
[   20.755047]  kasan_check_range+0x100/0x1a8
[   20.755310]  __kasan_check_write+0x20/0x30
[   20.755405]  kasan_atomics_helper+0x11f8/0x4858
[   20.755532]  kasan_atomics+0x198/0x2e0
[   20.755633]  kunit_try_run_case+0x170/0x3f0
[   20.755779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.755957]  kthread+0x328/0x630
[   20.756092]  ret_from_fork+0x10/0x20
[   20.756249] 
[   20.756328] Allocated by task 265:
[   20.756436]  kasan_save_stack+0x3c/0x68
[   20.756587]  kasan_save_track+0x20/0x40
[   20.756717]  kasan_save_alloc_info+0x40/0x58
[   20.756834]  __kasan_kmalloc+0xd4/0xd8
[   20.756925]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.757049]  kasan_atomics+0xb8/0x2e0
[   20.757181]  kunit_try_run_case+0x170/0x3f0
[   20.757303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.757425]  kthread+0x328/0x630
[   20.757504]  ret_from_fork+0x10/0x20
[   20.757587] 
[   20.757996] The buggy address belongs to the object at fff00000c7892700
[   20.757996]  which belongs to the cache kmalloc-64 of size 64
[   20.758353] The buggy address is located 0 bytes to the right of
[   20.758353]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.758534] 
[   20.758578] The buggy address belongs to the physical page:
[   20.758643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.758753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.759047] page_type: f5(slab)
[   20.759173] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.759281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.759386] page dumped because: kasan: bad access detected
[   20.759459] 
[   20.759501] Memory state around the buggy address:
[   20.759569]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.759671]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.759774] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.759855]                                      ^
[   20.760139]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.760291]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.760428] ==================================================================
[   20.936259] ==================================================================
[   20.936386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   20.936514] Read of size 8 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.936668] 
[   20.936959] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.937165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.937233] Hardware name: linux,dummy-virt (DT)
[   20.937511] Call trace:
[   20.937723]  show_stack+0x20/0x38 (C)
[   20.938810]  dump_stack_lvl+0x8c/0xd0
[   20.938938]  print_report+0x118/0x608
[   20.939045]  kasan_report+0xdc/0x128
[   20.939142]  __asan_report_load8_noabort+0x20/0x30
[   20.939376]  kasan_atomics_helper+0x3df4/0x4858
[   20.939473]  kasan_atomics+0x198/0x2e0
[   20.939588]  kunit_try_run_case+0x170/0x3f0
[   20.939703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.939828]  kthread+0x328/0x630
[   20.939923]  ret_from_fork+0x10/0x20
[   20.940031] 
[   20.940074] Allocated by task 265:
[   20.940146]  kasan_save_stack+0x3c/0x68
[   20.940222]  kasan_save_track+0x20/0x40
[   20.940297]  kasan_save_alloc_info+0x40/0x58
[   20.940399]  __kasan_kmalloc+0xd4/0xd8
[   20.940503]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.940648]  kasan_atomics+0xb8/0x2e0
[   20.940737]  kunit_try_run_case+0x170/0x3f0
[   20.940827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.940930]  kthread+0x328/0x630
[   20.941018]  ret_from_fork+0x10/0x20
[   20.941131] 
[   20.941176] The buggy address belongs to the object at fff00000c7892700
[   20.941176]  which belongs to the cache kmalloc-64 of size 64
[   20.941309] The buggy address is located 0 bytes to the right of
[   20.941309]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.941447] 
[   20.941492] The buggy address belongs to the physical page:
[   20.941608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.941766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.942074] page_type: f5(slab)
[   20.942168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.942279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.942419] page dumped because: kasan: bad access detected
[   20.942536] 
[   20.942596] Memory state around the buggy address:
[   20.942697]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.942811]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.942902] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.943035]                                      ^
[   20.943117]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.943220]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.943314] ==================================================================
[   20.666623] ==================================================================
[   20.666673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   20.666736] Read of size 4 at addr fff00000c7892730 by task kunit_try_catch/265
[   20.666817] 
[   20.666849] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT 
[   20.666933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   20.666963] Hardware name: linux,dummy-virt (DT)
[   20.666995] Call trace:
[   20.667019]  show_stack+0x20/0x38 (C)
[   20.667069]  dump_stack_lvl+0x8c/0xd0
[   20.667116]  print_report+0x118/0x608
[   20.667162]  kasan_report+0xdc/0x128
[   20.667259]  __asan_report_load4_noabort+0x20/0x30
[   20.667668]  kasan_atomics_helper+0x3e04/0x4858
[   20.667801]  kasan_atomics+0x198/0x2e0
[   20.667851]  kunit_try_run_case+0x170/0x3f0
[   20.667902]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.667956]  kthread+0x328/0x630
[   20.667998]  ret_from_fork+0x10/0x20
[   20.668048] 
[   20.668070] Allocated by task 265:
[   20.668102]  kasan_save_stack+0x3c/0x68
[   20.668145]  kasan_save_track+0x20/0x40
[   20.668276]  kasan_save_alloc_info+0x40/0x58
[   20.668444]  __kasan_kmalloc+0xd4/0xd8
[   20.668604]  __kmalloc_cache_noprof+0x15c/0x3c0
[   20.668649]  kasan_atomics+0xb8/0x2e0
[   20.668687]  kunit_try_run_case+0x170/0x3f0
[   20.668777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   20.668841]  kthread+0x328/0x630
[   20.668873]  ret_from_fork+0x10/0x20
[   20.668911] 
[   20.668945] The buggy address belongs to the object at fff00000c7892700
[   20.668945]  which belongs to the cache kmalloc-64 of size 64
[   20.669005] The buggy address is located 0 bytes to the right of
[   20.669005]  allocated 48-byte region [fff00000c7892700, fff00000c7892730)
[   20.669068] 
[   20.669090] The buggy address belongs to the physical page:
[   20.669123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107892
[   20.669175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   20.669248] page_type: f5(slab)
[   20.669315] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   20.669382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   20.669447] page dumped because: kasan: bad access detected
[   20.669517] 
[   20.669566] Memory state around the buggy address:
[   20.669606]  fff00000c7892600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.669704]  fff00000c7892680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   20.669795] >fff00000c7892700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   20.669832]                                      ^
[   20.669864]  fff00000c7892780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.669906]  fff00000c7892800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   20.669944] ==================================================================


[   14.192900] ==================================================================
[   14.193527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   14.193819] Read of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.194189] 
[   14.194306] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.194351] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.194364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.194398] Call Trace:
[   14.194415]  <TASK>
[   14.194432]  dump_stack_lvl+0x73/0xb0
[   14.194460]  print_report+0xd1/0x650
[   14.194484]  ? __virt_addr_valid+0x1db/0x2d0
[   14.194507]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.194530]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.194553]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.194576]  kasan_report+0x141/0x180
[   14.194599]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.194626]  __asan_report_load4_noabort+0x18/0x20
[   14.194648]  kasan_atomics_helper+0x49ce/0x5450
[   14.194672]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.194695]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.194716]  ? ret_from_fork_asm+0x1a/0x30
[   14.194738]  ? kasan_atomics+0x152/0x310
[   14.194762]  kasan_atomics+0x1dc/0x310
[   14.194798]  ? __pfx_kasan_atomics+0x10/0x10
[   14.194820]  ? __pfx_read_tsc+0x10/0x10
[   14.194841]  ? ktime_get_ts64+0x86/0x230
[   14.194868]  kunit_try_run_case+0x1a5/0x480
[   14.194891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.194911]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.194938]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.194963]  ? __kthread_parkme+0x82/0x180
[   14.194984]  ? preempt_count_sub+0x50/0x80
[   14.195049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.195076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.195103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.195128]  kthread+0x337/0x6f0
[   14.195148]  ? trace_preempt_on+0x20/0xc0
[   14.195174]  ? __pfx_kthread+0x10/0x10
[   14.195196]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.195220]  ? calculate_sigpending+0x7b/0xa0
[   14.195244]  ? __pfx_kthread+0x10/0x10
[   14.195266]  ret_from_fork+0x116/0x1d0
[   14.195285]  ? __pfx_kthread+0x10/0x10
[   14.195306]  ret_from_fork_asm+0x1a/0x30
[   14.195337]  </TASK>
[   14.195349] 
[   14.208433] Allocated by task 283:
[   14.208918]  kasan_save_stack+0x45/0x70
[   14.209307]  kasan_save_track+0x18/0x40
[   14.209467]  kasan_save_alloc_info+0x3b/0x50
[   14.209614]  __kasan_kmalloc+0xb7/0xc0
[   14.209763]  __kmalloc_cache_noprof+0x189/0x420
[   14.210192]  kasan_atomics+0x95/0x310
[   14.210573]  kunit_try_run_case+0x1a5/0x480
[   14.211050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.211643]  kthread+0x337/0x6f0
[   14.212037]  ret_from_fork+0x116/0x1d0
[   14.212413]  ret_from_fork_asm+0x1a/0x30
[   14.212679] 
[   14.212819] The buggy address belongs to the object at ffff8881039bd780
[   14.212819]  which belongs to the cache kmalloc-64 of size 64
[   14.213738] The buggy address is located 0 bytes to the right of
[   14.213738]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.214850] 
[   14.214936] The buggy address belongs to the physical page:
[   14.215400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.216348] flags: 0x200000000000000(node=0|zone=2)
[   14.216532] page_type: f5(slab)
[   14.216654] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.217303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.218103] page dumped because: kasan: bad access detected
[   14.218793] 
[   14.218963] Memory state around the buggy address:
[   14.219454]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.219675]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.220323] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.221200]                                      ^
[   14.221654]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.221925]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.222445] ==================================================================
[   14.499547] ==================================================================
[   14.499911] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   14.500344] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.500616] 
[   14.500703] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.500751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.500764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.500821] Call Trace:
[   14.500860]  <TASK>
[   14.500898]  dump_stack_lvl+0x73/0xb0
[   14.500950]  print_report+0xd1/0x650
[   14.500974]  ? __virt_addr_valid+0x1db/0x2d0
[   14.500997]  ? kasan_atomics_helper+0x194a/0x5450
[   14.501021]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.501044]  ? kasan_atomics_helper+0x194a/0x5450
[   14.501067]  kasan_report+0x141/0x180
[   14.501090]  ? kasan_atomics_helper+0x194a/0x5450
[   14.501118]  kasan_check_range+0x10c/0x1c0
[   14.501143]  __kasan_check_write+0x18/0x20
[   14.501164]  kasan_atomics_helper+0x194a/0x5450
[   14.501188]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.501211]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.501232]  ? ret_from_fork_asm+0x1a/0x30
[   14.501255]  ? kasan_atomics+0x152/0x310
[   14.501289]  kasan_atomics+0x1dc/0x310
[   14.501309]  ? __pfx_kasan_atomics+0x10/0x10
[   14.501330]  ? __pfx_read_tsc+0x10/0x10
[   14.501352]  ? ktime_get_ts64+0x86/0x230
[   14.501388]  kunit_try_run_case+0x1a5/0x480
[   14.501410]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.501465]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.501515]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.501541]  ? __kthread_parkme+0x82/0x180
[   14.501561]  ? preempt_count_sub+0x50/0x80
[   14.501585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.501607]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.501631]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.501687]  kthread+0x337/0x6f0
[   14.501707]  ? trace_preempt_on+0x20/0xc0
[   14.501741]  ? __pfx_kthread+0x10/0x10
[   14.501762]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.501786]  ? calculate_sigpending+0x7b/0xa0
[   14.501810]  ? __pfx_kthread+0x10/0x10
[   14.501863]  ret_from_fork+0x116/0x1d0
[   14.501882]  ? __pfx_kthread+0x10/0x10
[   14.501903]  ret_from_fork_asm+0x1a/0x30
[   14.501934]  </TASK>
[   14.501945] 
[   14.510397] Allocated by task 283:
[   14.510595]  kasan_save_stack+0x45/0x70
[   14.510822]  kasan_save_track+0x18/0x40
[   14.511033]  kasan_save_alloc_info+0x3b/0x50
[   14.511238]  __kasan_kmalloc+0xb7/0xc0
[   14.511442]  __kmalloc_cache_noprof+0x189/0x420
[   14.511603]  kasan_atomics+0x95/0x310
[   14.511802]  kunit_try_run_case+0x1a5/0x480
[   14.512018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.512292]  kthread+0x337/0x6f0
[   14.512431]  ret_from_fork+0x116/0x1d0
[   14.512568]  ret_from_fork_asm+0x1a/0x30
[   14.512873] 
[   14.513002] The buggy address belongs to the object at ffff8881039bd780
[   14.513002]  which belongs to the cache kmalloc-64 of size 64
[   14.513683] The buggy address is located 0 bytes to the right of
[   14.513683]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.514148] 
[   14.514223] The buggy address belongs to the physical page:
[   14.514475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.514942] flags: 0x200000000000000(node=0|zone=2)
[   14.515140] page_type: f5(slab)
[   14.515316] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.515678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.516083] page dumped because: kasan: bad access detected
[   14.516343] 
[   14.516448] Memory state around the buggy address:
[   14.516679]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.517117]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.517448] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.517789]                                      ^
[   14.518040]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.518405]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.518726] ==================================================================
[   13.892845] ==================================================================
[   13.893206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   13.893534] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.893872] 
[   13.894076] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.894127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.894141] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.894164] Call Trace:
[   13.894179]  <TASK>
[   13.894194]  dump_stack_lvl+0x73/0xb0
[   13.894221]  print_report+0xd1/0x650
[   13.894246]  ? __virt_addr_valid+0x1db/0x2d0
[   13.894269]  ? kasan_atomics_helper+0xe78/0x5450
[   13.894290]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.894315]  ? kasan_atomics_helper+0xe78/0x5450
[   13.894339]  kasan_report+0x141/0x180
[   13.894364]  ? kasan_atomics_helper+0xe78/0x5450
[   13.894404]  kasan_check_range+0x10c/0x1c0
[   13.894429]  __kasan_check_write+0x18/0x20
[   13.894449]  kasan_atomics_helper+0xe78/0x5450
[   13.894473]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.894496]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.894518]  ? ret_from_fork_asm+0x1a/0x30
[   13.894539]  ? kasan_atomics+0x152/0x310
[   13.894562]  kasan_atomics+0x1dc/0x310
[   13.894583]  ? __pfx_kasan_atomics+0x10/0x10
[   13.894603]  ? __pfx_read_tsc+0x10/0x10
[   13.894625]  ? ktime_get_ts64+0x86/0x230
[   13.894650]  kunit_try_run_case+0x1a5/0x480
[   13.894672]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.894692]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.894717]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.894743]  ? __kthread_parkme+0x82/0x180
[   13.894784]  ? preempt_count_sub+0x50/0x80
[   13.894808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.894830]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.894855]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.894881]  kthread+0x337/0x6f0
[   13.894900]  ? trace_preempt_on+0x20/0xc0
[   13.894924]  ? __pfx_kthread+0x10/0x10
[   13.894945]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.894968]  ? calculate_sigpending+0x7b/0xa0
[   13.895174]  ? __pfx_kthread+0x10/0x10
[   13.895204]  ret_from_fork+0x116/0x1d0
[   13.895226]  ? __pfx_kthread+0x10/0x10
[   13.895247]  ret_from_fork_asm+0x1a/0x30
[   13.895278]  </TASK>
[   13.895290] 
[   13.903341] Allocated by task 283:
[   13.904769]  kasan_save_stack+0x45/0x70
[   13.905437]  kasan_save_track+0x18/0x40
[   13.906193]  kasan_save_alloc_info+0x3b/0x50
[   13.906426]  __kasan_kmalloc+0xb7/0xc0
[   13.906567]  __kmalloc_cache_noprof+0x189/0x420
[   13.906721]  kasan_atomics+0x95/0x310
[   13.907138]  kunit_try_run_case+0x1a5/0x480
[   13.907550]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.908145]  kthread+0x337/0x6f0
[   13.908583]  ret_from_fork+0x116/0x1d0
[   13.909034]  ret_from_fork_asm+0x1a/0x30
[   13.909464] 
[   13.909539] The buggy address belongs to the object at ffff8881039bd780
[   13.909539]  which belongs to the cache kmalloc-64 of size 64
[   13.909919] The buggy address is located 0 bytes to the right of
[   13.909919]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.911248] 
[   13.911328] The buggy address belongs to the physical page:
[   13.911518] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.912322] flags: 0x200000000000000(node=0|zone=2)
[   13.912794] page_type: f5(slab)
[   13.913110] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.913940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.914547] page dumped because: kasan: bad access detected
[   13.914731] 
[   13.914904] Memory state around the buggy address:
[   13.915450]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.916366]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.917015] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.917264]                                      ^
[   13.917843]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.918582]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.919063] ==================================================================
[   13.539505] ==================================================================
[   13.539821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   13.540191] Read of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.540436] 
[   13.540519] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.540564] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.540577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.540599] Call Trace:
[   13.540615]  <TASK>
[   13.540630]  dump_stack_lvl+0x73/0xb0
[   13.540657]  print_report+0xd1/0x650
[   13.540681]  ? __virt_addr_valid+0x1db/0x2d0
[   13.540706]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.540729]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.540753]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.540776]  kasan_report+0x141/0x180
[   13.540800]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.540828]  __asan_report_load4_noabort+0x18/0x20
[   13.540850]  kasan_atomics_helper+0x4b54/0x5450
[   13.540875]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.540899]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.540921]  ? ret_from_fork_asm+0x1a/0x30
[   13.540943]  ? kasan_atomics+0x152/0x310
[   13.540979]  kasan_atomics+0x1dc/0x310
[   13.540999]  ? __pfx_kasan_atomics+0x10/0x10
[   13.541031]  ? __pfx_read_tsc+0x10/0x10
[   13.541052]  ? ktime_get_ts64+0x86/0x230
[   13.541079]  kunit_try_run_case+0x1a5/0x480
[   13.541102]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.541123]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.541148]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.541174]  ? __kthread_parkme+0x82/0x180
[   13.541195]  ? preempt_count_sub+0x50/0x80
[   13.541220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.541242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.541267]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.541293]  kthread+0x337/0x6f0
[   13.541313]  ? trace_preempt_on+0x20/0xc0
[   13.541339]  ? __pfx_kthread+0x10/0x10
[   13.541360]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.541395]  ? calculate_sigpending+0x7b/0xa0
[   13.541420]  ? __pfx_kthread+0x10/0x10
[   13.541443]  ret_from_fork+0x116/0x1d0
[   13.541463]  ? __pfx_kthread+0x10/0x10
[   13.541485]  ret_from_fork_asm+0x1a/0x30
[   13.541517]  </TASK>
[   13.541528] 
[   13.549795] Allocated by task 283:
[   13.549967]  kasan_save_stack+0x45/0x70
[   13.550200]  kasan_save_track+0x18/0x40
[   13.550413]  kasan_save_alloc_info+0x3b/0x50
[   13.550626]  __kasan_kmalloc+0xb7/0xc0
[   13.550983]  __kmalloc_cache_noprof+0x189/0x420
[   13.551356]  kasan_atomics+0x95/0x310
[   13.551551]  kunit_try_run_case+0x1a5/0x480
[   13.551774]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.551998]  kthread+0x337/0x6f0
[   13.552209]  ret_from_fork+0x116/0x1d0
[   13.552410]  ret_from_fork_asm+0x1a/0x30
[   13.552553] 
[   13.552626] The buggy address belongs to the object at ffff8881039bd780
[   13.552626]  which belongs to the cache kmalloc-64 of size 64
[   13.553109] The buggy address is located 0 bytes to the right of
[   13.553109]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.553787] 
[   13.553894] The buggy address belongs to the physical page:
[   13.554116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.554360] flags: 0x200000000000000(node=0|zone=2)
[   13.554534] page_type: f5(slab)
[   13.554658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.555478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.555837] page dumped because: kasan: bad access detected
[   13.556099] 
[   13.556197] Memory state around the buggy address:
[   13.556368]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.556837]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.557221] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.557454]                                      ^
[   13.557682]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.558001]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.558411] ==================================================================
[   13.657404] ==================================================================
[   13.657708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   13.658021] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.658360] 
[   13.659269] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.659320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.659333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.659356] Call Trace:
[   13.659370]  <TASK>
[   13.659396]  dump_stack_lvl+0x73/0xb0
[   13.659425]  print_report+0xd1/0x650
[   13.659448]  ? __virt_addr_valid+0x1db/0x2d0
[   13.659486]  ? kasan_atomics_helper+0x72f/0x5450
[   13.659510]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.659532]  ? kasan_atomics_helper+0x72f/0x5450
[   13.659555]  kasan_report+0x141/0x180
[   13.659578]  ? kasan_atomics_helper+0x72f/0x5450
[   13.659607]  kasan_check_range+0x10c/0x1c0
[   13.659635]  __kasan_check_write+0x18/0x20
[   13.659656]  kasan_atomics_helper+0x72f/0x5450
[   13.659679]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.659723]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.659745]  ? ret_from_fork_asm+0x1a/0x30
[   13.659766]  ? kasan_atomics+0x152/0x310
[   13.659791]  kasan_atomics+0x1dc/0x310
[   13.659810]  ? __pfx_kasan_atomics+0x10/0x10
[   13.659832]  ? __pfx_read_tsc+0x10/0x10
[   13.659853]  ? ktime_get_ts64+0x86/0x230
[   13.659878]  kunit_try_run_case+0x1a5/0x480
[   13.659900]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.659920]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.659946]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.659972]  ? __kthread_parkme+0x82/0x180
[   13.660248]  ? preempt_count_sub+0x50/0x80
[   13.660278]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.660302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.660328]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.660354]  kthread+0x337/0x6f0
[   13.660386]  ? trace_preempt_on+0x20/0xc0
[   13.660412]  ? __pfx_kthread+0x10/0x10
[   13.660435]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.660459]  ? calculate_sigpending+0x7b/0xa0
[   13.660484]  ? __pfx_kthread+0x10/0x10
[   13.660507]  ret_from_fork+0x116/0x1d0
[   13.660527]  ? __pfx_kthread+0x10/0x10
[   13.660548]  ret_from_fork_asm+0x1a/0x30
[   13.660579]  </TASK>
[   13.660591] 
[   13.669279] Allocated by task 283:
[   13.669426]  kasan_save_stack+0x45/0x70
[   13.669610]  kasan_save_track+0x18/0x40
[   13.669827]  kasan_save_alloc_info+0x3b/0x50
[   13.670200]  __kasan_kmalloc+0xb7/0xc0
[   13.670421]  __kmalloc_cache_noprof+0x189/0x420
[   13.670648]  kasan_atomics+0x95/0x310
[   13.670860]  kunit_try_run_case+0x1a5/0x480
[   13.671158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.671442]  kthread+0x337/0x6f0
[   13.671615]  ret_from_fork+0x116/0x1d0
[   13.671816]  ret_from_fork_asm+0x1a/0x30
[   13.672082] 
[   13.672171] The buggy address belongs to the object at ffff8881039bd780
[   13.672171]  which belongs to the cache kmalloc-64 of size 64
[   13.672668] The buggy address is located 0 bytes to the right of
[   13.672668]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.673263] 
[   13.673346] The buggy address belongs to the physical page:
[   13.673592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.673923] flags: 0x200000000000000(node=0|zone=2)
[   13.674369] page_type: f5(slab)
[   13.674565] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.674869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.675271] page dumped because: kasan: bad access detected
[   13.675491] 
[   13.675564] Memory state around the buggy address:
[   13.675744]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.676098]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.676431] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.676750]                                      ^
[   13.676930]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.677149]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.677475] ==================================================================
[   14.910948] ==================================================================
[   14.911354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   14.911689] Read of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.912054] 
[   14.912140] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.912184] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.912197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.912218] Call Trace:
[   14.912231]  <TASK>
[   14.912245]  dump_stack_lvl+0x73/0xb0
[   14.912271]  print_report+0xd1/0x650
[   14.912296]  ? __virt_addr_valid+0x1db/0x2d0
[   14.912319]  ? kasan_atomics_helper+0x5115/0x5450
[   14.912341]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.912364]  ? kasan_atomics_helper+0x5115/0x5450
[   14.912398]  kasan_report+0x141/0x180
[   14.912421]  ? kasan_atomics_helper+0x5115/0x5450
[   14.912448]  __asan_report_load8_noabort+0x18/0x20
[   14.912469]  kasan_atomics_helper+0x5115/0x5450
[   14.912494]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.912517]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.912538]  ? ret_from_fork_asm+0x1a/0x30
[   14.912561]  ? kasan_atomics+0x152/0x310
[   14.912585]  kasan_atomics+0x1dc/0x310
[   14.912605]  ? __pfx_kasan_atomics+0x10/0x10
[   14.912626]  ? __pfx_read_tsc+0x10/0x10
[   14.912683]  ? ktime_get_ts64+0x86/0x230
[   14.912709]  kunit_try_run_case+0x1a5/0x480
[   14.912742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.912763]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.912789]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.912843]  ? __kthread_parkme+0x82/0x180
[   14.912864]  ? preempt_count_sub+0x50/0x80
[   14.912898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.912920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.912945]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.912971]  kthread+0x337/0x6f0
[   14.912991]  ? trace_preempt_on+0x20/0xc0
[   14.913015]  ? __pfx_kthread+0x10/0x10
[   14.913065]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.913089]  ? calculate_sigpending+0x7b/0xa0
[   14.913113]  ? __pfx_kthread+0x10/0x10
[   14.913145]  ret_from_fork+0x116/0x1d0
[   14.913165]  ? __pfx_kthread+0x10/0x10
[   14.913186]  ret_from_fork_asm+0x1a/0x30
[   14.913219]  </TASK>
[   14.913230] 
[   14.921332] Allocated by task 283:
[   14.921475]  kasan_save_stack+0x45/0x70
[   14.921622]  kasan_save_track+0x18/0x40
[   14.921784]  kasan_save_alloc_info+0x3b/0x50
[   14.921994]  __kasan_kmalloc+0xb7/0xc0
[   14.922242]  __kmalloc_cache_noprof+0x189/0x420
[   14.922685]  kasan_atomics+0x95/0x310
[   14.922858]  kunit_try_run_case+0x1a5/0x480
[   14.923005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.923410]  kthread+0x337/0x6f0
[   14.923655]  ret_from_fork+0x116/0x1d0
[   14.923902]  ret_from_fork_asm+0x1a/0x30
[   14.924053] 
[   14.924125] The buggy address belongs to the object at ffff8881039bd780
[   14.924125]  which belongs to the cache kmalloc-64 of size 64
[   14.924490] The buggy address is located 0 bytes to the right of
[   14.924490]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.925430] 
[   14.925528] The buggy address belongs to the physical page:
[   14.925831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.926196] flags: 0x200000000000000(node=0|zone=2)
[   14.926528] page_type: f5(slab)
[   14.926672] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.927085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.927348] page dumped because: kasan: bad access detected
[   14.927532] 
[   14.927603] Memory state around the buggy address:
[   14.927871]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.928196]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.928585] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.928918]                                      ^
[   14.929152]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.929454]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.929806] ==================================================================
[   14.832120] ==================================================================
[   14.832532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   14.833007] Read of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.833410] 
[   14.833554] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.833632] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.833645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.833677] Call Trace:
[   14.833691]  <TASK>
[   14.833707]  dump_stack_lvl+0x73/0xb0
[   14.833733]  print_report+0xd1/0x650
[   14.833756]  ? __virt_addr_valid+0x1db/0x2d0
[   14.833778]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.833800]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.833852]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.833875]  kasan_report+0x141/0x180
[   14.833909]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.833937]  __asan_report_load8_noabort+0x18/0x20
[   14.833959]  kasan_atomics_helper+0x4fb2/0x5450
[   14.833982]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.834005]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.834030]  ? ret_from_fork_asm+0x1a/0x30
[   14.834053]  ? kasan_atomics+0x152/0x310
[   14.834078]  kasan_atomics+0x1dc/0x310
[   14.834097]  ? __pfx_kasan_atomics+0x10/0x10
[   14.834119]  ? __pfx_read_tsc+0x10/0x10
[   14.834140]  ? ktime_get_ts64+0x86/0x230
[   14.834165]  kunit_try_run_case+0x1a5/0x480
[   14.834187]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.834207]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.834264]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.834289]  ? __kthread_parkme+0x82/0x180
[   14.834342]  ? preempt_count_sub+0x50/0x80
[   14.834392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.834414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.834439]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.834464]  kthread+0x337/0x6f0
[   14.834484]  ? trace_preempt_on+0x20/0xc0
[   14.834508]  ? __pfx_kthread+0x10/0x10
[   14.834530]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.834554]  ? calculate_sigpending+0x7b/0xa0
[   14.834577]  ? __pfx_kthread+0x10/0x10
[   14.834613]  ret_from_fork+0x116/0x1d0
[   14.834633]  ? __pfx_kthread+0x10/0x10
[   14.834654]  ret_from_fork_asm+0x1a/0x30
[   14.834685]  </TASK>
[   14.834697] 
[   14.843074] Allocated by task 283:
[   14.843309]  kasan_save_stack+0x45/0x70
[   14.843553]  kasan_save_track+0x18/0x40
[   14.843778]  kasan_save_alloc_info+0x3b/0x50
[   14.843995]  __kasan_kmalloc+0xb7/0xc0
[   14.844160]  __kmalloc_cache_noprof+0x189/0x420
[   14.844354]  kasan_atomics+0x95/0x310
[   14.844518]  kunit_try_run_case+0x1a5/0x480
[   14.844707]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.844943]  kthread+0x337/0x6f0
[   14.845121]  ret_from_fork+0x116/0x1d0
[   14.845330]  ret_from_fork_asm+0x1a/0x30
[   14.845592] 
[   14.845760] The buggy address belongs to the object at ffff8881039bd780
[   14.845760]  which belongs to the cache kmalloc-64 of size 64
[   14.846220] The buggy address is located 0 bytes to the right of
[   14.846220]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.846932] 
[   14.847030] The buggy address belongs to the physical page:
[   14.847288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.847583] flags: 0x200000000000000(node=0|zone=2)
[   14.847871] page_type: f5(slab)
[   14.848051] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.848528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.848902] page dumped because: kasan: bad access detected
[   14.849137] 
[   14.849208] Memory state around the buggy address:
[   14.849364]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.849702]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.850032] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.850310]                                      ^
[   14.850577]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.850851]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.851228] ==================================================================
[   13.558839] ==================================================================
[   13.559159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   13.559437] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.559662] 
[   13.559747] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.559793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.559805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.559827] Call Trace:
[   13.559841]  <TASK>
[   13.559856]  dump_stack_lvl+0x73/0xb0
[   13.559882]  print_report+0xd1/0x650
[   13.559906]  ? __virt_addr_valid+0x1db/0x2d0
[   13.559928]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.559950]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.559974]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.559997]  kasan_report+0x141/0x180
[   13.560019]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.560048]  kasan_check_range+0x10c/0x1c0
[   13.560074]  __kasan_check_write+0x18/0x20
[   13.560095]  kasan_atomics_helper+0x4a0/0x5450
[   13.560119]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.560142]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.560164]  ? ret_from_fork_asm+0x1a/0x30
[   13.560186]  ? kasan_atomics+0x152/0x310
[   13.560210]  kasan_atomics+0x1dc/0x310
[   13.560230]  ? __pfx_kasan_atomics+0x10/0x10
[   13.560252]  ? __pfx_read_tsc+0x10/0x10
[   13.560434]  ? ktime_get_ts64+0x86/0x230
[   13.560466]  kunit_try_run_case+0x1a5/0x480
[   13.560490]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.560510]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.560536]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.560563]  ? __kthread_parkme+0x82/0x180
[   13.560585]  ? preempt_count_sub+0x50/0x80
[   13.560609]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.560631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.560656]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.560682]  kthread+0x337/0x6f0
[   13.560702]  ? trace_preempt_on+0x20/0xc0
[   13.560737]  ? __pfx_kthread+0x10/0x10
[   13.560759]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.560783]  ? calculate_sigpending+0x7b/0xa0
[   13.560806]  ? __pfx_kthread+0x10/0x10
[   13.560829]  ret_from_fork+0x116/0x1d0
[   13.560849]  ? __pfx_kthread+0x10/0x10
[   13.560870]  ret_from_fork_asm+0x1a/0x30
[   13.560902]  </TASK>
[   13.560913] 
[   13.569921] Allocated by task 283:
[   13.570135]  kasan_save_stack+0x45/0x70
[   13.570286]  kasan_save_track+0x18/0x40
[   13.570461]  kasan_save_alloc_info+0x3b/0x50
[   13.570679]  __kasan_kmalloc+0xb7/0xc0
[   13.570879]  __kmalloc_cache_noprof+0x189/0x420
[   13.571242]  kasan_atomics+0x95/0x310
[   13.571392]  kunit_try_run_case+0x1a5/0x480
[   13.571608]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.571916]  kthread+0x337/0x6f0
[   13.572264]  ret_from_fork+0x116/0x1d0
[   13.572434]  ret_from_fork_asm+0x1a/0x30
[   13.572637] 
[   13.572739] The buggy address belongs to the object at ffff8881039bd780
[   13.572739]  which belongs to the cache kmalloc-64 of size 64
[   13.573219] The buggy address is located 0 bytes to the right of
[   13.573219]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.573849] 
[   13.573953] The buggy address belongs to the physical page:
[   13.574250] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.574577] flags: 0x200000000000000(node=0|zone=2)
[   13.574816] page_type: f5(slab)
[   13.574974] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.575210] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.575484] page dumped because: kasan: bad access detected
[   13.575872] 
[   13.575968] Memory state around the buggy address:
[   13.576195]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.576592]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.576810] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.577519]                                      ^
[   13.577771]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.578204]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.578505] ==================================================================
[   14.386425] ==================================================================
[   14.386955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.387400] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.387687] 
[   14.387815] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.387945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.388023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.388061] Call Trace:
[   14.388076]  <TASK>
[   14.388093]  dump_stack_lvl+0x73/0xb0
[   14.388123]  print_report+0xd1/0x650
[   14.388148]  ? __virt_addr_valid+0x1db/0x2d0
[   14.388171]  ? kasan_atomics_helper+0x164f/0x5450
[   14.388193]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.388216]  ? kasan_atomics_helper+0x164f/0x5450
[   14.388239]  kasan_report+0x141/0x180
[   14.388262]  ? kasan_atomics_helper+0x164f/0x5450
[   14.388290]  kasan_check_range+0x10c/0x1c0
[   14.388314]  __kasan_check_write+0x18/0x20
[   14.388334]  kasan_atomics_helper+0x164f/0x5450
[   14.388358]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.388391]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.388412]  ? ret_from_fork_asm+0x1a/0x30
[   14.388434]  ? kasan_atomics+0x152/0x310
[   14.388457]  kasan_atomics+0x1dc/0x310
[   14.388476]  ? __pfx_kasan_atomics+0x10/0x10
[   14.388498]  ? __pfx_read_tsc+0x10/0x10
[   14.388519]  ? ktime_get_ts64+0x86/0x230
[   14.388543]  kunit_try_run_case+0x1a5/0x480
[   14.388565]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.388585]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.388610]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.388635]  ? __kthread_parkme+0x82/0x180
[   14.388655]  ? preempt_count_sub+0x50/0x80
[   14.388680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.388701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.388883]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.388909]  kthread+0x337/0x6f0
[   14.388929]  ? trace_preempt_on+0x20/0xc0
[   14.388954]  ? __pfx_kthread+0x10/0x10
[   14.388975]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.388999]  ? calculate_sigpending+0x7b/0xa0
[   14.389033]  ? __pfx_kthread+0x10/0x10
[   14.389057]  ret_from_fork+0x116/0x1d0
[   14.389076]  ? __pfx_kthread+0x10/0x10
[   14.389098]  ret_from_fork_asm+0x1a/0x30
[   14.389128]  </TASK>
[   14.389139] 
[   14.399836] Allocated by task 283:
[   14.400113]  kasan_save_stack+0x45/0x70
[   14.400300]  kasan_save_track+0x18/0x40
[   14.400525]  kasan_save_alloc_info+0x3b/0x50
[   14.401064]  __kasan_kmalloc+0xb7/0xc0
[   14.401370]  __kmalloc_cache_noprof+0x189/0x420
[   14.401603]  kasan_atomics+0x95/0x310
[   14.401894]  kunit_try_run_case+0x1a5/0x480
[   14.402161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.402623]  kthread+0x337/0x6f0
[   14.402808]  ret_from_fork+0x116/0x1d0
[   14.403155]  ret_from_fork_asm+0x1a/0x30
[   14.403331] 
[   14.403444] The buggy address belongs to the object at ffff8881039bd780
[   14.403444]  which belongs to the cache kmalloc-64 of size 64
[   14.403944] The buggy address is located 0 bytes to the right of
[   14.403944]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.404886] 
[   14.405008] The buggy address belongs to the physical page:
[   14.405474] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.405984] flags: 0x200000000000000(node=0|zone=2)
[   14.406352] page_type: f5(slab)
[   14.406520] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.407056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.407543] page dumped because: kasan: bad access detected
[   14.407736] 
[   14.407842] Memory state around the buggy address:
[   14.408050]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.408640]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.408947] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.409433]                                      ^
[   14.409703]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.409952]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.410546] ==================================================================
[   14.456309] ==================================================================
[   14.456602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   14.456963] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.457338] 
[   14.457437] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.457482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.457495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.457516] Call Trace:
[   14.457532]  <TASK>
[   14.457547]  dump_stack_lvl+0x73/0xb0
[   14.457573]  print_report+0xd1/0x650
[   14.457597]  ? __virt_addr_valid+0x1db/0x2d0
[   14.457620]  ? kasan_atomics_helper+0x1818/0x5450
[   14.457643]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.457667]  ? kasan_atomics_helper+0x1818/0x5450
[   14.457689]  kasan_report+0x141/0x180
[   14.457713]  ? kasan_atomics_helper+0x1818/0x5450
[   14.457740]  kasan_check_range+0x10c/0x1c0
[   14.457766]  __kasan_check_write+0x18/0x20
[   14.457786]  kasan_atomics_helper+0x1818/0x5450
[   14.457810]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.457833]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.457855]  ? ret_from_fork_asm+0x1a/0x30
[   14.457877]  ? kasan_atomics+0x152/0x310
[   14.457901]  kasan_atomics+0x1dc/0x310
[   14.457920]  ? __pfx_kasan_atomics+0x10/0x10
[   14.457942]  ? __pfx_read_tsc+0x10/0x10
[   14.457963]  ? ktime_get_ts64+0x86/0x230
[   14.457988]  kunit_try_run_case+0x1a5/0x480
[   14.458023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.458048]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.458073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.458098]  ? __kthread_parkme+0x82/0x180
[   14.458119]  ? preempt_count_sub+0x50/0x80
[   14.458143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.458165]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.458224]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.458250]  kthread+0x337/0x6f0
[   14.458270]  ? trace_preempt_on+0x20/0xc0
[   14.458295]  ? __pfx_kthread+0x10/0x10
[   14.458316]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.458339]  ? calculate_sigpending+0x7b/0xa0
[   14.458363]  ? __pfx_kthread+0x10/0x10
[   14.458395]  ret_from_fork+0x116/0x1d0
[   14.458415]  ? __pfx_kthread+0x10/0x10
[   14.458435]  ret_from_fork_asm+0x1a/0x30
[   14.458499]  </TASK>
[   14.458510] 
[   14.467290] Allocated by task 283:
[   14.467488]  kasan_save_stack+0x45/0x70
[   14.467679]  kasan_save_track+0x18/0x40
[   14.467821]  kasan_save_alloc_info+0x3b/0x50
[   14.467970]  __kasan_kmalloc+0xb7/0xc0
[   14.468105]  __kmalloc_cache_noprof+0x189/0x420
[   14.468259]  kasan_atomics+0x95/0x310
[   14.468486]  kunit_try_run_case+0x1a5/0x480
[   14.468833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.469090]  kthread+0x337/0x6f0
[   14.469260]  ret_from_fork+0x116/0x1d0
[   14.469458]  ret_from_fork_asm+0x1a/0x30
[   14.469656] 
[   14.469791] The buggy address belongs to the object at ffff8881039bd780
[   14.469791]  which belongs to the cache kmalloc-64 of size 64
[   14.470506] The buggy address is located 0 bytes to the right of
[   14.470506]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.471163] 
[   14.471280] The buggy address belongs to the physical page:
[   14.471543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.471964] flags: 0x200000000000000(node=0|zone=2)
[   14.472132] page_type: f5(slab)
[   14.472255] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.473281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.473639] page dumped because: kasan: bad access detected
[   14.474529] 
[   14.474650] Memory state around the buggy address:
[   14.475335]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.475696]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.475999] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.476268]                                      ^
[   14.476488]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.477057]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.477698] ==================================================================
[   14.478601] ==================================================================
[   14.479140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   14.479574] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.480409] 
[   14.480762] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.480815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.480837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.480860] Call Trace:
[   14.480876]  <TASK>
[   14.480893]  dump_stack_lvl+0x73/0xb0
[   14.480922]  print_report+0xd1/0x650
[   14.480946]  ? __virt_addr_valid+0x1db/0x2d0
[   14.480969]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.480992]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.481015]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.481038]  kasan_report+0x141/0x180
[   14.481062]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.481089]  kasan_check_range+0x10c/0x1c0
[   14.481114]  __kasan_check_write+0x18/0x20
[   14.481135]  kasan_atomics_helper+0x18b1/0x5450
[   14.481160]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.481183]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.481204]  ? ret_from_fork_asm+0x1a/0x30
[   14.481226]  ? kasan_atomics+0x152/0x310
[   14.481249]  kasan_atomics+0x1dc/0x310
[   14.481269]  ? __pfx_kasan_atomics+0x10/0x10
[   14.481290]  ? __pfx_read_tsc+0x10/0x10
[   14.481311]  ? ktime_get_ts64+0x86/0x230
[   14.481336]  kunit_try_run_case+0x1a5/0x480
[   14.481357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.481389]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.481415]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.481440]  ? __kthread_parkme+0x82/0x180
[   14.481461]  ? preempt_count_sub+0x50/0x80
[   14.481485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.481506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.481532]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.481559]  kthread+0x337/0x6f0
[   14.481581]  ? trace_preempt_on+0x20/0xc0
[   14.481605]  ? __pfx_kthread+0x10/0x10
[   14.481628]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.481652]  ? calculate_sigpending+0x7b/0xa0
[   14.481677]  ? __pfx_kthread+0x10/0x10
[   14.481698]  ret_from_fork+0x116/0x1d0
[   14.481728]  ? __pfx_kthread+0x10/0x10
[   14.481750]  ret_from_fork_asm+0x1a/0x30
[   14.481780]  </TASK>
[   14.481792] 
[   14.490279] Allocated by task 283:
[   14.490486]  kasan_save_stack+0x45/0x70
[   14.490744]  kasan_save_track+0x18/0x40
[   14.490916]  kasan_save_alloc_info+0x3b/0x50
[   14.491131]  __kasan_kmalloc+0xb7/0xc0
[   14.491317]  __kmalloc_cache_noprof+0x189/0x420
[   14.491517]  kasan_atomics+0x95/0x310
[   14.491848]  kunit_try_run_case+0x1a5/0x480
[   14.492016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.492211]  kthread+0x337/0x6f0
[   14.492425]  ret_from_fork+0x116/0x1d0
[   14.492673]  ret_from_fork_asm+0x1a/0x30
[   14.492967] 
[   14.493058] The buggy address belongs to the object at ffff8881039bd780
[   14.493058]  which belongs to the cache kmalloc-64 of size 64
[   14.493540] The buggy address is located 0 bytes to the right of
[   14.493540]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.494305] 
[   14.494433] The buggy address belongs to the physical page:
[   14.494695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.494977] flags: 0x200000000000000(node=0|zone=2)
[   14.495254] page_type: f5(slab)
[   14.495430] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.495663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.496312] page dumped because: kasan: bad access detected
[   14.496518] 
[   14.496587] Memory state around the buggy address:
[   14.496911]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.497248]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.497597] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.497930]                                      ^
[   14.498176]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.498509]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.498821] ==================================================================
[   13.736264] ==================================================================
[   13.736625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   13.736950] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.737303] 
[   13.737427] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.737472] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.737485] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.737507] Call Trace:
[   13.737520]  <TASK>
[   13.737534]  dump_stack_lvl+0x73/0xb0
[   13.737560]  print_report+0xd1/0x650
[   13.737584]  ? __virt_addr_valid+0x1db/0x2d0
[   13.737607]  ? kasan_atomics_helper+0x992/0x5450
[   13.737629]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.737653]  ? kasan_atomics_helper+0x992/0x5450
[   13.737676]  kasan_report+0x141/0x180
[   13.737720]  ? kasan_atomics_helper+0x992/0x5450
[   13.737750]  kasan_check_range+0x10c/0x1c0
[   13.737775]  __kasan_check_write+0x18/0x20
[   13.737796]  kasan_atomics_helper+0x992/0x5450
[   13.737819]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.737843]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.737864]  ? ret_from_fork_asm+0x1a/0x30
[   13.737886]  ? kasan_atomics+0x152/0x310
[   13.737911]  kasan_atomics+0x1dc/0x310
[   13.737931]  ? __pfx_kasan_atomics+0x10/0x10
[   13.737952]  ? __pfx_read_tsc+0x10/0x10
[   13.737974]  ? ktime_get_ts64+0x86/0x230
[   13.738069]  kunit_try_run_case+0x1a5/0x480
[   13.738094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.738115]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.738141]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.738167]  ? __kthread_parkme+0x82/0x180
[   13.738188]  ? preempt_count_sub+0x50/0x80
[   13.738212]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.738234]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.738259]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.738284]  kthread+0x337/0x6f0
[   13.738304]  ? trace_preempt_on+0x20/0xc0
[   13.738328]  ? __pfx_kthread+0x10/0x10
[   13.738349]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.738383]  ? calculate_sigpending+0x7b/0xa0
[   13.738407]  ? __pfx_kthread+0x10/0x10
[   13.738428]  ret_from_fork+0x116/0x1d0
[   13.738448]  ? __pfx_kthread+0x10/0x10
[   13.738469]  ret_from_fork_asm+0x1a/0x30
[   13.738499]  </TASK>
[   13.738511] 
[   13.747288] Allocated by task 283:
[   13.747456]  kasan_save_stack+0x45/0x70
[   13.747661]  kasan_save_track+0x18/0x40
[   13.747861]  kasan_save_alloc_info+0x3b/0x50
[   13.748238]  __kasan_kmalloc+0xb7/0xc0
[   13.748451]  __kmalloc_cache_noprof+0x189/0x420
[   13.748657]  kasan_atomics+0x95/0x310
[   13.748795]  kunit_try_run_case+0x1a5/0x480
[   13.749110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.749351]  kthread+0x337/0x6f0
[   13.749529]  ret_from_fork+0x116/0x1d0
[   13.749709]  ret_from_fork_asm+0x1a/0x30
[   13.749935] 
[   13.750101] The buggy address belongs to the object at ffff8881039bd780
[   13.750101]  which belongs to the cache kmalloc-64 of size 64
[   13.750596] The buggy address is located 0 bytes to the right of
[   13.750596]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.751157] 
[   13.751260] The buggy address belongs to the physical page:
[   13.751493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.751803] flags: 0x200000000000000(node=0|zone=2)
[   13.752251] page_type: f5(slab)
[   13.752420] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.752665] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.752921] page dumped because: kasan: bad access detected
[   13.753230] 
[   13.753328] Memory state around the buggy address:
[   13.753573]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.753913]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.754309] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.754601]                                      ^
[   13.754801]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.755030]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.755334] ==================================================================
[   13.853701] ==================================================================
[   13.854132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   13.854475] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.854819] 
[   13.854917] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.854961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.854974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.855185] Call Trace:
[   13.855208]  <TASK>
[   13.855225]  dump_stack_lvl+0x73/0xb0
[   13.855255]  print_report+0xd1/0x650
[   13.855279]  ? __virt_addr_valid+0x1db/0x2d0
[   13.855303]  ? kasan_atomics_helper+0xd47/0x5450
[   13.855325]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.855349]  ? kasan_atomics_helper+0xd47/0x5450
[   13.855371]  kasan_report+0x141/0x180
[   13.855408]  ? kasan_atomics_helper+0xd47/0x5450
[   13.855436]  kasan_check_range+0x10c/0x1c0
[   13.855460]  __kasan_check_write+0x18/0x20
[   13.855481]  kasan_atomics_helper+0xd47/0x5450
[   13.855504]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.855527]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.855548]  ? ret_from_fork_asm+0x1a/0x30
[   13.855570]  ? kasan_atomics+0x152/0x310
[   13.855593]  kasan_atomics+0x1dc/0x310
[   13.855613]  ? __pfx_kasan_atomics+0x10/0x10
[   13.855635]  ? __pfx_read_tsc+0x10/0x10
[   13.855656]  ? ktime_get_ts64+0x86/0x230
[   13.855682]  kunit_try_run_case+0x1a5/0x480
[   13.855704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.855724]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.855750]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.855776]  ? __kthread_parkme+0x82/0x180
[   13.855797]  ? preempt_count_sub+0x50/0x80
[   13.855821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.855843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.855889]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.855914]  kthread+0x337/0x6f0
[   13.855934]  ? trace_preempt_on+0x20/0xc0
[   13.855960]  ? __pfx_kthread+0x10/0x10
[   13.855982]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.856070]  ? calculate_sigpending+0x7b/0xa0
[   13.856095]  ? __pfx_kthread+0x10/0x10
[   13.856118]  ret_from_fork+0x116/0x1d0
[   13.856137]  ? __pfx_kthread+0x10/0x10
[   13.856159]  ret_from_fork_asm+0x1a/0x30
[   13.856191]  </TASK>
[   13.856202] 
[   13.864528] Allocated by task 283:
[   13.864689]  kasan_save_stack+0x45/0x70
[   13.864894]  kasan_save_track+0x18/0x40
[   13.865134]  kasan_save_alloc_info+0x3b/0x50
[   13.865329]  __kasan_kmalloc+0xb7/0xc0
[   13.865509]  __kmalloc_cache_noprof+0x189/0x420
[   13.865717]  kasan_atomics+0x95/0x310
[   13.865847]  kunit_try_run_case+0x1a5/0x480
[   13.865990]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.866228]  kthread+0x337/0x6f0
[   13.866429]  ret_from_fork+0x116/0x1d0
[   13.866620]  ret_from_fork_asm+0x1a/0x30
[   13.866822] 
[   13.866917] The buggy address belongs to the object at ffff8881039bd780
[   13.866917]  which belongs to the cache kmalloc-64 of size 64
[   13.867603] The buggy address is located 0 bytes to the right of
[   13.867603]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.868218] 
[   13.868324] The buggy address belongs to the physical page:
[   13.868559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.868924] flags: 0x200000000000000(node=0|zone=2)
[   13.869240] page_type: f5(slab)
[   13.869404] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.869708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.869952] page dumped because: kasan: bad access detected
[   13.870132] 
[   13.870202] Memory state around the buggy address:
[   13.870364]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.870690]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.871005] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.871317]                                      ^
[   13.871775]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.872139]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.872363] ==================================================================
[   14.695138] ==================================================================
[   14.695857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   14.696102] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.696329] 
[   14.696680] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.696951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.696968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.696990] Call Trace:
[   14.697009]  <TASK>
[   14.697027]  dump_stack_lvl+0x73/0xb0
[   14.697091]  print_report+0xd1/0x650
[   14.697119]  ? __virt_addr_valid+0x1db/0x2d0
[   14.697141]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.697164]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.697188]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.697211]  kasan_report+0x141/0x180
[   14.697234]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.697262]  kasan_check_range+0x10c/0x1c0
[   14.697287]  __kasan_check_write+0x18/0x20
[   14.697309]  kasan_atomics_helper+0x1eaa/0x5450
[   14.697333]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.697357]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.697388]  ? ret_from_fork_asm+0x1a/0x30
[   14.697411]  ? kasan_atomics+0x152/0x310
[   14.697435]  kasan_atomics+0x1dc/0x310
[   14.697455]  ? __pfx_kasan_atomics+0x10/0x10
[   14.697477]  ? __pfx_read_tsc+0x10/0x10
[   14.697498]  ? ktime_get_ts64+0x86/0x230
[   14.697524]  kunit_try_run_case+0x1a5/0x480
[   14.697546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.697567]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.697593]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.697619]  ? __kthread_parkme+0x82/0x180
[   14.697642]  ? preempt_count_sub+0x50/0x80
[   14.697666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.697688]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.697736]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.697761]  kthread+0x337/0x6f0
[   14.697781]  ? trace_preempt_on+0x20/0xc0
[   14.697806]  ? __pfx_kthread+0x10/0x10
[   14.697828]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.697852]  ? calculate_sigpending+0x7b/0xa0
[   14.697877]  ? __pfx_kthread+0x10/0x10
[   14.697899]  ret_from_fork+0x116/0x1d0
[   14.697918]  ? __pfx_kthread+0x10/0x10
[   14.697939]  ret_from_fork_asm+0x1a/0x30
[   14.697970]  </TASK>
[   14.697981] 
[   14.710942] Allocated by task 283:
[   14.711264]  kasan_save_stack+0x45/0x70
[   14.711635]  kasan_save_track+0x18/0x40
[   14.712009]  kasan_save_alloc_info+0x3b/0x50
[   14.712402]  __kasan_kmalloc+0xb7/0xc0
[   14.712563]  __kmalloc_cache_noprof+0x189/0x420
[   14.712767]  kasan_atomics+0x95/0x310
[   14.713101]  kunit_try_run_case+0x1a5/0x480
[   14.713476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.713955]  kthread+0x337/0x6f0
[   14.714154]  ret_from_fork+0x116/0x1d0
[   14.714290]  ret_from_fork_asm+0x1a/0x30
[   14.714444] 
[   14.714516] The buggy address belongs to the object at ffff8881039bd780
[   14.714516]  which belongs to the cache kmalloc-64 of size 64
[   14.715240] The buggy address is located 0 bytes to the right of
[   14.715240]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.716328] 
[   14.716495] The buggy address belongs to the physical page:
[   14.716981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.717660] flags: 0x200000000000000(node=0|zone=2)
[   14.718070] page_type: f5(slab)
[   14.718199] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.718449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.718676] page dumped because: kasan: bad access detected
[   14.719175] 
[   14.719333] Memory state around the buggy address:
[   14.719783]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.720396]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.721020] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.721635]                                      ^
[   14.722087]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.722501]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.722750] ==================================================================
[   14.302121] ==================================================================
[   14.303031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.303939] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.304856] 
[   14.305142] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.305203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.305218] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.305241] Call Trace:
[   14.305259]  <TASK>
[   14.305351]  dump_stack_lvl+0x73/0xb0
[   14.305396]  print_report+0xd1/0x650
[   14.305421]  ? __virt_addr_valid+0x1db/0x2d0
[   14.305444]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.305466]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.305489]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.305512]  kasan_report+0x141/0x180
[   14.305535]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.305562]  __asan_report_store8_noabort+0x1b/0x30
[   14.305584]  kasan_atomics_helper+0x50d4/0x5450
[   14.305607]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.305631]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.305652]  ? ret_from_fork_asm+0x1a/0x30
[   14.305673]  ? kasan_atomics+0x152/0x310
[   14.305696]  kasan_atomics+0x1dc/0x310
[   14.305728]  ? __pfx_kasan_atomics+0x10/0x10
[   14.305750]  ? __pfx_read_tsc+0x10/0x10
[   14.305771]  ? ktime_get_ts64+0x86/0x230
[   14.305796]  kunit_try_run_case+0x1a5/0x480
[   14.305818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.305840]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.305866]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.305891]  ? __kthread_parkme+0x82/0x180
[   14.305911]  ? preempt_count_sub+0x50/0x80
[   14.305936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.305958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.305983]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.306018]  kthread+0x337/0x6f0
[   14.306046]  ? trace_preempt_on+0x20/0xc0
[   14.306070]  ? __pfx_kthread+0x10/0x10
[   14.306091]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.306115]  ? calculate_sigpending+0x7b/0xa0
[   14.306140]  ? __pfx_kthread+0x10/0x10
[   14.306162]  ret_from_fork+0x116/0x1d0
[   14.306181]  ? __pfx_kthread+0x10/0x10
[   14.306202]  ret_from_fork_asm+0x1a/0x30
[   14.306232]  </TASK>
[   14.306244] 
[   14.320933] Allocated by task 283:
[   14.321586]  kasan_save_stack+0x45/0x70
[   14.321785]  kasan_save_track+0x18/0x40
[   14.321977]  kasan_save_alloc_info+0x3b/0x50
[   14.322395]  __kasan_kmalloc+0xb7/0xc0
[   14.322672]  __kmalloc_cache_noprof+0x189/0x420
[   14.322870]  kasan_atomics+0x95/0x310
[   14.323213]  kunit_try_run_case+0x1a5/0x480
[   14.323410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.323668]  kthread+0x337/0x6f0
[   14.323962]  ret_from_fork+0x116/0x1d0
[   14.324351]  ret_from_fork_asm+0x1a/0x30
[   14.324643] 
[   14.324771] The buggy address belongs to the object at ffff8881039bd780
[   14.324771]  which belongs to the cache kmalloc-64 of size 64
[   14.325585] The buggy address is located 0 bytes to the right of
[   14.325585]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.326325] 
[   14.326441] The buggy address belongs to the physical page:
[   14.326811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.327344] flags: 0x200000000000000(node=0|zone=2)
[   14.327554] page_type: f5(slab)
[   14.327735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.328399] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.328944] page dumped because: kasan: bad access detected
[   14.329147] 
[   14.329413] Memory state around the buggy address:
[   14.329606]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.330175]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.330555] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.330999]                                      ^
[   14.331307]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.331697]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.332209] ==================================================================
[   14.812336] ==================================================================
[   14.812718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   14.813117] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.813494] 
[   14.813621] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.813667] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.813681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.813703] Call Trace:
[   14.813719]  <TASK>
[   14.813735]  dump_stack_lvl+0x73/0xb0
[   14.813795]  print_report+0xd1/0x650
[   14.813819]  ? __virt_addr_valid+0x1db/0x2d0
[   14.813853]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.813876]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.813899]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.813922]  kasan_report+0x141/0x180
[   14.813945]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.813986]  kasan_check_range+0x10c/0x1c0
[   14.814010]  __kasan_check_write+0x18/0x20
[   14.814034]  kasan_atomics_helper+0x20c8/0x5450
[   14.814089]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.814113]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.814145]  ? ret_from_fork_asm+0x1a/0x30
[   14.814167]  ? kasan_atomics+0x152/0x310
[   14.814190]  kasan_atomics+0x1dc/0x310
[   14.814210]  ? __pfx_kasan_atomics+0x10/0x10
[   14.814231]  ? __pfx_read_tsc+0x10/0x10
[   14.814253]  ? ktime_get_ts64+0x86/0x230
[   14.814278]  kunit_try_run_case+0x1a5/0x480
[   14.814299]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.814319]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.814344]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.814410]  ? __kthread_parkme+0x82/0x180
[   14.814432]  ? preempt_count_sub+0x50/0x80
[   14.814467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.814489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.814513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.814539]  kthread+0x337/0x6f0
[   14.814558]  ? trace_preempt_on+0x20/0xc0
[   14.814582]  ? __pfx_kthread+0x10/0x10
[   14.814603]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.814627]  ? calculate_sigpending+0x7b/0xa0
[   14.814650]  ? __pfx_kthread+0x10/0x10
[   14.814673]  ret_from_fork+0x116/0x1d0
[   14.814692]  ? __pfx_kthread+0x10/0x10
[   14.814713]  ret_from_fork_asm+0x1a/0x30
[   14.814743]  </TASK>
[   14.814755] 
[   14.822984] Allocated by task 283:
[   14.823209]  kasan_save_stack+0x45/0x70
[   14.823356]  kasan_save_track+0x18/0x40
[   14.823538]  kasan_save_alloc_info+0x3b/0x50
[   14.823793]  __kasan_kmalloc+0xb7/0xc0
[   14.824088]  __kmalloc_cache_noprof+0x189/0x420
[   14.824401]  kasan_atomics+0x95/0x310
[   14.824593]  kunit_try_run_case+0x1a5/0x480
[   14.824846]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.825100]  kthread+0x337/0x6f0
[   14.825229]  ret_from_fork+0x116/0x1d0
[   14.825403]  ret_from_fork_asm+0x1a/0x30
[   14.825654] 
[   14.825752] The buggy address belongs to the object at ffff8881039bd780
[   14.825752]  which belongs to the cache kmalloc-64 of size 64
[   14.826392] The buggy address is located 0 bytes to the right of
[   14.826392]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.827142] 
[   14.827217] The buggy address belongs to the physical page:
[   14.827399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.827719] flags: 0x200000000000000(node=0|zone=2)
[   14.827990] page_type: f5(slab)
[   14.828174] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.828534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.829008] page dumped because: kasan: bad access detected
[   14.829256] 
[   14.829329] Memory state around the buggy address:
[   14.829496]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.829911]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.830283] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.830615]                                      ^
[   14.830899]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.831217]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.831524] ==================================================================
[   13.994548] ==================================================================
[   13.995162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   13.995956] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.996686] 
[   13.996973] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.997024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.997038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.997059] Call Trace:
[   13.997073]  <TASK>
[   13.997088]  dump_stack_lvl+0x73/0xb0
[   13.997115]  print_report+0xd1/0x650
[   13.997140]  ? __virt_addr_valid+0x1db/0x2d0
[   13.997163]  ? kasan_atomics_helper+0x1079/0x5450
[   13.997185]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.997209]  ? kasan_atomics_helper+0x1079/0x5450
[   13.997245]  kasan_report+0x141/0x180
[   13.997270]  ? kasan_atomics_helper+0x1079/0x5450
[   13.997298]  kasan_check_range+0x10c/0x1c0
[   13.997323]  __kasan_check_write+0x18/0x20
[   13.997343]  kasan_atomics_helper+0x1079/0x5450
[   13.997367]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.997402]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.997423]  ? ret_from_fork_asm+0x1a/0x30
[   13.997445]  ? kasan_atomics+0x152/0x310
[   13.997468]  kasan_atomics+0x1dc/0x310
[   13.997488]  ? __pfx_kasan_atomics+0x10/0x10
[   13.997510]  ? __pfx_read_tsc+0x10/0x10
[   13.997531]  ? ktime_get_ts64+0x86/0x230
[   13.997556]  kunit_try_run_case+0x1a5/0x480
[   13.997578]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.997599]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.997624]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.997649]  ? __kthread_parkme+0x82/0x180
[   13.997670]  ? preempt_count_sub+0x50/0x80
[   13.997694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.997715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.997789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.997813]  kthread+0x337/0x6f0
[   13.997834]  ? trace_preempt_on+0x20/0xc0
[   13.997858]  ? __pfx_kthread+0x10/0x10
[   13.997879]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.997903]  ? calculate_sigpending+0x7b/0xa0
[   13.997927]  ? __pfx_kthread+0x10/0x10
[   13.997948]  ret_from_fork+0x116/0x1d0
[   13.997968]  ? __pfx_kthread+0x10/0x10
[   13.997988]  ret_from_fork_asm+0x1a/0x30
[   13.998186]  </TASK>
[   13.998200] 
[   14.009482] Allocated by task 283:
[   14.009665]  kasan_save_stack+0x45/0x70
[   14.009845]  kasan_save_track+0x18/0x40
[   14.009987]  kasan_save_alloc_info+0x3b/0x50
[   14.010388]  __kasan_kmalloc+0xb7/0xc0
[   14.010768]  __kmalloc_cache_noprof+0x189/0x420
[   14.011277]  kasan_atomics+0x95/0x310
[   14.011638]  kunit_try_run_case+0x1a5/0x480
[   14.012137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.012653]  kthread+0x337/0x6f0
[   14.012997]  ret_from_fork+0x116/0x1d0
[   14.013426]  ret_from_fork_asm+0x1a/0x30
[   14.013673] 
[   14.013805] The buggy address belongs to the object at ffff8881039bd780
[   14.013805]  which belongs to the cache kmalloc-64 of size 64
[   14.015047] The buggy address is located 0 bytes to the right of
[   14.015047]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.015684] 
[   14.015785] The buggy address belongs to the physical page:
[   14.015964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.016592] flags: 0x200000000000000(node=0|zone=2)
[   14.017201] page_type: f5(slab)
[   14.017538] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.018413] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.019063] page dumped because: kasan: bad access detected
[   14.019632] 
[   14.019803] Memory state around the buggy address:
[   14.020140]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.020758]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.021320] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.021557]                                      ^
[   14.021727]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.022642]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.023410] ==================================================================
[   13.755884] ==================================================================
[   13.756436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   13.756694] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.757118] 
[   13.757209] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.757255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.757269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.757291] Call Trace:
[   13.757305]  <TASK>
[   13.757321]  dump_stack_lvl+0x73/0xb0
[   13.757348]  print_report+0xd1/0x650
[   13.757373]  ? __virt_addr_valid+0x1db/0x2d0
[   13.757409]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.757431]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.757454]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.757477]  kasan_report+0x141/0x180
[   13.757500]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.757528]  kasan_check_range+0x10c/0x1c0
[   13.757553]  __kasan_check_write+0x18/0x20
[   13.757574]  kasan_atomics_helper+0xa2b/0x5450
[   13.757597]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.757621]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.757644]  ? ret_from_fork_asm+0x1a/0x30
[   13.757667]  ? kasan_atomics+0x152/0x310
[   13.757691]  kasan_atomics+0x1dc/0x310
[   13.757712]  ? __pfx_kasan_atomics+0x10/0x10
[   13.757733]  ? __pfx_read_tsc+0x10/0x10
[   13.757776]  ? ktime_get_ts64+0x86/0x230
[   13.757802]  kunit_try_run_case+0x1a5/0x480
[   13.757824]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.757844]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.757870]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.757896]  ? __kthread_parkme+0x82/0x180
[   13.757916]  ? preempt_count_sub+0x50/0x80
[   13.757941]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.757963]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.758065]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.758096]  kthread+0x337/0x6f0
[   13.758117]  ? trace_preempt_on+0x20/0xc0
[   13.758141]  ? __pfx_kthread+0x10/0x10
[   13.758163]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.758188]  ? calculate_sigpending+0x7b/0xa0
[   13.758213]  ? __pfx_kthread+0x10/0x10
[   13.758235]  ret_from_fork+0x116/0x1d0
[   13.758254]  ? __pfx_kthread+0x10/0x10
[   13.758276]  ret_from_fork_asm+0x1a/0x30
[   13.758308]  </TASK>
[   13.758319] 
[   13.766608] Allocated by task 283:
[   13.766821]  kasan_save_stack+0x45/0x70
[   13.767100]  kasan_save_track+0x18/0x40
[   13.767278]  kasan_save_alloc_info+0x3b/0x50
[   13.767481]  __kasan_kmalloc+0xb7/0xc0
[   13.767672]  __kmalloc_cache_noprof+0x189/0x420
[   13.767894]  kasan_atomics+0x95/0x310
[   13.768148]  kunit_try_run_case+0x1a5/0x480
[   13.768354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.768607]  kthread+0x337/0x6f0
[   13.768758]  ret_from_fork+0x116/0x1d0
[   13.768927]  ret_from_fork_asm+0x1a/0x30
[   13.769331] 
[   13.769433] The buggy address belongs to the object at ffff8881039bd780
[   13.769433]  which belongs to the cache kmalloc-64 of size 64
[   13.770075] The buggy address is located 0 bytes to the right of
[   13.770075]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.770542] 
[   13.770623] The buggy address belongs to the physical page:
[   13.770829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.771423] flags: 0x200000000000000(node=0|zone=2)
[   13.771668] page_type: f5(slab)
[   13.771836] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.772200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.772553] page dumped because: kasan: bad access detected
[   13.772844] 
[   13.772944] Memory state around the buggy address:
[   13.773334]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.773640]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.773947] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.774340]                                      ^
[   13.774575]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.774887]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.775253] ==================================================================
[   14.435662] ==================================================================
[   14.436458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   14.436894] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.437407] 
[   14.437523] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.437650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.437666] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.437689] Call Trace:
[   14.437707]  <TASK>
[   14.437725]  dump_stack_lvl+0x73/0xb0
[   14.437755]  print_report+0xd1/0x650
[   14.437780]  ? __virt_addr_valid+0x1db/0x2d0
[   14.437802]  ? kasan_atomics_helper+0x177f/0x5450
[   14.437825]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.437848]  ? kasan_atomics_helper+0x177f/0x5450
[   14.437872]  kasan_report+0x141/0x180
[   14.437896]  ? kasan_atomics_helper+0x177f/0x5450
[   14.437923]  kasan_check_range+0x10c/0x1c0
[   14.437948]  __kasan_check_write+0x18/0x20
[   14.437969]  kasan_atomics_helper+0x177f/0x5450
[   14.437993]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.438016]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.438050]  ? ret_from_fork_asm+0x1a/0x30
[   14.438073]  ? kasan_atomics+0x152/0x310
[   14.438097]  kasan_atomics+0x1dc/0x310
[   14.438117]  ? __pfx_kasan_atomics+0x10/0x10
[   14.438139]  ? __pfx_read_tsc+0x10/0x10
[   14.438160]  ? ktime_get_ts64+0x86/0x230
[   14.438186]  kunit_try_run_case+0x1a5/0x480
[   14.438208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.438228]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.438254]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.438281]  ? __kthread_parkme+0x82/0x180
[   14.438303]  ? preempt_count_sub+0x50/0x80
[   14.438329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.438352]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.438390]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.438415]  kthread+0x337/0x6f0
[   14.438434]  ? trace_preempt_on+0x20/0xc0
[   14.438458]  ? __pfx_kthread+0x10/0x10
[   14.438480]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.438505]  ? calculate_sigpending+0x7b/0xa0
[   14.438529]  ? __pfx_kthread+0x10/0x10
[   14.438551]  ret_from_fork+0x116/0x1d0
[   14.438570]  ? __pfx_kthread+0x10/0x10
[   14.438592]  ret_from_fork_asm+0x1a/0x30
[   14.438623]  </TASK>
[   14.438635] 
[   14.447233] Allocated by task 283:
[   14.447442]  kasan_save_stack+0x45/0x70
[   14.447592]  kasan_save_track+0x18/0x40
[   14.447739]  kasan_save_alloc_info+0x3b/0x50
[   14.448108]  __kasan_kmalloc+0xb7/0xc0
[   14.448299]  __kmalloc_cache_noprof+0x189/0x420
[   14.448478]  kasan_atomics+0x95/0x310
[   14.448611]  kunit_try_run_case+0x1a5/0x480
[   14.448801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.449123]  kthread+0x337/0x6f0
[   14.449297]  ret_from_fork+0x116/0x1d0
[   14.449500]  ret_from_fork_asm+0x1a/0x30
[   14.449747] 
[   14.449876] The buggy address belongs to the object at ffff8881039bd780
[   14.449876]  which belongs to the cache kmalloc-64 of size 64
[   14.450353] The buggy address is located 0 bytes to the right of
[   14.450353]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.451011] 
[   14.451127] The buggy address belongs to the physical page:
[   14.451410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.451798] flags: 0x200000000000000(node=0|zone=2)
[   14.452035] page_type: f5(slab)
[   14.452226] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.452568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.452973] page dumped because: kasan: bad access detected
[   14.453248] 
[   14.453344] Memory state around the buggy address:
[   14.453585]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.453977]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.454312] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.454637]                                      ^
[   14.454889]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.455211]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.455564] ==================================================================
[   13.834332] ==================================================================
[   13.834605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   13.834950] Read of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.835452] 
[   13.835572] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.835619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.835631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.835654] Call Trace:
[   13.835667]  <TASK>
[   13.835682]  dump_stack_lvl+0x73/0xb0
[   13.835710]  print_report+0xd1/0x650
[   13.835734]  ? __virt_addr_valid+0x1db/0x2d0
[   13.835756]  ? kasan_atomics_helper+0x4a84/0x5450
[   13.835779]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.835803]  ? kasan_atomics_helper+0x4a84/0x5450
[   13.835825]  kasan_report+0x141/0x180
[   13.835870]  ? kasan_atomics_helper+0x4a84/0x5450
[   13.835898]  __asan_report_load4_noabort+0x18/0x20
[   13.835919]  kasan_atomics_helper+0x4a84/0x5450
[   13.835942]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.835966]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.836087]  ? ret_from_fork_asm+0x1a/0x30
[   13.836117]  ? kasan_atomics+0x152/0x310
[   13.836142]  kasan_atomics+0x1dc/0x310
[   13.836163]  ? __pfx_kasan_atomics+0x10/0x10
[   13.836184]  ? __pfx_read_tsc+0x10/0x10
[   13.836206]  ? ktime_get_ts64+0x86/0x230
[   13.836231]  kunit_try_run_case+0x1a5/0x480
[   13.836253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.836274]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.836299]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.836325]  ? __kthread_parkme+0x82/0x180
[   13.836347]  ? preempt_count_sub+0x50/0x80
[   13.836371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.836404]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.836429]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.836454]  kthread+0x337/0x6f0
[   13.836475]  ? trace_preempt_on+0x20/0xc0
[   13.836499]  ? __pfx_kthread+0x10/0x10
[   13.836520]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.836544]  ? calculate_sigpending+0x7b/0xa0
[   13.836568]  ? __pfx_kthread+0x10/0x10
[   13.836589]  ret_from_fork+0x116/0x1d0
[   13.836609]  ? __pfx_kthread+0x10/0x10
[   13.836630]  ret_from_fork_asm+0x1a/0x30
[   13.836660]  </TASK>
[   13.836671] 
[   13.844596] Allocated by task 283:
[   13.844812]  kasan_save_stack+0x45/0x70
[   13.845126]  kasan_save_track+0x18/0x40
[   13.845332]  kasan_save_alloc_info+0x3b/0x50
[   13.845539]  __kasan_kmalloc+0xb7/0xc0
[   13.845764]  __kmalloc_cache_noprof+0x189/0x420
[   13.845938]  kasan_atomics+0x95/0x310
[   13.846149]  kunit_try_run_case+0x1a5/0x480
[   13.846369]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.846640]  kthread+0x337/0x6f0
[   13.846847]  ret_from_fork+0x116/0x1d0
[   13.847311]  ret_from_fork_asm+0x1a/0x30
[   13.847541] 
[   13.847628] The buggy address belongs to the object at ffff8881039bd780
[   13.847628]  which belongs to the cache kmalloc-64 of size 64
[   13.848240] The buggy address is located 0 bytes to the right of
[   13.848240]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.848710] 
[   13.848810] The buggy address belongs to the physical page:
[   13.849071] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.849450] flags: 0x200000000000000(node=0|zone=2)
[   13.849686] page_type: f5(slab)
[   13.849881] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.850274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.850522] page dumped because: kasan: bad access detected
[   13.850777] 
[   13.850874] Memory state around the buggy address:
[   13.851291]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.851645]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.851963] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.852326]                                      ^
[   13.852548]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.852859]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.853235] ==================================================================
[   14.223361] ==================================================================
[   14.224126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.224448] Read of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.224674] 
[   14.224799] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.224847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.224860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.224883] Call Trace:
[   14.224899]  <TASK>
[   14.224915]  dump_stack_lvl+0x73/0xb0
[   14.224942]  print_report+0xd1/0x650
[   14.224965]  ? __virt_addr_valid+0x1db/0x2d0
[   14.224988]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.225011]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.225034]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.225228]  kasan_report+0x141/0x180
[   14.225260]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.225289]  kasan_check_range+0x10c/0x1c0
[   14.225314]  __kasan_check_read+0x15/0x20
[   14.225336]  kasan_atomics_helper+0x13b5/0x5450
[   14.225360]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.225399]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.225420]  ? ret_from_fork_asm+0x1a/0x30
[   14.225442]  ? kasan_atomics+0x152/0x310
[   14.225466]  kasan_atomics+0x1dc/0x310
[   14.225486]  ? __pfx_kasan_atomics+0x10/0x10
[   14.225508]  ? __pfx_read_tsc+0x10/0x10
[   14.225529]  ? ktime_get_ts64+0x86/0x230
[   14.225555]  kunit_try_run_case+0x1a5/0x480
[   14.225577]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.225597]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.225622]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.225649]  ? __kthread_parkme+0x82/0x180
[   14.225670]  ? preempt_count_sub+0x50/0x80
[   14.225694]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.225716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.225740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.225765]  kthread+0x337/0x6f0
[   14.225785]  ? trace_preempt_on+0x20/0xc0
[   14.225808]  ? __pfx_kthread+0x10/0x10
[   14.225829]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.225853]  ? calculate_sigpending+0x7b/0xa0
[   14.225877]  ? __pfx_kthread+0x10/0x10
[   14.225899]  ret_from_fork+0x116/0x1d0
[   14.225918]  ? __pfx_kthread+0x10/0x10
[   14.225939]  ret_from_fork_asm+0x1a/0x30
[   14.225969]  </TASK>
[   14.225981] 
[   14.239574] Allocated by task 283:
[   14.239807]  kasan_save_stack+0x45/0x70
[   14.240026]  kasan_save_track+0x18/0x40
[   14.240230]  kasan_save_alloc_info+0x3b/0x50
[   14.240392]  __kasan_kmalloc+0xb7/0xc0
[   14.240528]  __kmalloc_cache_noprof+0x189/0x420
[   14.240734]  kasan_atomics+0x95/0x310
[   14.240917]  kunit_try_run_case+0x1a5/0x480
[   14.241403]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.241648]  kthread+0x337/0x6f0
[   14.241830]  ret_from_fork+0x116/0x1d0
[   14.242000]  ret_from_fork_asm+0x1a/0x30
[   14.242146] 
[   14.242218] The buggy address belongs to the object at ffff8881039bd780
[   14.242218]  which belongs to the cache kmalloc-64 of size 64
[   14.242933] The buggy address is located 0 bytes to the right of
[   14.242933]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.243439] 
[   14.243557] The buggy address belongs to the physical page:
[   14.243816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.244143] flags: 0x200000000000000(node=0|zone=2)
[   14.244371] page_type: f5(slab)
[   14.244533] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.244872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.245187] page dumped because: kasan: bad access detected
[   14.245371] 
[   14.245453] Memory state around the buggy address:
[   14.245688]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.246041]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.246302] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.246625]                                      ^
[   14.246834]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.247243]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.247560] ==================================================================
[   14.273556] ==================================================================
[   14.273905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.274334] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.274602] 
[   14.274689] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.274733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.274746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.274767] Call Trace:
[   14.274784]  <TASK>
[   14.274801]  dump_stack_lvl+0x73/0xb0
[   14.274828]  print_report+0xd1/0x650
[   14.274852]  ? __virt_addr_valid+0x1db/0x2d0
[   14.274874]  ? kasan_atomics_helper+0x1467/0x5450
[   14.274897]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.274920]  ? kasan_atomics_helper+0x1467/0x5450
[   14.274943]  kasan_report+0x141/0x180
[   14.274967]  ? kasan_atomics_helper+0x1467/0x5450
[   14.274996]  kasan_check_range+0x10c/0x1c0
[   14.275022]  __kasan_check_write+0x18/0x20
[   14.275042]  kasan_atomics_helper+0x1467/0x5450
[   14.275066]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.275089]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.275110]  ? ret_from_fork_asm+0x1a/0x30
[   14.275131]  ? kasan_atomics+0x152/0x310
[   14.275157]  kasan_atomics+0x1dc/0x310
[   14.275176]  ? __pfx_kasan_atomics+0x10/0x10
[   14.275198]  ? __pfx_read_tsc+0x10/0x10
[   14.275219]  ? ktime_get_ts64+0x86/0x230
[   14.275245]  kunit_try_run_case+0x1a5/0x480
[   14.275267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.275287]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.275313]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.275340]  ? __kthread_parkme+0x82/0x180
[   14.275360]  ? preempt_count_sub+0x50/0x80
[   14.275393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.275415]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.275439]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.275464]  kthread+0x337/0x6f0
[   14.275484]  ? trace_preempt_on+0x20/0xc0
[   14.275509]  ? __pfx_kthread+0x10/0x10
[   14.275530]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.275554]  ? calculate_sigpending+0x7b/0xa0
[   14.275579]  ? __pfx_kthread+0x10/0x10
[   14.275601]  ret_from_fork+0x116/0x1d0
[   14.275620]  ? __pfx_kthread+0x10/0x10
[   14.275641]  ret_from_fork_asm+0x1a/0x30
[   14.275673]  </TASK>
[   14.275683] 
[   14.288285] Allocated by task 283:
[   14.289019]  kasan_save_stack+0x45/0x70
[   14.289186]  kasan_save_track+0x18/0x40
[   14.289330]  kasan_save_alloc_info+0x3b/0x50
[   14.289495]  __kasan_kmalloc+0xb7/0xc0
[   14.289632]  __kmalloc_cache_noprof+0x189/0x420
[   14.290220]  kasan_atomics+0x95/0x310
[   14.290369]  kunit_try_run_case+0x1a5/0x480
[   14.290650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.290946]  kthread+0x337/0x6f0
[   14.291146]  ret_from_fork+0x116/0x1d0
[   14.291423]  ret_from_fork_asm+0x1a/0x30
[   14.291626] 
[   14.291746] The buggy address belongs to the object at ffff8881039bd780
[   14.291746]  which belongs to the cache kmalloc-64 of size 64
[   14.293070] The buggy address is located 0 bytes to the right of
[   14.293070]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.294033] 
[   14.294156] The buggy address belongs to the physical page:
[   14.294501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.295105] flags: 0x200000000000000(node=0|zone=2)
[   14.295279] page_type: f5(slab)
[   14.295617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.296427] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.296668] page dumped because: kasan: bad access detected
[   14.297386] 
[   14.297649] Memory state around the buggy address:
[   14.298265]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.298884]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.299528] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.300240]                                      ^
[   14.300754]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.301270]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.301505] ==================================================================
[   14.587853] ==================================================================
[   14.588464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   14.588838] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.589321] 
[   14.589641] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.589691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.589705] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.589728] Call Trace:
[   14.589762]  <TASK>
[   14.589778]  dump_stack_lvl+0x73/0xb0
[   14.589807]  print_report+0xd1/0x650
[   14.589833]  ? __virt_addr_valid+0x1db/0x2d0
[   14.589856]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.589880]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.589904]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.589927]  kasan_report+0x141/0x180
[   14.589951]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.589978]  kasan_check_range+0x10c/0x1c0
[   14.590003]  __kasan_check_write+0x18/0x20
[   14.590023]  kasan_atomics_helper+0x1c18/0x5450
[   14.590053]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.590077]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.590098]  ? ret_from_fork_asm+0x1a/0x30
[   14.590120]  ? kasan_atomics+0x152/0x310
[   14.590144]  kasan_atomics+0x1dc/0x310
[   14.590164]  ? __pfx_kasan_atomics+0x10/0x10
[   14.590185]  ? __pfx_read_tsc+0x10/0x10
[   14.590206]  ? ktime_get_ts64+0x86/0x230
[   14.590231]  kunit_try_run_case+0x1a5/0x480
[   14.590255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.590276]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.590302]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.590328]  ? __kthread_parkme+0x82/0x180
[   14.590349]  ? preempt_count_sub+0x50/0x80
[   14.590373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.590409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.590433]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.590459]  kthread+0x337/0x6f0
[   14.590479]  ? trace_preempt_on+0x20/0xc0
[   14.590502]  ? __pfx_kthread+0x10/0x10
[   14.590523]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.590547]  ? calculate_sigpending+0x7b/0xa0
[   14.590571]  ? __pfx_kthread+0x10/0x10
[   14.590593]  ret_from_fork+0x116/0x1d0
[   14.590612]  ? __pfx_kthread+0x10/0x10
[   14.590635]  ret_from_fork_asm+0x1a/0x30
[   14.590666]  </TASK>
[   14.590678] 
[   14.599977] Allocated by task 283:
[   14.600158]  kasan_save_stack+0x45/0x70
[   14.600358]  kasan_save_track+0x18/0x40
[   14.600556]  kasan_save_alloc_info+0x3b/0x50
[   14.600788]  __kasan_kmalloc+0xb7/0xc0
[   14.600968]  __kmalloc_cache_noprof+0x189/0x420
[   14.601176]  kasan_atomics+0x95/0x310
[   14.601352]  kunit_try_run_case+0x1a5/0x480
[   14.601558]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.601883]  kthread+0x337/0x6f0
[   14.602044]  ret_from_fork+0x116/0x1d0
[   14.602221]  ret_from_fork_asm+0x1a/0x30
[   14.602907] 
[   14.603146] The buggy address belongs to the object at ffff8881039bd780
[   14.603146]  which belongs to the cache kmalloc-64 of size 64
[   14.604090] The buggy address is located 0 bytes to the right of
[   14.604090]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.604884] 
[   14.605111] The buggy address belongs to the physical page:
[   14.605535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.606241] flags: 0x200000000000000(node=0|zone=2)
[   14.606660] page_type: f5(slab)
[   14.606963] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.607597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.608063] page dumped because: kasan: bad access detected
[   14.608309] 
[   14.608421] Memory state around the buggy address:
[   14.608631]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.609332]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.610032] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.610535]                                      ^
[   14.610986]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.611493]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.611953] ==================================================================
[   13.814782] ==================================================================
[   13.815106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   13.815369] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.815923] 
[   13.816113] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.816162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.816175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.816198] Call Trace:
[   13.816213]  <TASK>
[   13.816227]  dump_stack_lvl+0x73/0xb0
[   13.816255]  print_report+0xd1/0x650
[   13.816279]  ? __virt_addr_valid+0x1db/0x2d0
[   13.816302]  ? kasan_atomics_helper+0xc70/0x5450
[   13.816324]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.816347]  ? kasan_atomics_helper+0xc70/0x5450
[   13.816369]  kasan_report+0x141/0x180
[   13.816405]  ? kasan_atomics_helper+0xc70/0x5450
[   13.816433]  kasan_check_range+0x10c/0x1c0
[   13.816458]  __kasan_check_write+0x18/0x20
[   13.816478]  kasan_atomics_helper+0xc70/0x5450
[   13.816503]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.816526]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.816547]  ? ret_from_fork_asm+0x1a/0x30
[   13.816569]  ? kasan_atomics+0x152/0x310
[   13.816593]  kasan_atomics+0x1dc/0x310
[   13.816614]  ? __pfx_kasan_atomics+0x10/0x10
[   13.816635]  ? __pfx_read_tsc+0x10/0x10
[   13.816657]  ? ktime_get_ts64+0x86/0x230
[   13.816683]  kunit_try_run_case+0x1a5/0x480
[   13.816705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.816725]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.816771]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.816796]  ? __kthread_parkme+0x82/0x180
[   13.816818]  ? preempt_count_sub+0x50/0x80
[   13.816843]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.816865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.816890]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.816915]  kthread+0x337/0x6f0
[   13.816935]  ? trace_preempt_on+0x20/0xc0
[   13.816959]  ? __pfx_kthread+0x10/0x10
[   13.816981]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.817094]  ? calculate_sigpending+0x7b/0xa0
[   13.817119]  ? __pfx_kthread+0x10/0x10
[   13.817142]  ret_from_fork+0x116/0x1d0
[   13.817162]  ? __pfx_kthread+0x10/0x10
[   13.817184]  ret_from_fork_asm+0x1a/0x30
[   13.817215]  </TASK>
[   13.817226] 
[   13.825519] Allocated by task 283:
[   13.825685]  kasan_save_stack+0x45/0x70
[   13.825860]  kasan_save_track+0x18/0x40
[   13.826050]  kasan_save_alloc_info+0x3b/0x50
[   13.826249]  __kasan_kmalloc+0xb7/0xc0
[   13.826542]  __kmalloc_cache_noprof+0x189/0x420
[   13.826774]  kasan_atomics+0x95/0x310
[   13.826944]  kunit_try_run_case+0x1a5/0x480
[   13.827262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.827499]  kthread+0x337/0x6f0
[   13.827672]  ret_from_fork+0x116/0x1d0
[   13.827882]  ret_from_fork_asm+0x1a/0x30
[   13.828184] 
[   13.828285] The buggy address belongs to the object at ffff8881039bd780
[   13.828285]  which belongs to the cache kmalloc-64 of size 64
[   13.828730] The buggy address is located 0 bytes to the right of
[   13.828730]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.829305] 
[   13.829421] The buggy address belongs to the physical page:
[   13.829684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.830167] flags: 0x200000000000000(node=0|zone=2)
[   13.830385] page_type: f5(slab)
[   13.830536] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.830876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.831325] page dumped because: kasan: bad access detected
[   13.831521] 
[   13.831594] Memory state around the buggy address:
[   13.831846]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.832270]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.832614] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.832887]                                      ^
[   13.833182]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.833525]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.833828] ==================================================================
[   13.618060] ==================================================================
[   13.618440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   13.618791] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.619155] 
[   13.619242] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.619285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.619297] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.619320] Call Trace:
[   13.619335]  <TASK>
[   13.619349]  dump_stack_lvl+0x73/0xb0
[   13.619387]  print_report+0xd1/0x650
[   13.619411]  ? __virt_addr_valid+0x1db/0x2d0
[   13.619434]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.619458]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.619482]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.619505]  kasan_report+0x141/0x180
[   13.619529]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.619556]  kasan_check_range+0x10c/0x1c0
[   13.619581]  __kasan_check_write+0x18/0x20
[   13.619601]  kasan_atomics_helper+0x5fe/0x5450
[   13.619625]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.619649]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.619669]  ? ret_from_fork_asm+0x1a/0x30
[   13.619691]  ? kasan_atomics+0x152/0x310
[   13.619715]  kasan_atomics+0x1dc/0x310
[   13.619735]  ? __pfx_kasan_atomics+0x10/0x10
[   13.619757]  ? __pfx_read_tsc+0x10/0x10
[   13.619778]  ? ktime_get_ts64+0x86/0x230
[   13.619803]  kunit_try_run_case+0x1a5/0x480
[   13.619825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.619845]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.619871]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.619896]  ? __kthread_parkme+0x82/0x180
[   13.619918]  ? preempt_count_sub+0x50/0x80
[   13.619943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.619965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.619990]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.620016]  kthread+0x337/0x6f0
[   13.620036]  ? trace_preempt_on+0x20/0xc0
[   13.620060]  ? __pfx_kthread+0x10/0x10
[   13.620082]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.620117]  ? calculate_sigpending+0x7b/0xa0
[   13.620142]  ? __pfx_kthread+0x10/0x10
[   13.620164]  ret_from_fork+0x116/0x1d0
[   13.620184]  ? __pfx_kthread+0x10/0x10
[   13.620205]  ret_from_fork_asm+0x1a/0x30
[   13.620237]  </TASK>
[   13.620249] 
[   13.628659] Allocated by task 283:
[   13.628799]  kasan_save_stack+0x45/0x70
[   13.628947]  kasan_save_track+0x18/0x40
[   13.629213]  kasan_save_alloc_info+0x3b/0x50
[   13.629617]  __kasan_kmalloc+0xb7/0xc0
[   13.629866]  __kmalloc_cache_noprof+0x189/0x420
[   13.630022]  kasan_atomics+0x95/0x310
[   13.630159]  kunit_try_run_case+0x1a5/0x480
[   13.630305]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.630567]  kthread+0x337/0x6f0
[   13.630732]  ret_from_fork+0x116/0x1d0
[   13.630923]  ret_from_fork_asm+0x1a/0x30
[   13.631126] 
[   13.631243] The buggy address belongs to the object at ffff8881039bd780
[   13.631243]  which belongs to the cache kmalloc-64 of size 64
[   13.631984] The buggy address is located 0 bytes to the right of
[   13.631984]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.632553] 
[   13.632633] The buggy address belongs to the physical page:
[   13.632836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.633258] flags: 0x200000000000000(node=0|zone=2)
[   13.633486] page_type: f5(slab)
[   13.633609] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.633849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.634360] page dumped because: kasan: bad access detected
[   13.634627] 
[   13.634724] Memory state around the buggy address:
[   13.635265]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.635560]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.635880] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.636247]                                      ^
[   13.636485]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.636837]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.637131] ==================================================================
[   13.460372] ==================================================================
[   13.460763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   13.461296] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.461655] 
[   13.461776] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.461822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.461834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.461856] Call Trace:
[   13.461867]  <TASK>
[   13.461883]  dump_stack_lvl+0x73/0xb0
[   13.461909]  print_report+0xd1/0x650
[   13.461932]  ? __virt_addr_valid+0x1db/0x2d0
[   13.461954]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.461975]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.461998]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.462043]  kasan_report+0x141/0x180
[   13.462065]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.462092]  __asan_report_store4_noabort+0x1b/0x30
[   13.462113]  kasan_atomics_helper+0x4ba2/0x5450
[   13.462136]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.462159]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.462180]  ? ret_from_fork_asm+0x1a/0x30
[   13.462202]  ? kasan_atomics+0x152/0x310
[   13.462225]  kasan_atomics+0x1dc/0x310
[   13.462244]  ? __pfx_kasan_atomics+0x10/0x10
[   13.462265]  ? __pfx_read_tsc+0x10/0x10
[   13.462285]  ? ktime_get_ts64+0x86/0x230
[   13.462310]  kunit_try_run_case+0x1a5/0x480
[   13.462331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.462350]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.462384]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.462409]  ? __kthread_parkme+0x82/0x180
[   13.462430]  ? preempt_count_sub+0x50/0x80
[   13.462453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.462474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.462498]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.462523]  kthread+0x337/0x6f0
[   13.462542]  ? trace_preempt_on+0x20/0xc0
[   13.462565]  ? __pfx_kthread+0x10/0x10
[   13.462586]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.462608]  ? calculate_sigpending+0x7b/0xa0
[   13.462632]  ? __pfx_kthread+0x10/0x10
[   13.462653]  ret_from_fork+0x116/0x1d0
[   13.462672]  ? __pfx_kthread+0x10/0x10
[   13.462693]  ret_from_fork_asm+0x1a/0x30
[   13.462722]  </TASK>
[   13.462732] 
[   13.470262] Allocated by task 283:
[   13.470404]  kasan_save_stack+0x45/0x70
[   13.470548]  kasan_save_track+0x18/0x40
[   13.470873]  kasan_save_alloc_info+0x3b/0x50
[   13.471211]  __kasan_kmalloc+0xb7/0xc0
[   13.471411]  __kmalloc_cache_noprof+0x189/0x420
[   13.471626]  kasan_atomics+0x95/0x310
[   13.471967]  kunit_try_run_case+0x1a5/0x480
[   13.472211]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.472414]  kthread+0x337/0x6f0
[   13.472588]  ret_from_fork+0x116/0x1d0
[   13.472827]  ret_from_fork_asm+0x1a/0x30
[   13.473071] 
[   13.473156] The buggy address belongs to the object at ffff8881039bd780
[   13.473156]  which belongs to the cache kmalloc-64 of size 64
[   13.473598] The buggy address is located 0 bytes to the right of
[   13.473598]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.473966] 
[   13.474066] The buggy address belongs to the physical page:
[   13.474318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.474794] flags: 0x200000000000000(node=0|zone=2)
[   13.475211] page_type: f5(slab)
[   13.475349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.475596] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.476013] page dumped because: kasan: bad access detected
[   13.476273] 
[   13.476368] Memory state around the buggy address:
[   13.476780]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.477090]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.477461] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.477693]                                      ^
[   13.477923]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.478301]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.478583] ==================================================================
[   14.165223] ==================================================================
[   14.165781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   14.166084] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.166735] 
[   14.166911] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.166958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.166972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.166994] Call Trace:
[   14.167007]  <TASK>
[   14.167038]  dump_stack_lvl+0x73/0xb0
[   14.167065]  print_report+0xd1/0x650
[   14.167089]  ? __virt_addr_valid+0x1db/0x2d0
[   14.167111]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.167134]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.167157]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.167180]  kasan_report+0x141/0x180
[   14.167203]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.167230]  kasan_check_range+0x10c/0x1c0
[   14.167255]  __kasan_check_write+0x18/0x20
[   14.167275]  kasan_atomics_helper+0x12e6/0x5450
[   14.167299]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.167322]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.167343]  ? ret_from_fork_asm+0x1a/0x30
[   14.167365]  ? kasan_atomics+0x152/0x310
[   14.167398]  kasan_atomics+0x1dc/0x310
[   14.167418]  ? __pfx_kasan_atomics+0x10/0x10
[   14.167441]  ? __pfx_read_tsc+0x10/0x10
[   14.167462]  ? ktime_get_ts64+0x86/0x230
[   14.167488]  kunit_try_run_case+0x1a5/0x480
[   14.167510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.167530]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.167555]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.167581]  ? __kthread_parkme+0x82/0x180
[   14.167602]  ? preempt_count_sub+0x50/0x80
[   14.167627]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.167648]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.167673]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.167699]  kthread+0x337/0x6f0
[   14.167735]  ? trace_preempt_on+0x20/0xc0
[   14.167760]  ? __pfx_kthread+0x10/0x10
[   14.167783]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.167807]  ? calculate_sigpending+0x7b/0xa0
[   14.167830]  ? __pfx_kthread+0x10/0x10
[   14.167852]  ret_from_fork+0x116/0x1d0
[   14.167872]  ? __pfx_kthread+0x10/0x10
[   14.167893]  ret_from_fork_asm+0x1a/0x30
[   14.167924]  </TASK>
[   14.167936] 
[   14.181904] Allocated by task 283:
[   14.182396]  kasan_save_stack+0x45/0x70
[   14.182706]  kasan_save_track+0x18/0x40
[   14.182923]  kasan_save_alloc_info+0x3b/0x50
[   14.183330]  __kasan_kmalloc+0xb7/0xc0
[   14.183535]  __kmalloc_cache_noprof+0x189/0x420
[   14.183923]  kasan_atomics+0x95/0x310
[   14.184550]  kunit_try_run_case+0x1a5/0x480
[   14.184934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.185352]  kthread+0x337/0x6f0
[   14.185530]  ret_from_fork+0x116/0x1d0
[   14.185705]  ret_from_fork_asm+0x1a/0x30
[   14.186242] 
[   14.186495] The buggy address belongs to the object at ffff8881039bd780
[   14.186495]  which belongs to the cache kmalloc-64 of size 64
[   14.187353] The buggy address is located 0 bytes to the right of
[   14.187353]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.187864] 
[   14.188282] The buggy address belongs to the physical page:
[   14.188510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.188890] flags: 0x200000000000000(node=0|zone=2)
[   14.189229] page_type: f5(slab)
[   14.189413] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.189663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.190054] page dumped because: kasan: bad access detected
[   14.190254] 
[   14.190356] Memory state around the buggy address:
[   14.190653]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.191165]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.191479] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.191743]                                      ^
[   14.191978]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.192226]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.192548] ==================================================================
[   14.539232] ==================================================================
[   14.539630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   14.540002] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.540356] 
[   14.540509] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.540553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.540567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.540588] Call Trace:
[   14.540603]  <TASK>
[   14.540651]  dump_stack_lvl+0x73/0xb0
[   14.540679]  print_report+0xd1/0x650
[   14.540703]  ? __virt_addr_valid+0x1db/0x2d0
[   14.540738]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.540761]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.540816]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.540842]  kasan_report+0x141/0x180
[   14.540866]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.540893]  kasan_check_range+0x10c/0x1c0
[   14.540918]  __kasan_check_write+0x18/0x20
[   14.540938]  kasan_atomics_helper+0x1a7f/0x5450
[   14.540992]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.541016]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.541037]  ? ret_from_fork_asm+0x1a/0x30
[   14.541059]  ? kasan_atomics+0x152/0x310
[   14.541084]  kasan_atomics+0x1dc/0x310
[   14.541134]  ? __pfx_kasan_atomics+0x10/0x10
[   14.541156]  ? __pfx_read_tsc+0x10/0x10
[   14.541177]  ? ktime_get_ts64+0x86/0x230
[   14.541203]  kunit_try_run_case+0x1a5/0x480
[   14.541225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.541275]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.541301]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.541326]  ? __kthread_parkme+0x82/0x180
[   14.541348]  ? preempt_count_sub+0x50/0x80
[   14.541413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.541436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.541461]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.541485]  kthread+0x337/0x6f0
[   14.541505]  ? trace_preempt_on+0x20/0xc0
[   14.541559]  ? __pfx_kthread+0x10/0x10
[   14.541580]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.541604]  ? calculate_sigpending+0x7b/0xa0
[   14.541629]  ? __pfx_kthread+0x10/0x10
[   14.541679]  ret_from_fork+0x116/0x1d0
[   14.541699]  ? __pfx_kthread+0x10/0x10
[   14.541729]  ret_from_fork_asm+0x1a/0x30
[   14.541760]  </TASK>
[   14.541800] 
[   14.549814] Allocated by task 283:
[   14.550018]  kasan_save_stack+0x45/0x70
[   14.550223]  kasan_save_track+0x18/0x40
[   14.550451]  kasan_save_alloc_info+0x3b/0x50
[   14.550687]  __kasan_kmalloc+0xb7/0xc0
[   14.550872]  __kmalloc_cache_noprof+0x189/0x420
[   14.551028]  kasan_atomics+0x95/0x310
[   14.551169]  kunit_try_run_case+0x1a5/0x480
[   14.551424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.551721]  kthread+0x337/0x6f0
[   14.551981]  ret_from_fork+0x116/0x1d0
[   14.552194]  ret_from_fork_asm+0x1a/0x30
[   14.552405] 
[   14.552538] The buggy address belongs to the object at ffff8881039bd780
[   14.552538]  which belongs to the cache kmalloc-64 of size 64
[   14.553115] The buggy address is located 0 bytes to the right of
[   14.553115]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.553646] 
[   14.554755] The buggy address belongs to the physical page:
[   14.555575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.555836] flags: 0x200000000000000(node=0|zone=2)
[   14.556008] page_type: f5(slab)
[   14.556133] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.557002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.557676] page dumped because: kasan: bad access detected
[   14.558077] 
[   14.558350] Memory state around the buggy address:
[   14.558793]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.559243]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.559546] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.560126]                                      ^
[   14.560598]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.561246]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.561845] ==================================================================
[   13.499089] ==================================================================
[   13.499411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   13.499670] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.499916] 
[   13.500041] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.500085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.500098] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.500120] Call Trace:
[   13.500133]  <TASK>
[   13.500148]  dump_stack_lvl+0x73/0xb0
[   13.500174]  print_report+0xd1/0x650
[   13.500197]  ? __virt_addr_valid+0x1db/0x2d0
[   13.500220]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.500242]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.500266]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.500289]  kasan_report+0x141/0x180
[   13.500311]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.500339]  __asan_report_store4_noabort+0x1b/0x30
[   13.500361]  kasan_atomics_helper+0x4b6e/0x5450
[   13.500582]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.500614]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.500636]  ? ret_from_fork_asm+0x1a/0x30
[   13.500659]  ? kasan_atomics+0x152/0x310
[   13.500684]  kasan_atomics+0x1dc/0x310
[   13.500705]  ? __pfx_kasan_atomics+0x10/0x10
[   13.500726]  ? __pfx_read_tsc+0x10/0x10
[   13.500749]  ? ktime_get_ts64+0x86/0x230
[   13.500774]  kunit_try_run_case+0x1a5/0x480
[   13.500797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.500817]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.500843]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.500869]  ? __kthread_parkme+0x82/0x180
[   13.500890]  ? preempt_count_sub+0x50/0x80
[   13.500914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.500936]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.500962]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.500987]  kthread+0x337/0x6f0
[   13.501008]  ? trace_preempt_on+0x20/0xc0
[   13.501033]  ? __pfx_kthread+0x10/0x10
[   13.501397]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.501427]  ? calculate_sigpending+0x7b/0xa0
[   13.501451]  ? __pfx_kthread+0x10/0x10
[   13.501474]  ret_from_fork+0x116/0x1d0
[   13.501496]  ? __pfx_kthread+0x10/0x10
[   13.501518]  ret_from_fork_asm+0x1a/0x30
[   13.501549]  </TASK>
[   13.501561] 
[   13.510163] Allocated by task 283:
[   13.510363]  kasan_save_stack+0x45/0x70
[   13.510704]  kasan_save_track+0x18/0x40
[   13.510911]  kasan_save_alloc_info+0x3b/0x50
[   13.511246]  __kasan_kmalloc+0xb7/0xc0
[   13.511437]  __kmalloc_cache_noprof+0x189/0x420
[   13.511601]  kasan_atomics+0x95/0x310
[   13.511734]  kunit_try_run_case+0x1a5/0x480
[   13.511925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.512185]  kthread+0x337/0x6f0
[   13.512433]  ret_from_fork+0x116/0x1d0
[   13.512835]  ret_from_fork_asm+0x1a/0x30
[   13.513020] 
[   13.513156] The buggy address belongs to the object at ffff8881039bd780
[   13.513156]  which belongs to the cache kmalloc-64 of size 64
[   13.513673] The buggy address is located 0 bytes to the right of
[   13.513673]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.514107] 
[   13.514349] The buggy address belongs to the physical page:
[   13.514577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.514820] flags: 0x200000000000000(node=0|zone=2)
[   13.514984] page_type: f5(slab)
[   13.515122] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.515473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.515816] page dumped because: kasan: bad access detected
[   13.516508] 
[   13.516602] Memory state around the buggy address:
[   13.516896]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.517242]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.517485] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.517757]                                      ^
[   13.518003]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.518478]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.518893] ==================================================================
[   14.111831] ==================================================================
[   14.112269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   14.112536] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.112888] 
[   14.112992] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.113080] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.113094] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.113115] Call Trace:
[   14.113132]  <TASK>
[   14.113147]  dump_stack_lvl+0x73/0xb0
[   14.113174]  print_report+0xd1/0x650
[   14.113198]  ? __virt_addr_valid+0x1db/0x2d0
[   14.113221]  ? kasan_atomics_helper+0x1217/0x5450
[   14.113244]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.113267]  ? kasan_atomics_helper+0x1217/0x5450
[   14.113290]  kasan_report+0x141/0x180
[   14.113313]  ? kasan_atomics_helper+0x1217/0x5450
[   14.113341]  kasan_check_range+0x10c/0x1c0
[   14.113366]  __kasan_check_write+0x18/0x20
[   14.113398]  kasan_atomics_helper+0x1217/0x5450
[   14.113422]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.113445]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.113466]  ? ret_from_fork_asm+0x1a/0x30
[   14.113488]  ? kasan_atomics+0x152/0x310
[   14.113512]  kasan_atomics+0x1dc/0x310
[   14.113532]  ? __pfx_kasan_atomics+0x10/0x10
[   14.113553]  ? __pfx_read_tsc+0x10/0x10
[   14.113575]  ? ktime_get_ts64+0x86/0x230
[   14.113601]  kunit_try_run_case+0x1a5/0x480
[   14.113623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.113643]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.113668]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.113694]  ? __kthread_parkme+0x82/0x180
[   14.113726]  ? preempt_count_sub+0x50/0x80
[   14.113750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.113772]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.113796]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.113822]  kthread+0x337/0x6f0
[   14.113842]  ? trace_preempt_on+0x20/0xc0
[   14.113867]  ? __pfx_kthread+0x10/0x10
[   14.113889]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.113913]  ? calculate_sigpending+0x7b/0xa0
[   14.113938]  ? __pfx_kthread+0x10/0x10
[   14.113962]  ret_from_fork+0x116/0x1d0
[   14.113981]  ? __pfx_kthread+0x10/0x10
[   14.114191]  ret_from_fork_asm+0x1a/0x30
[   14.114232]  </TASK>
[   14.114246] 
[   14.122753] Allocated by task 283:
[   14.122941]  kasan_save_stack+0x45/0x70
[   14.123228]  kasan_save_track+0x18/0x40
[   14.123443]  kasan_save_alloc_info+0x3b/0x50
[   14.123656]  __kasan_kmalloc+0xb7/0xc0
[   14.123969]  __kmalloc_cache_noprof+0x189/0x420
[   14.124297]  kasan_atomics+0x95/0x310
[   14.124447]  kunit_try_run_case+0x1a5/0x480
[   14.124657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.124920]  kthread+0x337/0x6f0
[   14.125165]  ret_from_fork+0x116/0x1d0
[   14.125365]  ret_from_fork_asm+0x1a/0x30
[   14.127365] 
[   14.127478] The buggy address belongs to the object at ffff8881039bd780
[   14.127478]  which belongs to the cache kmalloc-64 of size 64
[   14.129153] The buggy address is located 0 bytes to the right of
[   14.129153]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.130589] 
[   14.131334] The buggy address belongs to the physical page:
[   14.132002] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.132583] flags: 0x200000000000000(node=0|zone=2)
[   14.132955] page_type: f5(slab)
[   14.133317] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.133678] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.134143] page dumped because: kasan: bad access detected
[   14.134724] 
[   14.134816] Memory state around the buggy address:
[   14.135033]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.135458]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.135858] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.136200]                                      ^
[   14.136839]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.137124]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.137614] ==================================================================
[   14.332822] ==================================================================
[   14.333473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.333715] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.333945] 
[   14.334038] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.334084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.334097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.334119] Call Trace:
[   14.334133]  <TASK>
[   14.334148]  dump_stack_lvl+0x73/0xb0
[   14.334174]  print_report+0xd1/0x650
[   14.334198]  ? __virt_addr_valid+0x1db/0x2d0
[   14.334220]  ? kasan_atomics_helper+0x151d/0x5450
[   14.334242]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.334265]  ? kasan_atomics_helper+0x151d/0x5450
[   14.334288]  kasan_report+0x141/0x180
[   14.334310]  ? kasan_atomics_helper+0x151d/0x5450
[   14.334338]  kasan_check_range+0x10c/0x1c0
[   14.334362]  __kasan_check_write+0x18/0x20
[   14.334393]  kasan_atomics_helper+0x151d/0x5450
[   14.334416]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.334438]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.334459]  ? ret_from_fork_asm+0x1a/0x30
[   14.334480]  ? kasan_atomics+0x152/0x310
[   14.334503]  kasan_atomics+0x1dc/0x310
[   14.334522]  ? __pfx_kasan_atomics+0x10/0x10
[   14.334544]  ? __pfx_read_tsc+0x10/0x10
[   14.334565]  ? ktime_get_ts64+0x86/0x230
[   14.334590]  kunit_try_run_case+0x1a5/0x480
[   14.334612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.334631]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.334656]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.334681]  ? __kthread_parkme+0x82/0x180
[   14.334701]  ? preempt_count_sub+0x50/0x80
[   14.334725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.334747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.334771]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.334797]  kthread+0x337/0x6f0
[   14.334816]  ? trace_preempt_on+0x20/0xc0
[   14.334840]  ? __pfx_kthread+0x10/0x10
[   14.334861]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.334885]  ? calculate_sigpending+0x7b/0xa0
[   14.334909]  ? __pfx_kthread+0x10/0x10
[   14.334931]  ret_from_fork+0x116/0x1d0
[   14.335071]  ? __pfx_kthread+0x10/0x10
[   14.335094]  ret_from_fork_asm+0x1a/0x30
[   14.335126]  </TASK>
[   14.335138] 
[   14.346862] Allocated by task 283:
[   14.347003]  kasan_save_stack+0x45/0x70
[   14.347602]  kasan_save_track+0x18/0x40
[   14.347763]  kasan_save_alloc_info+0x3b/0x50
[   14.347997]  __kasan_kmalloc+0xb7/0xc0
[   14.348237]  __kmalloc_cache_noprof+0x189/0x420
[   14.348613]  kasan_atomics+0x95/0x310
[   14.349018]  kunit_try_run_case+0x1a5/0x480
[   14.349281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.349630]  kthread+0x337/0x6f0
[   14.349774]  ret_from_fork+0x116/0x1d0
[   14.350119]  ret_from_fork_asm+0x1a/0x30
[   14.350290] 
[   14.350421] The buggy address belongs to the object at ffff8881039bd780
[   14.350421]  which belongs to the cache kmalloc-64 of size 64
[   14.351413] The buggy address is located 0 bytes to the right of
[   14.351413]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.352152] 
[   14.352277] The buggy address belongs to the physical page:
[   14.352639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.353232] flags: 0x200000000000000(node=0|zone=2)
[   14.353733] page_type: f5(slab)
[   14.354154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.354528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.354971] page dumped because: kasan: bad access detected
[   14.355369] 
[   14.355561] Memory state around the buggy address:
[   14.355976]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.356514]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.356828] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.357345]                                      ^
[   14.357566]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.358103]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.358406] ==================================================================
[   14.674636] ==================================================================
[   14.675185] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   14.675543] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.675887] 
[   14.676039] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.676084] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.676097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.676119] Call Trace:
[   14.676133]  <TASK>
[   14.676148]  dump_stack_lvl+0x73/0xb0
[   14.676174]  print_report+0xd1/0x650
[   14.676198]  ? __virt_addr_valid+0x1db/0x2d0
[   14.676221]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.676243]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.676267]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.676289]  kasan_report+0x141/0x180
[   14.676312]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.676340]  kasan_check_range+0x10c/0x1c0
[   14.676365]  __kasan_check_write+0x18/0x20
[   14.676397]  kasan_atomics_helper+0x1e12/0x5450
[   14.676421]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.676445]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.676466]  ? ret_from_fork_asm+0x1a/0x30
[   14.676488]  ? kasan_atomics+0x152/0x310
[   14.676512]  kasan_atomics+0x1dc/0x310
[   14.676532]  ? __pfx_kasan_atomics+0x10/0x10
[   14.676553]  ? __pfx_read_tsc+0x10/0x10
[   14.676574]  ? ktime_get_ts64+0x86/0x230
[   14.676599]  kunit_try_run_case+0x1a5/0x480
[   14.676621]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.676641]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.676666]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.676691]  ? __kthread_parkme+0x82/0x180
[   14.676712]  ? preempt_count_sub+0x50/0x80
[   14.676745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.676766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.676792]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.676818]  kthread+0x337/0x6f0
[   14.676839]  ? trace_preempt_on+0x20/0xc0
[   14.676864]  ? __pfx_kthread+0x10/0x10
[   14.676886]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.676911]  ? calculate_sigpending+0x7b/0xa0
[   14.676935]  ? __pfx_kthread+0x10/0x10
[   14.676958]  ret_from_fork+0x116/0x1d0
[   14.676978]  ? __pfx_kthread+0x10/0x10
[   14.676999]  ret_from_fork_asm+0x1a/0x30
[   14.677030]  </TASK>
[   14.677042] 
[   14.684811] Allocated by task 283:
[   14.684978]  kasan_save_stack+0x45/0x70
[   14.685152]  kasan_save_track+0x18/0x40
[   14.685345]  kasan_save_alloc_info+0x3b/0x50
[   14.685535]  __kasan_kmalloc+0xb7/0xc0
[   14.685721]  __kmalloc_cache_noprof+0x189/0x420
[   14.685882]  kasan_atomics+0x95/0x310
[   14.686013]  kunit_try_run_case+0x1a5/0x480
[   14.686162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.686338]  kthread+0x337/0x6f0
[   14.686512]  ret_from_fork+0x116/0x1d0
[   14.686720]  ret_from_fork_asm+0x1a/0x30
[   14.686916] 
[   14.687010] The buggy address belongs to the object at ffff8881039bd780
[   14.687010]  which belongs to the cache kmalloc-64 of size 64
[   14.687546] The buggy address is located 0 bytes to the right of
[   14.687546]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.688068] 
[   14.688142] The buggy address belongs to the physical page:
[   14.688328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.688694] flags: 0x200000000000000(node=0|zone=2)
[   14.688936] page_type: f5(slab)
[   14.689105] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.689449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.690077] page dumped because: kasan: bad access detected
[   14.690280] 
[   14.690353] Memory state around the buggy address:
[   14.690524]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.691039]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.691527] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.692056]                                      ^
[   14.692272]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.692571]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.693609] ==================================================================
[   13.795297] ==================================================================
[   13.795671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   13.796060] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.796394] 
[   13.796501] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.796547] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.796560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.796583] Call Trace:
[   13.796599]  <TASK>
[   13.796614]  dump_stack_lvl+0x73/0xb0
[   13.796641]  print_report+0xd1/0x650
[   13.796665]  ? __virt_addr_valid+0x1db/0x2d0
[   13.796688]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.796711]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.796735]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.796779]  kasan_report+0x141/0x180
[   13.796802]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.796830]  kasan_check_range+0x10c/0x1c0
[   13.796855]  __kasan_check_write+0x18/0x20
[   13.796876]  kasan_atomics_helper+0xb6a/0x5450
[   13.796900]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.796924]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.796945]  ? ret_from_fork_asm+0x1a/0x30
[   13.796967]  ? kasan_atomics+0x152/0x310
[   13.797078]  kasan_atomics+0x1dc/0x310
[   13.797106]  ? __pfx_kasan_atomics+0x10/0x10
[   13.797128]  ? __pfx_read_tsc+0x10/0x10
[   13.797150]  ? ktime_get_ts64+0x86/0x230
[   13.797176]  kunit_try_run_case+0x1a5/0x480
[   13.797198]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.797218]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.797244]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.797269]  ? __kthread_parkme+0x82/0x180
[   13.797290]  ? preempt_count_sub+0x50/0x80
[   13.797315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.797336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.797361]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.797397]  kthread+0x337/0x6f0
[   13.797418]  ? trace_preempt_on+0x20/0xc0
[   13.797441]  ? __pfx_kthread+0x10/0x10
[   13.797463]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.797487]  ? calculate_sigpending+0x7b/0xa0
[   13.797511]  ? __pfx_kthread+0x10/0x10
[   13.797533]  ret_from_fork+0x116/0x1d0
[   13.797553]  ? __pfx_kthread+0x10/0x10
[   13.797575]  ret_from_fork_asm+0x1a/0x30
[   13.797605]  </TASK>
[   13.797618] 
[   13.805776] Allocated by task 283:
[   13.805967]  kasan_save_stack+0x45/0x70
[   13.806252]  kasan_save_track+0x18/0x40
[   13.806467]  kasan_save_alloc_info+0x3b/0x50
[   13.806659]  __kasan_kmalloc+0xb7/0xc0
[   13.806865]  __kmalloc_cache_noprof+0x189/0x420
[   13.807248]  kasan_atomics+0x95/0x310
[   13.807464]  kunit_try_run_case+0x1a5/0x480
[   13.807636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.807896]  kthread+0x337/0x6f0
[   13.808159]  ret_from_fork+0x116/0x1d0
[   13.808344]  ret_from_fork_asm+0x1a/0x30
[   13.808526] 
[   13.808601] The buggy address belongs to the object at ffff8881039bd780
[   13.808601]  which belongs to the cache kmalloc-64 of size 64
[   13.809213] The buggy address is located 0 bytes to the right of
[   13.809213]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.809772] 
[   13.809875] The buggy address belongs to the physical page:
[   13.810168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.810532] flags: 0x200000000000000(node=0|zone=2)
[   13.810758] page_type: f5(slab)
[   13.810920] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.811356] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.811608] page dumped because: kasan: bad access detected
[   13.811884] 
[   13.811979] Memory state around the buggy address:
[   13.812281]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.812610]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.812953] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.813260]                                      ^
[   13.813469]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.813823]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.814214] ==================================================================
[   14.753193] ==================================================================
[   14.753612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   14.753868] Read of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.754296] 
[   14.754498] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.754545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.754568] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.754590] Call Trace:
[   14.754604]  <TASK>
[   14.754619]  dump_stack_lvl+0x73/0xb0
[   14.754659]  print_report+0xd1/0x650
[   14.754683]  ? __virt_addr_valid+0x1db/0x2d0
[   14.754706]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.754729]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.754752]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.754775]  kasan_report+0x141/0x180
[   14.754799]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.754827]  __asan_report_load8_noabort+0x18/0x20
[   14.754850]  kasan_atomics_helper+0x4f71/0x5450
[   14.754880]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.754913]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.754934]  ? ret_from_fork_asm+0x1a/0x30
[   14.754955]  ? kasan_atomics+0x152/0x310
[   14.754991]  kasan_atomics+0x1dc/0x310
[   14.755013]  ? __pfx_kasan_atomics+0x10/0x10
[   14.755035]  ? __pfx_read_tsc+0x10/0x10
[   14.755056]  ? ktime_get_ts64+0x86/0x230
[   14.755081]  kunit_try_run_case+0x1a5/0x480
[   14.755103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.755124]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.755150]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.755175]  ? __kthread_parkme+0x82/0x180
[   14.755196]  ? preempt_count_sub+0x50/0x80
[   14.755220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.755242]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.755267]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.755293]  kthread+0x337/0x6f0
[   14.755313]  ? trace_preempt_on+0x20/0xc0
[   14.755337]  ? __pfx_kthread+0x10/0x10
[   14.755358]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.755390]  ? calculate_sigpending+0x7b/0xa0
[   14.755414]  ? __pfx_kthread+0x10/0x10
[   14.755436]  ret_from_fork+0x116/0x1d0
[   14.755456]  ? __pfx_kthread+0x10/0x10
[   14.755478]  ret_from_fork_asm+0x1a/0x30
[   14.755509]  </TASK>
[   14.755521] 
[   14.764585] Allocated by task 283:
[   14.764777]  kasan_save_stack+0x45/0x70
[   14.764988]  kasan_save_track+0x18/0x40
[   14.765187]  kasan_save_alloc_info+0x3b/0x50
[   14.765409]  __kasan_kmalloc+0xb7/0xc0
[   14.765598]  __kmalloc_cache_noprof+0x189/0x420
[   14.765850]  kasan_atomics+0x95/0x310
[   14.766004]  kunit_try_run_case+0x1a5/0x480
[   14.766246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.766511]  kthread+0x337/0x6f0
[   14.766690]  ret_from_fork+0x116/0x1d0
[   14.766889]  ret_from_fork_asm+0x1a/0x30
[   14.767075] 
[   14.767149] The buggy address belongs to the object at ffff8881039bd780
[   14.767149]  which belongs to the cache kmalloc-64 of size 64
[   14.767651] The buggy address is located 0 bytes to the right of
[   14.767651]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.768276] 
[   14.768350] The buggy address belongs to the physical page:
[   14.768641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.768994] flags: 0x200000000000000(node=0|zone=2)
[   14.769220] page_type: f5(slab)
[   14.769425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.769742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.770083] page dumped because: kasan: bad access detected
[   14.770310] 
[   14.770420] Memory state around the buggy address:
[   14.770620]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.770950]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.771260] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.771508]                                      ^
[   14.771664]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.771880]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.772217] ==================================================================
[   13.578946] ==================================================================
[   13.579265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   13.579587] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.579889] 
[   13.579975] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.580018] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.580031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.580053] Call Trace:
[   13.580066]  <TASK>
[   13.580081]  dump_stack_lvl+0x73/0xb0
[   13.580106]  print_report+0xd1/0x650
[   13.580130]  ? __virt_addr_valid+0x1db/0x2d0
[   13.580152]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.580175]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.580198]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.580221]  kasan_report+0x141/0x180
[   13.580245]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.580273]  __asan_report_store4_noabort+0x1b/0x30
[   13.580295]  kasan_atomics_helper+0x4b3a/0x5450
[   13.580319]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.580342]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.580364]  ? ret_from_fork_asm+0x1a/0x30
[   13.580407]  ? kasan_atomics+0x152/0x310
[   13.580431]  kasan_atomics+0x1dc/0x310
[   13.580452]  ? __pfx_kasan_atomics+0x10/0x10
[   13.580474]  ? __pfx_read_tsc+0x10/0x10
[   13.580495]  ? ktime_get_ts64+0x86/0x230
[   13.580521]  kunit_try_run_case+0x1a5/0x480
[   13.580542]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.580563]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.580588]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.580614]  ? __kthread_parkme+0x82/0x180
[   13.580635]  ? preempt_count_sub+0x50/0x80
[   13.580659]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.580681]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.580706]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.580732]  kthread+0x337/0x6f0
[   13.580752]  ? trace_preempt_on+0x20/0xc0
[   13.580776]  ? __pfx_kthread+0x10/0x10
[   13.580797]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.580821]  ? calculate_sigpending+0x7b/0xa0
[   13.580846]  ? __pfx_kthread+0x10/0x10
[   13.580869]  ret_from_fork+0x116/0x1d0
[   13.580888]  ? __pfx_kthread+0x10/0x10
[   13.580959]  ret_from_fork_asm+0x1a/0x30
[   13.580990]  </TASK>
[   13.581128] 
[   13.589940] Allocated by task 283:
[   13.590104]  kasan_save_stack+0x45/0x70
[   13.590315]  kasan_save_track+0x18/0x40
[   13.590532]  kasan_save_alloc_info+0x3b/0x50
[   13.590715]  __kasan_kmalloc+0xb7/0xc0
[   13.590933]  __kmalloc_cache_noprof+0x189/0x420
[   13.591136]  kasan_atomics+0x95/0x310
[   13.591304]  kunit_try_run_case+0x1a5/0x480
[   13.591511]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.591691]  kthread+0x337/0x6f0
[   13.591865]  ret_from_fork+0x116/0x1d0
[   13.592138]  ret_from_fork_asm+0x1a/0x30
[   13.592309] 
[   13.592406] The buggy address belongs to the object at ffff8881039bd780
[   13.592406]  which belongs to the cache kmalloc-64 of size 64
[   13.592901] The buggy address is located 0 bytes to the right of
[   13.592901]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.593665] 
[   13.593811] The buggy address belongs to the physical page:
[   13.594023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.594464] flags: 0x200000000000000(node=0|zone=2)
[   13.594701] page_type: f5(slab)
[   13.594867] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.595142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.595372] page dumped because: kasan: bad access detected
[   13.595634] 
[   13.595778] Memory state around the buggy address:
[   13.596038]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.596279]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.596516] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.597141]                                      ^
[   13.597393]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.597710]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.598056] ==================================================================
[   14.612515] ==================================================================
[   14.612866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   14.613798] Read of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.614406] 
[   14.614657] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.614706] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.614720] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.614742] Call Trace:
[   14.614760]  <TASK>
[   14.614815]  dump_stack_lvl+0x73/0xb0
[   14.614845]  print_report+0xd1/0x650
[   14.614871]  ? __virt_addr_valid+0x1db/0x2d0
[   14.614895]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.614917]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.614941]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.614964]  kasan_report+0x141/0x180
[   14.614990]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.615018]  __asan_report_load8_noabort+0x18/0x20
[   14.615040]  kasan_atomics_helper+0x4f30/0x5450
[   14.615063]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.615087]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.615108]  ? ret_from_fork_asm+0x1a/0x30
[   14.615130]  ? kasan_atomics+0x152/0x310
[   14.615154]  kasan_atomics+0x1dc/0x310
[   14.615173]  ? __pfx_kasan_atomics+0x10/0x10
[   14.615195]  ? __pfx_read_tsc+0x10/0x10
[   14.615217]  ? ktime_get_ts64+0x86/0x230
[   14.615243]  kunit_try_run_case+0x1a5/0x480
[   14.615265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.615285]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.615312]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.615338]  ? __kthread_parkme+0x82/0x180
[   14.615359]  ? preempt_count_sub+0x50/0x80
[   14.615395]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.615417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.615442]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.615467]  kthread+0x337/0x6f0
[   14.615487]  ? trace_preempt_on+0x20/0xc0
[   14.615512]  ? __pfx_kthread+0x10/0x10
[   14.615534]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.615558]  ? calculate_sigpending+0x7b/0xa0
[   14.615583]  ? __pfx_kthread+0x10/0x10
[   14.615605]  ret_from_fork+0x116/0x1d0
[   14.615623]  ? __pfx_kthread+0x10/0x10
[   14.615644]  ret_from_fork_asm+0x1a/0x30
[   14.615675]  </TASK>
[   14.615686] 
[   14.627019] Allocated by task 283:
[   14.627448]  kasan_save_stack+0x45/0x70
[   14.627721]  kasan_save_track+0x18/0x40
[   14.628011]  kasan_save_alloc_info+0x3b/0x50
[   14.628221]  __kasan_kmalloc+0xb7/0xc0
[   14.628413]  __kmalloc_cache_noprof+0x189/0x420
[   14.628630]  kasan_atomics+0x95/0x310
[   14.629191]  kunit_try_run_case+0x1a5/0x480
[   14.629460]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.629906]  kthread+0x337/0x6f0
[   14.630198]  ret_from_fork+0x116/0x1d0
[   14.630615]  ret_from_fork_asm+0x1a/0x30
[   14.631039] 
[   14.631133] The buggy address belongs to the object at ffff8881039bd780
[   14.631133]  which belongs to the cache kmalloc-64 of size 64
[   14.631635] The buggy address is located 0 bytes to the right of
[   14.631635]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.632525] 
[   14.632760] The buggy address belongs to the physical page:
[   14.633128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.633477] flags: 0x200000000000000(node=0|zone=2)
[   14.633692] page_type: f5(slab)
[   14.634166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.634636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.635139] page dumped because: kasan: bad access detected
[   14.635512] 
[   14.635607] Memory state around the buggy address:
[   14.636149]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.636602]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.637126] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.637442]                                      ^
[   14.637649]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.638207]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.638727] ==================================================================
[   14.871832] ==================================================================
[   14.872178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   14.872536] Read of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.872882] 
[   14.873002] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.873046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.873059] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.873079] Call Trace:
[   14.873094]  <TASK>
[   14.873109]  dump_stack_lvl+0x73/0xb0
[   14.873135]  print_report+0xd1/0x650
[   14.873158]  ? __virt_addr_valid+0x1db/0x2d0
[   14.873181]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.873203]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.873226]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.873249]  kasan_report+0x141/0x180
[   14.873272]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.873316]  __asan_report_load8_noabort+0x18/0x20
[   14.873337]  kasan_atomics_helper+0x4fa5/0x5450
[   14.873361]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.873395]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.873415]  ? ret_from_fork_asm+0x1a/0x30
[   14.873437]  ? kasan_atomics+0x152/0x310
[   14.873461]  kasan_atomics+0x1dc/0x310
[   14.873481]  ? __pfx_kasan_atomics+0x10/0x10
[   14.873503]  ? __pfx_read_tsc+0x10/0x10
[   14.873524]  ? ktime_get_ts64+0x86/0x230
[   14.873549]  kunit_try_run_case+0x1a5/0x480
[   14.873571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.873591]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.873617]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.873642]  ? __kthread_parkme+0x82/0x180
[   14.873663]  ? preempt_count_sub+0x50/0x80
[   14.873687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.873709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.873768]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.873793]  kthread+0x337/0x6f0
[   14.873826]  ? trace_preempt_on+0x20/0xc0
[   14.873852]  ? __pfx_kthread+0x10/0x10
[   14.873892]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.873917]  ? calculate_sigpending+0x7b/0xa0
[   14.873941]  ? __pfx_kthread+0x10/0x10
[   14.873973]  ret_from_fork+0x116/0x1d0
[   14.873993]  ? __pfx_kthread+0x10/0x10
[   14.874014]  ret_from_fork_asm+0x1a/0x30
[   14.874048]  </TASK>
[   14.874059] 
[   14.882630] Allocated by task 283:
[   14.882766]  kasan_save_stack+0x45/0x70
[   14.882915]  kasan_save_track+0x18/0x40
[   14.883222]  kasan_save_alloc_info+0x3b/0x50
[   14.883454]  __kasan_kmalloc+0xb7/0xc0
[   14.883649]  __kmalloc_cache_noprof+0x189/0x420
[   14.883869]  kasan_atomics+0x95/0x310
[   14.884107]  kunit_try_run_case+0x1a5/0x480
[   14.884354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.884621]  kthread+0x337/0x6f0
[   14.884876]  ret_from_fork+0x116/0x1d0
[   14.885014]  ret_from_fork_asm+0x1a/0x30
[   14.885155] 
[   14.885253] The buggy address belongs to the object at ffff8881039bd780
[   14.885253]  which belongs to the cache kmalloc-64 of size 64
[   14.885966] The buggy address is located 0 bytes to the right of
[   14.885966]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.886562] 
[   14.886639] The buggy address belongs to the physical page:
[   14.886981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.887404] flags: 0x200000000000000(node=0|zone=2)
[   14.887611] page_type: f5(slab)
[   14.887735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.888169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.888493] page dumped because: kasan: bad access detected
[   14.888683] 
[   14.888753] Memory state around the buggy address:
[   14.888910]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.889296]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.889632] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.890098]                                      ^
[   14.890309]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.890539]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.891005] ==================================================================
[   14.090714] ==================================================================
[   14.091337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   14.092000] Read of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.092495] 
[   14.092676] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.092722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.092735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.092759] Call Trace:
[   14.092773]  <TASK>
[   14.092789]  dump_stack_lvl+0x73/0xb0
[   14.092816]  print_report+0xd1/0x650
[   14.092841]  ? __virt_addr_valid+0x1db/0x2d0
[   14.092865]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.092887]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.092911]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.092934]  kasan_report+0x141/0x180
[   14.092957]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.092985]  __asan_report_load4_noabort+0x18/0x20
[   14.093006]  kasan_atomics_helper+0x4a02/0x5450
[   14.093030]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.093053]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.093161]  ? ret_from_fork_asm+0x1a/0x30
[   14.093187]  ? kasan_atomics+0x152/0x310
[   14.093213]  kasan_atomics+0x1dc/0x310
[   14.093233]  ? __pfx_kasan_atomics+0x10/0x10
[   14.093256]  ? __pfx_read_tsc+0x10/0x10
[   14.093277]  ? ktime_get_ts64+0x86/0x230
[   14.093304]  kunit_try_run_case+0x1a5/0x480
[   14.093326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.093346]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.093372]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.093410]  ? __kthread_parkme+0x82/0x180
[   14.093432]  ? preempt_count_sub+0x50/0x80
[   14.093456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.093478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.093503]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.093528]  kthread+0x337/0x6f0
[   14.093548]  ? trace_preempt_on+0x20/0xc0
[   14.093572]  ? __pfx_kthread+0x10/0x10
[   14.093593]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.093618]  ? calculate_sigpending+0x7b/0xa0
[   14.093642]  ? __pfx_kthread+0x10/0x10
[   14.093664]  ret_from_fork+0x116/0x1d0
[   14.093683]  ? __pfx_kthread+0x10/0x10
[   14.093705]  ret_from_fork_asm+0x1a/0x30
[   14.093738]  </TASK>
[   14.093750] 
[   14.102349] Allocated by task 283:
[   14.102536]  kasan_save_stack+0x45/0x70
[   14.102688]  kasan_save_track+0x18/0x40
[   14.103103]  kasan_save_alloc_info+0x3b/0x50
[   14.103333]  __kasan_kmalloc+0xb7/0xc0
[   14.103538]  __kmalloc_cache_noprof+0x189/0x420
[   14.103762]  kasan_atomics+0x95/0x310
[   14.103924]  kunit_try_run_case+0x1a5/0x480
[   14.104091]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.104267]  kthread+0x337/0x6f0
[   14.104397]  ret_from_fork+0x116/0x1d0
[   14.104550]  ret_from_fork_asm+0x1a/0x30
[   14.104751] 
[   14.104850] The buggy address belongs to the object at ffff8881039bd780
[   14.104850]  which belongs to the cache kmalloc-64 of size 64
[   14.105806] The buggy address is located 0 bytes to the right of
[   14.105806]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.106194] 
[   14.106524] The buggy address belongs to the physical page:
[   14.106872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.107328] flags: 0x200000000000000(node=0|zone=2)
[   14.107664] page_type: f5(slab)
[   14.107915] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.108280] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.108550] page dumped because: kasan: bad access detected
[   14.108883] 
[   14.109022] Memory state around the buggy address:
[   14.109181]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.109412]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.109787] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.110088]                                      ^
[   14.110246]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.110987]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.111261] ==================================================================
[   13.677989] ==================================================================
[   13.678340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   13.678942] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.679335] 
[   13.679462] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.679511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.679524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.679546] Call Trace:
[   13.679564]  <TASK>
[   13.679581]  dump_stack_lvl+0x73/0xb0
[   13.679609]  print_report+0xd1/0x650
[   13.679634]  ? __virt_addr_valid+0x1db/0x2d0
[   13.679657]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.679680]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.679725]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.679749]  kasan_report+0x141/0x180
[   13.679772]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.679799]  kasan_check_range+0x10c/0x1c0
[   13.679824]  __kasan_check_write+0x18/0x20
[   13.679845]  kasan_atomics_helper+0x7c7/0x5450
[   13.679868]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.679891]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.679912]  ? ret_from_fork_asm+0x1a/0x30
[   13.679934]  ? kasan_atomics+0x152/0x310
[   13.679958]  kasan_atomics+0x1dc/0x310
[   13.679978]  ? __pfx_kasan_atomics+0x10/0x10
[   13.680058]  ? __pfx_read_tsc+0x10/0x10
[   13.680081]  ? ktime_get_ts64+0x86/0x230
[   13.680107]  kunit_try_run_case+0x1a5/0x480
[   13.680129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.680150]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.680175]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.680201]  ? __kthread_parkme+0x82/0x180
[   13.680222]  ? preempt_count_sub+0x50/0x80
[   13.680245]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.680267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.680292]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.680318]  kthread+0x337/0x6f0
[   13.680338]  ? trace_preempt_on+0x20/0xc0
[   13.680362]  ? __pfx_kthread+0x10/0x10
[   13.680393]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.680418]  ? calculate_sigpending+0x7b/0xa0
[   13.680443]  ? __pfx_kthread+0x10/0x10
[   13.680465]  ret_from_fork+0x116/0x1d0
[   13.680484]  ? __pfx_kthread+0x10/0x10
[   13.680505]  ret_from_fork_asm+0x1a/0x30
[   13.680536]  </TASK>
[   13.680548] 
[   13.689215] Allocated by task 283:
[   13.689388]  kasan_save_stack+0x45/0x70
[   13.689586]  kasan_save_track+0x18/0x40
[   13.689810]  kasan_save_alloc_info+0x3b/0x50
[   13.690216]  __kasan_kmalloc+0xb7/0xc0
[   13.690447]  __kmalloc_cache_noprof+0x189/0x420
[   13.690674]  kasan_atomics+0x95/0x310
[   13.690842]  kunit_try_run_case+0x1a5/0x480
[   13.691055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.691328]  kthread+0x337/0x6f0
[   13.691515]  ret_from_fork+0x116/0x1d0
[   13.691710]  ret_from_fork_asm+0x1a/0x30
[   13.691917] 
[   13.692002] The buggy address belongs to the object at ffff8881039bd780
[   13.692002]  which belongs to the cache kmalloc-64 of size 64
[   13.692361] The buggy address is located 0 bytes to the right of
[   13.692361]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.692822] 
[   13.692918] The buggy address belongs to the physical page:
[   13.693167] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.693596] flags: 0x200000000000000(node=0|zone=2)
[   13.693852] page_type: f5(slab)
[   13.693977] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.694452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.694836] page dumped because: kasan: bad access detected
[   13.695171] 
[   13.695272] Memory state around the buggy address:
[   13.695519]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.695861]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.696211] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.696527]                                      ^
[   13.696730]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.697079]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.697298] ==================================================================
[   13.440228] ==================================================================
[   13.440938] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   13.441265] Read of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.441576] 
[   13.441679] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.441724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.441737] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.441760] Call Trace:
[   13.441772]  <TASK>
[   13.441975]  dump_stack_lvl+0x73/0xb0
[   13.442013]  print_report+0xd1/0x650
[   13.442044]  ? __virt_addr_valid+0x1db/0x2d0
[   13.442160]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.442183]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.442206]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.442229]  kasan_report+0x141/0x180
[   13.442252]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.442279]  __asan_report_load4_noabort+0x18/0x20
[   13.442300]  kasan_atomics_helper+0x4bbc/0x5450
[   13.442322]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.442345]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.442366]  ? ret_from_fork_asm+0x1a/0x30
[   13.442401]  ? kasan_atomics+0x152/0x310
[   13.442425]  kasan_atomics+0x1dc/0x310
[   13.442444]  ? __pfx_kasan_atomics+0x10/0x10
[   13.442465]  ? __pfx_read_tsc+0x10/0x10
[   13.442486]  ? ktime_get_ts64+0x86/0x230
[   13.442512]  kunit_try_run_case+0x1a5/0x480
[   13.442535]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.442555]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.442581]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.442607]  ? __kthread_parkme+0x82/0x180
[   13.442627]  ? preempt_count_sub+0x50/0x80
[   13.442652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.442673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.442697]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.442730]  kthread+0x337/0x6f0
[   13.442750]  ? trace_preempt_on+0x20/0xc0
[   13.442774]  ? __pfx_kthread+0x10/0x10
[   13.442795]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.442818]  ? calculate_sigpending+0x7b/0xa0
[   13.442842]  ? __pfx_kthread+0x10/0x10
[   13.442864]  ret_from_fork+0x116/0x1d0
[   13.442883]  ? __pfx_kthread+0x10/0x10
[   13.442905]  ret_from_fork_asm+0x1a/0x30
[   13.442935]  </TASK>
[   13.442946] 
[   13.451313] Allocated by task 283:
[   13.451494]  kasan_save_stack+0x45/0x70
[   13.451692]  kasan_save_track+0x18/0x40
[   13.451860]  kasan_save_alloc_info+0x3b/0x50
[   13.452040]  __kasan_kmalloc+0xb7/0xc0
[   13.452175]  __kmalloc_cache_noprof+0x189/0x420
[   13.452327]  kasan_atomics+0x95/0x310
[   13.452503]  kunit_try_run_case+0x1a5/0x480
[   13.452716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.453132]  kthread+0x337/0x6f0
[   13.453316]  ret_from_fork+0x116/0x1d0
[   13.453518]  ret_from_fork_asm+0x1a/0x30
[   13.453676] 
[   13.453832] The buggy address belongs to the object at ffff8881039bd780
[   13.453832]  which belongs to the cache kmalloc-64 of size 64
[   13.454524] The buggy address is located 0 bytes to the right of
[   13.454524]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.454984] 
[   13.455059] The buggy address belongs to the physical page:
[   13.455290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.455785] flags: 0x200000000000000(node=0|zone=2)
[   13.456033] page_type: f5(slab)
[   13.456239] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.456540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.456992] page dumped because: kasan: bad access detected
[   13.457220] 
[   13.457297] Memory state around the buggy address:
[   13.457482]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.457701]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.457944] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.458271]                                      ^
[   13.458516]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.459106]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.459397] ==================================================================
[   14.519390] ==================================================================
[   14.519768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   14.520101] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.520460] 
[   14.520547] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.520649] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.520687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.520709] Call Trace:
[   14.520727]  <TASK>
[   14.520743]  dump_stack_lvl+0x73/0xb0
[   14.520771]  print_report+0xd1/0x650
[   14.520795]  ? __virt_addr_valid+0x1db/0x2d0
[   14.520818]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.520841]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.520863]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.520887]  kasan_report+0x141/0x180
[   14.520910]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.520970]  kasan_check_range+0x10c/0x1c0
[   14.521020]  __kasan_check_write+0x18/0x20
[   14.521086]  kasan_atomics_helper+0x19e3/0x5450
[   14.521112]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.521135]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.521157]  ? ret_from_fork_asm+0x1a/0x30
[   14.521179]  ? kasan_atomics+0x152/0x310
[   14.521203]  kasan_atomics+0x1dc/0x310
[   14.521223]  ? __pfx_kasan_atomics+0x10/0x10
[   14.521244]  ? __pfx_read_tsc+0x10/0x10
[   14.521266]  ? ktime_get_ts64+0x86/0x230
[   14.521292]  kunit_try_run_case+0x1a5/0x480
[   14.521314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.521335]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.521362]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.521399]  ? __kthread_parkme+0x82/0x180
[   14.521420]  ? preempt_count_sub+0x50/0x80
[   14.521444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.521466]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.521490]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.521515]  kthread+0x337/0x6f0
[   14.521535]  ? trace_preempt_on+0x20/0xc0
[   14.521560]  ? __pfx_kthread+0x10/0x10
[   14.521581]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.521606]  ? calculate_sigpending+0x7b/0xa0
[   14.521631]  ? __pfx_kthread+0x10/0x10
[   14.521653]  ret_from_fork+0x116/0x1d0
[   14.521673]  ? __pfx_kthread+0x10/0x10
[   14.521694]  ret_from_fork_asm+0x1a/0x30
[   14.521724]  </TASK>
[   14.521735] 
[   14.530422] Allocated by task 283:
[   14.530605]  kasan_save_stack+0x45/0x70
[   14.530864]  kasan_save_track+0x18/0x40
[   14.531063]  kasan_save_alloc_info+0x3b/0x50
[   14.531278]  __kasan_kmalloc+0xb7/0xc0
[   14.531522]  __kmalloc_cache_noprof+0x189/0x420
[   14.531718]  kasan_atomics+0x95/0x310
[   14.531863]  kunit_try_run_case+0x1a5/0x480
[   14.532097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.532325]  kthread+0x337/0x6f0
[   14.532498]  ret_from_fork+0x116/0x1d0
[   14.532686]  ret_from_fork_asm+0x1a/0x30
[   14.532909] 
[   14.532980] The buggy address belongs to the object at ffff8881039bd780
[   14.532980]  which belongs to the cache kmalloc-64 of size 64
[   14.533705] The buggy address is located 0 bytes to the right of
[   14.533705]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.534149] 
[   14.534224] The buggy address belongs to the physical page:
[   14.534444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.534894] flags: 0x200000000000000(node=0|zone=2)
[   14.535186] page_type: f5(slab)
[   14.535395] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.535765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.536081] page dumped because: kasan: bad access detected
[   14.536254] 
[   14.536348] Memory state around the buggy address:
[   14.536621]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.537047]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.537402] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.537733]                                      ^
[   14.537927]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.538347]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.538710] ==================================================================
[   13.598512] ==================================================================
[   13.598746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   13.598981] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.599308] 
[   13.599430] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.599492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.599506] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.599528] Call Trace:
[   13.599545]  <TASK>
[   13.599561]  dump_stack_lvl+0x73/0xb0
[   13.599590]  print_report+0xd1/0x650
[   13.599614]  ? __virt_addr_valid+0x1db/0x2d0
[   13.599638]  ? kasan_atomics_helper+0x565/0x5450
[   13.599661]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.599685]  ? kasan_atomics_helper+0x565/0x5450
[   13.599708]  kasan_report+0x141/0x180
[   13.599732]  ? kasan_atomics_helper+0x565/0x5450
[   13.599760]  kasan_check_range+0x10c/0x1c0
[   13.599785]  __kasan_check_write+0x18/0x20
[   13.599806]  kasan_atomics_helper+0x565/0x5450
[   13.599830]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.599853]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.599874]  ? ret_from_fork_asm+0x1a/0x30
[   13.599897]  ? kasan_atomics+0x152/0x310
[   13.599921]  kasan_atomics+0x1dc/0x310
[   13.599942]  ? __pfx_kasan_atomics+0x10/0x10
[   13.599966]  ? __pfx_read_tsc+0x10/0x10
[   13.599989]  ? ktime_get_ts64+0x86/0x230
[   13.600016]  kunit_try_run_case+0x1a5/0x480
[   13.600038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.600058]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.600137]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.600165]  ? __kthread_parkme+0x82/0x180
[   13.600186]  ? preempt_count_sub+0x50/0x80
[   13.600211]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.600233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.600258]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.600284]  kthread+0x337/0x6f0
[   13.600304]  ? trace_preempt_on+0x20/0xc0
[   13.600329]  ? __pfx_kthread+0x10/0x10
[   13.600351]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.600386]  ? calculate_sigpending+0x7b/0xa0
[   13.600412]  ? __pfx_kthread+0x10/0x10
[   13.600435]  ret_from_fork+0x116/0x1d0
[   13.600454]  ? __pfx_kthread+0x10/0x10
[   13.600477]  ret_from_fork_asm+0x1a/0x30
[   13.600512]  </TASK>
[   13.600523] 
[   13.608850] Allocated by task 283:
[   13.609251]  kasan_save_stack+0x45/0x70
[   13.609483]  kasan_save_track+0x18/0x40
[   13.609690]  kasan_save_alloc_info+0x3b/0x50
[   13.609918]  __kasan_kmalloc+0xb7/0xc0
[   13.610312]  __kmalloc_cache_noprof+0x189/0x420
[   13.610565]  kasan_atomics+0x95/0x310
[   13.610798]  kunit_try_run_case+0x1a5/0x480
[   13.611019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.611280]  kthread+0x337/0x6f0
[   13.611445]  ret_from_fork+0x116/0x1d0
[   13.611582]  ret_from_fork_asm+0x1a/0x30
[   13.611907] 
[   13.612039] The buggy address belongs to the object at ffff8881039bd780
[   13.612039]  which belongs to the cache kmalloc-64 of size 64
[   13.612517] The buggy address is located 0 bytes to the right of
[   13.612517]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.613349] 
[   13.613473] The buggy address belongs to the physical page:
[   13.613651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.614163] flags: 0x200000000000000(node=0|zone=2)
[   13.614333] page_type: f5(slab)
[   13.614468] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.614703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.615110] page dumped because: kasan: bad access detected
[   13.615366] 
[   13.615472] Memory state around the buggy address:
[   13.615698]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.616020]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.616329] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.616552]                                      ^
[   13.616711]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.617264]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.617617] ==================================================================
[   14.657050] ==================================================================
[   14.657406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   14.657752] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.658211] 
[   14.658325] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.658369] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.658392] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.658414] Call Trace:
[   14.658427]  <TASK>
[   14.658441]  dump_stack_lvl+0x73/0xb0
[   14.658468]  print_report+0xd1/0x650
[   14.658491]  ? __virt_addr_valid+0x1db/0x2d0
[   14.658513]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.658546]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.658569]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.658592]  kasan_report+0x141/0x180
[   14.658615]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.658643]  kasan_check_range+0x10c/0x1c0
[   14.658668]  __kasan_check_write+0x18/0x20
[   14.658688]  kasan_atomics_helper+0x1d7a/0x5450
[   14.658712]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.658735]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.658756]  ? ret_from_fork_asm+0x1a/0x30
[   14.658778]  ? kasan_atomics+0x152/0x310
[   14.658801]  kasan_atomics+0x1dc/0x310
[   14.658821]  ? __pfx_kasan_atomics+0x10/0x10
[   14.658842]  ? __pfx_read_tsc+0x10/0x10
[   14.658876]  ? ktime_get_ts64+0x86/0x230
[   14.658900]  kunit_try_run_case+0x1a5/0x480
[   14.658922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.658942]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.658967]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.658993]  ? __kthread_parkme+0x82/0x180
[   14.659014]  ? preempt_count_sub+0x50/0x80
[   14.659037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.659060]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.659085]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.659110]  kthread+0x337/0x6f0
[   14.659130]  ? trace_preempt_on+0x20/0xc0
[   14.659153]  ? __pfx_kthread+0x10/0x10
[   14.659175]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.659199]  ? calculate_sigpending+0x7b/0xa0
[   14.659223]  ? __pfx_kthread+0x10/0x10
[   14.659245]  ret_from_fork+0x116/0x1d0
[   14.659264]  ? __pfx_kthread+0x10/0x10
[   14.659285]  ret_from_fork_asm+0x1a/0x30
[   14.659316]  </TASK>
[   14.659328] 
[   14.667186] Allocated by task 283:
[   14.667341]  kasan_save_stack+0x45/0x70
[   14.667550]  kasan_save_track+0x18/0x40
[   14.667689]  kasan_save_alloc_info+0x3b/0x50
[   14.667908]  __kasan_kmalloc+0xb7/0xc0
[   14.668105]  __kmalloc_cache_noprof+0x189/0x420
[   14.668295]  kasan_atomics+0x95/0x310
[   14.668480]  kunit_try_run_case+0x1a5/0x480
[   14.668657]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.668953]  kthread+0x337/0x6f0
[   14.669126]  ret_from_fork+0x116/0x1d0
[   14.669269]  ret_from_fork_asm+0x1a/0x30
[   14.669421] 
[   14.669518] The buggy address belongs to the object at ffff8881039bd780
[   14.669518]  which belongs to the cache kmalloc-64 of size 64
[   14.670198] The buggy address is located 0 bytes to the right of
[   14.670198]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.670623] 
[   14.670696] The buggy address belongs to the physical page:
[   14.670872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.671115] flags: 0x200000000000000(node=0|zone=2)
[   14.671278] page_type: f5(slab)
[   14.671414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.671753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.672096] page dumped because: kasan: bad access detected
[   14.672347] 
[   14.672450] Memory state around the buggy address:
[   14.672672]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.673030]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.673244] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.673467]                                      ^
[   14.673620]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.673836]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.674120] ==================================================================
[   14.792315] ==================================================================
[   14.792690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   14.793097] Read of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.793481] 
[   14.793604] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.793648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.793660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.793681] Call Trace:
[   14.793697]  <TASK>
[   14.793712]  dump_stack_lvl+0x73/0xb0
[   14.793738]  print_report+0xd1/0x650
[   14.793761]  ? __virt_addr_valid+0x1db/0x2d0
[   14.793785]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.793824]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.793847]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.793871]  kasan_report+0x141/0x180
[   14.793894]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.793923]  __asan_report_load8_noabort+0x18/0x20
[   14.793945]  kasan_atomics_helper+0x4f98/0x5450
[   14.793968]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.793991]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.794013]  ? ret_from_fork_asm+0x1a/0x30
[   14.794039]  ? kasan_atomics+0x152/0x310
[   14.794062]  kasan_atomics+0x1dc/0x310
[   14.794082]  ? __pfx_kasan_atomics+0x10/0x10
[   14.794103]  ? __pfx_read_tsc+0x10/0x10
[   14.794125]  ? ktime_get_ts64+0x86/0x230
[   14.794150]  kunit_try_run_case+0x1a5/0x480
[   14.794171]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.794191]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.794217]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.794242]  ? __kthread_parkme+0x82/0x180
[   14.794263]  ? preempt_count_sub+0x50/0x80
[   14.794287]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.794309]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.794334]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.794359]  kthread+0x337/0x6f0
[   14.794388]  ? trace_preempt_on+0x20/0xc0
[   14.794412]  ? __pfx_kthread+0x10/0x10
[   14.794433]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.794457]  ? calculate_sigpending+0x7b/0xa0
[   14.794481]  ? __pfx_kthread+0x10/0x10
[   14.794503]  ret_from_fork+0x116/0x1d0
[   14.794523]  ? __pfx_kthread+0x10/0x10
[   14.794544]  ret_from_fork_asm+0x1a/0x30
[   14.794574]  </TASK>
[   14.794585] 
[   14.802745] Allocated by task 283:
[   14.802935]  kasan_save_stack+0x45/0x70
[   14.803211]  kasan_save_track+0x18/0x40
[   14.803518]  kasan_save_alloc_info+0x3b/0x50
[   14.803791]  __kasan_kmalloc+0xb7/0xc0
[   14.803986]  __kmalloc_cache_noprof+0x189/0x420
[   14.804223]  kasan_atomics+0x95/0x310
[   14.804419]  kunit_try_run_case+0x1a5/0x480
[   14.804625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.804919]  kthread+0x337/0x6f0
[   14.805085]  ret_from_fork+0x116/0x1d0
[   14.805235]  ret_from_fork_asm+0x1a/0x30
[   14.805384] 
[   14.805457] The buggy address belongs to the object at ffff8881039bd780
[   14.805457]  which belongs to the cache kmalloc-64 of size 64
[   14.806362] The buggy address is located 0 bytes to the right of
[   14.806362]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.806970] 
[   14.807046] The buggy address belongs to the physical page:
[   14.807221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.807824] flags: 0x200000000000000(node=0|zone=2)
[   14.808057] page_type: f5(slab)
[   14.808181] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.808435] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.808778] page dumped because: kasan: bad access detected
[   14.809230] 
[   14.809355] Memory state around the buggy address:
[   14.809667]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.809984]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.810209] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.810433]                                      ^
[   14.810628]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.811260]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.811741] ==================================================================
[   14.639430] ==================================================================
[   14.639694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   14.640091] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.640432] 
[   14.640546] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.640593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.640606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.640628] Call Trace:
[   14.640645]  <TASK>
[   14.640663]  dump_stack_lvl+0x73/0xb0
[   14.640690]  print_report+0xd1/0x650
[   14.640713]  ? __virt_addr_valid+0x1db/0x2d0
[   14.640736]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.640759]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.640782]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.640805]  kasan_report+0x141/0x180
[   14.640828]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.640856]  kasan_check_range+0x10c/0x1c0
[   14.640895]  __kasan_check_write+0x18/0x20
[   14.640915]  kasan_atomics_helper+0x1ce1/0x5450
[   14.640938]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.640962]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.640983]  ? ret_from_fork_asm+0x1a/0x30
[   14.641004]  ? kasan_atomics+0x152/0x310
[   14.641027]  kasan_atomics+0x1dc/0x310
[   14.641047]  ? __pfx_kasan_atomics+0x10/0x10
[   14.641068]  ? __pfx_read_tsc+0x10/0x10
[   14.641089]  ? ktime_get_ts64+0x86/0x230
[   14.641114]  kunit_try_run_case+0x1a5/0x480
[   14.641136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.641156]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.641181]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.641206]  ? __kthread_parkme+0x82/0x180
[   14.641227]  ? preempt_count_sub+0x50/0x80
[   14.641252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.641274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.641298]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.641323]  kthread+0x337/0x6f0
[   14.641343]  ? trace_preempt_on+0x20/0xc0
[   14.641366]  ? __pfx_kthread+0x10/0x10
[   14.641399]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.641423]  ? calculate_sigpending+0x7b/0xa0
[   14.641447]  ? __pfx_kthread+0x10/0x10
[   14.641469]  ret_from_fork+0x116/0x1d0
[   14.641488]  ? __pfx_kthread+0x10/0x10
[   14.641509]  ret_from_fork_asm+0x1a/0x30
[   14.641541]  </TASK>
[   14.641552] 
[   14.649474] Allocated by task 283:
[   14.649635]  kasan_save_stack+0x45/0x70
[   14.649784]  kasan_save_track+0x18/0x40
[   14.649943]  kasan_save_alloc_info+0x3b/0x50
[   14.650164]  __kasan_kmalloc+0xb7/0xc0
[   14.650358]  __kmalloc_cache_noprof+0x189/0x420
[   14.650600]  kasan_atomics+0x95/0x310
[   14.650764]  kunit_try_run_case+0x1a5/0x480
[   14.650985]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.651207]  kthread+0x337/0x6f0
[   14.651367]  ret_from_fork+0x116/0x1d0
[   14.651540]  ret_from_fork_asm+0x1a/0x30
[   14.651681] 
[   14.651764] The buggy address belongs to the object at ffff8881039bd780
[   14.651764]  which belongs to the cache kmalloc-64 of size 64
[   14.652298] The buggy address is located 0 bytes to the right of
[   14.652298]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.652846] 
[   14.652924] The buggy address belongs to the physical page:
[   14.653142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.653460] flags: 0x200000000000000(node=0|zone=2)
[   14.653687] page_type: f5(slab)
[   14.653867] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.654153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.654393] page dumped because: kasan: bad access detected
[   14.654568] 
[   14.654639] Memory state around the buggy address:
[   14.654794]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.655200]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.655532] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.656017]                                      ^
[   14.656204]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.656431]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.656645] ==================================================================
[   14.891571] ==================================================================
[   14.892023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   14.892397] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.892732] 
[   14.892882] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.892969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.892993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.893016] Call Trace:
[   14.893058]  <TASK>
[   14.893074]  dump_stack_lvl+0x73/0xb0
[   14.893100]  print_report+0xd1/0x650
[   14.893135]  ? __virt_addr_valid+0x1db/0x2d0
[   14.893158]  ? kasan_atomics_helper+0x224c/0x5450
[   14.893180]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.893204]  ? kasan_atomics_helper+0x224c/0x5450
[   14.893227]  kasan_report+0x141/0x180
[   14.893251]  ? kasan_atomics_helper+0x224c/0x5450
[   14.893278]  kasan_check_range+0x10c/0x1c0
[   14.893302]  __kasan_check_write+0x18/0x20
[   14.893322]  kasan_atomics_helper+0x224c/0x5450
[   14.893346]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.893368]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.893399]  ? ret_from_fork_asm+0x1a/0x30
[   14.893420]  ? kasan_atomics+0x152/0x310
[   14.893444]  kasan_atomics+0x1dc/0x310
[   14.893464]  ? __pfx_kasan_atomics+0x10/0x10
[   14.893485]  ? __pfx_read_tsc+0x10/0x10
[   14.893506]  ? ktime_get_ts64+0x86/0x230
[   14.893560]  kunit_try_run_case+0x1a5/0x480
[   14.893583]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.893604]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.893640]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.893665]  ? __kthread_parkme+0x82/0x180
[   14.893686]  ? preempt_count_sub+0x50/0x80
[   14.893710]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.893732]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.893756]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.893782]  kthread+0x337/0x6f0
[   14.893802]  ? trace_preempt_on+0x20/0xc0
[   14.893853]  ? __pfx_kthread+0x10/0x10
[   14.893875]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.893898]  ? calculate_sigpending+0x7b/0xa0
[   14.893933]  ? __pfx_kthread+0x10/0x10
[   14.893955]  ret_from_fork+0x116/0x1d0
[   14.893975]  ? __pfx_kthread+0x10/0x10
[   14.893995]  ret_from_fork_asm+0x1a/0x30
[   14.894031]  </TASK>
[   14.894042] 
[   14.902255] Allocated by task 283:
[   14.902444]  kasan_save_stack+0x45/0x70
[   14.902670]  kasan_save_track+0x18/0x40
[   14.902889]  kasan_save_alloc_info+0x3b/0x50
[   14.903126]  __kasan_kmalloc+0xb7/0xc0
[   14.903343]  __kmalloc_cache_noprof+0x189/0x420
[   14.903510]  kasan_atomics+0x95/0x310
[   14.903697]  kunit_try_run_case+0x1a5/0x480
[   14.903960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.904195]  kthread+0x337/0x6f0
[   14.904318]  ret_from_fork+0x116/0x1d0
[   14.904464]  ret_from_fork_asm+0x1a/0x30
[   14.904679] 
[   14.904854] The buggy address belongs to the object at ffff8881039bd780
[   14.904854]  which belongs to the cache kmalloc-64 of size 64
[   14.905363] The buggy address is located 0 bytes to the right of
[   14.905363]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.905739] 
[   14.905837] The buggy address belongs to the physical page:
[   14.906141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.906585] flags: 0x200000000000000(node=0|zone=2)
[   14.906900] page_type: f5(slab)
[   14.907112] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.907347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.907642] page dumped because: kasan: bad access detected
[   14.908130] 
[   14.908256] Memory state around the buggy address:
[   14.908546]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.908975]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.909327] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.909611]                                      ^
[   14.909840]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.910162]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.910490] ==================================================================
[   14.562711] ==================================================================
[   14.563022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   14.563327] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.564301] 
[   14.564438] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.564487] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.564500] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.564523] Call Trace:
[   14.564538]  <TASK>
[   14.564555]  dump_stack_lvl+0x73/0xb0
[   14.564583]  print_report+0xd1/0x650
[   14.564607]  ? __virt_addr_valid+0x1db/0x2d0
[   14.564629]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.564651]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.564675]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.564698]  kasan_report+0x141/0x180
[   14.564722]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.564749]  kasan_check_range+0x10c/0x1c0
[   14.564774]  __kasan_check_write+0x18/0x20
[   14.564794]  kasan_atomics_helper+0x1b22/0x5450
[   14.564818]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.564866]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.564912]  ? ret_from_fork_asm+0x1a/0x30
[   14.564934]  ? kasan_atomics+0x152/0x310
[   14.564958]  kasan_atomics+0x1dc/0x310
[   14.564989]  ? __pfx_kasan_atomics+0x10/0x10
[   14.565012]  ? __pfx_read_tsc+0x10/0x10
[   14.565033]  ? ktime_get_ts64+0x86/0x230
[   14.565058]  kunit_try_run_case+0x1a5/0x480
[   14.565080]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.565101]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.565127]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.565152]  ? __kthread_parkme+0x82/0x180
[   14.565173]  ? preempt_count_sub+0x50/0x80
[   14.565197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.565219]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.565244]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.565269]  kthread+0x337/0x6f0
[   14.565289]  ? trace_preempt_on+0x20/0xc0
[   14.565311]  ? __pfx_kthread+0x10/0x10
[   14.565333]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.565356]  ? calculate_sigpending+0x7b/0xa0
[   14.565389]  ? __pfx_kthread+0x10/0x10
[   14.565412]  ret_from_fork+0x116/0x1d0
[   14.565433]  ? __pfx_kthread+0x10/0x10
[   14.565457]  ret_from_fork_asm+0x1a/0x30
[   14.565489]  </TASK>
[   14.565501] 
[   14.576300] Allocated by task 283:
[   14.576568]  kasan_save_stack+0x45/0x70
[   14.576937]  kasan_save_track+0x18/0x40
[   14.577195]  kasan_save_alloc_info+0x3b/0x50
[   14.577538]  __kasan_kmalloc+0xb7/0xc0
[   14.577859]  __kmalloc_cache_noprof+0x189/0x420
[   14.578090]  kasan_atomics+0x95/0x310
[   14.578277]  kunit_try_run_case+0x1a5/0x480
[   14.578471]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.578799]  kthread+0x337/0x6f0
[   14.579144]  ret_from_fork+0x116/0x1d0
[   14.579316]  ret_from_fork_asm+0x1a/0x30
[   14.579660] 
[   14.579822] The buggy address belongs to the object at ffff8881039bd780
[   14.579822]  which belongs to the cache kmalloc-64 of size 64
[   14.580498] The buggy address is located 0 bytes to the right of
[   14.580498]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.581330] 
[   14.581530] The buggy address belongs to the physical page:
[   14.581865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.582367] flags: 0x200000000000000(node=0|zone=2)
[   14.582692] page_type: f5(slab)
[   14.582904] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.583356] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.583813] page dumped because: kasan: bad access detected
[   14.584143] 
[   14.584265] Memory state around the buggy address:
[   14.584640]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.585059]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.585482] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.585961]                                      ^
[   14.586178]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.586603]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.587141] ==================================================================
[   13.952585] ==================================================================
[   13.953286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   13.954008] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.954744] 
[   13.954884] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.954930] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.954944] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.954966] Call Trace:
[   13.954984]  <TASK>
[   13.955002]  dump_stack_lvl+0x73/0xb0
[   13.955030]  print_report+0xd1/0x650
[   13.955055]  ? __virt_addr_valid+0x1db/0x2d0
[   13.955078]  ? kasan_atomics_helper+0xfa9/0x5450
[   13.955100]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.955124]  ? kasan_atomics_helper+0xfa9/0x5450
[   13.955146]  kasan_report+0x141/0x180
[   13.955169]  ? kasan_atomics_helper+0xfa9/0x5450
[   13.955197]  kasan_check_range+0x10c/0x1c0
[   13.955222]  __kasan_check_write+0x18/0x20
[   13.955242]  kasan_atomics_helper+0xfa9/0x5450
[   13.955266]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.955289]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.955310]  ? ret_from_fork_asm+0x1a/0x30
[   13.955332]  ? kasan_atomics+0x152/0x310
[   13.955356]  kasan_atomics+0x1dc/0x310
[   13.955387]  ? __pfx_kasan_atomics+0x10/0x10
[   13.955409]  ? __pfx_read_tsc+0x10/0x10
[   13.955430]  ? ktime_get_ts64+0x86/0x230
[   13.955456]  kunit_try_run_case+0x1a5/0x480
[   13.955477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.955498]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.955524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.955549]  ? __kthread_parkme+0x82/0x180
[   13.955570]  ? preempt_count_sub+0x50/0x80
[   13.955595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.955616]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.955641]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.955665]  kthread+0x337/0x6f0
[   13.955686]  ? trace_preempt_on+0x20/0xc0
[   13.955710]  ? __pfx_kthread+0x10/0x10
[   13.955732]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.955756]  ? calculate_sigpending+0x7b/0xa0
[   13.955780]  ? __pfx_kthread+0x10/0x10
[   13.955802]  ret_from_fork+0x116/0x1d0
[   13.955821]  ? __pfx_kthread+0x10/0x10
[   13.955843]  ret_from_fork_asm+0x1a/0x30
[   13.955874]  </TASK>
[   13.955886] 
[   13.963875] Allocated by task 283:
[   13.964180]  kasan_save_stack+0x45/0x70
[   13.964416]  kasan_save_track+0x18/0x40
[   13.964618]  kasan_save_alloc_info+0x3b/0x50
[   13.964971]  __kasan_kmalloc+0xb7/0xc0
[   13.965168]  __kmalloc_cache_noprof+0x189/0x420
[   13.965399]  kasan_atomics+0x95/0x310
[   13.965549]  kunit_try_run_case+0x1a5/0x480
[   13.965696]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.965987]  kthread+0x337/0x6f0
[   13.966180]  ret_from_fork+0x116/0x1d0
[   13.966336]  ret_from_fork_asm+0x1a/0x30
[   13.966487] 
[   13.966560] The buggy address belongs to the object at ffff8881039bd780
[   13.966560]  which belongs to the cache kmalloc-64 of size 64
[   13.967253] The buggy address is located 0 bytes to the right of
[   13.967253]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.967993] 
[   13.968097] The buggy address belongs to the physical page:
[   13.968306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.968622] flags: 0x200000000000000(node=0|zone=2)
[   13.968886] page_type: f5(slab)
[   13.969178] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.969484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.969831] page dumped because: kasan: bad access detected
[   13.970007] 
[   13.970085] Memory state around the buggy address:
[   13.970243]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.970568]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.970893] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.971401]                                      ^
[   13.971563]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.971781]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.972222] ==================================================================
[   14.057278] ==================================================================
[   14.057820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   14.058257] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.058839] 
[   14.059020] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.059114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.059127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.059150] Call Trace:
[   14.059167]  <TASK>
[   14.059183]  dump_stack_lvl+0x73/0xb0
[   14.059210]  print_report+0xd1/0x650
[   14.059234]  ? __virt_addr_valid+0x1db/0x2d0
[   14.059257]  ? kasan_atomics_helper+0x1148/0x5450
[   14.059279]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.059303]  ? kasan_atomics_helper+0x1148/0x5450
[   14.059326]  kasan_report+0x141/0x180
[   14.059349]  ? kasan_atomics_helper+0x1148/0x5450
[   14.059389]  kasan_check_range+0x10c/0x1c0
[   14.059414]  __kasan_check_write+0x18/0x20
[   14.059434]  kasan_atomics_helper+0x1148/0x5450
[   14.059458]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.059482]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.059502]  ? ret_from_fork_asm+0x1a/0x30
[   14.059524]  ? kasan_atomics+0x152/0x310
[   14.059547]  kasan_atomics+0x1dc/0x310
[   14.059567]  ? __pfx_kasan_atomics+0x10/0x10
[   14.059588]  ? __pfx_read_tsc+0x10/0x10
[   14.059609]  ? ktime_get_ts64+0x86/0x230
[   14.059635]  kunit_try_run_case+0x1a5/0x480
[   14.059656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.059676]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.059701]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.059737]  ? __kthread_parkme+0x82/0x180
[   14.059758]  ? preempt_count_sub+0x50/0x80
[   14.059783]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.059804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.059829]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.059854]  kthread+0x337/0x6f0
[   14.059874]  ? trace_preempt_on+0x20/0xc0
[   14.059898]  ? __pfx_kthread+0x10/0x10
[   14.059919]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.059942]  ? calculate_sigpending+0x7b/0xa0
[   14.059966]  ? __pfx_kthread+0x10/0x10
[   14.059989]  ret_from_fork+0x116/0x1d0
[   14.060074]  ? __pfx_kthread+0x10/0x10
[   14.060098]  ret_from_fork_asm+0x1a/0x30
[   14.060131]  </TASK>
[   14.060143] 
[   14.074965] Allocated by task 283:
[   14.075360]  kasan_save_stack+0x45/0x70
[   14.075745]  kasan_save_track+0x18/0x40
[   14.076216]  kasan_save_alloc_info+0x3b/0x50
[   14.076625]  __kasan_kmalloc+0xb7/0xc0
[   14.076916]  __kmalloc_cache_noprof+0x189/0x420
[   14.077268]  kasan_atomics+0x95/0x310
[   14.077626]  kunit_try_run_case+0x1a5/0x480
[   14.078016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.078407]  kthread+0x337/0x6f0
[   14.078546]  ret_from_fork+0x116/0x1d0
[   14.078686]  ret_from_fork_asm+0x1a/0x30
[   14.079077] 
[   14.079313] The buggy address belongs to the object at ffff8881039bd780
[   14.079313]  which belongs to the cache kmalloc-64 of size 64
[   14.080528] The buggy address is located 0 bytes to the right of
[   14.080528]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.081820] 
[   14.082011] The buggy address belongs to the physical page:
[   14.082439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.082691] flags: 0x200000000000000(node=0|zone=2)
[   14.083168] page_type: f5(slab)
[   14.083712] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.084509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.085370] page dumped because: kasan: bad access detected
[   14.086031] 
[   14.086334] Memory state around the buggy address:
[   14.086514]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.086752]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.087416] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.088146]                                      ^
[   14.088663]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.089437]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.089956] ==================================================================
[   14.359204] ==================================================================
[   14.359865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.360308] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.360855] 
[   14.360952] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.360999] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.361012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.361034] Call Trace:
[   14.361052]  <TASK>
[   14.361069]  dump_stack_lvl+0x73/0xb0
[   14.361292]  print_report+0xd1/0x650
[   14.361319]  ? __virt_addr_valid+0x1db/0x2d0
[   14.361343]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.361365]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.361399]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.361422]  kasan_report+0x141/0x180
[   14.361445]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.361473]  kasan_check_range+0x10c/0x1c0
[   14.361497]  __kasan_check_write+0x18/0x20
[   14.361518]  kasan_atomics_helper+0x15b6/0x5450
[   14.361542]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.361565]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.361586]  ? ret_from_fork_asm+0x1a/0x30
[   14.361608]  ? kasan_atomics+0x152/0x310
[   14.361632]  kasan_atomics+0x1dc/0x310
[   14.361652]  ? __pfx_kasan_atomics+0x10/0x10
[   14.361673]  ? __pfx_read_tsc+0x10/0x10
[   14.361694]  ? ktime_get_ts64+0x86/0x230
[   14.361811]  kunit_try_run_case+0x1a5/0x480
[   14.361834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.361855]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.361881]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.361906]  ? __kthread_parkme+0x82/0x180
[   14.361928]  ? preempt_count_sub+0x50/0x80
[   14.361951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.361973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.361998]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.362038]  kthread+0x337/0x6f0
[   14.362058]  ? trace_preempt_on+0x20/0xc0
[   14.362082]  ? __pfx_kthread+0x10/0x10
[   14.362104]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.362128]  ? calculate_sigpending+0x7b/0xa0
[   14.362152]  ? __pfx_kthread+0x10/0x10
[   14.362174]  ret_from_fork+0x116/0x1d0
[   14.362194]  ? __pfx_kthread+0x10/0x10
[   14.362215]  ret_from_fork_asm+0x1a/0x30
[   14.362246]  </TASK>
[   14.362258] 
[   14.374123] Allocated by task 283:
[   14.374413]  kasan_save_stack+0x45/0x70
[   14.374580]  kasan_save_track+0x18/0x40
[   14.375027]  kasan_save_alloc_info+0x3b/0x50
[   14.375210]  __kasan_kmalloc+0xb7/0xc0
[   14.375422]  __kmalloc_cache_noprof+0x189/0x420
[   14.375749]  kasan_atomics+0x95/0x310
[   14.375938]  kunit_try_run_case+0x1a5/0x480
[   14.376397]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.376782]  kthread+0x337/0x6f0
[   14.376927]  ret_from_fork+0x116/0x1d0
[   14.377357]  ret_from_fork_asm+0x1a/0x30
[   14.377563] 
[   14.377841] The buggy address belongs to the object at ffff8881039bd780
[   14.377841]  which belongs to the cache kmalloc-64 of size 64
[   14.378532] The buggy address is located 0 bytes to the right of
[   14.378532]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.379339] 
[   14.379462] The buggy address belongs to the physical page:
[   14.379841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.380453] flags: 0x200000000000000(node=0|zone=2)
[   14.380675] page_type: f5(slab)
[   14.380885] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.381479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.381998] page dumped because: kasan: bad access detected
[   14.382244] 
[   14.382445] Memory state around the buggy address:
[   14.382878]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.383281]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.383839] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.384204]                                      ^
[   14.384616]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.385092]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.385541] ==================================================================
[   13.637652] ==================================================================
[   13.638193] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   13.638521] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.638760] 
[   13.638874] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.638920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.638933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.638957] Call Trace:
[   13.638971]  <TASK>
[   13.638988]  dump_stack_lvl+0x73/0xb0
[   13.639013]  print_report+0xd1/0x650
[   13.639037]  ? __virt_addr_valid+0x1db/0x2d0
[   13.639060]  ? kasan_atomics_helper+0x697/0x5450
[   13.639083]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.639106]  ? kasan_atomics_helper+0x697/0x5450
[   13.639130]  kasan_report+0x141/0x180
[   13.639153]  ? kasan_atomics_helper+0x697/0x5450
[   13.639180]  kasan_check_range+0x10c/0x1c0
[   13.639206]  __kasan_check_write+0x18/0x20
[   13.639226]  kasan_atomics_helper+0x697/0x5450
[   13.639250]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.639274]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.639294]  ? ret_from_fork_asm+0x1a/0x30
[   13.639316]  ? kasan_atomics+0x152/0x310
[   13.639340]  kasan_atomics+0x1dc/0x310
[   13.639361]  ? __pfx_kasan_atomics+0x10/0x10
[   13.639393]  ? __pfx_read_tsc+0x10/0x10
[   13.639414]  ? ktime_get_ts64+0x86/0x230
[   13.639439]  kunit_try_run_case+0x1a5/0x480
[   13.639461]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.639481]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.639506]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.639532]  ? __kthread_parkme+0x82/0x180
[   13.639704]  ? preempt_count_sub+0x50/0x80
[   13.639734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.639757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.639783]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.639809]  kthread+0x337/0x6f0
[   13.639829]  ? trace_preempt_on+0x20/0xc0
[   13.639853]  ? __pfx_kthread+0x10/0x10
[   13.639875]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.639899]  ? calculate_sigpending+0x7b/0xa0
[   13.639924]  ? __pfx_kthread+0x10/0x10
[   13.639947]  ret_from_fork+0x116/0x1d0
[   13.639966]  ? __pfx_kthread+0x10/0x10
[   13.639988]  ret_from_fork_asm+0x1a/0x30
[   13.640019]  </TASK>
[   13.640032] 
[   13.648533] Allocated by task 283:
[   13.648667]  kasan_save_stack+0x45/0x70
[   13.648856]  kasan_save_track+0x18/0x40
[   13.649056]  kasan_save_alloc_info+0x3b/0x50
[   13.649273]  __kasan_kmalloc+0xb7/0xc0
[   13.649482]  __kmalloc_cache_noprof+0x189/0x420
[   13.649825]  kasan_atomics+0x95/0x310
[   13.650017]  kunit_try_run_case+0x1a5/0x480
[   13.650176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.650354]  kthread+0x337/0x6f0
[   13.650492]  ret_from_fork+0x116/0x1d0
[   13.650643]  ret_from_fork_asm+0x1a/0x30
[   13.651132] 
[   13.651247] The buggy address belongs to the object at ffff8881039bd780
[   13.651247]  which belongs to the cache kmalloc-64 of size 64
[   13.651910] The buggy address is located 0 bytes to the right of
[   13.651910]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.652386] 
[   13.652491] The buggy address belongs to the physical page:
[   13.652751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.653131] flags: 0x200000000000000(node=0|zone=2)
[   13.653428] page_type: f5(slab)
[   13.653587] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.653932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.654262] page dumped because: kasan: bad access detected
[   13.654452] 
[   13.654524] Memory state around the buggy address:
[   13.654680]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.654961]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.655283] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.655636]                                      ^
[   13.655875]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.656206]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.656935] ==================================================================
[   13.519421] ==================================================================
[   13.519692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   13.520151] Read of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.520447] 
[   13.520562] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.520609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.520622] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.520645] Call Trace:
[   13.520663]  <TASK>
[   13.520681]  dump_stack_lvl+0x73/0xb0
[   13.520708]  print_report+0xd1/0x650
[   13.520887]  ? __virt_addr_valid+0x1db/0x2d0
[   13.520917]  ? kasan_atomics_helper+0x3df/0x5450
[   13.520939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.520963]  ? kasan_atomics_helper+0x3df/0x5450
[   13.520986]  kasan_report+0x141/0x180
[   13.521010]  ? kasan_atomics_helper+0x3df/0x5450
[   13.521037]  kasan_check_range+0x10c/0x1c0
[   13.521062]  __kasan_check_read+0x15/0x20
[   13.521083]  kasan_atomics_helper+0x3df/0x5450
[   13.521106]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.521130]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.521152]  ? ret_from_fork_asm+0x1a/0x30
[   13.521174]  ? kasan_atomics+0x152/0x310
[   13.521246]  kasan_atomics+0x1dc/0x310
[   13.521268]  ? __pfx_kasan_atomics+0x10/0x10
[   13.521289]  ? __pfx_read_tsc+0x10/0x10
[   13.521312]  ? ktime_get_ts64+0x86/0x230
[   13.521338]  kunit_try_run_case+0x1a5/0x480
[   13.521361]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.521394]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.521421]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.521447]  ? __kthread_parkme+0x82/0x180
[   13.521469]  ? preempt_count_sub+0x50/0x80
[   13.521495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.521517]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.521542]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.521568]  kthread+0x337/0x6f0
[   13.521588]  ? trace_preempt_on+0x20/0xc0
[   13.521613]  ? __pfx_kthread+0x10/0x10
[   13.521634]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.521659]  ? calculate_sigpending+0x7b/0xa0
[   13.521683]  ? __pfx_kthread+0x10/0x10
[   13.521705]  ret_from_fork+0x116/0x1d0
[   13.521725]  ? __pfx_kthread+0x10/0x10
[   13.521746]  ret_from_fork_asm+0x1a/0x30
[   13.521778]  </TASK>
[   13.521790] 
[   13.530246] Allocated by task 283:
[   13.530674]  kasan_save_stack+0x45/0x70
[   13.530880]  kasan_save_track+0x18/0x40
[   13.531061]  kasan_save_alloc_info+0x3b/0x50
[   13.531275]  __kasan_kmalloc+0xb7/0xc0
[   13.531431]  __kmalloc_cache_noprof+0x189/0x420
[   13.531588]  kasan_atomics+0x95/0x310
[   13.531720]  kunit_try_run_case+0x1a5/0x480
[   13.531866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.532083]  kthread+0x337/0x6f0
[   13.532254]  ret_from_fork+0x116/0x1d0
[   13.532453]  ret_from_fork_asm+0x1a/0x30
[   13.532898] 
[   13.533091] The buggy address belongs to the object at ffff8881039bd780
[   13.533091]  which belongs to the cache kmalloc-64 of size 64
[   13.533472] The buggy address is located 0 bytes to the right of
[   13.533472]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.534350] 
[   13.534478] The buggy address belongs to the physical page:
[   13.534775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.535304] flags: 0x200000000000000(node=0|zone=2)
[   13.535536] page_type: f5(slab)
[   13.535701] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.536022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.536309] page dumped because: kasan: bad access detected
[   13.536565] 
[   13.536652] Memory state around the buggy address:
[   13.536945]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.537169]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.537576] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.537901]                                      ^
[   13.538290]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.538629]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.539117] ==================================================================
[   14.024219] ==================================================================
[   14.024863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   14.025603] Read of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.026155] 
[   14.026273] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.026319] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.026332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.026354] Call Trace:
[   14.026372]  <TASK>
[   14.026565]  dump_stack_lvl+0x73/0xb0
[   14.026602]  print_report+0xd1/0x650
[   14.026627]  ? __virt_addr_valid+0x1db/0x2d0
[   14.026651]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.026674]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.026697]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.026730]  kasan_report+0x141/0x180
[   14.026754]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.026781]  __asan_report_load4_noabort+0x18/0x20
[   14.026803]  kasan_atomics_helper+0x4a1c/0x5450
[   14.026827]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.026850]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.026871]  ? ret_from_fork_asm+0x1a/0x30
[   14.026894]  ? kasan_atomics+0x152/0x310
[   14.026918]  kasan_atomics+0x1dc/0x310
[   14.026938]  ? __pfx_kasan_atomics+0x10/0x10
[   14.026960]  ? __pfx_read_tsc+0x10/0x10
[   14.026982]  ? ktime_get_ts64+0x86/0x230
[   14.027058]  kunit_try_run_case+0x1a5/0x480
[   14.027082]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.027104]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.027130]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.027155]  ? __kthread_parkme+0x82/0x180
[   14.027176]  ? preempt_count_sub+0x50/0x80
[   14.027201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.027223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.027248]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.027273]  kthread+0x337/0x6f0
[   14.027293]  ? trace_preempt_on+0x20/0xc0
[   14.027318]  ? __pfx_kthread+0x10/0x10
[   14.027339]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.027363]  ? calculate_sigpending+0x7b/0xa0
[   14.027401]  ? __pfx_kthread+0x10/0x10
[   14.027424]  ret_from_fork+0x116/0x1d0
[   14.027444]  ? __pfx_kthread+0x10/0x10
[   14.027466]  ret_from_fork_asm+0x1a/0x30
[   14.027497]  </TASK>
[   14.027508] 
[   14.042198] Allocated by task 283:
[   14.042437]  kasan_save_stack+0x45/0x70
[   14.042592]  kasan_save_track+0x18/0x40
[   14.042746]  kasan_save_alloc_info+0x3b/0x50
[   14.043126]  __kasan_kmalloc+0xb7/0xc0
[   14.043545]  __kmalloc_cache_noprof+0x189/0x420
[   14.044070]  kasan_atomics+0x95/0x310
[   14.044532]  kunit_try_run_case+0x1a5/0x480
[   14.044949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.045534]  kthread+0x337/0x6f0
[   14.045671]  ret_from_fork+0x116/0x1d0
[   14.045871]  ret_from_fork_asm+0x1a/0x30
[   14.046428] 
[   14.046602] The buggy address belongs to the object at ffff8881039bd780
[   14.046602]  which belongs to the cache kmalloc-64 of size 64
[   14.047751] The buggy address is located 0 bytes to the right of
[   14.047751]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.048691] 
[   14.048768] The buggy address belongs to the physical page:
[   14.049487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.050388] flags: 0x200000000000000(node=0|zone=2)
[   14.050737] page_type: f5(slab)
[   14.050874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.051189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.051883] page dumped because: kasan: bad access detected
[   14.052484] 
[   14.052650] Memory state around the buggy address:
[   14.053184]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.053594]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.053995] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.054876]                                      ^
[   14.055339]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.055905]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.056438] ==================================================================
[   14.723693] ==================================================================
[   14.724403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   14.725043] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.725298] 
[   14.725490] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.725537] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.725550] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.725573] Call Trace:
[   14.725590]  <TASK>
[   14.725607]  dump_stack_lvl+0x73/0xb0
[   14.725634]  print_report+0xd1/0x650
[   14.725657]  ? __virt_addr_valid+0x1db/0x2d0
[   14.725680]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.725723]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.725747]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.725771]  kasan_report+0x141/0x180
[   14.725795]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.725822]  kasan_check_range+0x10c/0x1c0
[   14.725847]  __kasan_check_write+0x18/0x20
[   14.725867]  kasan_atomics_helper+0x1f43/0x5450
[   14.725891]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.725914]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.725935]  ? ret_from_fork_asm+0x1a/0x30
[   14.725957]  ? kasan_atomics+0x152/0x310
[   14.725980]  kasan_atomics+0x1dc/0x310
[   14.726000]  ? __pfx_kasan_atomics+0x10/0x10
[   14.726022]  ? __pfx_read_tsc+0x10/0x10
[   14.726058]  ? ktime_get_ts64+0x86/0x230
[   14.726083]  kunit_try_run_case+0x1a5/0x480
[   14.726106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.726127]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.726153]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.726179]  ? __kthread_parkme+0x82/0x180
[   14.726200]  ? preempt_count_sub+0x50/0x80
[   14.726224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.726246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.726270]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.726296]  kthread+0x337/0x6f0
[   14.726316]  ? trace_preempt_on+0x20/0xc0
[   14.726341]  ? __pfx_kthread+0x10/0x10
[   14.726362]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.726397]  ? calculate_sigpending+0x7b/0xa0
[   14.726421]  ? __pfx_kthread+0x10/0x10
[   14.726444]  ret_from_fork+0x116/0x1d0
[   14.726463]  ? __pfx_kthread+0x10/0x10
[   14.726484]  ret_from_fork_asm+0x1a/0x30
[   14.726516]  </TASK>
[   14.726527] 
[   14.739647] Allocated by task 283:
[   14.740019]  kasan_save_stack+0x45/0x70
[   14.740404]  kasan_save_track+0x18/0x40
[   14.740768]  kasan_save_alloc_info+0x3b/0x50
[   14.741156]  __kasan_kmalloc+0xb7/0xc0
[   14.741524]  __kmalloc_cache_noprof+0x189/0x420
[   14.741780]  kasan_atomics+0x95/0x310
[   14.742119]  kunit_try_run_case+0x1a5/0x480
[   14.742421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.742600]  kthread+0x337/0x6f0
[   14.742748]  ret_from_fork+0x116/0x1d0
[   14.743085]  ret_from_fork_asm+0x1a/0x30
[   14.743447] 
[   14.743606] The buggy address belongs to the object at ffff8881039bd780
[   14.743606]  which belongs to the cache kmalloc-64 of size 64
[   14.744783] The buggy address is located 0 bytes to the right of
[   14.744783]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.745425] 
[   14.745501] The buggy address belongs to the physical page:
[   14.745677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.746421] flags: 0x200000000000000(node=0|zone=2)
[   14.746895] page_type: f5(slab)
[   14.747228] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.747930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.748600] page dumped because: kasan: bad access detected
[   14.749089] 
[   14.749168] Memory state around the buggy address:
[   14.749328]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.749565]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.749869] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.750824]                                      ^
[   14.751319]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.752037]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.752671] ==================================================================
[   14.138249] ==================================================================
[   14.138652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   14.139539] Read of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.139976] 
[   14.140164] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.140213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.140227] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.140250] Call Trace:
[   14.140266]  <TASK>
[   14.140282]  dump_stack_lvl+0x73/0xb0
[   14.140311]  print_report+0xd1/0x650
[   14.140335]  ? __virt_addr_valid+0x1db/0x2d0
[   14.140357]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.140394]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.140419]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.140442]  kasan_report+0x141/0x180
[   14.140465]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.140493]  __asan_report_load4_noabort+0x18/0x20
[   14.140514]  kasan_atomics_helper+0x49e8/0x5450
[   14.140538]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.140561]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.140582]  ? ret_from_fork_asm+0x1a/0x30
[   14.140605]  ? kasan_atomics+0x152/0x310
[   14.140628]  kasan_atomics+0x1dc/0x310
[   14.140648]  ? __pfx_kasan_atomics+0x10/0x10
[   14.140669]  ? __pfx_read_tsc+0x10/0x10
[   14.140691]  ? ktime_get_ts64+0x86/0x230
[   14.140726]  kunit_try_run_case+0x1a5/0x480
[   14.140747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.140768]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.140793]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.140818]  ? __kthread_parkme+0x82/0x180
[   14.140839]  ? preempt_count_sub+0x50/0x80
[   14.140864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.140885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.140911]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.140936]  kthread+0x337/0x6f0
[   14.140956]  ? trace_preempt_on+0x20/0xc0
[   14.140980]  ? __pfx_kthread+0x10/0x10
[   14.141049]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.141077]  ? calculate_sigpending+0x7b/0xa0
[   14.141101]  ? __pfx_kthread+0x10/0x10
[   14.141123]  ret_from_fork+0x116/0x1d0
[   14.141144]  ? __pfx_kthread+0x10/0x10
[   14.141165]  ret_from_fork_asm+0x1a/0x30
[   14.141196]  </TASK>
[   14.141208] 
[   14.152135] Allocated by task 283:
[   14.152336]  kasan_save_stack+0x45/0x70
[   14.152553]  kasan_save_track+0x18/0x40
[   14.152773]  kasan_save_alloc_info+0x3b/0x50
[   14.152938]  __kasan_kmalloc+0xb7/0xc0
[   14.153087]  __kmalloc_cache_noprof+0x189/0x420
[   14.153309]  kasan_atomics+0x95/0x310
[   14.153665]  kunit_try_run_case+0x1a5/0x480
[   14.153924]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.154249]  kthread+0x337/0x6f0
[   14.154430]  ret_from_fork+0x116/0x1d0
[   14.154569]  ret_from_fork_asm+0x1a/0x30
[   14.154769] 
[   14.155509] The buggy address belongs to the object at ffff8881039bd780
[   14.155509]  which belongs to the cache kmalloc-64 of size 64
[   14.156161] The buggy address is located 0 bytes to the right of
[   14.156161]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.156941] 
[   14.157189] The buggy address belongs to the physical page:
[   14.157734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.158298] flags: 0x200000000000000(node=0|zone=2)
[   14.158637] page_type: f5(slab)
[   14.158910] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.159725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.159967] page dumped because: kasan: bad access detected
[   14.160577] 
[   14.160772] Memory state around the buggy address:
[   14.161282]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.161916]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.162484] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.162869]                                      ^
[   14.163095]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.163753]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.164057] ==================================================================
[   13.717176] ==================================================================
[   13.717546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   13.717922] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.718434] 
[   13.718548] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.718597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.718610] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.718633] Call Trace:
[   13.718650]  <TASK>
[   13.718667]  dump_stack_lvl+0x73/0xb0
[   13.718695]  print_report+0xd1/0x650
[   13.718718]  ? __virt_addr_valid+0x1db/0x2d0
[   13.718741]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.718763]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.718786]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.718809]  kasan_report+0x141/0x180
[   13.718832]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.718881]  kasan_check_range+0x10c/0x1c0
[   13.718906]  __kasan_check_write+0x18/0x20
[   13.718928]  kasan_atomics_helper+0x8f9/0x5450
[   13.718952]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.718975]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.719068]  ? ret_from_fork_asm+0x1a/0x30
[   13.719092]  ? kasan_atomics+0x152/0x310
[   13.719115]  kasan_atomics+0x1dc/0x310
[   13.719135]  ? __pfx_kasan_atomics+0x10/0x10
[   13.719156]  ? __pfx_read_tsc+0x10/0x10
[   13.719177]  ? ktime_get_ts64+0x86/0x230
[   13.719202]  kunit_try_run_case+0x1a5/0x480
[   13.719224]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.719244]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.719269]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.719294]  ? __kthread_parkme+0x82/0x180
[   13.719315]  ? preempt_count_sub+0x50/0x80
[   13.719339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.719360]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.719395]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.719421]  kthread+0x337/0x6f0
[   13.719440]  ? trace_preempt_on+0x20/0xc0
[   13.719463]  ? __pfx_kthread+0x10/0x10
[   13.719485]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.719509]  ? calculate_sigpending+0x7b/0xa0
[   13.719532]  ? __pfx_kthread+0x10/0x10
[   13.719554]  ret_from_fork+0x116/0x1d0
[   13.719574]  ? __pfx_kthread+0x10/0x10
[   13.719596]  ret_from_fork_asm+0x1a/0x30
[   13.719627]  </TASK>
[   13.719638] 
[   13.727938] Allocated by task 283:
[   13.728131]  kasan_save_stack+0x45/0x70
[   13.728341]  kasan_save_track+0x18/0x40
[   13.728548]  kasan_save_alloc_info+0x3b/0x50
[   13.728715]  __kasan_kmalloc+0xb7/0xc0
[   13.728849]  __kmalloc_cache_noprof+0x189/0x420
[   13.729001]  kasan_atomics+0x95/0x310
[   13.729170]  kunit_try_run_case+0x1a5/0x480
[   13.729434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.729727]  kthread+0x337/0x6f0
[   13.729889]  ret_from_fork+0x116/0x1d0
[   13.730201]  ret_from_fork_asm+0x1a/0x30
[   13.730354] 
[   13.730471] The buggy address belongs to the object at ffff8881039bd780
[   13.730471]  which belongs to the cache kmalloc-64 of size 64
[   13.731118] The buggy address is located 0 bytes to the right of
[   13.731118]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.731718] 
[   13.731817] The buggy address belongs to the physical page:
[   13.732076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.732343] flags: 0x200000000000000(node=0|zone=2)
[   13.732589] page_type: f5(slab)
[   13.732780] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.733188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.733509] page dumped because: kasan: bad access detected
[   13.733753] 
[   13.733822] Memory state around the buggy address:
[   13.733975]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.734248]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.734584] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.734910]                                      ^
[   13.735145]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.735440]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.735729] ==================================================================
[   13.775659] ==================================================================
[   13.776012] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   13.776288] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.776718] 
[   13.776835] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.776879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.776892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.776914] Call Trace:
[   13.776930]  <TASK>
[   13.776945]  dump_stack_lvl+0x73/0xb0
[   13.776974]  print_report+0xd1/0x650
[   13.777168]  ? __virt_addr_valid+0x1db/0x2d0
[   13.777195]  ? kasan_atomics_helper+0xac7/0x5450
[   13.777218]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.777241]  ? kasan_atomics_helper+0xac7/0x5450
[   13.777265]  kasan_report+0x141/0x180
[   13.777288]  ? kasan_atomics_helper+0xac7/0x5450
[   13.777316]  kasan_check_range+0x10c/0x1c0
[   13.777341]  __kasan_check_write+0x18/0x20
[   13.777362]  kasan_atomics_helper+0xac7/0x5450
[   13.777400]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.777424]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.777445]  ? ret_from_fork_asm+0x1a/0x30
[   13.777467]  ? kasan_atomics+0x152/0x310
[   13.777491]  kasan_atomics+0x1dc/0x310
[   13.777511]  ? __pfx_kasan_atomics+0x10/0x10
[   13.777533]  ? __pfx_read_tsc+0x10/0x10
[   13.777554]  ? ktime_get_ts64+0x86/0x230
[   13.777581]  kunit_try_run_case+0x1a5/0x480
[   13.777602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.777623]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.777649]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.777675]  ? __kthread_parkme+0x82/0x180
[   13.777716]  ? preempt_count_sub+0x50/0x80
[   13.777742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.777764]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.777789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.777814]  kthread+0x337/0x6f0
[   13.777836]  ? trace_preempt_on+0x20/0xc0
[   13.777860]  ? __pfx_kthread+0x10/0x10
[   13.777882]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.777906]  ? calculate_sigpending+0x7b/0xa0
[   13.777930]  ? __pfx_kthread+0x10/0x10
[   13.777953]  ret_from_fork+0x116/0x1d0
[   13.777973]  ? __pfx_kthread+0x10/0x10
[   13.778112]  ret_from_fork_asm+0x1a/0x30
[   13.778147]  </TASK>
[   13.778159] 
[   13.786265] Allocated by task 283:
[   13.786461]  kasan_save_stack+0x45/0x70
[   13.786633]  kasan_save_track+0x18/0x40
[   13.786860]  kasan_save_alloc_info+0x3b/0x50
[   13.787241]  __kasan_kmalloc+0xb7/0xc0
[   13.787445]  __kmalloc_cache_noprof+0x189/0x420
[   13.787602]  kasan_atomics+0x95/0x310
[   13.787784]  kunit_try_run_case+0x1a5/0x480
[   13.788102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.788370]  kthread+0x337/0x6f0
[   13.788550]  ret_from_fork+0x116/0x1d0
[   13.788684]  ret_from_fork_asm+0x1a/0x30
[   13.788907] 
[   13.789105] The buggy address belongs to the object at ffff8881039bd780
[   13.789105]  which belongs to the cache kmalloc-64 of size 64
[   13.789589] The buggy address is located 0 bytes to the right of
[   13.789589]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.790200] 
[   13.790277] The buggy address belongs to the physical page:
[   13.790553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.790903] flags: 0x200000000000000(node=0|zone=2)
[   13.791288] page_type: f5(slab)
[   13.791477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.791757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.792183] page dumped because: kasan: bad access detected
[   13.792412] 
[   13.792484] Memory state around the buggy address:
[   13.792716]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.793137]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.793360] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.793692]                                      ^
[   13.793944]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.794338]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.794585] ==================================================================
[   13.919749] ==================================================================
[   13.919981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   13.920299] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.920997] 
[   13.921180] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.921259] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.921274] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.921296] Call Trace:
[   13.921322]  <TASK>
[   13.921338]  dump_stack_lvl+0x73/0xb0
[   13.921367]  print_report+0xd1/0x650
[   13.921401]  ? __virt_addr_valid+0x1db/0x2d0
[   13.921424]  ? kasan_atomics_helper+0xf10/0x5450
[   13.921446]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.921470]  ? kasan_atomics_helper+0xf10/0x5450
[   13.921493]  kasan_report+0x141/0x180
[   13.921517]  ? kasan_atomics_helper+0xf10/0x5450
[   13.921543]  kasan_check_range+0x10c/0x1c0
[   13.921569]  __kasan_check_write+0x18/0x20
[   13.921588]  kasan_atomics_helper+0xf10/0x5450
[   13.921612]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.921635]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.921673]  ? ret_from_fork_asm+0x1a/0x30
[   13.921695]  ? kasan_atomics+0x152/0x310
[   13.921719]  kasan_atomics+0x1dc/0x310
[   13.921738]  ? __pfx_kasan_atomics+0x10/0x10
[   13.921759]  ? __pfx_read_tsc+0x10/0x10
[   13.921780]  ? ktime_get_ts64+0x86/0x230
[   13.921805]  kunit_try_run_case+0x1a5/0x480
[   13.921827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.921847]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.921873]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.921898]  ? __kthread_parkme+0x82/0x180
[   13.921919]  ? preempt_count_sub+0x50/0x80
[   13.921943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.921965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.921990]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.922015]  kthread+0x337/0x6f0
[   13.922041]  ? trace_preempt_on+0x20/0xc0
[   13.922066]  ? __pfx_kthread+0x10/0x10
[   13.922087]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.922111]  ? calculate_sigpending+0x7b/0xa0
[   13.922135]  ? __pfx_kthread+0x10/0x10
[   13.922157]  ret_from_fork+0x116/0x1d0
[   13.922176]  ? __pfx_kthread+0x10/0x10
[   13.922197]  ret_from_fork_asm+0x1a/0x30
[   13.922227]  </TASK>
[   13.922239] 
[   13.938061] Allocated by task 283:
[   13.938328]  kasan_save_stack+0x45/0x70
[   13.938628]  kasan_save_track+0x18/0x40
[   13.938791]  kasan_save_alloc_info+0x3b/0x50
[   13.938941]  __kasan_kmalloc+0xb7/0xc0
[   13.939145]  __kmalloc_cache_noprof+0x189/0x420
[   13.939648]  kasan_atomics+0x95/0x310
[   13.940291]  kunit_try_run_case+0x1a5/0x480
[   13.940719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.941282]  kthread+0x337/0x6f0
[   13.941428]  ret_from_fork+0x116/0x1d0
[   13.941565]  ret_from_fork_asm+0x1a/0x30
[   13.941708] 
[   13.941880] The buggy address belongs to the object at ffff8881039bd780
[   13.941880]  which belongs to the cache kmalloc-64 of size 64
[   13.943059] The buggy address is located 0 bytes to the right of
[   13.943059]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.944353] 
[   13.944684] The buggy address belongs to the physical page:
[   13.944975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.945473] flags: 0x200000000000000(node=0|zone=2)
[   13.945644] page_type: f5(slab)
[   13.945790] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.946577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.947406] page dumped because: kasan: bad access detected
[   13.947997] 
[   13.948358] Memory state around the buggy address:
[   13.948862]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.949477]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.949893] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.950342]                                      ^
[   13.950807]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.951434]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.951655] ==================================================================
[   13.972624] ==================================================================
[   13.972858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   13.973150] Read of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.973742] 
[   13.973863] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.973910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.973923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.973945] Call Trace:
[   13.973960]  <TASK>
[   13.973975]  dump_stack_lvl+0x73/0xb0
[   13.974002]  print_report+0xd1/0x650
[   13.974030]  ? __virt_addr_valid+0x1db/0x2d0
[   13.974053]  ? kasan_atomics_helper+0x4a36/0x5450
[   13.974076]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.974100]  ? kasan_atomics_helper+0x4a36/0x5450
[   13.974188]  kasan_report+0x141/0x180
[   13.974212]  ? kasan_atomics_helper+0x4a36/0x5450
[   13.974241]  __asan_report_load4_noabort+0x18/0x20
[   13.974263]  kasan_atomics_helper+0x4a36/0x5450
[   13.974287]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.974310]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.974331]  ? ret_from_fork_asm+0x1a/0x30
[   13.974354]  ? kasan_atomics+0x152/0x310
[   13.974390]  kasan_atomics+0x1dc/0x310
[   13.974410]  ? __pfx_kasan_atomics+0x10/0x10
[   13.974432]  ? __pfx_read_tsc+0x10/0x10
[   13.974453]  ? ktime_get_ts64+0x86/0x230
[   13.974478]  kunit_try_run_case+0x1a5/0x480
[   13.974501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.974522]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.974547]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.974572]  ? __kthread_parkme+0x82/0x180
[   13.974593]  ? preempt_count_sub+0x50/0x80
[   13.974618]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.974640]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.974665]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.974690]  kthread+0x337/0x6f0
[   13.974710]  ? trace_preempt_on+0x20/0xc0
[   13.974743]  ? __pfx_kthread+0x10/0x10
[   13.974765]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.974789]  ? calculate_sigpending+0x7b/0xa0
[   13.974813]  ? __pfx_kthread+0x10/0x10
[   13.974835]  ret_from_fork+0x116/0x1d0
[   13.974854]  ? __pfx_kthread+0x10/0x10
[   13.974875]  ret_from_fork_asm+0x1a/0x30
[   13.974905]  </TASK>
[   13.974916] 
[   13.983662] Allocated by task 283:
[   13.983973]  kasan_save_stack+0x45/0x70
[   13.984254]  kasan_save_track+0x18/0x40
[   13.984431]  kasan_save_alloc_info+0x3b/0x50
[   13.984646]  __kasan_kmalloc+0xb7/0xc0
[   13.984855]  __kmalloc_cache_noprof+0x189/0x420
[   13.985225]  kasan_atomics+0x95/0x310
[   13.985370]  kunit_try_run_case+0x1a5/0x480
[   13.985529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.985821]  kthread+0x337/0x6f0
[   13.986111]  ret_from_fork+0x116/0x1d0
[   13.986279]  ret_from_fork_asm+0x1a/0x30
[   13.986438] 
[   13.986511] The buggy address belongs to the object at ffff8881039bd780
[   13.986511]  which belongs to the cache kmalloc-64 of size 64
[   13.987161] The buggy address is located 0 bytes to the right of
[   13.987161]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.987618] 
[   13.987695] The buggy address belongs to the physical page:
[   13.987871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.988222] flags: 0x200000000000000(node=0|zone=2)
[   13.988481] page_type: f5(slab)
[   13.988786] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.989168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.989407] page dumped because: kasan: bad access detected
[   13.989578] 
[   13.989648] Memory state around the buggy address:
[   13.989803]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.990571]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.991220] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.991579]                                      ^
[   13.992563]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.992915]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.993806] ==================================================================
[   14.247979] ==================================================================
[   14.248473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.248713] Read of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.249040] 
[   14.251085] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.251154] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.251170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.251193] Call Trace:
[   14.251207]  <TASK>
[   14.251224]  dump_stack_lvl+0x73/0xb0
[   14.251254]  print_report+0xd1/0x650
[   14.251277]  ? __virt_addr_valid+0x1db/0x2d0
[   14.251300]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.251323]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.251348]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.251371]  kasan_report+0x141/0x180
[   14.251407]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.251436]  __asan_report_load8_noabort+0x18/0x20
[   14.251459]  kasan_atomics_helper+0x4eae/0x5450
[   14.251484]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.251508]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.251529]  ? ret_from_fork_asm+0x1a/0x30
[   14.251551]  ? kasan_atomics+0x152/0x310
[   14.251574]  kasan_atomics+0x1dc/0x310
[   14.251594]  ? __pfx_kasan_atomics+0x10/0x10
[   14.251615]  ? __pfx_read_tsc+0x10/0x10
[   14.251637]  ? ktime_get_ts64+0x86/0x230
[   14.251662]  kunit_try_run_case+0x1a5/0x480
[   14.251685]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.251726]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.251752]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.251777]  ? __kthread_parkme+0x82/0x180
[   14.251798]  ? preempt_count_sub+0x50/0x80
[   14.251822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.251843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.251868]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.251893]  kthread+0x337/0x6f0
[   14.251913]  ? trace_preempt_on+0x20/0xc0
[   14.251937]  ? __pfx_kthread+0x10/0x10
[   14.251958]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.251982]  ? calculate_sigpending+0x7b/0xa0
[   14.252023]  ? __pfx_kthread+0x10/0x10
[   14.252045]  ret_from_fork+0x116/0x1d0
[   14.252064]  ? __pfx_kthread+0x10/0x10
[   14.252086]  ret_from_fork_asm+0x1a/0x30
[   14.252117]  </TASK>
[   14.252128] 
[   14.263178] Allocated by task 283:
[   14.263399]  kasan_save_stack+0x45/0x70
[   14.263647]  kasan_save_track+0x18/0x40
[   14.263877]  kasan_save_alloc_info+0x3b/0x50
[   14.264035]  __kasan_kmalloc+0xb7/0xc0
[   14.264366]  __kmalloc_cache_noprof+0x189/0x420
[   14.264887]  kasan_atomics+0x95/0x310
[   14.265255]  kunit_try_run_case+0x1a5/0x480
[   14.265460]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.265713]  kthread+0x337/0x6f0
[   14.265971]  ret_from_fork+0x116/0x1d0
[   14.266173]  ret_from_fork_asm+0x1a/0x30
[   14.266385] 
[   14.266485] The buggy address belongs to the object at ffff8881039bd780
[   14.266485]  which belongs to the cache kmalloc-64 of size 64
[   14.266996] The buggy address is located 0 bytes to the right of
[   14.266996]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.267624] 
[   14.267721] The buggy address belongs to the physical page:
[   14.268003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.268404] flags: 0x200000000000000(node=0|zone=2)
[   14.268869] page_type: f5(slab)
[   14.269080] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.269487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.269899] page dumped because: kasan: bad access detected
[   14.270322] 
[   14.270431] Memory state around the buggy address:
[   14.270727]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.271175]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.271523] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.271838]                                      ^
[   14.272101]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.272550]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.273122] ==================================================================
[   13.479072] ==================================================================
[   13.479507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   13.479745] Read of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.480166] 
[   13.480273] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.480317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.480329] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.480349] Call Trace:
[   13.480362]  <TASK>
[   13.480386]  dump_stack_lvl+0x73/0xb0
[   13.480412]  print_report+0xd1/0x650
[   13.480435]  ? __virt_addr_valid+0x1db/0x2d0
[   13.480458]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.480480]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.480504]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.480526]  kasan_report+0x141/0x180
[   13.480549]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.480576]  __asan_report_load4_noabort+0x18/0x20
[   13.480597]  kasan_atomics_helper+0x4b88/0x5450
[   13.480620]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.480643]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.480662]  ? ret_from_fork_asm+0x1a/0x30
[   13.480747]  ? kasan_atomics+0x152/0x310
[   13.480770]  kasan_atomics+0x1dc/0x310
[   13.480790]  ? __pfx_kasan_atomics+0x10/0x10
[   13.480811]  ? __pfx_read_tsc+0x10/0x10
[   13.480831]  ? ktime_get_ts64+0x86/0x230
[   13.480855]  kunit_try_run_case+0x1a5/0x480
[   13.480877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.480897]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.480921]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.480946]  ? __kthread_parkme+0x82/0x180
[   13.480967]  ? preempt_count_sub+0x50/0x80
[   13.480990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.481011]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.481035]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.481060]  kthread+0x337/0x6f0
[   13.481079]  ? trace_preempt_on+0x20/0xc0
[   13.481102]  ? __pfx_kthread+0x10/0x10
[   13.481124]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.481146]  ? calculate_sigpending+0x7b/0xa0
[   13.481183]  ? __pfx_kthread+0x10/0x10
[   13.481204]  ret_from_fork+0x116/0x1d0
[   13.481222]  ? __pfx_kthread+0x10/0x10
[   13.481242]  ret_from_fork_asm+0x1a/0x30
[   13.481272]  </TASK>
[   13.481282] 
[   13.489729] Allocated by task 283:
[   13.489882]  kasan_save_stack+0x45/0x70
[   13.490090]  kasan_save_track+0x18/0x40
[   13.490417]  kasan_save_alloc_info+0x3b/0x50
[   13.490629]  __kasan_kmalloc+0xb7/0xc0
[   13.491198]  __kmalloc_cache_noprof+0x189/0x420
[   13.491436]  kasan_atomics+0x95/0x310
[   13.491571]  kunit_try_run_case+0x1a5/0x480
[   13.491717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.491907]  kthread+0x337/0x6f0
[   13.492206]  ret_from_fork+0x116/0x1d0
[   13.492419]  ret_from_fork_asm+0x1a/0x30
[   13.492623] 
[   13.492719] The buggy address belongs to the object at ffff8881039bd780
[   13.492719]  which belongs to the cache kmalloc-64 of size 64
[   13.493367] The buggy address is located 0 bytes to the right of
[   13.493367]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.493949] 
[   13.494111] The buggy address belongs to the physical page:
[   13.494290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.494601] flags: 0x200000000000000(node=0|zone=2)
[   13.494838] page_type: f5(slab)
[   13.495005] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.495533] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.495895] page dumped because: kasan: bad access detected
[   13.496234] 
[   13.496318] Memory state around the buggy address:
[   13.496524]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.496792]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.497120] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.497596]                                      ^
[   13.497843]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.498160]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.498482] ==================================================================
[   14.411119] ==================================================================
[   14.411434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.411709] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.412237] 
[   14.412360] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.412422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.412435] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.412458] Call Trace:
[   14.412471]  <TASK>
[   14.412486]  dump_stack_lvl+0x73/0xb0
[   14.413058]  print_report+0xd1/0x650
[   14.413083]  ? __virt_addr_valid+0x1db/0x2d0
[   14.413107]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.413129]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.413153]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.413176]  kasan_report+0x141/0x180
[   14.413200]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.413227]  kasan_check_range+0x10c/0x1c0
[   14.413251]  __kasan_check_write+0x18/0x20
[   14.413273]  kasan_atomics_helper+0x16e7/0x5450
[   14.413297]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.413321]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.413341]  ? ret_from_fork_asm+0x1a/0x30
[   14.413362]  ? kasan_atomics+0x152/0x310
[   14.413399]  kasan_atomics+0x1dc/0x310
[   14.413419]  ? __pfx_kasan_atomics+0x10/0x10
[   14.413441]  ? __pfx_read_tsc+0x10/0x10
[   14.413462]  ? ktime_get_ts64+0x86/0x230
[   14.413487]  kunit_try_run_case+0x1a5/0x480
[   14.413509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.413529]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.413555]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.413579]  ? __kthread_parkme+0x82/0x180
[   14.413600]  ? preempt_count_sub+0x50/0x80
[   14.413624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.413646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.413670]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.413695]  kthread+0x337/0x6f0
[   14.413723]  ? trace_preempt_on+0x20/0xc0
[   14.413747]  ? __pfx_kthread+0x10/0x10
[   14.413769]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.413792]  ? calculate_sigpending+0x7b/0xa0
[   14.413816]  ? __pfx_kthread+0x10/0x10
[   14.413838]  ret_from_fork+0x116/0x1d0
[   14.413857]  ? __pfx_kthread+0x10/0x10
[   14.413878]  ret_from_fork_asm+0x1a/0x30
[   14.413908]  </TASK>
[   14.413920] 
[   14.424722] Allocated by task 283:
[   14.424926]  kasan_save_stack+0x45/0x70
[   14.425125]  kasan_save_track+0x18/0x40
[   14.425309]  kasan_save_alloc_info+0x3b/0x50
[   14.425514]  __kasan_kmalloc+0xb7/0xc0
[   14.425692]  __kmalloc_cache_noprof+0x189/0x420
[   14.425880]  kasan_atomics+0x95/0x310
[   14.426076]  kunit_try_run_case+0x1a5/0x480
[   14.426264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.427023]  kthread+0x337/0x6f0
[   14.427180]  ret_from_fork+0x116/0x1d0
[   14.427523]  ret_from_fork_asm+0x1a/0x30
[   14.427815] 
[   14.427921] The buggy address belongs to the object at ffff8881039bd780
[   14.427921]  which belongs to the cache kmalloc-64 of size 64
[   14.428599] The buggy address is located 0 bytes to the right of
[   14.428599]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.429321] 
[   14.429413] The buggy address belongs to the physical page:
[   14.429815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.430245] flags: 0x200000000000000(node=0|zone=2)
[   14.430483] page_type: f5(slab)
[   14.430859] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.431206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.431609] page dumped because: kasan: bad access detected
[   14.432029] 
[   14.432154] Memory state around the buggy address:
[   14.432482]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.432913]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.433311] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.433731]                                      ^
[   14.434136]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.434529]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.434993] ==================================================================
[   14.772749] ==================================================================
[   14.773168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   14.773420] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.774110] 
[   14.774219] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.774261] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.774275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.774295] Call Trace:
[   14.774313]  <TASK>
[   14.774330]  dump_stack_lvl+0x73/0xb0
[   14.774357]  print_report+0xd1/0x650
[   14.774404]  ? __virt_addr_valid+0x1db/0x2d0
[   14.774428]  ? kasan_atomics_helper+0x2006/0x5450
[   14.774462]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.774486]  ? kasan_atomics_helper+0x2006/0x5450
[   14.774509]  kasan_report+0x141/0x180
[   14.774541]  ? kasan_atomics_helper+0x2006/0x5450
[   14.774569]  kasan_check_range+0x10c/0x1c0
[   14.774605]  __kasan_check_write+0x18/0x20
[   14.774625]  kasan_atomics_helper+0x2006/0x5450
[   14.774649]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.774674]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.774695]  ? ret_from_fork_asm+0x1a/0x30
[   14.774724]  ? kasan_atomics+0x152/0x310
[   14.774749]  kasan_atomics+0x1dc/0x310
[   14.774768]  ? __pfx_kasan_atomics+0x10/0x10
[   14.774790]  ? __pfx_read_tsc+0x10/0x10
[   14.774812]  ? ktime_get_ts64+0x86/0x230
[   14.774838]  kunit_try_run_case+0x1a5/0x480
[   14.774860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.774891]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.774920]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.774947]  ? __kthread_parkme+0x82/0x180
[   14.774978]  ? preempt_count_sub+0x50/0x80
[   14.775003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.775024]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.775057]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.775083]  kthread+0x337/0x6f0
[   14.775102]  ? trace_preempt_on+0x20/0xc0
[   14.775137]  ? __pfx_kthread+0x10/0x10
[   14.775159]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.775182]  ? calculate_sigpending+0x7b/0xa0
[   14.775207]  ? __pfx_kthread+0x10/0x10
[   14.775238]  ret_from_fork+0x116/0x1d0
[   14.775257]  ? __pfx_kthread+0x10/0x10
[   14.775279]  ret_from_fork_asm+0x1a/0x30
[   14.775320]  </TASK>
[   14.775331] 
[   14.783669] Allocated by task 283:
[   14.783869]  kasan_save_stack+0x45/0x70
[   14.784092]  kasan_save_track+0x18/0x40
[   14.784303]  kasan_save_alloc_info+0x3b/0x50
[   14.784500]  __kasan_kmalloc+0xb7/0xc0
[   14.784709]  __kmalloc_cache_noprof+0x189/0x420
[   14.784920]  kasan_atomics+0x95/0x310
[   14.785136]  kunit_try_run_case+0x1a5/0x480
[   14.785341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.785548]  kthread+0x337/0x6f0
[   14.785674]  ret_from_fork+0x116/0x1d0
[   14.785807]  ret_from_fork_asm+0x1a/0x30
[   14.785946] 
[   14.786017] The buggy address belongs to the object at ffff8881039bd780
[   14.786017]  which belongs to the cache kmalloc-64 of size 64
[   14.786471] The buggy address is located 0 bytes to the right of
[   14.786471]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.787047] 
[   14.787145] The buggy address belongs to the physical page:
[   14.787364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.787617] flags: 0x200000000000000(node=0|zone=2)
[   14.787779] page_type: f5(slab)
[   14.787898] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.788310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.788659] page dumped because: kasan: bad access detected
[   14.789209] 
[   14.789305] Memory state around the buggy address:
[   14.789545]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.790059]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.790337] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.790564]                                      ^
[   14.790879]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.791283]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.791636] ==================================================================
[   14.851715] ==================================================================
[   14.852271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   14.852635] Write of size 8 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   14.852976] 
[   14.853082] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   14.853125] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.853139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.853191] Call Trace:
[   14.853210]  <TASK>
[   14.853226]  dump_stack_lvl+0x73/0xb0
[   14.853265]  print_report+0xd1/0x650
[   14.853290]  ? __virt_addr_valid+0x1db/0x2d0
[   14.853313]  ? kasan_atomics_helper+0x218a/0x5450
[   14.853335]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.853359]  ? kasan_atomics_helper+0x218a/0x5450
[   14.853389]  kasan_report+0x141/0x180
[   14.853412]  ? kasan_atomics_helper+0x218a/0x5450
[   14.853440]  kasan_check_range+0x10c/0x1c0
[   14.853493]  __kasan_check_write+0x18/0x20
[   14.853514]  kasan_atomics_helper+0x218a/0x5450
[   14.853559]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.853583]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.853631]  ? ret_from_fork_asm+0x1a/0x30
[   14.853653]  ? kasan_atomics+0x152/0x310
[   14.853688]  kasan_atomics+0x1dc/0x310
[   14.853709]  ? __pfx_kasan_atomics+0x10/0x10
[   14.853738]  ? __pfx_read_tsc+0x10/0x10
[   14.853760]  ? ktime_get_ts64+0x86/0x230
[   14.853787]  kunit_try_run_case+0x1a5/0x480
[   14.853836]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.853857]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.853884]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.853945]  ? __kthread_parkme+0x82/0x180
[   14.853966]  ? preempt_count_sub+0x50/0x80
[   14.854000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.854022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.854053]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.854079]  kthread+0x337/0x6f0
[   14.854099]  ? trace_preempt_on+0x20/0xc0
[   14.854123]  ? __pfx_kthread+0x10/0x10
[   14.854145]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.854169]  ? calculate_sigpending+0x7b/0xa0
[   14.854193]  ? __pfx_kthread+0x10/0x10
[   14.854215]  ret_from_fork+0x116/0x1d0
[   14.854235]  ? __pfx_kthread+0x10/0x10
[   14.854256]  ret_from_fork_asm+0x1a/0x30
[   14.854287]  </TASK>
[   14.854298] 
[   14.862693] Allocated by task 283:
[   14.862840]  kasan_save_stack+0x45/0x70
[   14.863090]  kasan_save_track+0x18/0x40
[   14.863293]  kasan_save_alloc_info+0x3b/0x50
[   14.863688]  __kasan_kmalloc+0xb7/0xc0
[   14.864010]  __kmalloc_cache_noprof+0x189/0x420
[   14.864303]  kasan_atomics+0x95/0x310
[   14.864516]  kunit_try_run_case+0x1a5/0x480
[   14.864665]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.864842]  kthread+0x337/0x6f0
[   14.865077]  ret_from_fork+0x116/0x1d0
[   14.865274]  ret_from_fork_asm+0x1a/0x30
[   14.865481] 
[   14.865579] The buggy address belongs to the object at ffff8881039bd780
[   14.865579]  which belongs to the cache kmalloc-64 of size 64
[   14.866286] The buggy address is located 0 bytes to the right of
[   14.866286]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   14.866801] 
[   14.866875] The buggy address belongs to the physical page:
[   14.867049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   14.867552] flags: 0x200000000000000(node=0|zone=2)
[   14.867874] page_type: f5(slab)
[   14.868090] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.868454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.868798] page dumped because: kasan: bad access detected
[   14.869023] 
[   14.869214] Memory state around the buggy address:
[   14.869443]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.869838]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.870144] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.870360]                                      ^
[   14.870529]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.870884]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.871231] ==================================================================
[   13.697830] ==================================================================
[   13.698400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   13.698744] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.699172] 
[   13.699289] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.699333] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.699346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.699368] Call Trace:
[   13.699394]  <TASK>
[   13.699409]  dump_stack_lvl+0x73/0xb0
[   13.699438]  print_report+0xd1/0x650
[   13.699461]  ? __virt_addr_valid+0x1db/0x2d0
[   13.699485]  ? kasan_atomics_helper+0x860/0x5450
[   13.699507]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.699530]  ? kasan_atomics_helper+0x860/0x5450
[   13.699553]  kasan_report+0x141/0x180
[   13.699577]  ? kasan_atomics_helper+0x860/0x5450
[   13.699604]  kasan_check_range+0x10c/0x1c0
[   13.699628]  __kasan_check_write+0x18/0x20
[   13.699649]  kasan_atomics_helper+0x860/0x5450
[   13.699672]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.699694]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.699716]  ? ret_from_fork_asm+0x1a/0x30
[   13.699737]  ? kasan_atomics+0x152/0x310
[   13.699768]  kasan_atomics+0x1dc/0x310
[   13.699787]  ? __pfx_kasan_atomics+0x10/0x10
[   13.699809]  ? __pfx_read_tsc+0x10/0x10
[   13.699829]  ? ktime_get_ts64+0x86/0x230
[   13.699854]  kunit_try_run_case+0x1a5/0x480
[   13.699876]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.699896]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.699922]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.699949]  ? __kthread_parkme+0x82/0x180
[   13.699970]  ? preempt_count_sub+0x50/0x80
[   13.699993]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.700015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.700039]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.700064]  kthread+0x337/0x6f0
[   13.700084]  ? trace_preempt_on+0x20/0xc0
[   13.700108]  ? __pfx_kthread+0x10/0x10
[   13.700129]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.700153]  ? calculate_sigpending+0x7b/0xa0
[   13.700177]  ? __pfx_kthread+0x10/0x10
[   13.700199]  ret_from_fork+0x116/0x1d0
[   13.700218]  ? __pfx_kthread+0x10/0x10
[   13.700240]  ret_from_fork_asm+0x1a/0x30
[   13.700271]  </TASK>
[   13.700282] 
[   13.708617] Allocated by task 283:
[   13.708802]  kasan_save_stack+0x45/0x70
[   13.708954]  kasan_save_track+0x18/0x40
[   13.709163]  kasan_save_alloc_info+0x3b/0x50
[   13.709317]  __kasan_kmalloc+0xb7/0xc0
[   13.709508]  __kmalloc_cache_noprof+0x189/0x420
[   13.709730]  kasan_atomics+0x95/0x310
[   13.709935]  kunit_try_run_case+0x1a5/0x480
[   13.710342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.710625]  kthread+0x337/0x6f0
[   13.710777]  ret_from_fork+0x116/0x1d0
[   13.710937]  ret_from_fork_asm+0x1a/0x30
[   13.711211] 
[   13.711309] The buggy address belongs to the object at ffff8881039bd780
[   13.711309]  which belongs to the cache kmalloc-64 of size 64
[   13.711892] The buggy address is located 0 bytes to the right of
[   13.711892]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.712449] 
[   13.712549] The buggy address belongs to the physical page:
[   13.712770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.713082] flags: 0x200000000000000(node=0|zone=2)
[   13.713305] page_type: f5(slab)
[   13.713452] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.713762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.714090] page dumped because: kasan: bad access detected
[   13.714268] 
[   13.714340] Memory state around the buggy address:
[   13.714727]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.715139]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.715480] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.715832]                                      ^
[   13.716132]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.716455]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.716686] ==================================================================
[   13.873452] ==================================================================
[   13.873793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   13.874123] Write of size 4 at addr ffff8881039bd7b0 by task kunit_try_catch/283
[   13.874416] 
[   13.874508] CPU: 1 UID: 0 PID: 283 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-rc7-next-20250526 #1 PREEMPT(voluntary) 
[   13.874553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.874566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.874589] Call Trace:
[   13.874604]  <TASK>
[   13.874620]  dump_stack_lvl+0x73/0xb0
[   13.874645]  print_report+0xd1/0x650
[   13.874670]  ? __virt_addr_valid+0x1db/0x2d0
[   13.874692]  ? kasan_atomics_helper+0xde0/0x5450
[   13.874714]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.874737]  ? kasan_atomics_helper+0xde0/0x5450
[   13.874759]  kasan_report+0x141/0x180
[   13.874781]  ? kasan_atomics_helper+0xde0/0x5450
[   13.874808]  kasan_check_range+0x10c/0x1c0
[   13.874833]  __kasan_check_write+0x18/0x20
[   13.874852]  kasan_atomics_helper+0xde0/0x5450
[   13.874876]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.874899]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.874919]  ? ret_from_fork_asm+0x1a/0x30
[   13.874941]  ? kasan_atomics+0x152/0x310
[   13.874964]  kasan_atomics+0x1dc/0x310
[   13.874984]  ? __pfx_kasan_atomics+0x10/0x10
[   13.875005]  ? __pfx_read_tsc+0x10/0x10
[   13.875025]  ? ktime_get_ts64+0x86/0x230
[   13.875049]  kunit_try_run_case+0x1a5/0x480
[   13.875071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.875091]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.875116]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.875141]  ? __kthread_parkme+0x82/0x180
[   13.875162]  ? preempt_count_sub+0x50/0x80
[   13.875185]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.875206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.875230]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.875255]  kthread+0x337/0x6f0
[   13.875274]  ? trace_preempt_on+0x20/0xc0
[   13.875297]  ? __pfx_kthread+0x10/0x10
[   13.875318]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.875341]  ? calculate_sigpending+0x7b/0xa0
[   13.875365]  ? __pfx_kthread+0x10/0x10
[   13.875724]  ret_from_fork+0x116/0x1d0
[   13.875751]  ? __pfx_kthread+0x10/0x10
[   13.875774]  ret_from_fork_asm+0x1a/0x30
[   13.875805]  </TASK>
[   13.875816] 
[   13.884271] Allocated by task 283:
[   13.884475]  kasan_save_stack+0x45/0x70
[   13.884686]  kasan_save_track+0x18/0x40
[   13.884883]  kasan_save_alloc_info+0x3b/0x50
[   13.885040]  __kasan_kmalloc+0xb7/0xc0
[   13.885176]  __kmalloc_cache_noprof+0x189/0x420
[   13.885410]  kasan_atomics+0x95/0x310
[   13.885599]  kunit_try_run_case+0x1a5/0x480
[   13.885805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.886019]  kthread+0x337/0x6f0
[   13.886168]  ret_from_fork+0x116/0x1d0
[   13.886354]  ret_from_fork_asm+0x1a/0x30
[   13.886597] 
[   13.886715] The buggy address belongs to the object at ffff8881039bd780
[   13.886715]  which belongs to the cache kmalloc-64 of size 64
[   13.887298] The buggy address is located 0 bytes to the right of
[   13.887298]  allocated 48-byte region [ffff8881039bd780, ffff8881039bd7b0)
[   13.887933] 
[   13.888117] The buggy address belongs to the physical page:
[   13.888342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039bd
[   13.888624] flags: 0x200000000000000(node=0|zone=2)
[   13.888892] page_type: f5(slab)
[   13.889136] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.889489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.889809] page dumped because: kasan: bad access detected
[   13.890048] 
[   13.890127] Memory state around the buggy address:
[   13.890314]  ffff8881039bd680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.890649]  ffff8881039bd700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.890949] >ffff8881039bd780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.891387]                                      ^
[   13.891631]  ffff8881039bd800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.892062]  ffff8881039bd880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.892405] ==================================================================