Hay
Date
May 29, 2025, 7:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   25.535534] ==================================================================
[   25.535671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   25.535799] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.535917] 
[   25.535996] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.536181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.536251] Hardware name: linux,dummy-virt (DT)
[   25.536335] Call trace:
[   25.536394]  show_stack+0x20/0x38 (C)
[   25.536533]  dump_stack_lvl+0x8c/0xd0
[   25.536656]  print_report+0x118/0x608
[   25.536768]  kasan_report+0xdc/0x128
[   25.536883]  kasan_check_range+0x100/0x1a8
[   25.537006]  __kasan_check_write+0x20/0x30
[   25.537119]  kasan_atomics_helper+0xeb8/0x4858
[   25.537239]  kasan_atomics+0x198/0x2e0
[   25.537359]  kunit_try_run_case+0x170/0x3f0
[   25.537736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.537886]  kthread+0x328/0x630
[   25.538620]  ret_from_fork+0x10/0x20
[   25.538745] 
[   25.538855] Allocated by task 265:
[   25.539115]  kasan_save_stack+0x3c/0x68
[   25.539246]  kasan_save_track+0x20/0x40
[   25.539358]  kasan_save_alloc_info+0x40/0x58
[   25.539473]  __kasan_kmalloc+0xd4/0xd8
[   25.539599]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.539704]  kasan_atomics+0xb8/0x2e0
[   25.539822]  kunit_try_run_case+0x170/0x3f0
[   25.539933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.540040]  kthread+0x328/0x630
[   25.540118]  ret_from_fork+0x10/0x20
[   25.540370] 
[   25.540440] The buggy address belongs to the object at fff00000c7884f80
[   25.540440]  which belongs to the cache kmalloc-64 of size 64
[   25.540609] The buggy address is located 0 bytes to the right of
[   25.540609]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.540778] 
[   25.540840] The buggy address belongs to the physical page:
[   25.540926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.541051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.541172] page_type: f5(slab)
[   25.541271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.541414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.541526] page dumped because: kasan: bad access detected
[   25.541612] 
[   25.541662] Memory state around the buggy address:
[   25.541744]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.541856]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.541970] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.542072]                                      ^
[   25.542162]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.542275]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.542448] ==================================================================
[   25.691027] ==================================================================
[   25.691135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   25.691229] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.691290] 
[   25.691558] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.691681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.691913] Hardware name: linux,dummy-virt (DT)
[   25.691969] Call trace:
[   25.692001]  show_stack+0x20/0x38 (C)
[   25.692226]  dump_stack_lvl+0x8c/0xd0
[   25.692438]  print_report+0x118/0x608
[   25.692513]  kasan_report+0xdc/0x128
[   25.692595]  kasan_check_range+0x100/0x1a8
[   25.692665]  __kasan_check_write+0x20/0x30
[   25.692724]  kasan_atomics_helper+0x147c/0x4858
[   25.692782]  kasan_atomics+0x198/0x2e0
[   25.692837]  kunit_try_run_case+0x170/0x3f0
[   25.692894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.692961]  kthread+0x328/0x630
[   25.693011]  ret_from_fork+0x10/0x20
[   25.693069] 
[   25.693095] Allocated by task 265:
[   25.693133]  kasan_save_stack+0x3c/0x68
[   25.693188]  kasan_save_track+0x20/0x40
[   25.693236]  kasan_save_alloc_info+0x40/0x58
[   25.693283]  __kasan_kmalloc+0xd4/0xd8
[   25.693329]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.693378]  kasan_atomics+0xb8/0x2e0
[   25.693443]  kunit_try_run_case+0x170/0x3f0
[   25.693645]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.693719]  kthread+0x328/0x630
[   25.694348]  ret_from_fork+0x10/0x20
[   25.694476] 
[   25.694510] The buggy address belongs to the object at fff00000c7884f80
[   25.694510]  which belongs to the cache kmalloc-64 of size 64
[   25.694586] The buggy address is located 0 bytes to the right of
[   25.694586]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.694663] 
[   25.695732] The buggy address belongs to the physical page:
[   25.695838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.695914] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.696544] page_type: f5(slab)
[   25.696615] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.696775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.696921] page dumped because: kasan: bad access detected
[   25.697408] 
[   25.697449] Memory state around the buggy address:
[   25.697746]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.697832]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.697938] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.697991]                                      ^
[   25.698233]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.698559]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.698721] ==================================================================
[   25.228443] ==================================================================
[   25.228562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   25.228674] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.229824]  kasan_check_range+0x100/0x1a8
[   25.231143]  kasan_save_track+0x20/0x40
[   25.232114]  kthread+0x328/0x630
[   25.234088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.235123] page dumped because: kasan: bad access detected
[   25.237011] ==================================================================
[   25.347790] ==================================================================
[   25.347927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   25.348064] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.348196] 
[   25.348282] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.349190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.349388] Hardware name: linux,dummy-virt (DT)
[   25.349596] Call trace:
[   25.349680]  show_stack+0x20/0x38 (C)
[   25.350255]  dump_stack_lvl+0x8c/0xd0
[   25.350703]  print_report+0x118/0x608
[   25.350858]  kasan_report+0xdc/0x128
[   25.351224]  kasan_check_range+0x100/0x1a8
[   25.351614]  __kasan_check_write+0x20/0x30
[   25.352037]  kasan_atomics_helper+0xad4/0x4858
[   25.352570]  kasan_atomics+0x198/0x2e0
[   25.352714]  kunit_try_run_case+0x170/0x3f0
[   25.352948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.353239]  kthread+0x328/0x630
[   25.353362]  ret_from_fork+0x10/0x20
[   25.353502] 
[   25.354045] Allocated by task 265:
[   25.354484]  kasan_save_stack+0x3c/0x68
[   25.354646]  kasan_save_track+0x20/0x40
[   25.354768]  kasan_save_alloc_info+0x40/0x58
[   25.355282]  __kasan_kmalloc+0xd4/0xd8
[   25.356242] The buggy address is located 0 bytes to the right of
[   25.356242]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.356807] 
[   25.356968] The buggy address belongs to the physical page:
[   25.357055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.357171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.357286] page_type: f5(slab)
[   25.357444] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.357744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.357999] page dumped because: kasan: bad access detected
[   25.358449] 
[   25.358522] Memory state around the buggy address:
[   25.358769]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.359038]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.359145] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.359238]                                      ^
[   25.359701]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.359954]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.360358] ==================================================================
[   25.444521] ==================================================================
[   25.444670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   25.444799] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.444921] 
[   25.445020] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.445244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.445319] Hardware name: linux,dummy-virt (DT)
[   25.446933] Call trace:
[   25.447053]  show_stack+0x20/0x38 (C)
[   25.447355]  dump_stack_lvl+0x8c/0xd0
[   25.447862]  print_report+0x118/0x608
[   25.448228]  kasan_report+0xdc/0x128
[   25.448358]  kasan_check_range+0x100/0x1a8
[   25.448877]  __kasan_check_write+0x20/0x30
[   25.449330]  kasan_atomics_helper+0xd3c/0x4858
[   25.449888]  kasan_atomics+0x198/0x2e0
[   25.450043]  kunit_try_run_case+0x170/0x3f0
[   25.450484]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.450660]  kthread+0x328/0x630
[   25.451115]  ret_from_fork+0x10/0x20
[   25.451638] 
[   25.451989] Allocated by task 265:
[   25.452244]  kasan_save_stack+0x3c/0x68
[   25.452908]  kasan_save_track+0x20/0x40
[   25.453407]  kasan_save_alloc_info+0x40/0x58
[   25.453549]  __kasan_kmalloc+0xd4/0xd8
[   25.453661]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.454178]  kasan_atomics+0xb8/0x2e0
[   25.454333]  kunit_try_run_case+0x170/0x3f0
[   25.454448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.454545]  kthread+0x328/0x630
[   25.454631]  ret_from_fork+0x10/0x20
[   25.454726] 
[   25.455559] The buggy address belongs to the object at fff00000c7884f80
[   25.455559]  which belongs to the cache kmalloc-64 of size 64
[   25.455748] The buggy address is located 0 bytes to the right of
[   25.455748]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.456660] 
[   25.456741] The buggy address belongs to the physical page:
[   25.456988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.457193] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.457701] page_type: f5(slab)
[   25.457838] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.457978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.458955] page dumped because: kasan: bad access detected
[   25.459090] 
[   25.459155] Memory state around the buggy address:
[   25.459395]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.459568]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.459660] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.459751]                                      ^
[   25.459842]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.460673]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.460955] ==================================================================
[   25.498390] ==================================================================
[   25.498617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   25.498811] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.498943] 
[   25.499034] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.499608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.499955] Hardware name: linux,dummy-virt (DT)
[   25.500135] Call trace:
[   25.500223]  show_stack+0x20/0x38 (C)
[   25.500467]  dump_stack_lvl+0x8c/0xd0
[   25.500683]  print_report+0x118/0x608
[   25.500878]  kasan_report+0xdc/0x128
[   25.501217]  __asan_report_load8_noabort+0x20/0x30
[   25.501688]  kasan_atomics_helper+0x3f58/0x4858
[   25.501864]  kasan_atomics+0x198/0x2e0
[   25.501988]  kunit_try_run_case+0x170/0x3f0
[   25.502106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.502251]  kthread+0x328/0x630
[   25.502798]  ret_from_fork+0x10/0x20
[   25.503302] 
[   25.503355] Allocated by task 265:
[   25.503436]  kasan_save_stack+0x3c/0x68
[   25.503539]  kasan_save_track+0x20/0x40
[   25.503631]  kasan_save_alloc_info+0x40/0x58
[   25.503788]  __kasan_kmalloc+0xd4/0xd8
[   25.503933]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.504274]  kasan_atomics+0xb8/0x2e0
[   25.504762]  kunit_try_run_case+0x170/0x3f0
[   25.505206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.505824]  kthread+0x328/0x630
[   25.506444]  ret_from_fork+0x10/0x20
[   25.506860] 
[   25.506943] The buggy address belongs to the object at fff00000c7884f80
[   25.506943]  which belongs to the cache kmalloc-64 of size 64
[   25.507142] The buggy address is located 0 bytes to the right of
[   25.507142]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.507318] 
[   25.507974] The buggy address belongs to the physical page:
[   25.508068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.508205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.508343] page_type: f5(slab)
[   25.508458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.509908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.510102] page dumped because: kasan: bad access detected
[   25.510225] 
[   25.510286] Memory state around the buggy address:
[   25.510456]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.510562]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.510927] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.511043]                                      ^
[   25.511133]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.511838]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.511958] ==================================================================
[   25.661217] ==================================================================
[   25.661334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   25.661434] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.661496] 
[   25.661797] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.661914] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.661951] Hardware name: linux,dummy-virt (DT)
[   25.661993] Call trace:
[   25.662024]  show_stack+0x20/0x38 (C)
[   25.662279]  dump_stack_lvl+0x8c/0xd0
[   25.662428]  print_report+0x118/0x608
[   25.662558]  kasan_report+0xdc/0x128
[   25.662829]  kasan_check_range+0x100/0x1a8
[   25.663018]  __kasan_check_write+0x20/0x30
[   25.663183]  kasan_atomics_helper+0x12d8/0x4858
[   25.663307]  kasan_atomics+0x198/0x2e0
[   25.663367]  kunit_try_run_case+0x170/0x3f0
[   25.663440]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.663507]  kthread+0x328/0x630
[   25.663959]  ret_from_fork+0x10/0x20
[   25.664169] 
[   25.664247] Allocated by task 265:
[   25.664336]  kasan_save_stack+0x3c/0x68
[   25.664475]  kasan_save_track+0x20/0x40
[   25.664525]  kasan_save_alloc_info+0x40/0x58
[   25.664584]  __kasan_kmalloc+0xd4/0xd8
[   25.664636]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.664822]  kasan_atomics+0xb8/0x2e0
[   25.664874]  kunit_try_run_case+0x170/0x3f0
[   25.664934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.664989]  kthread+0x328/0x630
[   25.665315]  ret_from_fork+0x10/0x20
[   25.665386] 
[   25.665548] The buggy address belongs to the object at fff00000c7884f80
[   25.665548]  which belongs to the cache kmalloc-64 of size 64
[   25.665931] The buggy address is located 0 bytes to the right of
[   25.665931]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.666027] 
[   25.666070] The buggy address belongs to the physical page:
[   25.666115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.666376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.666518] page_type: f5(slab)
[   25.666747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.666813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.666972] page dumped because: kasan: bad access detected
[   25.667018] 
[   25.667044] Memory state around the buggy address:
[   25.667097]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.667152]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.667447] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.667611]                                      ^
[   25.667664]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.667743]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.667801] ==================================================================
[   25.486081] ==================================================================
[   25.486426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   25.488274] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.488432] 
[   25.488536] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.488765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.488852] Hardware name: linux,dummy-virt (DT)
[   25.488935] Call trace:
[   25.489000]  show_stack+0x20/0x38 (C)
[   25.489140]  dump_stack_lvl+0x8c/0xd0
[   25.489271]  print_report+0x118/0x608
[   25.489392]  kasan_report+0xdc/0x128
[   25.489528]  kasan_check_range+0x100/0x1a8
[   25.489659]  __kasan_check_read+0x20/0x30
[   25.491111]  kasan_atomics_helper+0xdd4/0x4858
[   25.491744]  kasan_atomics+0x198/0x2e0
[   25.491958]  kunit_try_run_case+0x170/0x3f0
[   25.492150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.492564]  kthread+0x328/0x630
[   25.492810]  ret_from_fork+0x10/0x20
[   25.493169] 
[   25.493264] Allocated by task 265:
[   25.494423]  kasan_save_stack+0x3c/0x68
[   25.494907]  kasan_save_track+0x20/0x40
[   25.495154]  kasan_save_alloc_info+0x40/0x58
[   25.495285]  __kasan_kmalloc+0xd4/0xd8
[   25.495416]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.495497]  kasan_atomics+0xb8/0x2e0
[   25.495546]  kunit_try_run_case+0x170/0x3f0
[   25.495594]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.495651]  kthread+0x328/0x630
[   25.495693]  ret_from_fork+0x10/0x20
[   25.495738] 
[   25.495770] The buggy address belongs to the object at fff00000c7884f80
[   25.495770]  which belongs to the cache kmalloc-64 of size 64
[   25.495845] The buggy address is located 0 bytes to the right of
[   25.495845]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.495916] 
[   25.495945] The buggy address belongs to the physical page:
[   25.495983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.496048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.496110] page_type: f5(slab)
[   25.496162] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.496222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.496270] page dumped because: kasan: bad access detected
[   25.496310] 
[   25.496333] Memory state around the buggy address:
[   25.496375]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.496469]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.496787] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.497176]                                      ^
[   25.497234]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.497302]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.497393] ==================================================================
[   25.751604] ==================================================================
[   25.751916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   25.752271] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.752383] 
[   25.752447] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.752545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.752580] Hardware name: linux,dummy-virt (DT)
[   25.752620] Call trace:
[   25.752650]  show_stack+0x20/0x38 (C)
[   25.752713]  dump_stack_lvl+0x8c/0xd0
[   25.752774]  print_report+0x118/0x608
[   25.752829]  kasan_report+0xdc/0x128
[   25.752885]  __asan_report_load8_noabort+0x20/0x30
[   25.752942]  kasan_atomics_helper+0x3df4/0x4858
[   25.752998]  kasan_atomics+0x198/0x2e0
[   25.753053]  kunit_try_run_case+0x170/0x3f0
[   25.753109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.753172]  kthread+0x328/0x630
[   25.753221]  ret_from_fork+0x10/0x20
[   25.753282] 
[   25.753306] Allocated by task 265:
[   25.755956]  kasan_save_stack+0x3c/0x68
[   25.756542]  kasan_save_track+0x20/0x40
[   25.757077]  kasan_save_alloc_info+0x40/0x58
[   25.757343]  __kasan_kmalloc+0xd4/0xd8
[   25.757745]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.757953]  kasan_atomics+0xb8/0x2e0
[   25.758492]  kunit_try_run_case+0x170/0x3f0
[   25.758562]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.758619]  kthread+0x328/0x630
[   25.758920]  ret_from_fork+0x10/0x20
[   25.758972] 
[   25.759469] The buggy address belongs to the object at fff00000c7884f80
[   25.759469]  which belongs to the cache kmalloc-64 of size 64
[   25.759794] The buggy address is located 0 bytes to the right of
[   25.759794]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.760367] 
[   25.760431] The buggy address belongs to the physical page:
[   25.760668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.760952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.761022] page_type: f5(slab)
[   25.761075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.761339] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.761682] page dumped because: kasan: bad access detected
[   25.761746] 
[   25.761774] Memory state around the buggy address:
[   25.761817]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.761871]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.761922] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.763073]                                      ^
[   25.763313]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.763583]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.763737] ==================================================================
[   25.593737] ==================================================================
[   25.593875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   25.594006] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.594128] 
[   25.594221] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.595076] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.595225] Hardware name: linux,dummy-virt (DT)
[   25.595323] Call trace:
[   25.595500]  show_stack+0x20/0x38 (C)
[   25.595783]  dump_stack_lvl+0x8c/0xd0
[   25.596181]  print_report+0x118/0x608
[   25.596301]  kasan_report+0xdc/0x128
[   25.596483]  kasan_check_range+0x100/0x1a8
[   25.596681]  __kasan_check_write+0x20/0x30
[   25.596942]  kasan_atomics_helper+0x10c0/0x4858
[   25.597281]  kasan_atomics+0x198/0x2e0
[   25.597763]  kunit_try_run_case+0x170/0x3f0
[   25.598154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.598291]  kthread+0x328/0x630
[   25.598770]  ret_from_fork+0x10/0x20
[   25.599269] 
[   25.599777] Allocated by task 265:
[   25.599951]  kasan_save_stack+0x3c/0x68
[   25.600067]  kasan_save_track+0x20/0x40
[   25.600621]  kasan_save_alloc_info+0x40/0x58
[   25.600885]  __kasan_kmalloc+0xd4/0xd8
[   25.601192]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.601542]  kasan_atomics+0xb8/0x2e0
[   25.601655]  kunit_try_run_case+0x170/0x3f0
[   25.601728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.601784]  kthread+0x328/0x630
[   25.601846]  ret_from_fork+0x10/0x20
[   25.601939] 
[   25.602001] The buggy address belongs to the object at fff00000c7884f80
[   25.602001]  which belongs to the cache kmalloc-64 of size 64
[   25.602192] The buggy address is located 0 bytes to the right of
[   25.602192]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.602422] 
[   25.602482] The buggy address belongs to the physical page:
[   25.602588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.602723] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.602850] page_type: f5(slab)
[   25.602958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.603119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.603260] page dumped because: kasan: bad access detected
[   25.603375] 
[   25.603459] Memory state around the buggy address:
[   25.603627]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.603736]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.603825] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.603905]                                      ^
[   25.603990]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.604096]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.604193] ==================================================================
[   25.316251] ==================================================================
[   25.316437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   25.316653] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.316871] 
[   25.316973] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.317511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.317594] Hardware name: linux,dummy-virt (DT)
[   25.317679] Call trace:
[   25.317746]  show_stack+0x20/0x38 (C)
[   25.318126]  dump_stack_lvl+0x8c/0xd0
[   25.318545]  print_report+0x118/0x608
[   25.318916]  kasan_report+0xdc/0x128
[   25.319231]  kasan_check_range+0x100/0x1a8
[   25.319505]  __kasan_check_write+0x20/0x30
[   25.319711]  kasan_atomics_helper+0x99c/0x4858
[   25.319850]  kasan_atomics+0x198/0x2e0
[   25.319978]  kunit_try_run_case+0x170/0x3f0
[   25.320105]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.320247]  kthread+0x328/0x630
[   25.320356]  ret_from_fork+0x10/0x20
[   25.320499] 
[   25.320758] Allocated by task 265:
[   25.320984]  kasan_save_stack+0x3c/0x68
[   25.321286]  kasan_save_track+0x20/0x40
[   25.321637]  kasan_save_alloc_info+0x40/0x58
[   25.321888]  __kasan_kmalloc+0xd4/0xd8
[   25.322035]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.322483]  kasan_atomics+0xb8/0x2e0
[   25.322588]  kunit_try_run_case+0x170/0x3f0
[   25.322792]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.323112]  kthread+0x328/0x630
[   25.323466]  ret_from_fork+0x10/0x20
[   25.323632] 
[   25.323796] The buggy address belongs to the object at fff00000c7884f80
[   25.323796]  which belongs to the cache kmalloc-64 of size 64
[   25.324080] The buggy address is located 0 bytes to the right of
[   25.324080]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.324582] 
[   25.324650] The buggy address belongs to the physical page:
[   25.324915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.325297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.325468] page_type: f5(slab)
[   25.325722] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.326254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.326466] page dumped because: kasan: bad access detected
[   25.326780] 
[   25.326852] Memory state around the buggy address:
[   25.326963]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.327070]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.327157] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.327648]                                      ^
[   25.328041]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.328326]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.328554] ==================================================================
[   25.561665] ==================================================================
[   25.561817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   25.562073] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.562205] 
[   25.562393] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.562796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.563009] Hardware name: linux,dummy-virt (DT)
[   25.563171] Call trace:
[   25.563227]  show_stack+0x20/0x38 (C)
[   25.563346]  dump_stack_lvl+0x8c/0xd0
[   25.563474]  print_report+0x118/0x608
[   25.564844]  kasan_report+0xdc/0x128
[   25.565471]  kasan_check_range+0x100/0x1a8
[   25.565625]  __kasan_check_write+0x20/0x30
[   25.566489]  kasan_atomics_helper+0xff0/0x4858
[   25.567186]  kasan_atomics+0x198/0x2e0
[   25.567384]  kunit_try_run_case+0x170/0x3f0
[   25.567525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.567669]  kthread+0x328/0x630
[   25.567775]  ret_from_fork+0x10/0x20
[   25.567878] 
[   25.567931] Allocated by task 265:
[   25.568007]  kasan_save_stack+0x3c/0x68
[   25.570277]  kasan_save_track+0x20/0x40
[   25.571080]  kasan_save_alloc_info+0x40/0x58
[   25.571180]  __kasan_kmalloc+0xd4/0xd8
[   25.571273]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.572446]  kasan_atomics+0xb8/0x2e0
[   25.572768]  kunit_try_run_case+0x170/0x3f0
[   25.573266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.573388]  kthread+0x328/0x630
[   25.573490]  ret_from_fork+0x10/0x20
[   25.573588] 
[   25.573659] The buggy address belongs to the object at fff00000c7884f80
[   25.573659]  which belongs to the cache kmalloc-64 of size 64
[   25.573821] The buggy address is located 0 bytes to the right of
[   25.573821]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.576276] 
[   25.576367] The buggy address belongs to the physical page:
[   25.576466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.576644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.576844] page_type: f5(slab)
[   25.577007] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.577195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.577315] page dumped because: kasan: bad access detected
[   25.577417] 
[   25.577487] Memory state around the buggy address:
[   25.577578]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.577726]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.577881] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.577990]                                      ^
[   25.578086]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.578246]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.578481] ==================================================================
[   25.361482] ==================================================================
[   25.361777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   25.361925] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.362060] 
[   25.362147] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.362758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.362983] Hardware name: linux,dummy-virt (DT)
[   25.363082] Call trace:
[   25.363149]  show_stack+0x20/0x38 (C)
[   25.363280]  dump_stack_lvl+0x8c/0xd0
[   25.363420]  print_report+0x118/0x608
[   25.363544]  kasan_report+0xdc/0x128
[   25.363683]  __asan_report_load4_noabort+0x20/0x30
[   25.363808]  kasan_atomics_helper+0x3dcc/0x4858
[   25.367836]  kasan_save_alloc_info+0x40/0x58
[   25.369265] The buggy address is located 0 bytes to the right of
[   25.369265]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.369360] 
[   25.369557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.369780] page dumped because: kasan: bad access detected
[   25.369883]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.370165] ==================================================================
[   25.668762] ==================================================================
[   25.668846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   25.668927] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.668987] 
[   25.669032] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.669133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.669167] Hardware name: linux,dummy-virt (DT)
[   25.669207] Call trace:
[   25.669237]  show_stack+0x20/0x38 (C)
[   25.669298]  dump_stack_lvl+0x8c/0xd0
[   25.669356]  print_report+0x118/0x608
[   25.669428]  kasan_report+0xdc/0x128
[   25.669487]  kasan_check_range+0x100/0x1a8
[   25.669544]  __kasan_check_write+0x20/0x30
[   25.669599]  kasan_atomics_helper+0x1384/0x4858
[   25.669657]  kasan_atomics+0x198/0x2e0
[   25.669715]  kunit_try_run_case+0x170/0x3f0
[   25.669774]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.669836]  kthread+0x328/0x630
[   25.669905]  ret_from_fork+0x10/0x20
[   25.669964] 
[   25.669990] Allocated by task 265:
[   25.670026]  kasan_save_stack+0x3c/0x68
[   25.670080]  kasan_save_track+0x20/0x40
[   25.670127]  kasan_save_alloc_info+0x40/0x58
[   25.670174]  __kasan_kmalloc+0xd4/0xd8
[   25.670219]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.670267]  kasan_atomics+0xb8/0x2e0
[   25.670312]  kunit_try_run_case+0x170/0x3f0
[   25.670680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.670751]  kthread+0x328/0x630
[   25.670805]  ret_from_fork+0x10/0x20
[   25.670885] 
[   25.670917] The buggy address belongs to the object at fff00000c7884f80
[   25.670917]  which belongs to the cache kmalloc-64 of size 64
[   25.670988] The buggy address is located 0 bytes to the right of
[   25.670988]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.671576] 
[   25.671732] The buggy address belongs to the physical page:
[   25.671897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.672019] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.672094] page_type: f5(slab)
[   25.672297] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.672364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.672429] page dumped because: kasan: bad access detected
[   25.672728] 
[   25.673013] Memory state around the buggy address:
[   25.673162]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.673220]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.673283] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.673352]                                      ^
[   25.673678]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.673859]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.673928] ==================================================================
[   25.522693] ==================================================================
[   25.522924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   25.523385] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.523623] 
[   25.523721] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.524008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.524255] Hardware name: linux,dummy-virt (DT)
[   25.524688] Call trace:
[   25.524749]  show_stack+0x20/0x38 (C)
[   25.525187]  dump_stack_lvl+0x8c/0xd0
[   25.525602]  print_report+0x118/0x608
[   25.525742]  kasan_report+0xdc/0x128
[   25.525872]  __asan_report_store8_noabort+0x20/0x30
[   25.526120]  kasan_atomics_helper+0x3e5c/0x4858
[   25.526276]  kasan_atomics+0x198/0x2e0
[   25.526410]  kunit_try_run_case+0x170/0x3f0
[   25.526986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.527135]  kthread+0x328/0x630
[   25.527235]  ret_from_fork+0x10/0x20
[   25.527349] 
[   25.527414] Allocated by task 265:
[   25.527781]  kasan_save_stack+0x3c/0x68
[   25.528071]  kasan_save_track+0x20/0x40
[   25.528184]  kasan_save_alloc_info+0x40/0x58
[   25.528287]  __kasan_kmalloc+0xd4/0xd8
[   25.528383]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.528497]  kasan_atomics+0xb8/0x2e0
[   25.528594]  kunit_try_run_case+0x170/0x3f0
[   25.528701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.528821]  kthread+0x328/0x630
[   25.529648]  ret_from_fork+0x10/0x20
[   25.530339] 
[   25.530583] The buggy address belongs to the object at fff00000c7884f80
[   25.530583]  which belongs to the cache kmalloc-64 of size 64
[   25.530729] The buggy address is located 0 bytes to the right of
[   25.530729]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.530906] 
[   25.531566] The buggy address belongs to the physical page:
[   25.531707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.531846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.531972] page_type: f5(slab)
[   25.532079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.532213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.532378] page dumped because: kasan: bad access detected
[   25.532505] 
[   25.532576] Memory state around the buggy address:
[   25.532695]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.532856]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.533016] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.533165]                                      ^
[   25.533255]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.533373]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.533898] ==================================================================
[   25.545125] ==================================================================
[   25.545278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   25.545498] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.545858] 
[   25.545961] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.546306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.546680] Hardware name: linux,dummy-virt (DT)
[   25.546761] Call trace:
[   25.546845]  show_stack+0x20/0x38 (C)
[   25.546993]  dump_stack_lvl+0x8c/0xd0
[   25.547774]  print_report+0x118/0x608
[   25.548345]  kasan_report+0xdc/0x128
[   25.548521]  kasan_check_range+0x100/0x1a8
[   25.548773]  __kasan_check_write+0x20/0x30
[   25.548863]  kasan_atomics_helper+0xf20/0x4858
[   25.549008]  kasan_atomics+0x198/0x2e0
[   25.549127]  kunit_try_run_case+0x170/0x3f0
[   25.549242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.549388]  kthread+0x328/0x630
[   25.549575]  ret_from_fork+0x10/0x20
[   25.549713] 
[   25.549788] Allocated by task 265:
[   25.549897]  kasan_save_stack+0x3c/0x68
[   25.550048]  kasan_save_track+0x20/0x40
[   25.550158]  kasan_save_alloc_info+0x40/0x58
[   25.550256]  __kasan_kmalloc+0xd4/0xd8
[   25.550408]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.550510]  kasan_atomics+0xb8/0x2e0
[   25.550609]  kunit_try_run_case+0x170/0x3f0
[   25.550696]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.550799]  kthread+0x328/0x630
[   25.550882]  ret_from_fork+0x10/0x20
[   25.550985] 
[   25.551051] The buggy address belongs to the object at fff00000c7884f80
[   25.551051]  which belongs to the cache kmalloc-64 of size 64
[   25.551208] The buggy address is located 0 bytes to the right of
[   25.551208]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.551429] 
[   25.551527] The buggy address belongs to the physical page:
[   25.551616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.551757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.551895] page_type: f5(slab)
[   25.551990] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.552099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.552216] page dumped because: kasan: bad access detected
[   25.552301] 
[   25.552349] Memory state around the buggy address:
[   25.552459]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.552610]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.552717] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.552803]                                      ^
[   25.552889]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.552996]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.553081] ==================================================================
[   25.330332] ==================================================================
[   25.330505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   25.330650] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.330784] 
[   25.330883] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.331085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.331159] Hardware name: linux,dummy-virt (DT)
[   25.331251] Call trace:
[   25.331313]  show_stack+0x20/0x38 (C)
[   25.331622]  dump_stack_lvl+0x8c/0xd0
[   25.331807]  print_report+0x118/0x608
[   25.331980]  kasan_report+0xdc/0x128
[   25.332157]  kasan_check_range+0x100/0x1a8
[   25.332600]  kasan_atomics+0x198/0x2e0
[   25.333416] 
[   25.334628]  kthread+0x328/0x630
[   25.334755]  ret_from_fork+0x10/0x20
[   25.334877] 
[   25.334972] The buggy address belongs to the object at fff00000c7884f80
[   25.334972]  which belongs to the cache kmalloc-64 of size 64
[   25.335132] The buggy address is located 0 bytes to the right of
[   25.335132]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.335477] 
[   25.335574] The buggy address belongs to the physical page:
[   25.335709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.335874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.336063] page_type: f5(slab)
[   25.336215] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.336391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.336525] page dumped because: kasan: bad access detected
[   25.336651] 
[   25.336736] Memory state around the buggy address:
[   25.336870]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.336991]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.337108] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.337211]                                      ^
[   25.337306]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.337430]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.337531] ==================================================================
[   25.432703] ==================================================================
[   25.432828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   25.432961] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.433142] 
[   25.433238] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.433468] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.433546] Hardware name: linux,dummy-virt (DT)
[   25.433627] Call trace:
[   25.433686]  show_stack+0x20/0x38 (C)
[   25.433815]  dump_stack_lvl+0x8c/0xd0
[   25.433933]  print_report+0x118/0x608
[   25.434072]  kasan_report+0xdc/0x128
[   25.434181]  __asan_report_load4_noabort+0x20/0x30
[   25.434300]  kasan_atomics_helper+0x3dd8/0x4858
[   25.434444]  kasan_atomics+0x198/0x2e0
[   25.435016]  kunit_try_run_case+0x170/0x3f0
[   25.435192]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.435333]  kthread+0x328/0x630
[   25.435658]  ret_from_fork+0x10/0x20
[   25.436008] 
[   25.436206] Allocated by task 265:
[   25.436289]  kasan_save_stack+0x3c/0x68
[   25.436385]  kasan_save_track+0x20/0x40
[   25.436474]  kasan_save_alloc_info+0x40/0x58
[   25.436585]  __kasan_kmalloc+0xd4/0xd8
[   25.436668]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.436763]  kasan_atomics+0xb8/0x2e0
[   25.436850]  kunit_try_run_case+0x170/0x3f0
[   25.436949]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.437350]  kthread+0x328/0x630
[   25.437556]  ret_from_fork+0x10/0x20
[   25.437677] 
[   25.437769] The buggy address belongs to the object at fff00000c7884f80
[   25.437769]  which belongs to the cache kmalloc-64 of size 64
[   25.438155] The buggy address is located 0 bytes to the right of
[   25.438155]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.438594] 
[   25.438669] The buggy address belongs to the physical page:
[   25.438745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.438894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.439391] page_type: f5(slab)
[   25.439812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.440029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.440354] page dumped because: kasan: bad access detected
[   25.440473] 
[   25.440527] Memory state around the buggy address:
[   25.440624]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.440741]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.441272] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.442043]                                      ^
[   25.442565]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.442831]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.443250] ==================================================================
[   25.463742] ==================================================================
[   25.463888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   25.464036] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.464160] 
[   25.464254] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.464492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.464567] Hardware name: linux,dummy-virt (DT)
[   25.464657] Call trace:
[   25.464724]  show_stack+0x20/0x38 (C)
[   25.464858]  dump_stack_lvl+0x8c/0xd0
[   25.467691]  print_report+0x118/0x608
[   25.467925]  kasan_report+0xdc/0x128
[   25.468054]  __asan_report_load4_noabort+0x20/0x30
[   25.468617]  kasan_atomics_helper+0x3e04/0x4858
[   25.468764]  kasan_atomics+0x198/0x2e0
[   25.469246]  kunit_try_run_case+0x170/0x3f0
[   25.469600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.470107]  kthread+0x328/0x630
[   25.470478]  ret_from_fork+0x10/0x20
[   25.470863] 
[   25.471239] Allocated by task 265:
[   25.471321]  kasan_save_stack+0x3c/0x68
[   25.471680]  kasan_save_track+0x20/0x40
[   25.471910]  kasan_save_alloc_info+0x40/0x58
[   25.472268]  __kasan_kmalloc+0xd4/0xd8
[   25.472390]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.473180]  kasan_atomics+0xb8/0x2e0
[   25.473309]  kunit_try_run_case+0x170/0x3f0
[   25.473420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.474286]  kthread+0x328/0x630
[   25.474606]  ret_from_fork+0x10/0x20
[   25.474746] 
[   25.474811] The buggy address belongs to the object at fff00000c7884f80
[   25.474811]  which belongs to the cache kmalloc-64 of size 64
[   25.475564] The buggy address is located 0 bytes to the right of
[   25.475564]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.475762] 
[   25.476020] The buggy address belongs to the physical page:
[   25.476317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.476863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.477494] page_type: f5(slab)
[   25.477786] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.478023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.478388] page dumped because: kasan: bad access detected
[   25.478873] 
[   25.478958] Memory state around the buggy address:
[   25.479081]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.479228]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.479441] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.479591]                                      ^
[   25.479884]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.480313]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.480514] ==================================================================
[   25.773880] ==================================================================
[   25.773958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   25.774033] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.774093] 
[   25.774138] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.774238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.774284] Hardware name: linux,dummy-virt (DT)
[   25.774331] Call trace:
[   25.774389]  show_stack+0x20/0x38 (C)
[   25.774822]  dump_stack_lvl+0x8c/0xd0
[   25.774973]  print_report+0x118/0x608
[   25.775061]  kasan_report+0xdc/0x128
[   25.775513]  __asan_report_load8_noabort+0x20/0x30
[   25.775583]  kasan_atomics_helper+0x3e10/0x4858
[   25.775644]  kasan_atomics+0x198/0x2e0
[   25.775698]  kunit_try_run_case+0x170/0x3f0
[   25.775755]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.775901]  kthread+0x328/0x630
[   25.776067]  ret_from_fork+0x10/0x20
[   25.776190] 
[   25.776338] Allocated by task 265:
[   25.776420]  kasan_save_stack+0x3c/0x68
[   25.776690]  kasan_save_track+0x20/0x40
[   25.776747]  kasan_save_alloc_info+0x40/0x58
[   25.776796]  __kasan_kmalloc+0xd4/0xd8
[   25.777100]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.777166]  kasan_atomics+0xb8/0x2e0
[   25.777393]  kunit_try_run_case+0x170/0x3f0
[   25.778023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.778375]  kthread+0x328/0x630
[   25.778527]  ret_from_fork+0x10/0x20
[   25.778898] 
[   25.778943] The buggy address belongs to the object at fff00000c7884f80
[   25.778943]  which belongs to the cache kmalloc-64 of size 64
[   25.779172] The buggy address is located 0 bytes to the right of
[   25.779172]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.779274] 
[   25.779317] The buggy address belongs to the physical page:
[   25.779496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.779616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.779840] page_type: f5(slab)
[   25.779994] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.780059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.780111] page dumped because: kasan: bad access detected
[   25.780151] 
[   25.780178] Memory state around the buggy address:
[   25.780220]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.780273]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.780321] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.780670]                                      ^
[   25.780729]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.780785]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.780936] ==================================================================
[   25.580392] ==================================================================
[   25.580584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   25.580721] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.580922] 
[   25.581023] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.581345] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.581414] Hardware name: linux,dummy-virt (DT)
[   25.581484] Call trace:
[   25.581529]  show_stack+0x20/0x38 (C)
[   25.581641]  dump_stack_lvl+0x8c/0xd0
[   25.581754]  print_report+0x118/0x608
[   25.581873]  kasan_report+0xdc/0x128
[   25.581988]  kasan_check_range+0x100/0x1a8
[   25.582463]  __kasan_check_write+0x20/0x30
[   25.582626]  kasan_atomics_helper+0x1058/0x4858
[   25.582759]  kasan_atomics+0x198/0x2e0
[   25.582974]  kunit_try_run_case+0x170/0x3f0
[   25.583196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.583446]  kthread+0x328/0x630
[   25.583631]  ret_from_fork+0x10/0x20
[   25.584001] 
[   25.584333] Allocated by task 265:
[   25.584454]  kasan_save_stack+0x3c/0x68
[   25.585006]  kasan_save_track+0x20/0x40
[   25.585356]  kasan_save_alloc_info+0x40/0x58
[   25.585703]  __kasan_kmalloc+0xd4/0xd8
[   25.585834]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.585995]  kasan_atomics+0xb8/0x2e0
[   25.586264]  kunit_try_run_case+0x170/0x3f0
[   25.586577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.586726]  kthread+0x328/0x630
[   25.586828]  ret_from_fork+0x10/0x20
[   25.587316] 
[   25.587449] The buggy address belongs to the object at fff00000c7884f80
[   25.587449]  which belongs to the cache kmalloc-64 of size 64
[   25.587650] The buggy address is located 0 bytes to the right of
[   25.587650]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.587795] 
[   25.588029] The buggy address belongs to the physical page:
[   25.588164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.588301] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.588540] page_type: f5(slab)
[   25.588869] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.589077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.589204] page dumped because: kasan: bad access detected
[   25.589333] 
[   25.589381] Memory state around the buggy address:
[   25.589798]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.589929]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.590373] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.590491]                                      ^
[   25.590937]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.591080]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.591586] ==================================================================
[   25.291833] ==================================================================
[   25.292003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   25.292136] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.292276] 
[   25.292359] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.292582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.292659] Hardware name: linux,dummy-virt (DT)
[   25.292740] Call trace:
[   25.292797]  show_stack+0x20/0x38 (C)
[   25.292928]  dump_stack_lvl+0x8c/0xd0
[   25.293702]  print_report+0x118/0x608
[   25.294830]  kasan_report+0xdc/0x128
[   25.295613]  __asan_report_load4_noabort+0x20/0x30
[   25.295786]  kasan_atomics_helper+0x42d8/0x4858
[   25.296663]  kasan_atomics+0x198/0x2e0
[   25.297801]  kunit_try_run_case+0x170/0x3f0
[   25.297969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.298739]  kthread+0x328/0x630
[   25.298930]  ret_from_fork+0x10/0x20
[   25.299427] 
[   25.299497] Allocated by task 265:
[   25.299581]  kasan_save_stack+0x3c/0x68
[   25.299793]  kasan_save_track+0x20/0x40
[   25.299972]  kasan_save_alloc_info+0x40/0x58
[   25.300123]  __kasan_kmalloc+0xd4/0xd8
[   25.300232]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.300681]  kthread+0x328/0x630
[   25.301091] The buggy address is located 0 bytes to the right of
[   25.301091]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.301266] 
[   25.301326] The buggy address belongs to the physical page:
[   25.301424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.301574] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.301702] page_type: f5(slab)
[   25.301810] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.302151] 
[   25.304938] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.306875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.307097]  kthread+0x328/0x630
[   25.307617]  ret_from_fork+0x10/0x20
[   25.307851] 
[   25.307936] Allocated by task 265:
[   25.308133]  kasan_save_stack+0x3c/0x68
[   25.308352]  kasan_save_track+0x20/0x40
[   25.308480]  kasan_save_alloc_info+0x40/0x58
[   25.308581]  __kasan_kmalloc+0xd4/0xd8
[   25.308685]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.308788]  kasan_atomics+0xb8/0x2e0
[   25.309308]  kunit_try_run_case+0x170/0x3f0
[   25.309668]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.310230]  kthread+0x328/0x630
[   25.310387]  ret_from_fork+0x10/0x20
[   25.310496] 
[   25.310563] The buggy address belongs to the object at fff00000c7884f80
[   25.310563]  which belongs to the cache kmalloc-64 of size 64
[   25.310724] The buggy address is located 0 bytes to the right of
[   25.310724]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.311030] 
[   25.311355] The buggy address belongs to the physical page:
[   25.311628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.312040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.312350] page_type: f5(slab)
[   25.312561] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.312703] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.313445] page dumped because: kasan: bad access detected
[   25.313661] 
[   25.313728] Memory state around the buggy address:
[   25.313818]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.313944]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.314538] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.314747]                                      ^
[   25.315001]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.315238]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.315350] ==================================================================
[   25.004991] ==================================================================
[   25.005197] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   25.006609] 
[   25.007111] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.007361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.007697] Hardware name: linux,dummy-virt (DT)
[   25.009432]  __asan_report_load4_noabort+0x20/0x30
[   25.009950]  kasan_atomics+0x198/0x2e0
[   25.010329]  kunit_try_run_case+0x170/0x3f0
[   25.011869] Allocated by task 265:
[   25.012186]  kasan_save_stack+0x3c/0x68
[   25.012703]  __kasan_kmalloc+0xd4/0xd8
[   25.013146]  kasan_atomics+0xb8/0x2e0
[   25.013933]  kthread+0x328/0x630
[   25.014870] The buggy address is located 0 bytes to the right of
[   25.014870]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.015437] page_type: f5(slab)
[   25.015682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.016923] page dumped because: kasan: bad access detected
[   25.017041] 
[   25.017091] Memory state around the buggy address:
[   25.017275]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.017545]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.018331]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.018474]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.021204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   25.021339] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.022236] 
[   25.022563] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.030383]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.034646]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.039546] Read of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.043809]  kunit_try_run_case+0x170/0x3f0
[   25.048193] The buggy address belongs to the object at fff00000c7884f80
[   25.048193]  which belongs to the cache kmalloc-64 of size 64
[   25.050300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.051583] page dumped because: kasan: bad access detected
[   25.051869] 
[   25.052297]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.062717] 
[   25.062991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.065917]  kasan_check_range+0x100/0x1a8
[   25.066464]  kunit_try_run_case+0x170/0x3f0
[   25.067444]  kasan_save_alloc_info+0x40/0x58
[   25.071629] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.072452] 
[   25.073982]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.078133] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.080264]  kasan_atomics_helper+0x2b0/0x4858
[   25.081817]  kasan_save_alloc_info+0x40/0x58
[   25.084176] 
[   25.087360] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.087557] page dumped because: kasan: bad access detected
[   25.088453] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.094733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   25.095884]  dump_stack_lvl+0x8c/0xd0
[   25.101314]  kasan_save_track+0x20/0x40
[   25.104127] The buggy address is located 0 bytes to the right of
[   25.104127]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.105456] 
[   25.107498] ==================================================================
[   25.789209] ==================================================================
[   25.789300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   25.789394] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.789645] 
[   25.789850] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.790165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.790205] Hardware name: linux,dummy-virt (DT)
[   25.790246] Call trace:
[   25.790277]  show_stack+0x20/0x38 (C)
[   25.790626]  dump_stack_lvl+0x8c/0xd0
[   25.790738]  print_report+0x118/0x608
[   25.790926]  kasan_report+0xdc/0x128
[   25.790995]  __asan_report_load8_noabort+0x20/0x30
[   25.791055]  kasan_atomics_helper+0x3e20/0x4858
[   25.791113]  kasan_atomics+0x198/0x2e0
[   25.791171]  kunit_try_run_case+0x170/0x3f0
[   25.791261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.791358]  kthread+0x328/0x630
[   25.791418]  ret_from_fork+0x10/0x20
[   25.791495] 
[   25.791528] Allocated by task 265:
[   25.791765]  kasan_save_stack+0x3c/0x68
[   25.791854]  kasan_save_track+0x20/0x40
[   25.791901]  kasan_save_alloc_info+0x40/0x58
[   25.791947]  __kasan_kmalloc+0xd4/0xd8
[   25.791992]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.792040]  kasan_atomics+0xb8/0x2e0
[   25.792084]  kunit_try_run_case+0x170/0x3f0
[   25.792144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.792199]  kthread+0x328/0x630
[   25.792253]  ret_from_fork+0x10/0x20
[   25.792337] 
[   25.792381] The buggy address belongs to the object at fff00000c7884f80
[   25.792381]  which belongs to the cache kmalloc-64 of size 64
[   25.792648] The buggy address is located 0 bytes to the right of
[   25.792648]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.792997] 
[   25.793029] The buggy address belongs to the physical page:
[   25.793070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.793135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.793197] page_type: f5(slab)
[   25.793248] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.793308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.793358] page dumped because: kasan: bad access detected
[   25.793395] 
[   25.793434] Memory state around the buggy address:
[   25.793475]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.793545]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.793608] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.793673]                                      ^
[   25.793716]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.793766]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.794085] ==================================================================
[   25.700604] ==================================================================
[   25.700695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   25.700785] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.700846] 
[   25.700947] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.701058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.701265] Hardware name: linux,dummy-virt (DT)
[   25.701621] Call trace:
[   25.701724]  show_stack+0x20/0x38 (C)
[   25.701843]  dump_stack_lvl+0x8c/0xd0
[   25.701989]  print_report+0x118/0x608
[   25.702057]  kasan_report+0xdc/0x128
[   25.702175]  kasan_check_range+0x100/0x1a8
[   25.702236]  __kasan_check_write+0x20/0x30
[   25.702598]  kasan_atomics_helper+0x14e4/0x4858
[   25.702814]  kasan_atomics+0x198/0x2e0
[   25.703024]  kunit_try_run_case+0x170/0x3f0
[   25.703196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.703451]  kthread+0x328/0x630
[   25.703520]  ret_from_fork+0x10/0x20
[   25.703584] 
[   25.703764] Allocated by task 265:
[   25.703824]  kasan_save_stack+0x3c/0x68
[   25.703886]  kasan_save_track+0x20/0x40
[   25.704008]  kasan_save_alloc_info+0x40/0x58
[   25.704144]  __kasan_kmalloc+0xd4/0xd8
[   25.704470]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.704664]  kasan_atomics+0xb8/0x2e0
[   25.704874]  kunit_try_run_case+0x170/0x3f0
[   25.705007]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.705367]  kthread+0x328/0x630
[   25.705436]  ret_from_fork+0x10/0x20
[   25.705655] 
[   25.705715] The buggy address belongs to the object at fff00000c7884f80
[   25.705715]  which belongs to the cache kmalloc-64 of size 64
[   25.705878] The buggy address is located 0 bytes to the right of
[   25.705878]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.705961] 
[   25.706009] The buggy address belongs to the physical page:
[   25.706396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.706476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.706662] page_type: f5(slab)
[   25.706736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.706927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.707223] page dumped because: kasan: bad access detected
[   25.707446] 
[   25.707528] Memory state around the buggy address:
[   25.707581]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.707757]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.707817] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.707866]                                      ^
[   25.707966]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.708248]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.708303] ==================================================================
[   25.781760] ==================================================================
[   25.781836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   25.781910] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.781971] 
[   25.782019] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.782120] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.782154] Hardware name: linux,dummy-virt (DT)
[   25.782193] Call trace:
[   25.782234]  show_stack+0x20/0x38 (C)
[   25.782296]  dump_stack_lvl+0x8c/0xd0
[   25.782534]  print_report+0x118/0x608
[   25.782957]  kasan_report+0xdc/0x128
[   25.783050]  kasan_check_range+0x100/0x1a8
[   25.783117]  __kasan_check_write+0x20/0x30
[   25.783174]  kasan_atomics_helper+0x175c/0x4858
[   25.783689]  kasan_atomics+0x198/0x2e0
[   25.783764]  kunit_try_run_case+0x170/0x3f0
[   25.783836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.784091]  kthread+0x328/0x630
[   25.784245]  ret_from_fork+0x10/0x20
[   25.784508] 
[   25.784678] Allocated by task 265:
[   25.784725]  kasan_save_stack+0x3c/0x68
[   25.784901]  kasan_save_track+0x20/0x40
[   25.784953]  kasan_save_alloc_info+0x40/0x58
[   25.785327]  __kasan_kmalloc+0xd4/0xd8
[   25.785596]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.785655]  kasan_atomics+0xb8/0x2e0
[   25.785889]  kunit_try_run_case+0x170/0x3f0
[   25.785975]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.786186]  kthread+0x328/0x630
[   25.786359]  ret_from_fork+0x10/0x20
[   25.786603] 
[   25.786642] The buggy address belongs to the object at fff00000c7884f80
[   25.786642]  which belongs to the cache kmalloc-64 of size 64
[   25.786750] The buggy address is located 0 bytes to the right of
[   25.786750]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.786854] 
[   25.786887] The buggy address belongs to the physical page:
[   25.786929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.786996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.787056] page_type: f5(slab)
[   25.787109] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.787172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.787222] page dumped because: kasan: bad access detected
[   25.787816] 
[   25.787852] Memory state around the buggy address:
[   25.788151]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.788355]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.788450] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.788504]                                      ^
[   25.788551]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.788632]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.788728] ==================================================================
[   25.338211] ==================================================================
[   25.338424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   25.338652] Write of size 4 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.338786] 
[   25.338883] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.339090] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.339181] Hardware name: linux,dummy-virt (DT)
[   25.339263] Call trace:
[   25.339325]  show_stack+0x20/0x38 (C)
[   25.339605]  dump_stack_lvl+0x8c/0xd0
[   25.339753]  print_report+0x118/0x608
[   25.339930]  kasan_report+0xdc/0x128
[   25.340061]  kasan_check_range+0x100/0x1a8
[   25.340186]  __kasan_check_write+0x20/0x30
[   25.340310]  kasan_atomics_helper+0xa6c/0x4858
[   25.340451]  kasan_atomics+0x198/0x2e0
[   25.340680]  kunit_try_run_case+0x170/0x3f0
[   25.340799]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.340970]  kthread+0x328/0x630
[   25.341087]  ret_from_fork+0x10/0x20
[   25.341208] 
[   25.341263] Allocated by task 265:
[   25.341517]  kasan_save_stack+0x3c/0x68
[   25.341688]  kasan_save_track+0x20/0x40
[   25.341814]  kasan_save_alloc_info+0x40/0x58
[   25.341926]  __kasan_kmalloc+0xd4/0xd8
[   25.342082]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.342190]  kasan_atomics+0xb8/0x2e0
[   25.342281]  kunit_try_run_case+0x170/0x3f0
[   25.342390]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.342511]  kthread+0x328/0x630
[   25.342717]  ret_from_fork+0x10/0x20
[   25.342807] 
[   25.342884] The buggy address belongs to the object at fff00000c7884f80
[   25.342884]  which belongs to the cache kmalloc-64 of size 64
[   25.343168] The buggy address is located 0 bytes to the right of
[   25.343168]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.343409] 
[   25.343468] The buggy address belongs to the physical page:
[   25.343552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.343757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.343867] page_type: f5(slab)
[   25.344026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.344184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.344384] page dumped because: kasan: bad access detected
[   25.344592] 
[   25.344646] Memory state around the buggy address:
[   25.344750]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.344869]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.345566] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.345821]                                      ^
[   25.345921]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.346280]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.346604] ==================================================================
[   25.716948] ==================================================================
[   25.717016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   25.717284] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.717408] 
[   25.717464] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.717567] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.717600] Hardware name: linux,dummy-virt (DT)
[   25.717639] Call trace:
[   25.717669]  show_stack+0x20/0x38 (C)
[   25.717738]  dump_stack_lvl+0x8c/0xd0
[   25.717796]  print_report+0x118/0x608
[   25.717854]  kasan_report+0xdc/0x128
[   25.717905]  kasan_check_range+0x100/0x1a8
[   25.717961]  __kasan_check_write+0x20/0x30
[   25.718013]  kasan_atomics_helper+0x15b4/0x4858
[   25.718068]  kasan_atomics+0x198/0x2e0
[   25.718120]  kunit_try_run_case+0x170/0x3f0
[   25.718174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.718235]  kthread+0x328/0x630
[   25.718283]  ret_from_fork+0x10/0x20
[   25.718339] 
[   25.718363] Allocated by task 265:
[   25.718408]  kasan_save_stack+0x3c/0x68
[   25.718473]  kasan_save_track+0x20/0x40
[   25.718566]  kasan_save_alloc_info+0x40/0x58
[   25.718657]  __kasan_kmalloc+0xd4/0xd8
[   25.718739]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.718862]  kasan_atomics+0xb8/0x2e0
[   25.719074]  kunit_try_run_case+0x170/0x3f0
[   25.719164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.719217]  kthread+0x328/0x630
[   25.720141]  ret_from_fork+0x10/0x20
[   25.720201] 
[   25.720243] The buggy address belongs to the object at fff00000c7884f80
[   25.720243]  which belongs to the cache kmalloc-64 of size 64
[   25.720418] The buggy address is located 0 bytes to the right of
[   25.720418]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.720571] 
[   25.720651] The buggy address belongs to the physical page:
[   25.720728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.721000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.721262] page_type: f5(slab)
[   25.721433] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.721788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.722373] page dumped because: kasan: bad access detected
[   25.722587] 
[   25.722627] Memory state around the buggy address:
[   25.722680]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.722733]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.722787] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.722846]                                      ^
[   25.724231]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.724308]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.724356] ==================================================================
[   25.643048] ==================================================================
[   25.643171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   25.643254] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.643316] 
[   25.643368] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.643541] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.643595] Hardware name: linux,dummy-virt (DT)
[   25.643660] Call trace:
[   25.643720]  show_stack+0x20/0x38 (C)
[   25.643837]  dump_stack_lvl+0x8c/0xd0
[   25.644363]  print_report+0x118/0x608
[   25.644552]  kasan_report+0xdc/0x128
[   25.644723]  kasan_check_range+0x100/0x1a8
[   25.644870]  __kasan_check_write+0x20/0x30
[   25.644991]  kasan_atomics_helper+0x11f8/0x4858
[   25.645116]  kasan_atomics+0x198/0x2e0
[   25.645228]  kunit_try_run_case+0x170/0x3f0
[   25.645356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.645493]  kthread+0x328/0x630
[   25.645600]  ret_from_fork+0x10/0x20
[   25.646210] 
[   25.646480] Allocated by task 265:
[   25.646610]  kasan_save_stack+0x3c/0x68
[   25.646743]  kasan_save_track+0x20/0x40
[   25.646880]  kasan_save_alloc_info+0x40/0x58
[   25.647030]  __kasan_kmalloc+0xd4/0xd8
[   25.647137]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.647246]  kasan_atomics+0xb8/0x2e0
[   25.647344]  kunit_try_run_case+0x170/0x3f0
[   25.647462]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.647570]  kthread+0x328/0x630
[   25.647642]  ret_from_fork+0x10/0x20
[   25.649568] 
[   25.649617] The buggy address belongs to the object at fff00000c7884f80
[   25.649617]  which belongs to the cache kmalloc-64 of size 64
[   25.649727] The buggy address is located 0 bytes to the right of
[   25.649727]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.649804] 
[   25.649842] The buggy address belongs to the physical page:
[   25.649924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.650051] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.650167] page_type: f5(slab)
[   25.650220] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.650277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.650326] page dumped because: kasan: bad access detected
[   25.650378] 
[   25.650416] Memory state around the buggy address:
[   25.650459]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.650509]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.650710] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.651016]                                      ^
[   25.651708]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.652094]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.652806] ==================================================================
[   25.709260] ==================================================================
[   25.709415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   25.709500] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.709562] 
[   25.709608] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.709946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.710246] Hardware name: linux,dummy-virt (DT)
[   25.710366] Call trace:
[   25.710433]  show_stack+0x20/0x38 (C)
[   25.710542]  dump_stack_lvl+0x8c/0xd0
[   25.710609]  print_report+0x118/0x608
[   25.710667]  kasan_report+0xdc/0x128
[   25.710885]  kasan_check_range+0x100/0x1a8
[   25.711071]  __kasan_check_write+0x20/0x30
[   25.711136]  kasan_atomics_helper+0x154c/0x4858
[   25.711198]  kasan_atomics+0x198/0x2e0
[   25.711255]  kunit_try_run_case+0x170/0x3f0
[   25.711312]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.711377]  kthread+0x328/0x630
[   25.711630]  ret_from_fork+0x10/0x20
[   25.711700] 
[   25.711740] Allocated by task 265:
[   25.711794]  kasan_save_stack+0x3c/0x68
[   25.711869]  kasan_save_track+0x20/0x40
[   25.711922]  kasan_save_alloc_info+0x40/0x58
[   25.711969]  __kasan_kmalloc+0xd4/0xd8
[   25.712015]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.712078]  kasan_atomics+0xb8/0x2e0
[   25.712141]  kunit_try_run_case+0x170/0x3f0
[   25.712210]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.712281]  kthread+0x328/0x630
[   25.712326]  ret_from_fork+0x10/0x20
[   25.712372] 
[   25.712412] The buggy address belongs to the object at fff00000c7884f80
[   25.712412]  which belongs to the cache kmalloc-64 of size 64
[   25.712487] The buggy address is located 0 bytes to the right of
[   25.712487]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.712581] 
[   25.712617] The buggy address belongs to the physical page:
[   25.712658] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.712724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.712786] page_type: f5(slab)
[   25.712841] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.712902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.712951] page dumped because: kasan: bad access detected
[   25.713015] 
[   25.713043] Memory state around the buggy address:
[   25.713086]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.713154]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.713209] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.713272]                                      ^
[   25.713331]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.716451]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.716577] ==================================================================
[   25.674299] ==================================================================
[   25.674377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   25.674696] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.674763] 
[   25.674807] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.674952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.674991] Hardware name: linux,dummy-virt (DT)
[   25.675329] Call trace:
[   25.675379]  show_stack+0x20/0x38 (C)
[   25.675725]  dump_stack_lvl+0x8c/0xd0
[   25.675797]  print_report+0x118/0x608
[   25.675925]  kasan_report+0xdc/0x128
[   25.676048]  __asan_report_load8_noabort+0x20/0x30
[   25.676110]  kasan_atomics_helper+0x3f04/0x4858
[   25.676412]  kasan_atomics+0x198/0x2e0
[   25.676571]  kunit_try_run_case+0x170/0x3f0
[   25.676728]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.676970]  kthread+0x328/0x630
[   25.677122]  ret_from_fork+0x10/0x20
[   25.677216] 
[   25.677248] Allocated by task 265:
[   25.677610]  kasan_save_stack+0x3c/0x68
[   25.678156]  kasan_save_track+0x20/0x40
[   25.678231]  kasan_save_alloc_info+0x40/0x58
[   25.678308]  __kasan_kmalloc+0xd4/0xd8
[   25.678454]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.678557]  kasan_atomics+0xb8/0x2e0
[   25.678656]  kunit_try_run_case+0x170/0x3f0
[   25.678711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.678788]  kthread+0x328/0x630
[   25.678857]  ret_from_fork+0x10/0x20
[   25.679258] 
[   25.679440] The buggy address belongs to the object at fff00000c7884f80
[   25.679440]  which belongs to the cache kmalloc-64 of size 64
[   25.679790] The buggy address is located 0 bytes to the right of
[   25.679790]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.680079] 
[   25.680431] The buggy address belongs to the physical page:
[   25.680699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.680816] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.680935] page_type: f5(slab)
[   25.681224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.681442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.681703] page dumped because: kasan: bad access detected
[   25.681764] 
[   25.682029] Memory state around the buggy address:
[   25.682093]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.682150]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.682429] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.682505]                                      ^
[   25.682556]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.682994]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.683088] ==================================================================
[   25.605035] ==================================================================
[   25.605168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   25.605325] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.605469] 
[   25.605603] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.605876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.605979] Hardware name: linux,dummy-virt (DT)
[   25.606076] Call trace:
[   25.606163]  show_stack+0x20/0x38 (C)
[   25.606324]  dump_stack_lvl+0x8c/0xd0
[   25.606580]  print_report+0x118/0x608
[   25.607108]  kasan_report+0xdc/0x128
[   25.607834]  kasan_check_range+0x100/0x1a8
[   25.608035]  __kasan_check_write+0x20/0x30
[   25.608917]  kasan_atomics_helper+0x1128/0x4858
[   25.609473]  kasan_atomics+0x198/0x2e0
[   25.610032]  kunit_try_run_case+0x170/0x3f0
[   25.610521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.610655]  kthread+0x328/0x630
[   25.610755]  ret_from_fork+0x10/0x20
[   25.611839] 
[   25.611962] Allocated by task 265:
[   25.612085]  kasan_save_stack+0x3c/0x68
[   25.612512]  kasan_save_track+0x20/0x40
[   25.613309]  kasan_save_alloc_info+0x40/0x58
[   25.613684]  __kasan_kmalloc+0xd4/0xd8
[   25.614297]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.614551]  kasan_atomics+0xb8/0x2e0
[   25.614635]  kunit_try_run_case+0x170/0x3f0
[   25.614724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.614846]  kthread+0x328/0x630
[   25.614943]  ret_from_fork+0x10/0x20
[   25.616215] 
[   25.616706] The buggy address belongs to the object at fff00000c7884f80
[   25.616706]  which belongs to the cache kmalloc-64 of size 64
[   25.617571] The buggy address is located 0 bytes to the right of
[   25.617571]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.618612] 
[   25.619315] The buggy address belongs to the physical page:
[   25.619458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.620487] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.620650] page_type: f5(slab)
[   25.621095] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.621712] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.621945] page dumped because: kasan: bad access detected
[   25.622150] 
[   25.622433] Memory state around the buggy address:
[   25.623127]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.623674]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.624117] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.624861]                                      ^
[   25.625164]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.625697]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.626493] ==================================================================
[   25.628755] ==================================================================
[   25.629605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   25.630575] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.631094] 
[   25.631376] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.631620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.631691] Hardware name: linux,dummy-virt (DT)
[   25.631775] Call trace:
[   25.633183]  show_stack+0x20/0x38 (C)
[   25.633918]  dump_stack_lvl+0x8c/0xd0
[   25.634296]  print_report+0x118/0x608
[   25.634436]  kasan_report+0xdc/0x128
[   25.634557]  kasan_check_range+0x100/0x1a8
[   25.634666]  __kasan_check_write+0x20/0x30
[   25.634771]  kasan_atomics_helper+0x1190/0x4858
[   25.634905]  kasan_atomics+0x198/0x2e0
[   25.635031]  kunit_try_run_case+0x170/0x3f0
[   25.636964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.637421]  kthread+0x328/0x630
[   25.638066]  ret_from_fork+0x10/0x20
[   25.638220] 
[   25.638298] Allocated by task 265:
[   25.638450]  kasan_save_stack+0x3c/0x68
[   25.638568]  kasan_save_track+0x20/0x40
[   25.638792]  kasan_save_alloc_info+0x40/0x58
[   25.638912]  __kasan_kmalloc+0xd4/0xd8
[   25.639031]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.639142]  kasan_atomics+0xb8/0x2e0
[   25.639243]  kunit_try_run_case+0x170/0x3f0
[   25.639345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.639493]  kthread+0x328/0x630
[   25.639581]  ret_from_fork+0x10/0x20
[   25.639663] 
[   25.639712] The buggy address belongs to the object at fff00000c7884f80
[   25.639712]  which belongs to the cache kmalloc-64 of size 64
[   25.639863] The buggy address is located 0 bytes to the right of
[   25.639863]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.640039] 
[   25.640094] The buggy address belongs to the physical page:
[   25.640169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.640298] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.640433] page_type: f5(slab)
[   25.640538] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.640721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.640905] page dumped because: kasan: bad access detected
[   25.641003] 
[   25.641050] Memory state around the buggy address:
[   25.641138]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.641239]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.641341] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.641465]                                      ^
[   25.641550]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.641655]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.641787] ==================================================================
[   25.765611] ==================================================================
[   25.765695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   25.765772] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.765833] 
[   25.765880] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.765982] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.766014] Hardware name: linux,dummy-virt (DT)
[   25.766054] Call trace:
[   25.766084]  show_stack+0x20/0x38 (C)
[   25.766147]  dump_stack_lvl+0x8c/0xd0
[   25.766205]  print_report+0x118/0x608
[   25.766262]  kasan_report+0xdc/0x128
[   25.766315]  kasan_check_range+0x100/0x1a8
[   25.768313]  __kasan_check_write+0x20/0x30
[   25.768811]  kasan_atomics_helper+0x16d0/0x4858
[   25.769114]  kasan_atomics+0x198/0x2e0
[   25.769578]  kunit_try_run_case+0x170/0x3f0
[   25.769788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.770020]  kthread+0x328/0x630
[   25.770094]  ret_from_fork+0x10/0x20
[   25.770266] 
[   25.770296] Allocated by task 265:
[   25.770576]  kasan_save_stack+0x3c/0x68
[   25.770640]  kasan_save_track+0x20/0x40
[   25.770691]  kasan_save_alloc_info+0x40/0x58
[   25.770738]  __kasan_kmalloc+0xd4/0xd8
[   25.770785]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.770845]  kasan_atomics+0xb8/0x2e0
[   25.770897]  kunit_try_run_case+0x170/0x3f0
[   25.770947]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.771211]  kthread+0x328/0x630
[   25.771461]  ret_from_fork+0x10/0x20
[   25.771520] 
[   25.771556] The buggy address belongs to the object at fff00000c7884f80
[   25.771556]  which belongs to the cache kmalloc-64 of size 64
[   25.771628] The buggy address is located 0 bytes to the right of
[   25.771628]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.771701] 
[   25.771731] The buggy address belongs to the physical page:
[   25.771770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.772045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.772117] page_type: f5(slab)
[   25.772172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.772234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.772284] page dumped because: kasan: bad access detected
[   25.772327] 
[   25.772350] Memory state around the buggy address:
[   25.772421]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.772489]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.772545] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.772592]                                      ^
[   25.772636]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.772686]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.772733] ==================================================================
[   25.513483] ==================================================================
[   25.513690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   25.513820] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.513989] 
[   25.514129] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.514347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.514775] Hardware name: linux,dummy-virt (DT)
[   25.514865] Call trace:
[   25.514929]  show_stack+0x20/0x38 (C)
[   25.515154]  dump_stack_lvl+0x8c/0xd0
[   25.515586]  print_report+0x118/0x608
[   25.515804]  kasan_report+0xdc/0x128
[   25.515954]  kasan_check_range+0x100/0x1a8
[   25.516045]  __kasan_check_write+0x20/0x30
[   25.516147]  kasan_atomics_helper+0xe44/0x4858
[   25.516312]  kasan_atomics+0x198/0x2e0
[   25.516620]  kunit_try_run_case+0x170/0x3f0
[   25.517045]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.517210]  kthread+0x328/0x630
[   25.517324]  ret_from_fork+0x10/0x20
[   25.517530] 
[   25.517954] Allocated by task 265:
[   25.518127]  kasan_save_stack+0x3c/0x68
[   25.518246]  kasan_save_track+0x20/0x40
[   25.518350]  kasan_save_alloc_info+0x40/0x58
[   25.518686]  __kasan_kmalloc+0xd4/0xd8
[   25.519055]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.519173]  kasan_atomics+0xb8/0x2e0
[   25.519380]  kunit_try_run_case+0x170/0x3f0
[   25.519537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.519751]  kthread+0x328/0x630
[   25.520045]  ret_from_fork+0x10/0x20
[   25.520373] 
[   25.520445] The buggy address belongs to the object at fff00000c7884f80
[   25.520445]  which belongs to the cache kmalloc-64 of size 64
[   25.520792] The buggy address is located 0 bytes to the right of
[   25.520792]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.520972] 
[   25.521009] The buggy address belongs to the physical page:
[   25.521050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.521114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.521175] page_type: f5(slab)
[   25.521229] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.521289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.521337] page dumped because: kasan: bad access detected
[   25.521376] 
[   25.521424] Memory state around the buggy address:
[   25.521469]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.521521]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.521572] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.521618]                                      ^
[   25.521659]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.521707]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.521751] ==================================================================
[   25.553708] ==================================================================
[   25.553886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   25.554045] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.554162] 
[   25.554241] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.554498] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.554646] Hardware name: linux,dummy-virt (DT)
[   25.554761] Call trace:
[   25.554858]  show_stack+0x20/0x38 (C)
[   25.555040]  dump_stack_lvl+0x8c/0xd0
[   25.555200]  print_report+0x118/0x608
[   25.555371]  kasan_report+0xdc/0x128
[   25.555547]  kasan_check_range+0x100/0x1a8
[   25.555668]  __kasan_check_write+0x20/0x30
[   25.555763]  kasan_atomics_helper+0xf88/0x4858
[   25.555897]  kasan_atomics+0x198/0x2e0
[   25.555998]  kunit_try_run_case+0x170/0x3f0
[   25.556102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.556232]  kthread+0x328/0x630
[   25.556329]  ret_from_fork+0x10/0x20
[   25.556465] 
[   25.556524] Allocated by task 265:
[   25.556615]  kasan_save_stack+0x3c/0x68
[   25.556722]  kasan_save_track+0x20/0x40
[   25.556825]  kasan_save_alloc_info+0x40/0x58
[   25.556924]  __kasan_kmalloc+0xd4/0xd8
[   25.557020]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.557124]  kasan_atomics+0xb8/0x2e0
[   25.557223]  kunit_try_run_case+0x170/0x3f0
[   25.557321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.557434]  kthread+0x328/0x630
[   25.557526]  ret_from_fork+0x10/0x20
[   25.557622] 
[   25.557679] The buggy address belongs to the object at fff00000c7884f80
[   25.557679]  which belongs to the cache kmalloc-64 of size 64
[   25.557814] The buggy address is located 0 bytes to the right of
[   25.557814]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.557976] 
[   25.558043] The buggy address belongs to the physical page:
[   25.558122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.558253] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.558439] page_type: f5(slab)
[   25.558532] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.558594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.558644] page dumped because: kasan: bad access detected
[   25.558708] 
[   25.558792] Memory state around the buggy address:
[   25.559018]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.559243]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.559642] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.559961]                                      ^
[   25.560055]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.560169]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.560659] ==================================================================
[   25.653766] ==================================================================
[   25.653846] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   25.653926] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.654443] 
[   25.654532] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.654645] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.654681] Hardware name: linux,dummy-virt (DT)
[   25.654722] Call trace:
[   25.654754]  show_stack+0x20/0x38 (C)
[   25.654836]  dump_stack_lvl+0x8c/0xd0
[   25.654902]  print_report+0x118/0x608
[   25.654958]  kasan_report+0xdc/0x128
[   25.655044]  kasan_check_range+0x100/0x1a8
[   25.655266]  __kasan_check_write+0x20/0x30
[   25.655650]  kasan_atomics_helper+0x126c/0x4858
[   25.655729]  kasan_atomics+0x198/0x2e0
[   25.655786]  kunit_try_run_case+0x170/0x3f0
[   25.655845]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.656026]  kthread+0x328/0x630
[   25.656119]  ret_from_fork+0x10/0x20
[   25.656412] 
[   25.656444] Allocated by task 265:
[   25.656483]  kasan_save_stack+0x3c/0x68
[   25.656726]  kasan_save_track+0x20/0x40
[   25.656801]  kasan_save_alloc_info+0x40/0x58
[   25.657004]  __kasan_kmalloc+0xd4/0xd8
[   25.657216]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.657305]  kasan_atomics+0xb8/0x2e0
[   25.657366]  kunit_try_run_case+0x170/0x3f0
[   25.657429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.657486]  kthread+0x328/0x630
[   25.657527]  ret_from_fork+0x10/0x20
[   25.658018] 
[   25.658057] The buggy address belongs to the object at fff00000c7884f80
[   25.658057]  which belongs to the cache kmalloc-64 of size 64
[   25.658445] The buggy address is located 0 bytes to the right of
[   25.658445]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.658746] 
[   25.658781] The buggy address belongs to the physical page:
[   25.658832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.658903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.658965] page_type: f5(slab)
[   25.659019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.659484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.659549] page dumped because: kasan: bad access detected
[   25.659592] 
[   25.659699] Memory state around the buggy address:
[   25.659748]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.659802]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.659857] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.659907]                                      ^
[   25.659998]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.660241]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.660514] ==================================================================
[   25.794948] ==================================================================
[   25.795022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   25.795096] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.795160] 
[   25.795202] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.795304] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.795339] Hardware name: linux,dummy-virt (DT)
[   25.795379] Call trace:
[   25.795422]  show_stack+0x20/0x38 (C)
[   25.795489]  dump_stack_lvl+0x8c/0xd0
[   25.795547]  print_report+0x118/0x608
[   25.795604]  kasan_report+0xdc/0x128
[   25.795658]  kasan_check_range+0x100/0x1a8
[   25.795716]  __kasan_check_write+0x20/0x30
[   25.795770]  kasan_atomics_helper+0x17ec/0x4858
[   25.795827]  kasan_atomics+0x198/0x2e0
[   25.795882]  kunit_try_run_case+0x170/0x3f0
[   25.795937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.795998]  kthread+0x328/0x630
[   25.796046]  ret_from_fork+0x10/0x20
[   25.796103] 
[   25.796128] Allocated by task 265:
[   25.796164]  kasan_save_stack+0x3c/0x68
[   25.796217]  kasan_save_track+0x20/0x40
[   25.796266]  kasan_save_alloc_info+0x40/0x58
[   25.796312]  __kasan_kmalloc+0xd4/0xd8
[   25.796356]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.796430]  kasan_atomics+0xb8/0x2e0
[   25.796483]  kunit_try_run_case+0x170/0x3f0
[   25.796530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.796583]  kthread+0x328/0x630
[   25.796623]  ret_from_fork+0x10/0x20
[   25.796667] 
[   25.796694] The buggy address belongs to the object at fff00000c7884f80
[   25.796694]  which belongs to the cache kmalloc-64 of size 64
[   25.796971] The buggy address is located 0 bytes to the right of
[   25.796971]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.797269] 
[   25.797301] The buggy address belongs to the physical page:
[   25.797343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.797828] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.797900] page_type: f5(slab)
[   25.798028] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.798175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.798244] page dumped because: kasan: bad access detected
[   25.798328] 
[   25.798379] Memory state around the buggy address:
[   25.798437]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.798542]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.798677] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.798787]                                      ^
[   25.798848]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.798903]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.798949] ==================================================================
[   25.684354] ==================================================================
[   25.684501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   25.684582] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.684641] 
[   25.684684] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.684781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.684814] Hardware name: linux,dummy-virt (DT)
[   25.684853] Call trace:
[   25.684903]  show_stack+0x20/0x38 (C)
[   25.684965]  dump_stack_lvl+0x8c/0xd0
[   25.685023]  print_report+0x118/0x608
[   25.685078]  kasan_report+0xdc/0x128
[   25.685131]  kasan_check_range+0x100/0x1a8
[   25.685184]  __kasan_check_write+0x20/0x30
[   25.685236]  kasan_atomics_helper+0x1414/0x4858
[   25.685292]  kasan_atomics+0x198/0x2e0
[   25.685344]  kunit_try_run_case+0x170/0x3f0
[   25.685782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.686153]  kthread+0x328/0x630
[   25.686230]  ret_from_fork+0x10/0x20
[   25.686293] 
[   25.686319] Allocated by task 265:
[   25.686788]  kasan_save_stack+0x3c/0x68
[   25.686871]  kasan_save_track+0x20/0x40
[   25.686938]  kasan_save_alloc_info+0x40/0x58
[   25.686990]  __kasan_kmalloc+0xd4/0xd8
[   25.687036]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.687085]  kasan_atomics+0xb8/0x2e0
[   25.687168]  kunit_try_run_case+0x170/0x3f0
[   25.687232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.687300]  kthread+0x328/0x630
[   25.687342]  ret_from_fork+0x10/0x20
[   25.687434] 
[   25.687627] The buggy address belongs to the object at fff00000c7884f80
[   25.687627]  which belongs to the cache kmalloc-64 of size 64
[   25.687795] The buggy address is located 0 bytes to the right of
[   25.687795]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.688061] 
[   25.688240] The buggy address belongs to the physical page:
[   25.688468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.688556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.688619] page_type: f5(slab)
[   25.689000] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.689069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.689121] page dumped because: kasan: bad access detected
[   25.689161] 
[   25.689186] Memory state around the buggy address:
[   25.689228]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.689492]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.689556] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.689709]                                      ^
[   25.689761]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.689861]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.689912] ==================================================================
[   25.738942] ==================================================================
[   25.739025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   25.739102] Write of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.739162] 
[   25.739209] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.739310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.739344] Hardware name: linux,dummy-virt (DT)
[   25.739385] Call trace:
[   25.739430]  show_stack+0x20/0x38 (C)
[   25.739492]  dump_stack_lvl+0x8c/0xd0
[   25.739552]  print_report+0x118/0x608
[   25.739605]  kasan_report+0xdc/0x128
[   25.739660]  kasan_check_range+0x100/0x1a8
[   25.739717]  __kasan_check_write+0x20/0x30
[   25.739771]  kasan_atomics_helper+0x1644/0x4858
[   25.739827]  kasan_atomics+0x198/0x2e0
[   25.739879]  kunit_try_run_case+0x170/0x3f0
[   25.739935]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.739995]  kthread+0x328/0x630
[   25.740045]  ret_from_fork+0x10/0x20
[   25.740102] 
[   25.740127] Allocated by task 265:
[   25.740161]  kasan_save_stack+0x3c/0x68
[   25.740215]  kasan_save_track+0x20/0x40
[   25.740262]  kasan_save_alloc_info+0x40/0x58
[   25.740306]  __kasan_kmalloc+0xd4/0xd8
[   25.740350]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.740395]  kasan_atomics+0xb8/0x2e0
[   25.743057]  kunit_try_run_case+0x170/0x3f0
[   25.743731]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.743853]  kthread+0x328/0x630
[   25.744019]  ret_from_fork+0x10/0x20
[   25.744297] 
[   25.744443] The buggy address belongs to the object at fff00000c7884f80
[   25.744443]  which belongs to the cache kmalloc-64 of size 64
[   25.745075] The buggy address is located 0 bytes to the right of
[   25.745075]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.745207] 
[   25.745240] The buggy address belongs to the physical page:
[   25.745280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.746424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.746829] page_type: f5(slab)
[   25.746898] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.747319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.747726] page dumped because: kasan: bad access detected
[   25.747774] 
[   25.747801] Memory state around the buggy address:
[   25.747849]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.747903]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.747958] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.748006]                                      ^
[   25.748048]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.748100]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.748147] ==================================================================
[   25.727827] ==================================================================
[   25.728268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   25.728432] Read of size 8 at addr fff00000c7884fb0 by task kunit_try_catch/265
[   25.728497] 
[   25.728542] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT 
[   25.728643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.728676] Hardware name: linux,dummy-virt (DT)
[   25.728717] Call trace:
[   25.728745]  show_stack+0x20/0x38 (C)
[   25.728809]  dump_stack_lvl+0x8c/0xd0
[   25.728866]  print_report+0x118/0x608
[   25.728923]  kasan_report+0xdc/0x128
[   25.728977]  __asan_report_load8_noabort+0x20/0x30
[   25.729034]  kasan_atomics_helper+0x3db0/0x4858
[   25.729092]  kasan_atomics+0x198/0x2e0
[   25.729145]  kunit_try_run_case+0x170/0x3f0
[   25.729202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.729264]  kthread+0x328/0x630
[   25.731179]  ret_from_fork+0x10/0x20
[   25.732236] 
[   25.732271] Allocated by task 265:
[   25.732313]  kasan_save_stack+0x3c/0x68
[   25.732385]  kasan_save_track+0x20/0x40
[   25.732449]  kasan_save_alloc_info+0x40/0x58
[   25.733042]  __kasan_kmalloc+0xd4/0xd8
[   25.733345]  __kmalloc_cache_noprof+0x15c/0x3c0
[   25.733614]  kasan_atomics+0xb8/0x2e0
[   25.734188]  kunit_try_run_case+0x170/0x3f0
[   25.734496]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   25.734574]  kthread+0x328/0x630
[   25.734621]  ret_from_fork+0x10/0x20
[   25.734926] 
[   25.735149] The buggy address belongs to the object at fff00000c7884f80
[   25.735149]  which belongs to the cache kmalloc-64 of size 64
[   25.735581] The buggy address is located 0 bytes to the right of
[   25.735581]  allocated 48-byte region [fff00000c7884f80, fff00000c7884fb0)
[   25.736193] 
[   25.736529] The buggy address belongs to the physical page:
[   25.736745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107884
[   25.736855] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   25.736925] page_type: f5(slab)
[   25.736979] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   25.737040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.737091] page dumped because: kasan: bad access detected
[   25.737131] 
[   25.737155] Memory state around the buggy address:
[   25.737199]  fff00000c7884e80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.737342]  fff00000c7884f00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.737407] >fff00000c7884f80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.737479]                                      ^
[   25.737548]  fff00000c7885000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.737629]  fff00000c7885080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[   25.737683] ==================================================================


[   13.411426] ==================================================================
[   13.411701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   13.412316] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.412894] 
[   13.413066] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.413114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.413127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.413150] Call Trace:
[   13.413166]  <TASK>
[   13.413183]  dump_stack_lvl+0x73/0xb0
[   13.413211]  print_report+0xd1/0x650
[   13.413350]  ? __virt_addr_valid+0x1db/0x2d0
[   13.413373]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.413397]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.413420]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.413444]  kasan_report+0x141/0x180
[   13.413525]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.413559]  __asan_report_load4_noabort+0x18/0x20
[   13.413581]  kasan_atomics_helper+0x4b54/0x5450
[   13.413606]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.413643]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.413667]  ? kasan_atomics+0x152/0x310
[   13.413691]  kasan_atomics+0x1dc/0x310
[   13.413712]  ? __pfx_kasan_atomics+0x10/0x10
[   13.413734]  ? __pfx_read_tsc+0x10/0x10
[   13.413764]  ? ktime_get_ts64+0x86/0x230
[   13.413792]  kunit_try_run_case+0x1a5/0x480
[   13.413828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.413849]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.413875]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.413901]  ? __kthread_parkme+0x82/0x180
[   13.413923]  ? preempt_count_sub+0x50/0x80
[   13.413948]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.413971]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.413996]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.414023]  kthread+0x337/0x6f0
[   13.414043]  ? trace_preempt_on+0x20/0xc0
[   13.414067]  ? __pfx_kthread+0x10/0x10
[   13.414089]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.414113]  ? calculate_sigpending+0x7b/0xa0
[   13.414139]  ? __pfx_kthread+0x10/0x10
[   13.414162]  ret_from_fork+0x116/0x1d0
[   13.414182]  ? __pfx_kthread+0x10/0x10
[   13.414206]  ret_from_fork_asm+0x1a/0x30
[   13.414237]  </TASK>
[   13.414248] 
[   13.424975] Allocated by task 282:
[   13.425796]  kasan_save_stack+0x45/0x70
[   13.426022]  kasan_save_track+0x18/0x40
[   13.426645]  kasan_save_alloc_info+0x3b/0x50
[   13.426946]  __kasan_kmalloc+0xb7/0xc0
[   13.427157]  __kmalloc_cache_noprof+0x189/0x420
[   13.427331]  kasan_atomics+0x95/0x310
[   13.427526]  kunit_try_run_case+0x1a5/0x480
[   13.427745]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.428064]  kthread+0x337/0x6f0
[   13.428227]  ret_from_fork+0x116/0x1d0
[   13.428423]  ret_from_fork_asm+0x1a/0x30
[   13.428634] 
[   13.428711] The buggy address belongs to the object at ffff888102fa7d80
[   13.428711]  which belongs to the cache kmalloc-64 of size 64
[   13.429476] The buggy address is located 0 bytes to the right of
[   13.429476]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.430053] 
[   13.430203] The buggy address belongs to the physical page:
[   13.430438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.430951] flags: 0x200000000000000(node=0|zone=2)
[   13.431138] page_type: f5(slab)
[   13.431349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.431909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.432446] page dumped because: kasan: bad access detected
[   13.433295] 
[   13.433382] Memory state around the buggy address:
[   13.433861]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.434298]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.434702] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.435202]                                      ^
[   13.435439]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.435763]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.436071] ==================================================================
[   13.482921] ==================================================================
[   13.483376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   13.483743] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.484301] 
[   13.484423] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.484470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.484484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.484507] Call Trace:
[   13.484522]  <TASK>
[   13.484538]  dump_stack_lvl+0x73/0xb0
[   13.484565]  print_report+0xd1/0x650
[   13.484589]  ? __virt_addr_valid+0x1db/0x2d0
[   13.484626]  ? kasan_atomics_helper+0x565/0x5450
[   13.484650]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.484675]  ? kasan_atomics_helper+0x565/0x5450
[   13.484699]  kasan_report+0x141/0x180
[   13.484722]  ? kasan_atomics_helper+0x565/0x5450
[   13.484750]  kasan_check_range+0x10c/0x1c0
[   13.484837]  __kasan_check_write+0x18/0x20
[   13.484860]  kasan_atomics_helper+0x565/0x5450
[   13.484885]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.484909]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.484932]  ? kasan_atomics+0x152/0x310
[   13.484957]  kasan_atomics+0x1dc/0x310
[   13.484979]  ? __pfx_kasan_atomics+0x10/0x10
[   13.485003]  ? __pfx_read_tsc+0x10/0x10
[   13.485026]  ? ktime_get_ts64+0x86/0x230
[   13.485052]  kunit_try_run_case+0x1a5/0x480
[   13.485074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.485095]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.485121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.485148]  ? __kthread_parkme+0x82/0x180
[   13.485170]  ? preempt_count_sub+0x50/0x80
[   13.485196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.485219]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.485244]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.485270]  kthread+0x337/0x6f0
[   13.485291]  ? trace_preempt_on+0x20/0xc0
[   13.485315]  ? __pfx_kthread+0x10/0x10
[   13.485337]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.485361]  ? calculate_sigpending+0x7b/0xa0
[   13.485386]  ? __pfx_kthread+0x10/0x10
[   13.485410]  ret_from_fork+0x116/0x1d0
[   13.485429]  ? __pfx_kthread+0x10/0x10
[   13.485450]  ret_from_fork_asm+0x1a/0x30
[   13.485482]  </TASK>
[   13.485494] 
[   13.496443] Allocated by task 282:
[   13.496633]  kasan_save_stack+0x45/0x70
[   13.497405]  kasan_save_track+0x18/0x40
[   13.497696]  kasan_save_alloc_info+0x3b/0x50
[   13.498144]  __kasan_kmalloc+0xb7/0xc0
[   13.498349]  __kmalloc_cache_noprof+0x189/0x420
[   13.498868]  kasan_atomics+0x95/0x310
[   13.499137]  kunit_try_run_case+0x1a5/0x480
[   13.499477]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.499957]  kthread+0x337/0x6f0
[   13.500135]  ret_from_fork+0x116/0x1d0
[   13.500305]  ret_from_fork_asm+0x1a/0x30
[   13.500488] 
[   13.500585] The buggy address belongs to the object at ffff888102fa7d80
[   13.500585]  which belongs to the cache kmalloc-64 of size 64
[   13.501192] The buggy address is located 0 bytes to the right of
[   13.501192]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.501863] 
[   13.501953] The buggy address belongs to the physical page:
[   13.502136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.502503] flags: 0x200000000000000(node=0|zone=2)
[   13.502787] page_type: f5(slab)
[   13.502949] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.503282] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.503537] page dumped because: kasan: bad access detected
[   13.503790] 
[   13.504007] Memory state around the buggy address:
[   13.504175]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.504495]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.504833] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.505322]                                      ^
[   13.505553]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.505895]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.506261] ==================================================================
[   14.695092] ==================================================================
[   14.695491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   14.695917] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.696164] 
[   14.696275] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.696320] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.696334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.696356] Call Trace:
[   14.696371]  <TASK>
[   14.696388]  dump_stack_lvl+0x73/0xb0
[   14.696417]  print_report+0xd1/0x650
[   14.696441]  ? __virt_addr_valid+0x1db/0x2d0
[   14.696464]  ? kasan_atomics_helper+0x224c/0x5450
[   14.696487]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.696512]  ? kasan_atomics_helper+0x224c/0x5450
[   14.696540]  kasan_report+0x141/0x180
[   14.696566]  ? kasan_atomics_helper+0x224c/0x5450
[   14.696595]  kasan_check_range+0x10c/0x1c0
[   14.696632]  __kasan_check_write+0x18/0x20
[   14.696654]  kasan_atomics_helper+0x224c/0x5450
[   14.696679]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.696702]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.696726]  ? kasan_atomics+0x152/0x310
[   14.696750]  kasan_atomics+0x1dc/0x310
[   14.696792]  ? __pfx_kasan_atomics+0x10/0x10
[   14.696815]  ? __pfx_read_tsc+0x10/0x10
[   14.696838]  ? ktime_get_ts64+0x86/0x230
[   14.696865]  kunit_try_run_case+0x1a5/0x480
[   14.696888]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.696909]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.696936]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.696963]  ? __kthread_parkme+0x82/0x180
[   14.696985]  ? preempt_count_sub+0x50/0x80
[   14.697009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.697032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.697058]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.697084]  kthread+0x337/0x6f0
[   14.697105]  ? trace_preempt_on+0x20/0xc0
[   14.697129]  ? __pfx_kthread+0x10/0x10
[   14.697151]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.697175]  ? calculate_sigpending+0x7b/0xa0
[   14.697200]  ? __pfx_kthread+0x10/0x10
[   14.697222]  ret_from_fork+0x116/0x1d0
[   14.697241]  ? __pfx_kthread+0x10/0x10
[   14.697263]  ret_from_fork_asm+0x1a/0x30
[   14.697295]  </TASK>
[   14.697307] 
[   14.704927] Allocated by task 282:
[   14.705107]  kasan_save_stack+0x45/0x70
[   14.705272]  kasan_save_track+0x18/0x40
[   14.705415]  kasan_save_alloc_info+0x3b/0x50
[   14.705584]  __kasan_kmalloc+0xb7/0xc0
[   14.705810]  __kmalloc_cache_noprof+0x189/0x420
[   14.706036]  kasan_atomics+0x95/0x310
[   14.706223]  kunit_try_run_case+0x1a5/0x480
[   14.706387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.706652]  kthread+0x337/0x6f0
[   14.706844]  ret_from_fork+0x116/0x1d0
[   14.707018]  ret_from_fork_asm+0x1a/0x30
[   14.707184] 
[   14.707261] The buggy address belongs to the object at ffff888102fa7d80
[   14.707261]  which belongs to the cache kmalloc-64 of size 64
[   14.707648] The buggy address is located 0 bytes to the right of
[   14.707648]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.708235] 
[   14.708336] The buggy address belongs to the physical page:
[   14.708593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.708925] flags: 0x200000000000000(node=0|zone=2)
[   14.709098] page_type: f5(slab)
[   14.709223] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.709568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.709951] page dumped because: kasan: bad access detected
[   14.710222] 
[   14.710326] Memory state around the buggy address:
[   14.710561]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.710898]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.711195] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.711483]                                      ^
[   14.711692]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.712030]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.712309] ==================================================================
[   14.031272] ==================================================================
[   14.031575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   14.032083] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.032396] 
[   14.032508] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.032554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.032567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.032588] Call Trace:
[   14.032604]  <TASK>
[   14.032631]  dump_stack_lvl+0x73/0xb0
[   14.032658]  print_report+0xd1/0x650
[   14.032681]  ? __virt_addr_valid+0x1db/0x2d0
[   14.032705]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.032728]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.032869]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.032894]  kasan_report+0x141/0x180
[   14.032918]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.032946]  __asan_report_load4_noabort+0x18/0x20
[   14.032970]  kasan_atomics_helper+0x49e8/0x5450
[   14.032994]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.033018]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.033041]  ? kasan_atomics+0x152/0x310
[   14.033065]  kasan_atomics+0x1dc/0x310
[   14.033086]  ? __pfx_kasan_atomics+0x10/0x10
[   14.033108]  ? __pfx_read_tsc+0x10/0x10
[   14.033130]  ? ktime_get_ts64+0x86/0x230
[   14.033156]  kunit_try_run_case+0x1a5/0x480
[   14.033178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.033199]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.033225]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.033252]  ? __kthread_parkme+0x82/0x180
[   14.033273]  ? preempt_count_sub+0x50/0x80
[   14.033298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.033320]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.033345]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.033371]  kthread+0x337/0x6f0
[   14.033392]  ? trace_preempt_on+0x20/0xc0
[   14.033416]  ? __pfx_kthread+0x10/0x10
[   14.033438]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.033462]  ? calculate_sigpending+0x7b/0xa0
[   14.033487]  ? __pfx_kthread+0x10/0x10
[   14.033511]  ret_from_fork+0x116/0x1d0
[   14.033530]  ? __pfx_kthread+0x10/0x10
[   14.033552]  ret_from_fork_asm+0x1a/0x30
[   14.033583]  </TASK>
[   14.033595] 
[   14.042133] Allocated by task 282:
[   14.042282]  kasan_save_stack+0x45/0x70
[   14.042494]  kasan_save_track+0x18/0x40
[   14.042837]  kasan_save_alloc_info+0x3b/0x50
[   14.043034]  __kasan_kmalloc+0xb7/0xc0
[   14.043174]  __kmalloc_cache_noprof+0x189/0x420
[   14.043348]  kasan_atomics+0x95/0x310
[   14.043537]  kunit_try_run_case+0x1a5/0x480
[   14.043768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.044019]  kthread+0x337/0x6f0
[   14.044147]  ret_from_fork+0x116/0x1d0
[   14.044286]  ret_from_fork_asm+0x1a/0x30
[   14.044433] 
[   14.044510] The buggy address belongs to the object at ffff888102fa7d80
[   14.044510]  which belongs to the cache kmalloc-64 of size 64
[   14.044933] The buggy address is located 0 bytes to the right of
[   14.044933]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.045576] 
[   14.045685] The buggy address belongs to the physical page:
[   14.045976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.046381] flags: 0x200000000000000(node=0|zone=2)
[   14.046660] page_type: f5(slab)
[   14.046862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.047234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.047537] page dumped because: kasan: bad access detected
[   14.047752] 
[   14.047842] Memory state around the buggy address:
[   14.048023]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.048616]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.048919] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.049140]                                      ^
[   14.049325]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.049551]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.049889] ==================================================================
[   13.506718] ==================================================================
[   13.507249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   13.507533] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.508019] 
[   13.508119] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.508167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.508180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.508203] Call Trace:
[   13.508218]  <TASK>
[   13.508234]  dump_stack_lvl+0x73/0xb0
[   13.508260]  print_report+0xd1/0x650
[   13.508283]  ? __virt_addr_valid+0x1db/0x2d0
[   13.508306]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.508329]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.508353]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.508377]  kasan_report+0x141/0x180
[   13.508400]  ? kasan_atomics_helper+0x5fe/0x5450
[   13.508429]  kasan_check_range+0x10c/0x1c0
[   13.508455]  __kasan_check_write+0x18/0x20
[   13.508476]  kasan_atomics_helper+0x5fe/0x5450
[   13.508500]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.508524]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.508548]  ? kasan_atomics+0x152/0x310
[   13.508573]  kasan_atomics+0x1dc/0x310
[   13.508593]  ? __pfx_kasan_atomics+0x10/0x10
[   13.508625]  ? __pfx_read_tsc+0x10/0x10
[   13.508647]  ? ktime_get_ts64+0x86/0x230
[   13.508674]  kunit_try_run_case+0x1a5/0x480
[   13.508695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.508716]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.508758]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.508783]  ? __kthread_parkme+0x82/0x180
[   13.508805]  ? preempt_count_sub+0x50/0x80
[   13.508830]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.508852]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.508878]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.508905]  kthread+0x337/0x6f0
[   13.508926]  ? trace_preempt_on+0x20/0xc0
[   13.508950]  ? __pfx_kthread+0x10/0x10
[   13.508973]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.508996]  ? calculate_sigpending+0x7b/0xa0
[   13.509022]  ? __pfx_kthread+0x10/0x10
[   13.509044]  ret_from_fork+0x116/0x1d0
[   13.509064]  ? __pfx_kthread+0x10/0x10
[   13.509085]  ret_from_fork_asm+0x1a/0x30
[   13.509117]  </TASK>
[   13.509129] 
[   13.517399] Allocated by task 282:
[   13.517540]  kasan_save_stack+0x45/0x70
[   13.517764]  kasan_save_track+0x18/0x40
[   13.518163]  kasan_save_alloc_info+0x3b/0x50
[   13.518349]  __kasan_kmalloc+0xb7/0xc0
[   13.518526]  __kmalloc_cache_noprof+0x189/0x420
[   13.518801]  kasan_atomics+0x95/0x310
[   13.519137]  kunit_try_run_case+0x1a5/0x480
[   13.519313]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.519542]  kthread+0x337/0x6f0
[   13.519738]  ret_from_fork+0x116/0x1d0
[   13.519980]  ret_from_fork_asm+0x1a/0x30
[   13.520166] 
[   13.520266] The buggy address belongs to the object at ffff888102fa7d80
[   13.520266]  which belongs to the cache kmalloc-64 of size 64
[   13.520724] The buggy address is located 0 bytes to the right of
[   13.520724]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.521109] 
[   13.521186] The buggy address belongs to the physical page:
[   13.521410] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.521781] flags: 0x200000000000000(node=0|zone=2)
[   13.522021] page_type: f5(slab)
[   13.522195] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.522527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.522781] page dumped because: kasan: bad access detected
[   13.523040] 
[   13.523138] Memory state around the buggy address:
[   13.523371]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.523962]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.524247] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.524511]                                      ^
[   13.524714]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.525176]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.525455] ==================================================================
[   14.377398] ==================================================================
[   14.377870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   14.378235] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.378572] 
[   14.378686] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.378732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.378746] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.378768] Call Trace:
[   14.378786]  <TASK>
[   14.378802]  dump_stack_lvl+0x73/0xb0
[   14.378827]  print_report+0xd1/0x650
[   14.378850]  ? __virt_addr_valid+0x1db/0x2d0
[   14.378873]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.378896]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.378921]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.378945]  kasan_report+0x141/0x180
[   14.378969]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.378997]  kasan_check_range+0x10c/0x1c0
[   14.379022]  __kasan_check_write+0x18/0x20
[   14.379043]  kasan_atomics_helper+0x1b22/0x5450
[   14.379067]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.379091]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.379114]  ? kasan_atomics+0x152/0x310
[   14.379138]  kasan_atomics+0x1dc/0x310
[   14.379159]  ? __pfx_kasan_atomics+0x10/0x10
[   14.379181]  ? __pfx_read_tsc+0x10/0x10
[   14.379204]  ? ktime_get_ts64+0x86/0x230
[   14.379229]  kunit_try_run_case+0x1a5/0x480
[   14.379252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.379273]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.379298]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.379324]  ? __kthread_parkme+0x82/0x180
[   14.379345]  ? preempt_count_sub+0x50/0x80
[   14.379370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.379392]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.379417]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.379443]  kthread+0x337/0x6f0
[   14.379463]  ? trace_preempt_on+0x20/0xc0
[   14.379486]  ? __pfx_kthread+0x10/0x10
[   14.379510]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.379535]  ? calculate_sigpending+0x7b/0xa0
[   14.379560]  ? __pfx_kthread+0x10/0x10
[   14.379582]  ret_from_fork+0x116/0x1d0
[   14.379602]  ? __pfx_kthread+0x10/0x10
[   14.379635]  ret_from_fork_asm+0x1a/0x30
[   14.379667]  </TASK>
[   14.379680] 
[   14.387363] Allocated by task 282:
[   14.387545]  kasan_save_stack+0x45/0x70
[   14.387759]  kasan_save_track+0x18/0x40
[   14.387970]  kasan_save_alloc_info+0x3b/0x50
[   14.388157]  __kasan_kmalloc+0xb7/0xc0
[   14.388296]  __kmalloc_cache_noprof+0x189/0x420
[   14.388455]  kasan_atomics+0x95/0x310
[   14.388591]  kunit_try_run_case+0x1a5/0x480
[   14.388751]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.388936]  kthread+0x337/0x6f0
[   14.389063]  ret_from_fork+0x116/0x1d0
[   14.389202]  ret_from_fork_asm+0x1a/0x30
[   14.389406] 
[   14.389505] The buggy address belongs to the object at ffff888102fa7d80
[   14.389505]  which belongs to the cache kmalloc-64 of size 64
[   14.390046] The buggy address is located 0 bytes to the right of
[   14.390046]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.390620] 
[   14.390721] The buggy address belongs to the physical page:
[   14.391072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.391381] flags: 0x200000000000000(node=0|zone=2)
[   14.391591] page_type: f5(slab)
[   14.391726] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.391969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.392205] page dumped because: kasan: bad access detected
[   14.392386] 
[   14.392459] Memory state around the buggy address:
[   14.392628]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.393190]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.393523] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.393969]                                      ^
[   14.394212]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.394552]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.394880] ==================================================================
[   14.126864] ==================================================================
[   14.127198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.127485] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.127728] 
[   14.127913] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.127958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.127972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.127994] Call Trace:
[   14.128010]  <TASK>
[   14.128026]  dump_stack_lvl+0x73/0xb0
[   14.128053]  print_report+0xd1/0x650
[   14.128076]  ? __virt_addr_valid+0x1db/0x2d0
[   14.128101]  ? kasan_atomics_helper+0x1467/0x5450
[   14.128124]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.128148]  ? kasan_atomics_helper+0x1467/0x5450
[   14.128172]  kasan_report+0x141/0x180
[   14.128195]  ? kasan_atomics_helper+0x1467/0x5450
[   14.128224]  kasan_check_range+0x10c/0x1c0
[   14.128249]  __kasan_check_write+0x18/0x20
[   14.128271]  kasan_atomics_helper+0x1467/0x5450
[   14.128295]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.128320]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.128342]  ? kasan_atomics+0x152/0x310
[   14.128366]  kasan_atomics+0x1dc/0x310
[   14.128387]  ? __pfx_kasan_atomics+0x10/0x10
[   14.128410]  ? __pfx_read_tsc+0x10/0x10
[   14.128432]  ? ktime_get_ts64+0x86/0x230
[   14.128457]  kunit_try_run_case+0x1a5/0x480
[   14.128480]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.128501]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.128527]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.128554]  ? __kthread_parkme+0x82/0x180
[   14.128575]  ? preempt_count_sub+0x50/0x80
[   14.128600]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.128636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.128662]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.128689]  kthread+0x337/0x6f0
[   14.128709]  ? trace_preempt_on+0x20/0xc0
[   14.128732]  ? __pfx_kthread+0x10/0x10
[   14.128755]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.128802]  ? calculate_sigpending+0x7b/0xa0
[   14.128827]  ? __pfx_kthread+0x10/0x10
[   14.128850]  ret_from_fork+0x116/0x1d0
[   14.128870]  ? __pfx_kthread+0x10/0x10
[   14.128893]  ret_from_fork_asm+0x1a/0x30
[   14.128924]  </TASK>
[   14.128936] 
[   14.138596] Allocated by task 282:
[   14.139092]  kasan_save_stack+0x45/0x70
[   14.139721]  kasan_save_track+0x18/0x40
[   14.140553]  kasan_save_alloc_info+0x3b/0x50
[   14.141192]  __kasan_kmalloc+0xb7/0xc0
[   14.141847]  __kmalloc_cache_noprof+0x189/0x420
[   14.142222]  kasan_atomics+0x95/0x310
[   14.142374]  kunit_try_run_case+0x1a5/0x480
[   14.142528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.143590]  kthread+0x337/0x6f0
[   14.144254]  ret_from_fork+0x116/0x1d0
[   14.144743]  ret_from_fork_asm+0x1a/0x30
[   14.145381] 
[   14.145570] The buggy address belongs to the object at ffff888102fa7d80
[   14.145570]  which belongs to the cache kmalloc-64 of size 64
[   14.146989] The buggy address is located 0 bytes to the right of
[   14.146989]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.148389] 
[   14.148763] The buggy address belongs to the physical page:
[   14.149462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.150317] flags: 0x200000000000000(node=0|zone=2)
[   14.150500] page_type: f5(slab)
[   14.150647] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.151498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.152635] page dumped because: kasan: bad access detected
[   14.153428] 
[   14.153782] Memory state around the buggy address:
[   14.154239]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.154478]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.155023] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.155707]                                      ^
[   14.156269]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.156784]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.157150] ==================================================================
[   14.204690] ==================================================================
[   14.205051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.205398] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.205969] 
[   14.206106] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.206153] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.206167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.206189] Call Trace:
[   14.206205]  <TASK>
[   14.206222]  dump_stack_lvl+0x73/0xb0
[   14.206248]  print_report+0xd1/0x650
[   14.206272]  ? __virt_addr_valid+0x1db/0x2d0
[   14.206296]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.206319]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.206344]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.206369]  kasan_report+0x141/0x180
[   14.206394]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.206422]  kasan_check_range+0x10c/0x1c0
[   14.206447]  __kasan_check_write+0x18/0x20
[   14.206469]  kasan_atomics_helper+0x15b6/0x5450
[   14.206493]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.206517]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.206546]  ? kasan_atomics+0x152/0x310
[   14.206583]  kasan_atomics+0x1dc/0x310
[   14.206604]  ? __pfx_kasan_atomics+0x10/0x10
[   14.206636]  ? __pfx_read_tsc+0x10/0x10
[   14.206660]  ? ktime_get_ts64+0x86/0x230
[   14.206685]  kunit_try_run_case+0x1a5/0x480
[   14.206712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.206734]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.206760]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.206798]  ? __kthread_parkme+0x82/0x180
[   14.206822]  ? preempt_count_sub+0x50/0x80
[   14.206848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.206871]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.206896]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.206924]  kthread+0x337/0x6f0
[   14.206946]  ? trace_preempt_on+0x20/0xc0
[   14.206970]  ? __pfx_kthread+0x10/0x10
[   14.206993]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.207016]  ? calculate_sigpending+0x7b/0xa0
[   14.207041]  ? __pfx_kthread+0x10/0x10
[   14.207064]  ret_from_fork+0x116/0x1d0
[   14.207084]  ? __pfx_kthread+0x10/0x10
[   14.207106]  ret_from_fork_asm+0x1a/0x30
[   14.207138]  </TASK>
[   14.207150] 
[   14.215171] Allocated by task 282:
[   14.215341]  kasan_save_stack+0x45/0x70
[   14.215514]  kasan_save_track+0x18/0x40
[   14.215669]  kasan_save_alloc_info+0x3b/0x50
[   14.215825]  __kasan_kmalloc+0xb7/0xc0
[   14.215964]  __kmalloc_cache_noprof+0x189/0x420
[   14.216125]  kasan_atomics+0x95/0x310
[   14.216262]  kunit_try_run_case+0x1a5/0x480
[   14.216455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.216735]  kthread+0x337/0x6f0
[   14.216908]  ret_from_fork+0x116/0x1d0
[   14.217100]  ret_from_fork_asm+0x1a/0x30
[   14.217300] 
[   14.217398] The buggy address belongs to the object at ffff888102fa7d80
[   14.217398]  which belongs to the cache kmalloc-64 of size 64
[   14.218335] The buggy address is located 0 bytes to the right of
[   14.218335]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.218729] 
[   14.218806] The buggy address belongs to the physical page:
[   14.218985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.219670] flags: 0x200000000000000(node=0|zone=2)
[   14.220086] page_type: f5(slab)
[   14.220259] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.220606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.220852] page dumped because: kasan: bad access detected
[   14.221031] 
[   14.221105] Memory state around the buggy address:
[   14.221516]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.221951]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.222257] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.222559]                                      ^
[   14.222788]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.223056]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.223279] ==================================================================
[   14.323423] ==================================================================
[   14.323872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   14.324213] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.324481] 
[   14.324596] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.324655] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.324669] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.324691] Call Trace:
[   14.324708]  <TASK>
[   14.324723]  dump_stack_lvl+0x73/0xb0
[   14.324749]  print_report+0xd1/0x650
[   14.324783]  ? __virt_addr_valid+0x1db/0x2d0
[   14.324807]  ? kasan_atomics_helper+0x194a/0x5450
[   14.324829]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.324853]  ? kasan_atomics_helper+0x194a/0x5450
[   14.324877]  kasan_report+0x141/0x180
[   14.324903]  ? kasan_atomics_helper+0x194a/0x5450
[   14.324931]  kasan_check_range+0x10c/0x1c0
[   14.324955]  __kasan_check_write+0x18/0x20
[   14.324976]  kasan_atomics_helper+0x194a/0x5450
[   14.325000]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.325024]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.325055]  ? kasan_atomics+0x152/0x310
[   14.325079]  kasan_atomics+0x1dc/0x310
[   14.325101]  ? __pfx_kasan_atomics+0x10/0x10
[   14.325123]  ? __pfx_read_tsc+0x10/0x10
[   14.325147]  ? ktime_get_ts64+0x86/0x230
[   14.325172]  kunit_try_run_case+0x1a5/0x480
[   14.325194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.325215]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.325240]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.325265]  ? __kthread_parkme+0x82/0x180
[   14.325287]  ? preempt_count_sub+0x50/0x80
[   14.325313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.325335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.325361]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.325387]  kthread+0x337/0x6f0
[   14.325408]  ? trace_preempt_on+0x20/0xc0
[   14.325431]  ? __pfx_kthread+0x10/0x10
[   14.325454]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.325477]  ? calculate_sigpending+0x7b/0xa0
[   14.325502]  ? __pfx_kthread+0x10/0x10
[   14.325525]  ret_from_fork+0x116/0x1d0
[   14.325545]  ? __pfx_kthread+0x10/0x10
[   14.325567]  ret_from_fork_asm+0x1a/0x30
[   14.325599]  </TASK>
[   14.325623] 
[   14.333274] Allocated by task 282:
[   14.333457]  kasan_save_stack+0x45/0x70
[   14.333645]  kasan_save_track+0x18/0x40
[   14.333858]  kasan_save_alloc_info+0x3b/0x50
[   14.334064]  __kasan_kmalloc+0xb7/0xc0
[   14.334225]  __kmalloc_cache_noprof+0x189/0x420
[   14.334411]  kasan_atomics+0x95/0x310
[   14.334605]  kunit_try_run_case+0x1a5/0x480
[   14.334843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.335069]  kthread+0x337/0x6f0
[   14.335208]  ret_from_fork+0x116/0x1d0
[   14.335347]  ret_from_fork_asm+0x1a/0x30
[   14.335492] 
[   14.335567] The buggy address belongs to the object at ffff888102fa7d80
[   14.335567]  which belongs to the cache kmalloc-64 of size 64
[   14.336296] The buggy address is located 0 bytes to the right of
[   14.336296]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.336682] 
[   14.336758] The buggy address belongs to the physical page:
[   14.337334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.337718] flags: 0x200000000000000(node=0|zone=2)
[   14.337961] page_type: f5(slab)
[   14.338166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.338474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.338746] page dumped because: kasan: bad access detected
[   14.339005] 
[   14.339160] Memory state around the buggy address:
[   14.339359]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.339624]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.340091] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.340381]                                      ^
[   14.340585]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.340858]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.341081] ==================================================================
[   14.558922] ==================================================================
[   14.559407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   14.559732] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.560087] 
[   14.560240] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.560286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.560300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.560322] Call Trace:
[   14.560336]  <TASK>
[   14.560350]  dump_stack_lvl+0x73/0xb0
[   14.560376]  print_report+0xd1/0x650
[   14.560402]  ? __virt_addr_valid+0x1db/0x2d0
[   14.560425]  ? kasan_atomics_helper+0x2006/0x5450
[   14.560456]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.560503]  ? kasan_atomics_helper+0x2006/0x5450
[   14.560527]  kasan_report+0x141/0x180
[   14.560551]  ? kasan_atomics_helper+0x2006/0x5450
[   14.560581]  kasan_check_range+0x10c/0x1c0
[   14.560618]  __kasan_check_write+0x18/0x20
[   14.560639]  kasan_atomics_helper+0x2006/0x5450
[   14.560664]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.560688]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.560711]  ? kasan_atomics+0x152/0x310
[   14.560735]  kasan_atomics+0x1dc/0x310
[   14.560755]  ? __pfx_kasan_atomics+0x10/0x10
[   14.560778]  ? __pfx_read_tsc+0x10/0x10
[   14.560800]  ? ktime_get_ts64+0x86/0x230
[   14.560826]  kunit_try_run_case+0x1a5/0x480
[   14.560848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.560870]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.560905]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.560951]  ? __kthread_parkme+0x82/0x180
[   14.560973]  ? preempt_count_sub+0x50/0x80
[   14.560998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.561021]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.561046]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.561072]  kthread+0x337/0x6f0
[   14.561094]  ? trace_preempt_on+0x20/0xc0
[   14.561117]  ? __pfx_kthread+0x10/0x10
[   14.561140]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.561163]  ? calculate_sigpending+0x7b/0xa0
[   14.561188]  ? __pfx_kthread+0x10/0x10
[   14.561210]  ret_from_fork+0x116/0x1d0
[   14.561230]  ? __pfx_kthread+0x10/0x10
[   14.561251]  ret_from_fork_asm+0x1a/0x30
[   14.561283]  </TASK>
[   14.561294] 
[   14.569134] Allocated by task 282:
[   14.569319]  kasan_save_stack+0x45/0x70
[   14.569512]  kasan_save_track+0x18/0x40
[   14.569688]  kasan_save_alloc_info+0x3b/0x50
[   14.569840]  __kasan_kmalloc+0xb7/0xc0
[   14.569979]  __kmalloc_cache_noprof+0x189/0x420
[   14.570149]  kasan_atomics+0x95/0x310
[   14.570429]  kunit_try_run_case+0x1a5/0x480
[   14.572124]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.572919]  kthread+0x337/0x6f0
[   14.573406]  ret_from_fork+0x116/0x1d0
[   14.573800]  ret_from_fork_asm+0x1a/0x30
[   14.574458] 
[   14.574930] The buggy address belongs to the object at ffff888102fa7d80
[   14.574930]  which belongs to the cache kmalloc-64 of size 64
[   14.576258] The buggy address is located 0 bytes to the right of
[   14.576258]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.577490] 
[   14.577593] The buggy address belongs to the physical page:
[   14.578230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.578486] flags: 0x200000000000000(node=0|zone=2)
[   14.579056] page_type: f5(slab)
[   14.579745] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.580630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.581412] page dumped because: kasan: bad access detected
[   14.581604] 
[   14.581691] Memory state around the buggy address:
[   14.582416]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.583512]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.584317] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.584544]                                      ^
[   14.584721]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.585882]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.586800] ==================================================================
[   14.050389] ==================================================================
[   14.050933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   14.051277] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.051600] 
[   14.051793] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.051840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.051854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.051877] Call Trace:
[   14.051893]  <TASK>
[   14.051908]  dump_stack_lvl+0x73/0xb0
[   14.051935]  print_report+0xd1/0x650
[   14.051958]  ? __virt_addr_valid+0x1db/0x2d0
[   14.051981]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.052004]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.052028]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.052052]  kasan_report+0x141/0x180
[   14.052076]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.052104]  kasan_check_range+0x10c/0x1c0
[   14.052129]  __kasan_check_write+0x18/0x20
[   14.052151]  kasan_atomics_helper+0x12e6/0x5450
[   14.052175]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.052199]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.052222]  ? kasan_atomics+0x152/0x310
[   14.052246]  kasan_atomics+0x1dc/0x310
[   14.052266]  ? __pfx_kasan_atomics+0x10/0x10
[   14.052288]  ? __pfx_read_tsc+0x10/0x10
[   14.052311]  ? ktime_get_ts64+0x86/0x230
[   14.052337]  kunit_try_run_case+0x1a5/0x480
[   14.052360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.052381]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.052406]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.052432]  ? __kthread_parkme+0x82/0x180
[   14.052453]  ? preempt_count_sub+0x50/0x80
[   14.052479]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.052502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.052527]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.052555]  kthread+0x337/0x6f0
[   14.052576]  ? trace_preempt_on+0x20/0xc0
[   14.052599]  ? __pfx_kthread+0x10/0x10
[   14.052631]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.052654]  ? calculate_sigpending+0x7b/0xa0
[   14.052679]  ? __pfx_kthread+0x10/0x10
[   14.052702]  ret_from_fork+0x116/0x1d0
[   14.052722]  ? __pfx_kthread+0x10/0x10
[   14.052780]  ret_from_fork_asm+0x1a/0x30
[   14.052811]  </TASK>
[   14.052823] 
[   14.061107] Allocated by task 282:
[   14.061270]  kasan_save_stack+0x45/0x70
[   14.061423]  kasan_save_track+0x18/0x40
[   14.061572]  kasan_save_alloc_info+0x3b/0x50
[   14.061879]  __kasan_kmalloc+0xb7/0xc0
[   14.062079]  __kmalloc_cache_noprof+0x189/0x420
[   14.062304]  kasan_atomics+0x95/0x310
[   14.062478]  kunit_try_run_case+0x1a5/0x480
[   14.062701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.063089]  kthread+0x337/0x6f0
[   14.063229]  ret_from_fork+0x116/0x1d0
[   14.063449]  ret_from_fork_asm+0x1a/0x30
[   14.063595] 
[   14.063704] The buggy address belongs to the object at ffff888102fa7d80
[   14.063704]  which belongs to the cache kmalloc-64 of size 64
[   14.064341] The buggy address is located 0 bytes to the right of
[   14.064341]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.064831] 
[   14.064908] The buggy address belongs to the physical page:
[   14.065090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.065365] flags: 0x200000000000000(node=0|zone=2)
[   14.065603] page_type: f5(slab)
[   14.065782] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.066265] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.066638] page dumped because: kasan: bad access detected
[   14.067147] 
[   14.067225] Memory state around the buggy address:
[   14.067388]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.067624]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.067874] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.068507]                                      ^
[   14.068747]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.069341]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.069655] ==================================================================
[   14.223702] ==================================================================
[   14.224337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.224911] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.225335] 
[   14.225442] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.225488] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.225503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.225525] Call Trace:
[   14.225540]  <TASK>
[   14.225555]  dump_stack_lvl+0x73/0xb0
[   14.225582]  print_report+0xd1/0x650
[   14.225606]  ? __virt_addr_valid+0x1db/0x2d0
[   14.225640]  ? kasan_atomics_helper+0x164f/0x5450
[   14.225665]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.225690]  ? kasan_atomics_helper+0x164f/0x5450
[   14.225714]  kasan_report+0x141/0x180
[   14.225739]  ? kasan_atomics_helper+0x164f/0x5450
[   14.225768]  kasan_check_range+0x10c/0x1c0
[   14.225794]  __kasan_check_write+0x18/0x20
[   14.225816]  kasan_atomics_helper+0x164f/0x5450
[   14.225842]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.225867]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.225891]  ? kasan_atomics+0x152/0x310
[   14.225916]  kasan_atomics+0x1dc/0x310
[   14.225937]  ? __pfx_kasan_atomics+0x10/0x10
[   14.225960]  ? __pfx_read_tsc+0x10/0x10
[   14.225982]  ? ktime_get_ts64+0x86/0x230
[   14.226009]  kunit_try_run_case+0x1a5/0x480
[   14.226032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.226054]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.226079]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.226106]  ? __kthread_parkme+0x82/0x180
[   14.226128]  ? preempt_count_sub+0x50/0x80
[   14.226154]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.226177]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.226204]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.226231]  kthread+0x337/0x6f0
[   14.226252]  ? trace_preempt_on+0x20/0xc0
[   14.226277]  ? __pfx_kthread+0x10/0x10
[   14.226300]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.226324]  ? calculate_sigpending+0x7b/0xa0
[   14.226349]  ? __pfx_kthread+0x10/0x10
[   14.226373]  ret_from_fork+0x116/0x1d0
[   14.226393]  ? __pfx_kthread+0x10/0x10
[   14.226416]  ret_from_fork_asm+0x1a/0x30
[   14.226448]  </TASK>
[   14.226460] 
[   14.234050] Allocated by task 282:
[   14.234199]  kasan_save_stack+0x45/0x70
[   14.234369]  kasan_save_track+0x18/0x40
[   14.234574]  kasan_save_alloc_info+0x3b/0x50
[   14.234821]  __kasan_kmalloc+0xb7/0xc0
[   14.235007]  __kmalloc_cache_noprof+0x189/0x420
[   14.235171]  kasan_atomics+0x95/0x310
[   14.235308]  kunit_try_run_case+0x1a5/0x480
[   14.235520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.235791]  kthread+0x337/0x6f0
[   14.235986]  ret_from_fork+0x116/0x1d0
[   14.236169]  ret_from_fork_asm+0x1a/0x30
[   14.236317] 
[   14.236393] The buggy address belongs to the object at ffff888102fa7d80
[   14.236393]  which belongs to the cache kmalloc-64 of size 64
[   14.237111] The buggy address is located 0 bytes to the right of
[   14.237111]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.237607] 
[   14.237716] The buggy address belongs to the physical page:
[   14.237961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.238299] flags: 0x200000000000000(node=0|zone=2)
[   14.238516] page_type: f5(slab)
[   14.238689] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.239051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.239378] page dumped because: kasan: bad access detected
[   14.239621] 
[   14.239699] Memory state around the buggy address:
[   14.239961]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.240217]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.240447] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.240680]                                      ^
[   14.240850]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.241145]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.241464] ==================================================================
[   14.304955] ==================================================================
[   14.305345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   14.305996] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.306310] 
[   14.306417] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.306465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.306479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.306501] Call Trace:
[   14.306518]  <TASK>
[   14.306541]  dump_stack_lvl+0x73/0xb0
[   14.306569]  print_report+0xd1/0x650
[   14.306593]  ? __virt_addr_valid+0x1db/0x2d0
[   14.306630]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.306653]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.306677]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.306701]  kasan_report+0x141/0x180
[   14.306725]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.306753]  kasan_check_range+0x10c/0x1c0
[   14.306779]  __kasan_check_write+0x18/0x20
[   14.306799]  kasan_atomics_helper+0x18b1/0x5450
[   14.306824]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.306847]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.306870]  ? kasan_atomics+0x152/0x310
[   14.306905]  kasan_atomics+0x1dc/0x310
[   14.306925]  ? __pfx_kasan_atomics+0x10/0x10
[   14.306947]  ? __pfx_read_tsc+0x10/0x10
[   14.306968]  ? ktime_get_ts64+0x86/0x230
[   14.306994]  kunit_try_run_case+0x1a5/0x480
[   14.307016]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.307037]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.307062]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.307088]  ? __kthread_parkme+0x82/0x180
[   14.307110]  ? preempt_count_sub+0x50/0x80
[   14.307135]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.307158]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.307183]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.307209]  kthread+0x337/0x6f0
[   14.307230]  ? trace_preempt_on+0x20/0xc0
[   14.307253]  ? __pfx_kthread+0x10/0x10
[   14.307275]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.307299]  ? calculate_sigpending+0x7b/0xa0
[   14.307323]  ? __pfx_kthread+0x10/0x10
[   14.307346]  ret_from_fork+0x116/0x1d0
[   14.307365]  ? __pfx_kthread+0x10/0x10
[   14.307387]  ret_from_fork_asm+0x1a/0x30
[   14.307418]  </TASK>
[   14.307430] 
[   14.314863] Allocated by task 282:
[   14.315048]  kasan_save_stack+0x45/0x70
[   14.315218]  kasan_save_track+0x18/0x40
[   14.315360]  kasan_save_alloc_info+0x3b/0x50
[   14.315513]  __kasan_kmalloc+0xb7/0xc0
[   14.315724]  __kmalloc_cache_noprof+0x189/0x420
[   14.316067]  kasan_atomics+0x95/0x310
[   14.316258]  kunit_try_run_case+0x1a5/0x480
[   14.316478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.316758]  kthread+0x337/0x6f0
[   14.316935]  ret_from_fork+0x116/0x1d0
[   14.317108]  ret_from_fork_asm+0x1a/0x30
[   14.317254] 
[   14.317330] The buggy address belongs to the object at ffff888102fa7d80
[   14.317330]  which belongs to the cache kmalloc-64 of size 64
[   14.317969] The buggy address is located 0 bytes to the right of
[   14.317969]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.318525] 
[   14.318635] The buggy address belongs to the physical page:
[   14.318854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.319110] flags: 0x200000000000000(node=0|zone=2)
[   14.319279] page_type: f5(slab)
[   14.319463] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.319835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.320184] page dumped because: kasan: bad access detected
[   14.320412] 
[   14.320485] Memory state around the buggy address:
[   14.320656]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.321178]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.321496] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.321727]                                      ^
[   14.322184]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.322505]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.322813] ==================================================================
[   13.744530] ==================================================================
[   13.745195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   13.745934] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.746640] 
[   13.746741] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.746788] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.746801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.746826] Call Trace:
[   13.746842]  <TASK>
[   13.746859]  dump_stack_lvl+0x73/0xb0
[   13.746887]  print_report+0xd1/0x650
[   13.746911]  ? __virt_addr_valid+0x1db/0x2d0
[   13.746934]  ? kasan_atomics_helper+0xc70/0x5450
[   13.746956]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.746980]  ? kasan_atomics_helper+0xc70/0x5450
[   13.747003]  kasan_report+0x141/0x180
[   13.747026]  ? kasan_atomics_helper+0xc70/0x5450
[   13.747055]  kasan_check_range+0x10c/0x1c0
[   13.747080]  __kasan_check_write+0x18/0x20
[   13.747100]  kasan_atomics_helper+0xc70/0x5450
[   13.747124]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.747148]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.747170]  ? kasan_atomics+0x152/0x310
[   13.747195]  kasan_atomics+0x1dc/0x310
[   13.747215]  ? __pfx_kasan_atomics+0x10/0x10
[   13.747237]  ? __pfx_read_tsc+0x10/0x10
[   13.747260]  ? ktime_get_ts64+0x86/0x230
[   13.747284]  kunit_try_run_case+0x1a5/0x480
[   13.747307]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.747328]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.747354]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.747379]  ? __kthread_parkme+0x82/0x180
[   13.747402]  ? preempt_count_sub+0x50/0x80
[   13.747427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.747448]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.747474]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.747499]  kthread+0x337/0x6f0
[   13.747520]  ? trace_preempt_on+0x20/0xc0
[   13.747544]  ? __pfx_kthread+0x10/0x10
[   13.747566]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.747589]  ? calculate_sigpending+0x7b/0xa0
[   13.747634]  ? __pfx_kthread+0x10/0x10
[   13.747658]  ret_from_fork+0x116/0x1d0
[   13.747677]  ? __pfx_kthread+0x10/0x10
[   13.747699]  ret_from_fork_asm+0x1a/0x30
[   13.747731]  </TASK>
[   13.747742] 
[   13.764899] Allocated by task 282:
[   13.765057]  kasan_save_stack+0x45/0x70
[   13.765517]  kasan_save_track+0x18/0x40
[   13.766002]  kasan_save_alloc_info+0x3b/0x50
[   13.766566]  __kasan_kmalloc+0xb7/0xc0
[   13.767051]  __kmalloc_cache_noprof+0x189/0x420
[   13.767424]  kasan_atomics+0x95/0x310
[   13.767570]  kunit_try_run_case+0x1a5/0x480
[   13.767730]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.768409]  kthread+0x337/0x6f0
[   13.768764]  ret_from_fork+0x116/0x1d0
[   13.769187]  ret_from_fork_asm+0x1a/0x30
[   13.769681] 
[   13.769856] The buggy address belongs to the object at ffff888102fa7d80
[   13.769856]  which belongs to the cache kmalloc-64 of size 64
[   13.770817] The buggy address is located 0 bytes to the right of
[   13.770817]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.772207] 
[   13.772291] The buggy address belongs to the physical page:
[   13.772479] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.772741] flags: 0x200000000000000(node=0|zone=2)
[   13.773117] page_type: f5(slab)
[   13.773248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.774063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.774777] page dumped because: kasan: bad access detected
[   13.775375] 
[   13.775453] Memory state around the buggy address:
[   13.775621]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.775882]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.776113] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.776775]                                      ^
[   13.777246]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.777793]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.778572] ==================================================================
[   13.671434] ==================================================================
[   13.672286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   13.673173] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.674068] 
[   13.674263] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.674312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.674325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.674347] Call Trace:
[   13.674364]  <TASK>
[   13.674381]  dump_stack_lvl+0x73/0xb0
[   13.674410]  print_report+0xd1/0x650
[   13.674433]  ? __virt_addr_valid+0x1db/0x2d0
[   13.674457]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.674481]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.674505]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.674528]  kasan_report+0x141/0x180
[   13.674559]  ? kasan_atomics_helper+0xa2b/0x5450
[   13.674587]  kasan_check_range+0x10c/0x1c0
[   13.674642]  __kasan_check_write+0x18/0x20
[   13.674663]  kasan_atomics_helper+0xa2b/0x5450
[   13.674688]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.674711]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.674734]  ? kasan_atomics+0x152/0x310
[   13.674775]  kasan_atomics+0x1dc/0x310
[   13.674805]  ? __pfx_kasan_atomics+0x10/0x10
[   13.674827]  ? __pfx_read_tsc+0x10/0x10
[   13.674850]  ? ktime_get_ts64+0x86/0x230
[   13.674875]  kunit_try_run_case+0x1a5/0x480
[   13.674897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.674918]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.674944]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.674969]  ? __kthread_parkme+0x82/0x180
[   13.674992]  ? preempt_count_sub+0x50/0x80
[   13.675017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.675039]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.675064]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.675090]  kthread+0x337/0x6f0
[   13.675112]  ? trace_preempt_on+0x20/0xc0
[   13.675139]  ? __pfx_kthread+0x10/0x10
[   13.675160]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.675184]  ? calculate_sigpending+0x7b/0xa0
[   13.675210]  ? __pfx_kthread+0x10/0x10
[   13.675232]  ret_from_fork+0x116/0x1d0
[   13.675252]  ? __pfx_kthread+0x10/0x10
[   13.675275]  ret_from_fork_asm+0x1a/0x30
[   13.675307]  </TASK>
[   13.675318] 
[   13.685767] Allocated by task 282:
[   13.685939]  kasan_save_stack+0x45/0x70
[   13.686290]  kasan_save_track+0x18/0x40
[   13.686474]  kasan_save_alloc_info+0x3b/0x50
[   13.686715]  __kasan_kmalloc+0xb7/0xc0
[   13.687070]  __kmalloc_cache_noprof+0x189/0x420
[   13.687238]  kasan_atomics+0x95/0x310
[   13.687373]  kunit_try_run_case+0x1a5/0x480
[   13.687574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.687843]  kthread+0x337/0x6f0
[   13.688026]  ret_from_fork+0x116/0x1d0
[   13.688218]  ret_from_fork_asm+0x1a/0x30
[   13.688421] 
[   13.688523] The buggy address belongs to the object at ffff888102fa7d80
[   13.688523]  which belongs to the cache kmalloc-64 of size 64
[   13.689124] The buggy address is located 0 bytes to the right of
[   13.689124]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.689625] 
[   13.689727] The buggy address belongs to the physical page:
[   13.690179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.690523] flags: 0x200000000000000(node=0|zone=2)
[   13.690790] page_type: f5(slab)
[   13.690965] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.691275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.691549] page dumped because: kasan: bad access detected
[   13.691741] 
[   13.691818] Memory state around the buggy address:
[   13.692041]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.692601]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.692838] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.693060]                                      ^
[   13.693562]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.694289]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.694659] ==================================================================
[   14.070109] ==================================================================
[   14.070452] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   14.070819] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.071074] 
[   14.071161] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.071210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.071225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.071250] Call Trace:
[   14.071265]  <TASK>
[   14.071281]  dump_stack_lvl+0x73/0xb0
[   14.071307]  print_report+0xd1/0x650
[   14.071332]  ? __virt_addr_valid+0x1db/0x2d0
[   14.071356]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.071380]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.071404]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.071429]  kasan_report+0x141/0x180
[   14.071453]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.071483]  __asan_report_load4_noabort+0x18/0x20
[   14.071505]  kasan_atomics_helper+0x49ce/0x5450
[   14.071530]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.071554]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.071577]  ? kasan_atomics+0x152/0x310
[   14.071601]  kasan_atomics+0x1dc/0x310
[   14.071635]  ? __pfx_kasan_atomics+0x10/0x10
[   14.071658]  ? __pfx_read_tsc+0x10/0x10
[   14.071681]  ? ktime_get_ts64+0x86/0x230
[   14.071706]  kunit_try_run_case+0x1a5/0x480
[   14.071729]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.071787]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.071813]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.071838]  ? __kthread_parkme+0x82/0x180
[   14.071860]  ? preempt_count_sub+0x50/0x80
[   14.071886]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.071909]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.071935]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.071962]  kthread+0x337/0x6f0
[   14.071983]  ? trace_preempt_on+0x20/0xc0
[   14.072025]  ? __pfx_kthread+0x10/0x10
[   14.072048]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.072072]  ? calculate_sigpending+0x7b/0xa0
[   14.072097]  ? __pfx_kthread+0x10/0x10
[   14.072120]  ret_from_fork+0x116/0x1d0
[   14.072140]  ? __pfx_kthread+0x10/0x10
[   14.072163]  ret_from_fork_asm+0x1a/0x30
[   14.072195]  </TASK>
[   14.072207] 
[   14.080632] Allocated by task 282:
[   14.080841]  kasan_save_stack+0x45/0x70
[   14.081053]  kasan_save_track+0x18/0x40
[   14.081253]  kasan_save_alloc_info+0x3b/0x50
[   14.081457]  __kasan_kmalloc+0xb7/0xc0
[   14.081632]  __kmalloc_cache_noprof+0x189/0x420
[   14.081823]  kasan_atomics+0x95/0x310
[   14.081959]  kunit_try_run_case+0x1a5/0x480
[   14.082109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.082368]  kthread+0x337/0x6f0
[   14.082548]  ret_from_fork+0x116/0x1d0
[   14.082830]  ret_from_fork_asm+0x1a/0x30
[   14.083070] 
[   14.083188] The buggy address belongs to the object at ffff888102fa7d80
[   14.083188]  which belongs to the cache kmalloc-64 of size 64
[   14.083664] The buggy address is located 0 bytes to the right of
[   14.083664]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.084237] 
[   14.084337] The buggy address belongs to the physical page:
[   14.084581] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.084916] flags: 0x200000000000000(node=0|zone=2)
[   14.085130] page_type: f5(slab)
[   14.085276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.085520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.085813] page dumped because: kasan: bad access detected
[   14.085995] 
[   14.086069] Memory state around the buggy address:
[   14.086230]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.086548]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.086915] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.087237]                                      ^
[   14.087465]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.087990]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.088329] ==================================================================
[   14.278464] ==================================================================
[   14.278718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   14.278952] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.279174] 
[   14.279352] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.279399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.279412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.279857] Call Trace:
[   14.279876]  <TASK>
[   14.279892]  dump_stack_lvl+0x73/0xb0
[   14.279922]  print_report+0xd1/0x650
[   14.279946]  ? __virt_addr_valid+0x1db/0x2d0
[   14.279969]  ? kasan_atomics_helper+0x1818/0x5450
[   14.280471]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.280498]  ? kasan_atomics_helper+0x1818/0x5450
[   14.280523]  kasan_report+0x141/0x180
[   14.280551]  ? kasan_atomics_helper+0x1818/0x5450
[   14.280749]  kasan_check_range+0x10c/0x1c0
[   14.280792]  __kasan_check_write+0x18/0x20
[   14.280814]  kasan_atomics_helper+0x1818/0x5450
[   14.280839]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.280864]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.280887]  ? kasan_atomics+0x152/0x310
[   14.280911]  kasan_atomics+0x1dc/0x310
[   14.280948]  ? __pfx_kasan_atomics+0x10/0x10
[   14.280970]  ? __pfx_read_tsc+0x10/0x10
[   14.280993]  ? ktime_get_ts64+0x86/0x230
[   14.281018]  kunit_try_run_case+0x1a5/0x480
[   14.281041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.281062]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.281088]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.281114]  ? __kthread_parkme+0x82/0x180
[   14.281136]  ? preempt_count_sub+0x50/0x80
[   14.281160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.281183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.281208]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.281234]  kthread+0x337/0x6f0
[   14.281254]  ? trace_preempt_on+0x20/0xc0
[   14.281278]  ? __pfx_kthread+0x10/0x10
[   14.281300]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.281324]  ? calculate_sigpending+0x7b/0xa0
[   14.281350]  ? __pfx_kthread+0x10/0x10
[   14.281374]  ret_from_fork+0x116/0x1d0
[   14.281394]  ? __pfx_kthread+0x10/0x10
[   14.281417]  ret_from_fork_asm+0x1a/0x30
[   14.281448]  </TASK>
[   14.281460] 
[   14.292605] Allocated by task 282:
[   14.293015]  kasan_save_stack+0x45/0x70
[   14.293330]  kasan_save_track+0x18/0x40
[   14.293539]  kasan_save_alloc_info+0x3b/0x50
[   14.293737]  __kasan_kmalloc+0xb7/0xc0
[   14.294213]  __kmalloc_cache_noprof+0x189/0x420
[   14.294505]  kasan_atomics+0x95/0x310
[   14.294821]  kunit_try_run_case+0x1a5/0x480
[   14.295031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.295257]  kthread+0x337/0x6f0
[   14.295404]  ret_from_fork+0x116/0x1d0
[   14.295566]  ret_from_fork_asm+0x1a/0x30
[   14.295751] 
[   14.295848] The buggy address belongs to the object at ffff888102fa7d80
[   14.295848]  which belongs to the cache kmalloc-64 of size 64
[   14.296313] The buggy address is located 0 bytes to the right of
[   14.296313]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.297296] 
[   14.297385] The buggy address belongs to the physical page:
[   14.297836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.298351] flags: 0x200000000000000(node=0|zone=2)
[   14.298781] page_type: f5(slab)
[   14.299064] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.299661] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.300185] page dumped because: kasan: bad access detected
[   14.300607] 
[   14.300853] Memory state around the buggy address:
[   14.301205]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.301521]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.302028] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.302511]                                      ^
[   14.302860]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.303313]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.303617] ==================================================================
[   13.525977] ==================================================================
[   13.526290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   13.526530] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.526856] 
[   13.526969] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.527015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.527029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.527051] Call Trace:
[   13.527066]  <TASK>
[   13.527081]  dump_stack_lvl+0x73/0xb0
[   13.527106]  print_report+0xd1/0x650
[   13.527129]  ? __virt_addr_valid+0x1db/0x2d0
[   13.527151]  ? kasan_atomics_helper+0x697/0x5450
[   13.527174]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.527198]  ? kasan_atomics_helper+0x697/0x5450
[   13.527220]  kasan_report+0x141/0x180
[   13.527244]  ? kasan_atomics_helper+0x697/0x5450
[   13.527356]  kasan_check_range+0x10c/0x1c0
[   13.527388]  __kasan_check_write+0x18/0x20
[   13.527409]  kasan_atomics_helper+0x697/0x5450
[   13.527435]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.527459]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.527482]  ? kasan_atomics+0x152/0x310
[   13.527506]  kasan_atomics+0x1dc/0x310
[   13.527527]  ? __pfx_kasan_atomics+0x10/0x10
[   13.527549]  ? __pfx_read_tsc+0x10/0x10
[   13.527571]  ? ktime_get_ts64+0x86/0x230
[   13.527596]  kunit_try_run_case+0x1a5/0x480
[   13.527631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.527653]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.527678]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.527704]  ? __kthread_parkme+0x82/0x180
[   13.527725]  ? preempt_count_sub+0x50/0x80
[   13.527750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.527948]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.527976]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.528002]  kthread+0x337/0x6f0
[   13.528023]  ? trace_preempt_on+0x20/0xc0
[   13.528047]  ? __pfx_kthread+0x10/0x10
[   13.528069]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.528094]  ? calculate_sigpending+0x7b/0xa0
[   13.528120]  ? __pfx_kthread+0x10/0x10
[   13.528143]  ret_from_fork+0x116/0x1d0
[   13.528162]  ? __pfx_kthread+0x10/0x10
[   13.528185]  ret_from_fork_asm+0x1a/0x30
[   13.528217]  </TASK>
[   13.528229] 
[   13.536280] Allocated by task 282:
[   13.536426]  kasan_save_stack+0x45/0x70
[   13.536593]  kasan_save_track+0x18/0x40
[   13.536974]  kasan_save_alloc_info+0x3b/0x50
[   13.537197]  __kasan_kmalloc+0xb7/0xc0
[   13.537390]  __kmalloc_cache_noprof+0x189/0x420
[   13.537625]  kasan_atomics+0x95/0x310
[   13.537813]  kunit_try_run_case+0x1a5/0x480
[   13.538038]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.538394]  kthread+0x337/0x6f0
[   13.538542]  ret_from_fork+0x116/0x1d0
[   13.538799]  ret_from_fork_asm+0x1a/0x30
[   13.539003] 
[   13.539088] The buggy address belongs to the object at ffff888102fa7d80
[   13.539088]  which belongs to the cache kmalloc-64 of size 64
[   13.539582] The buggy address is located 0 bytes to the right of
[   13.539582]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.540277] 
[   13.540389] The buggy address belongs to the physical page:
[   13.540626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.541003] flags: 0x200000000000000(node=0|zone=2)
[   13.541178] page_type: f5(slab)
[   13.541304] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.541597] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.542061] page dumped because: kasan: bad access detected
[   13.542463] 
[   13.542545] Memory state around the buggy address:
[   13.542722]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.543482]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.543734] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.543993]                                      ^
[   13.544228]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.544893]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.545239] ==================================================================
[   14.588034] ==================================================================
[   14.588796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   14.589270] Read of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.589887] 
[   14.590071] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.590150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.590192] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.590216] Call Trace:
[   14.590233]  <TASK>
[   14.590251]  dump_stack_lvl+0x73/0xb0
[   14.590277]  print_report+0xd1/0x650
[   14.590301]  ? __virt_addr_valid+0x1db/0x2d0
[   14.590325]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.590347]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.590372]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.590395]  kasan_report+0x141/0x180
[   14.590419]  ? kasan_atomics_helper+0x4f98/0x5450
[   14.590448]  __asan_report_load8_noabort+0x18/0x20
[   14.590471]  kasan_atomics_helper+0x4f98/0x5450
[   14.590496]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.590520]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.590549]  ? kasan_atomics+0x152/0x310
[   14.590574]  kasan_atomics+0x1dc/0x310
[   14.590594]  ? __pfx_kasan_atomics+0x10/0x10
[   14.590628]  ? __pfx_read_tsc+0x10/0x10
[   14.590650]  ? ktime_get_ts64+0x86/0x230
[   14.590676]  kunit_try_run_case+0x1a5/0x480
[   14.590698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.590720]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.590746]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.590793]  ? __kthread_parkme+0x82/0x180
[   14.590815]  ? preempt_count_sub+0x50/0x80
[   14.590841]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.590863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.590888]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.590914]  kthread+0x337/0x6f0
[   14.590934]  ? trace_preempt_on+0x20/0xc0
[   14.590959]  ? __pfx_kthread+0x10/0x10
[   14.590981]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.591006]  ? calculate_sigpending+0x7b/0xa0
[   14.591030]  ? __pfx_kthread+0x10/0x10
[   14.591053]  ret_from_fork+0x116/0x1d0
[   14.591073]  ? __pfx_kthread+0x10/0x10
[   14.591095]  ret_from_fork_asm+0x1a/0x30
[   14.591127]  </TASK>
[   14.591138] 
[   14.603468] Allocated by task 282:
[   14.603727]  kasan_save_stack+0x45/0x70
[   14.604166]  kasan_save_track+0x18/0x40
[   14.604390]  kasan_save_alloc_info+0x3b/0x50
[   14.604825]  __kasan_kmalloc+0xb7/0xc0
[   14.605115]  __kmalloc_cache_noprof+0x189/0x420
[   14.605278]  kasan_atomics+0x95/0x310
[   14.605414]  kunit_try_run_case+0x1a5/0x480
[   14.605563]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.605857]  kthread+0x337/0x6f0
[   14.606053]  ret_from_fork+0x116/0x1d0
[   14.606244]  ret_from_fork_asm+0x1a/0x30
[   14.606482] 
[   14.606563] The buggy address belongs to the object at ffff888102fa7d80
[   14.606563]  which belongs to the cache kmalloc-64 of size 64
[   14.607199] The buggy address is located 0 bytes to the right of
[   14.607199]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.607811] 
[   14.607927] The buggy address belongs to the physical page:
[   14.608196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.608476] flags: 0x200000000000000(node=0|zone=2)
[   14.608785] page_type: f5(slab)
[   14.608937] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.609279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.609653] page dumped because: kasan: bad access detected
[   14.609938] 
[   14.610039] Memory state around the buggy address:
[   14.610315]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.610655]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.611106] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.611471]                                      ^
[   14.611696]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.612102]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.612426] ==================================================================
[   13.890381] ==================================================================
[   13.890840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   13.891197] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.891515] 
[   13.891603] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.891661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.891675] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.891697] Call Trace:
[   13.891710]  <TASK>
[   13.891724]  dump_stack_lvl+0x73/0xb0
[   13.891944]  print_report+0xd1/0x650
[   13.891969]  ? __virt_addr_valid+0x1db/0x2d0
[   13.891993]  ? kasan_atomics_helper+0xfa9/0x5450
[   13.892016]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.892040]  ? kasan_atomics_helper+0xfa9/0x5450
[   13.892064]  kasan_report+0x141/0x180
[   13.892088]  ? kasan_atomics_helper+0xfa9/0x5450
[   13.892116]  kasan_check_range+0x10c/0x1c0
[   13.892141]  __kasan_check_write+0x18/0x20
[   13.892162]  kasan_atomics_helper+0xfa9/0x5450
[   13.892186]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.892211]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.892234]  ? kasan_atomics+0x152/0x310
[   13.892258]  kasan_atomics+0x1dc/0x310
[   13.892279]  ? __pfx_kasan_atomics+0x10/0x10
[   13.892301]  ? __pfx_read_tsc+0x10/0x10
[   13.892323]  ? ktime_get_ts64+0x86/0x230
[   13.892348]  kunit_try_run_case+0x1a5/0x480
[   13.892371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.892392]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.892417]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.892443]  ? __kthread_parkme+0x82/0x180
[   13.892465]  ? preempt_count_sub+0x50/0x80
[   13.892490]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.892512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.892539]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.892565]  kthread+0x337/0x6f0
[   13.892585]  ? trace_preempt_on+0x20/0xc0
[   13.892623]  ? __pfx_kthread+0x10/0x10
[   13.892646]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.892670]  ? calculate_sigpending+0x7b/0xa0
[   13.892695]  ? __pfx_kthread+0x10/0x10
[   13.892718]  ret_from_fork+0x116/0x1d0
[   13.892839]  ? __pfx_kthread+0x10/0x10
[   13.892868]  ret_from_fork_asm+0x1a/0x30
[   13.892899]  </TASK>
[   13.892912] 
[   13.901390] Allocated by task 282:
[   13.901585]  kasan_save_stack+0x45/0x70
[   13.901893]  kasan_save_track+0x18/0x40
[   13.902082]  kasan_save_alloc_info+0x3b/0x50
[   13.902295]  __kasan_kmalloc+0xb7/0xc0
[   13.902474]  __kmalloc_cache_noprof+0x189/0x420
[   13.902706]  kasan_atomics+0x95/0x310
[   13.902986]  kunit_try_run_case+0x1a5/0x480
[   13.903178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.903420]  kthread+0x337/0x6f0
[   13.903589]  ret_from_fork+0x116/0x1d0
[   13.904005]  ret_from_fork_asm+0x1a/0x30
[   13.904180] 
[   13.904284] The buggy address belongs to the object at ffff888102fa7d80
[   13.904284]  which belongs to the cache kmalloc-64 of size 64
[   13.904902] The buggy address is located 0 bytes to the right of
[   13.904902]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.905432] 
[   13.905531] The buggy address belongs to the physical page:
[   13.905878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.906162] flags: 0x200000000000000(node=0|zone=2)
[   13.906335] page_type: f5(slab)
[   13.906461] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.906900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.907247] page dumped because: kasan: bad access detected
[   13.907503] 
[   13.907580] Memory state around the buggy address:
[   13.907947]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.908291]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.908629] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.909064]                                      ^
[   13.909306]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.909651]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.910016] ==================================================================
[   14.157815] ==================================================================
[   14.158519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.159405] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.160135] 
[   14.160339] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.160403] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.160426] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.160448] Call Trace:
[   14.160464]  <TASK>
[   14.160483]  dump_stack_lvl+0x73/0xb0
[   14.160522]  print_report+0xd1/0x650
[   14.160546]  ? __virt_addr_valid+0x1db/0x2d0
[   14.160570]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.160593]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.160627]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.160650]  kasan_report+0x141/0x180
[   14.160674]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.160702]  __asan_report_store8_noabort+0x1b/0x30
[   14.160725]  kasan_atomics_helper+0x50d4/0x5450
[   14.160749]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.160787]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.160814]  ? kasan_atomics+0x152/0x310
[   14.160839]  kasan_atomics+0x1dc/0x310
[   14.160859]  ? __pfx_kasan_atomics+0x10/0x10
[   14.160883]  ? __pfx_read_tsc+0x10/0x10
[   14.160905]  ? ktime_get_ts64+0x86/0x230
[   14.160931]  kunit_try_run_case+0x1a5/0x480
[   14.160954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.160976]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.161003]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.161028]  ? __kthread_parkme+0x82/0x180
[   14.161050]  ? preempt_count_sub+0x50/0x80
[   14.161076]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.161098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.161124]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.161150]  kthread+0x337/0x6f0
[   14.161170]  ? trace_preempt_on+0x20/0xc0
[   14.161194]  ? __pfx_kthread+0x10/0x10
[   14.161216]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.161240]  ? calculate_sigpending+0x7b/0xa0
[   14.161266]  ? __pfx_kthread+0x10/0x10
[   14.161288]  ret_from_fork+0x116/0x1d0
[   14.161308]  ? __pfx_kthread+0x10/0x10
[   14.161329]  ret_from_fork_asm+0x1a/0x30
[   14.161362]  </TASK>
[   14.161374] 
[   14.173823] Allocated by task 282:
[   14.174211]  kasan_save_stack+0x45/0x70
[   14.174452]  kasan_save_track+0x18/0x40
[   14.174855]  kasan_save_alloc_info+0x3b/0x50
[   14.175047]  __kasan_kmalloc+0xb7/0xc0
[   14.175419]  __kmalloc_cache_noprof+0x189/0x420
[   14.175788]  kasan_atomics+0x95/0x310
[   14.176093]  kunit_try_run_case+0x1a5/0x480
[   14.176246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.176433]  kthread+0x337/0x6f0
[   14.176559]  ret_from_fork+0x116/0x1d0
[   14.176719]  ret_from_fork_asm+0x1a/0x30
[   14.177099] 
[   14.177275] The buggy address belongs to the object at ffff888102fa7d80
[   14.177275]  which belongs to the cache kmalloc-64 of size 64
[   14.178184] The buggy address is located 0 bytes to the right of
[   14.178184]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.178722] 
[   14.178825] The buggy address belongs to the physical page:
[   14.179325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.180093] flags: 0x200000000000000(node=0|zone=2)
[   14.180547] page_type: f5(slab)
[   14.180873] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.181280] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.181518] page dumped because: kasan: bad access detected
[   14.181709] 
[   14.181808] Memory state around the buggy address:
[   14.182260]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.182970]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.183596] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.184271]                                      ^
[   14.184723]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.185563]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.186066] ==================================================================
[   13.972137] ==================================================================
[   13.972440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   13.972882] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.973201] 
[   13.973308] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.973353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.973368] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.973390] Call Trace:
[   13.973404]  <TASK>
[   13.973419]  dump_stack_lvl+0x73/0xb0
[   13.973445]  print_report+0xd1/0x650
[   13.973468]  ? __virt_addr_valid+0x1db/0x2d0
[   13.973492]  ? kasan_atomics_helper+0x1148/0x5450
[   13.973515]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.973539]  ? kasan_atomics_helper+0x1148/0x5450
[   13.973563]  kasan_report+0x141/0x180
[   13.973586]  ? kasan_atomics_helper+0x1148/0x5450
[   13.973627]  kasan_check_range+0x10c/0x1c0
[   13.973653]  __kasan_check_write+0x18/0x20
[   13.973674]  kasan_atomics_helper+0x1148/0x5450
[   13.973698]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.973722]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.973822]  ? kasan_atomics+0x152/0x310
[   13.973848]  kasan_atomics+0x1dc/0x310
[   13.973868]  ? __pfx_kasan_atomics+0x10/0x10
[   13.973890]  ? __pfx_read_tsc+0x10/0x10
[   13.973913]  ? ktime_get_ts64+0x86/0x230
[   13.973939]  kunit_try_run_case+0x1a5/0x480
[   13.973961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.973982]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.974008]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.974034]  ? __kthread_parkme+0x82/0x180
[   13.974056]  ? preempt_count_sub+0x50/0x80
[   13.974081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.974104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.974130]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.974156]  kthread+0x337/0x6f0
[   13.974177]  ? trace_preempt_on+0x20/0xc0
[   13.974200]  ? __pfx_kthread+0x10/0x10
[   13.974223]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.974246]  ? calculate_sigpending+0x7b/0xa0
[   13.974271]  ? __pfx_kthread+0x10/0x10
[   13.974293]  ret_from_fork+0x116/0x1d0
[   13.974313]  ? __pfx_kthread+0x10/0x10
[   13.974335]  ret_from_fork_asm+0x1a/0x30
[   13.974366]  </TASK>
[   13.974378] 
[   13.982902] Allocated by task 282:
[   13.983095]  kasan_save_stack+0x45/0x70
[   13.983274]  kasan_save_track+0x18/0x40
[   13.983476]  kasan_save_alloc_info+0x3b/0x50
[   13.983674]  __kasan_kmalloc+0xb7/0xc0
[   13.984121]  __kmalloc_cache_noprof+0x189/0x420
[   13.984361]  kasan_atomics+0x95/0x310
[   13.984553]  kunit_try_run_case+0x1a5/0x480
[   13.984748]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.985009]  kthread+0x337/0x6f0
[   13.985180]  ret_from_fork+0x116/0x1d0
[   13.985336]  ret_from_fork_asm+0x1a/0x30
[   13.985529] 
[   13.985959] The buggy address belongs to the object at ffff888102fa7d80
[   13.985959]  which belongs to the cache kmalloc-64 of size 64
[   13.986334] The buggy address is located 0 bytes to the right of
[   13.986334]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.987008] 
[   13.987112] The buggy address belongs to the physical page:
[   13.987328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.987604] flags: 0x200000000000000(node=0|zone=2)
[   13.988075] page_type: f5(slab)
[   13.988258] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.988623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.989056] page dumped because: kasan: bad access detected
[   13.989295] 
[   13.989401] Memory state around the buggy address:
[   13.989631]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.989995]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.990310] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.990569]                                      ^
[   13.990838]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.991178]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.991499] ==================================================================
[   13.849847] ==================================================================
[   13.850192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   13.850639] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.851203] 
[   13.851323] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.851371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.851384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.851406] Call Trace:
[   13.851422]  <TASK>
[   13.851437]  dump_stack_lvl+0x73/0xb0
[   13.851466]  print_report+0xd1/0x650
[   13.851489]  ? __virt_addr_valid+0x1db/0x2d0
[   13.851513]  ? kasan_atomics_helper+0xe78/0x5450
[   13.851537]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.851562]  ? kasan_atomics_helper+0xe78/0x5450
[   13.851585]  kasan_report+0x141/0x180
[   13.851624]  ? kasan_atomics_helper+0xe78/0x5450
[   13.851653]  kasan_check_range+0x10c/0x1c0
[   13.851678]  __kasan_check_write+0x18/0x20
[   13.851699]  kasan_atomics_helper+0xe78/0x5450
[   13.851724]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.851748]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.851770]  ? kasan_atomics+0x152/0x310
[   13.851794]  kasan_atomics+0x1dc/0x310
[   13.851815]  ? __pfx_kasan_atomics+0x10/0x10
[   13.851837]  ? __pfx_read_tsc+0x10/0x10
[   13.851923]  ? ktime_get_ts64+0x86/0x230
[   13.851950]  kunit_try_run_case+0x1a5/0x480
[   13.851986]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.852008]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.852034]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.852060]  ? __kthread_parkme+0x82/0x180
[   13.852082]  ? preempt_count_sub+0x50/0x80
[   13.852107]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.852129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.852154]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.852181]  kthread+0x337/0x6f0
[   13.852202]  ? trace_preempt_on+0x20/0xc0
[   13.852226]  ? __pfx_kthread+0x10/0x10
[   13.852248]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.852272]  ? calculate_sigpending+0x7b/0xa0
[   13.852297]  ? __pfx_kthread+0x10/0x10
[   13.852320]  ret_from_fork+0x116/0x1d0
[   13.852340]  ? __pfx_kthread+0x10/0x10
[   13.852365]  ret_from_fork_asm+0x1a/0x30
[   13.852397]  </TASK>
[   13.852409] 
[   13.860953] Allocated by task 282:
[   13.861091]  kasan_save_stack+0x45/0x70
[   13.861246]  kasan_save_track+0x18/0x40
[   13.861411]  kasan_save_alloc_info+0x3b/0x50
[   13.861636]  __kasan_kmalloc+0xb7/0xc0
[   13.861827]  __kmalloc_cache_noprof+0x189/0x420
[   13.862058]  kasan_atomics+0x95/0x310
[   13.862364]  kunit_try_run_case+0x1a5/0x480
[   13.862580]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.863049]  kthread+0x337/0x6f0
[   13.863195]  ret_from_fork+0x116/0x1d0
[   13.863335]  ret_from_fork_asm+0x1a/0x30
[   13.863492] 
[   13.863593] The buggy address belongs to the object at ffff888102fa7d80
[   13.863593]  which belongs to the cache kmalloc-64 of size 64
[   13.864245] The buggy address is located 0 bytes to the right of
[   13.864245]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.865011] 
[   13.865121] The buggy address belongs to the physical page:
[   13.865381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.865685] flags: 0x200000000000000(node=0|zone=2)
[   13.865858] page_type: f5(slab)
[   13.865983] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.866268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.866764] page dumped because: kasan: bad access detected
[   13.867230] 
[   13.867309] Memory state around the buggy address:
[   13.867471]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.867733]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.868154] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.868482]                                      ^
[   13.868731]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.869118]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.869415] ==================================================================
[   13.585170] ==================================================================
[   13.585522] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   13.585915] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.586278] 
[   13.586367] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.586415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.586429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.586452] Call Trace:
[   13.586470]  <TASK>
[   13.586487]  dump_stack_lvl+0x73/0xb0
[   13.586514]  print_report+0xd1/0x650
[   13.586543]  ? __virt_addr_valid+0x1db/0x2d0
[   13.586566]  ? kasan_atomics_helper+0x860/0x5450
[   13.586590]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.586627]  ? kasan_atomics_helper+0x860/0x5450
[   13.586651]  kasan_report+0x141/0x180
[   13.586675]  ? kasan_atomics_helper+0x860/0x5450
[   13.586703]  kasan_check_range+0x10c/0x1c0
[   13.586729]  __kasan_check_write+0x18/0x20
[   13.586752]  kasan_atomics_helper+0x860/0x5450
[   13.586775]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.586799]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.586822]  ? kasan_atomics+0x152/0x310
[   13.586845]  kasan_atomics+0x1dc/0x310
[   13.586866]  ? __pfx_kasan_atomics+0x10/0x10
[   13.586888]  ? __pfx_read_tsc+0x10/0x10
[   13.586911]  ? ktime_get_ts64+0x86/0x230
[   13.586936]  kunit_try_run_case+0x1a5/0x480
[   13.587139]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.587162]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.587188]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.587214]  ? __kthread_parkme+0x82/0x180
[   13.587236]  ? preempt_count_sub+0x50/0x80
[   13.587262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.587285]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.587310]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.587336]  kthread+0x337/0x6f0
[   13.587358]  ? trace_preempt_on+0x20/0xc0
[   13.587382]  ? __pfx_kthread+0x10/0x10
[   13.587404]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.587427]  ? calculate_sigpending+0x7b/0xa0
[   13.587453]  ? __pfx_kthread+0x10/0x10
[   13.587476]  ret_from_fork+0x116/0x1d0
[   13.587496]  ? __pfx_kthread+0x10/0x10
[   13.587517]  ret_from_fork_asm+0x1a/0x30
[   13.587550]  </TASK>
[   13.587561] 
[   13.595834] Allocated by task 282:
[   13.596269]  kasan_save_stack+0x45/0x70
[   13.596480]  kasan_save_track+0x18/0x40
[   13.596698]  kasan_save_alloc_info+0x3b/0x50
[   13.596973]  __kasan_kmalloc+0xb7/0xc0
[   13.597146]  __kmalloc_cache_noprof+0x189/0x420
[   13.597372]  kasan_atomics+0x95/0x310
[   13.597510]  kunit_try_run_case+0x1a5/0x480
[   13.597729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.598038]  kthread+0x337/0x6f0
[   13.598195]  ret_from_fork+0x116/0x1d0
[   13.598384]  ret_from_fork_asm+0x1a/0x30
[   13.598586] 
[   13.598695] The buggy address belongs to the object at ffff888102fa7d80
[   13.598695]  which belongs to the cache kmalloc-64 of size 64
[   13.599255] The buggy address is located 0 bytes to the right of
[   13.599255]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.599714] 
[   13.599791] The buggy address belongs to the physical page:
[   13.599970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.600239] flags: 0x200000000000000(node=0|zone=2)
[   13.600769] page_type: f5(slab)
[   13.600960] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.601433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.601845] page dumped because: kasan: bad access detected
[   13.602092] 
[   13.602166] Memory state around the buggy address:
[   13.602329]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.602654]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.603238] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.603526]                                      ^
[   13.603782]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.604047]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.604362] ==================================================================
[   13.931105] ==================================================================
[   13.931437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   13.932042] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.932369] 
[   13.932481] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.932545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.932572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.932594] Call Trace:
[   13.932634]  <TASK>
[   13.932650]  dump_stack_lvl+0x73/0xb0
[   13.932676]  print_report+0xd1/0x650
[   13.932715]  ? __virt_addr_valid+0x1db/0x2d0
[   13.932889]  ? kasan_atomics_helper+0x1079/0x5450
[   13.932916]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.932940]  ? kasan_atomics_helper+0x1079/0x5450
[   13.932964]  kasan_report+0x141/0x180
[   13.932988]  ? kasan_atomics_helper+0x1079/0x5450
[   13.933016]  kasan_check_range+0x10c/0x1c0
[   13.933041]  __kasan_check_write+0x18/0x20
[   13.933063]  kasan_atomics_helper+0x1079/0x5450
[   13.933088]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.933112]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.933135]  ? kasan_atomics+0x152/0x310
[   13.933159]  kasan_atomics+0x1dc/0x310
[   13.933180]  ? __pfx_kasan_atomics+0x10/0x10
[   13.933202]  ? __pfx_read_tsc+0x10/0x10
[   13.933225]  ? ktime_get_ts64+0x86/0x230
[   13.933251]  kunit_try_run_case+0x1a5/0x480
[   13.933273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.933294]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.933320]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.933346]  ? __kthread_parkme+0x82/0x180
[   13.933367]  ? preempt_count_sub+0x50/0x80
[   13.933392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.933414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.933440]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.933466]  kthread+0x337/0x6f0
[   13.933487]  ? trace_preempt_on+0x20/0xc0
[   13.933511]  ? __pfx_kthread+0x10/0x10
[   13.933533]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.933557]  ? calculate_sigpending+0x7b/0xa0
[   13.933582]  ? __pfx_kthread+0x10/0x10
[   13.933604]  ret_from_fork+0x116/0x1d0
[   13.933635]  ? __pfx_kthread+0x10/0x10
[   13.933657]  ret_from_fork_asm+0x1a/0x30
[   13.933689]  </TASK>
[   13.933699] 
[   13.943027] Allocated by task 282:
[   13.943219]  kasan_save_stack+0x45/0x70
[   13.943426]  kasan_save_track+0x18/0x40
[   13.943634]  kasan_save_alloc_info+0x3b/0x50
[   13.944051]  __kasan_kmalloc+0xb7/0xc0
[   13.944291]  __kmalloc_cache_noprof+0x189/0x420
[   13.944535]  kasan_atomics+0x95/0x310
[   13.944898]  kunit_try_run_case+0x1a5/0x480
[   13.945153]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.945456]  kthread+0x337/0x6f0
[   13.945642]  ret_from_fork+0x116/0x1d0
[   13.945896]  ret_from_fork_asm+0x1a/0x30
[   13.946108] 
[   13.946233] The buggy address belongs to the object at ffff888102fa7d80
[   13.946233]  which belongs to the cache kmalloc-64 of size 64
[   13.946923] The buggy address is located 0 bytes to the right of
[   13.946923]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.947521] 
[   13.947646] The buggy address belongs to the physical page:
[   13.947914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.948241] flags: 0x200000000000000(node=0|zone=2)
[   13.948479] page_type: f5(slab)
[   13.948920] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.949242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.949558] page dumped because: kasan: bad access detected
[   13.949890] 
[   13.949978] Memory state around the buggy address:
[   13.950188]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.950490]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.950898] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.951205]                                      ^
[   13.951376]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.951673]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.952191] ==================================================================
[   13.992142] ==================================================================
[   13.992480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   13.992931] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.993203] 
[   13.993319] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.993364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.993377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.993400] Call Trace:
[   13.993417]  <TASK>
[   13.993433]  dump_stack_lvl+0x73/0xb0
[   13.993461]  print_report+0xd1/0x650
[   13.993485]  ? __virt_addr_valid+0x1db/0x2d0
[   13.993507]  ? kasan_atomics_helper+0x4a02/0x5450
[   13.993530]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.993554]  ? kasan_atomics_helper+0x4a02/0x5450
[   13.993577]  kasan_report+0x141/0x180
[   13.993602]  ? kasan_atomics_helper+0x4a02/0x5450
[   13.993644]  __asan_report_load4_noabort+0x18/0x20
[   13.993666]  kasan_atomics_helper+0x4a02/0x5450
[   13.993691]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.993715]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.993814]  ? kasan_atomics+0x152/0x310
[   13.993841]  kasan_atomics+0x1dc/0x310
[   13.993862]  ? __pfx_kasan_atomics+0x10/0x10
[   13.993885]  ? __pfx_read_tsc+0x10/0x10
[   13.993908]  ? ktime_get_ts64+0x86/0x230
[   13.993933]  kunit_try_run_case+0x1a5/0x480
[   13.993955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.993976]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.994002]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.994028]  ? __kthread_parkme+0x82/0x180
[   13.994050]  ? preempt_count_sub+0x50/0x80
[   13.994075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.994097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.994123]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.994149]  kthread+0x337/0x6f0
[   13.994169]  ? trace_preempt_on+0x20/0xc0
[   13.994193]  ? __pfx_kthread+0x10/0x10
[   13.994215]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.994239]  ? calculate_sigpending+0x7b/0xa0
[   13.994264]  ? __pfx_kthread+0x10/0x10
[   13.994287]  ret_from_fork+0x116/0x1d0
[   13.994307]  ? __pfx_kthread+0x10/0x10
[   13.994329]  ret_from_fork_asm+0x1a/0x30
[   13.994360]  </TASK>
[   13.994372] 
[   14.002595] Allocated by task 282:
[   14.002858]  kasan_save_stack+0x45/0x70
[   14.003078]  kasan_save_track+0x18/0x40
[   14.003286]  kasan_save_alloc_info+0x3b/0x50
[   14.003501]  __kasan_kmalloc+0xb7/0xc0
[   14.003710]  __kmalloc_cache_noprof+0x189/0x420
[   14.004119]  kasan_atomics+0x95/0x310
[   14.004319]  kunit_try_run_case+0x1a5/0x480
[   14.004482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.004681]  kthread+0x337/0x6f0
[   14.004959]  ret_from_fork+0x116/0x1d0
[   14.005158]  ret_from_fork_asm+0x1a/0x30
[   14.005359] 
[   14.005459] The buggy address belongs to the object at ffff888102fa7d80
[   14.005459]  which belongs to the cache kmalloc-64 of size 64
[   14.006072] The buggy address is located 0 bytes to the right of
[   14.006072]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.006537] 
[   14.006623] The buggy address belongs to the physical page:
[   14.006941] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.007322] flags: 0x200000000000000(node=0|zone=2)
[   14.007572] page_type: f5(slab)
[   14.007944] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.008240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.008530] page dumped because: kasan: bad access detected
[   14.008726] 
[   14.008952] Memory state around the buggy address:
[   14.009185]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.009514]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.009857] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.010185]                                      ^
[   14.010421]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.010690]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.011113] ==================================================================
[   14.260387] ==================================================================
[   14.260770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   14.261123] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.261407] 
[   14.261518] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.261563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.261578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.261600] Call Trace:
[   14.261625]  <TASK>
[   14.261640]  dump_stack_lvl+0x73/0xb0
[   14.261665]  print_report+0xd1/0x650
[   14.261689]  ? __virt_addr_valid+0x1db/0x2d0
[   14.261712]  ? kasan_atomics_helper+0x177f/0x5450
[   14.261736]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.261760]  ? kasan_atomics_helper+0x177f/0x5450
[   14.261784]  kasan_report+0x141/0x180
[   14.261808]  ? kasan_atomics_helper+0x177f/0x5450
[   14.261845]  kasan_check_range+0x10c/0x1c0
[   14.261871]  __kasan_check_write+0x18/0x20
[   14.261893]  kasan_atomics_helper+0x177f/0x5450
[   14.261918]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.261942]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.261965]  ? kasan_atomics+0x152/0x310
[   14.261989]  kasan_atomics+0x1dc/0x310
[   14.262010]  ? __pfx_kasan_atomics+0x10/0x10
[   14.262033]  ? __pfx_read_tsc+0x10/0x10
[   14.262056]  ? ktime_get_ts64+0x86/0x230
[   14.262081]  kunit_try_run_case+0x1a5/0x480
[   14.262104]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.262125]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.262152]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.262178]  ? __kthread_parkme+0x82/0x180
[   14.262199]  ? preempt_count_sub+0x50/0x80
[   14.262225]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.262248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.262274]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.262300]  kthread+0x337/0x6f0
[   14.262322]  ? trace_preempt_on+0x20/0xc0
[   14.262347]  ? __pfx_kthread+0x10/0x10
[   14.262370]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.262394]  ? calculate_sigpending+0x7b/0xa0
[   14.262419]  ? __pfx_kthread+0x10/0x10
[   14.262441]  ret_from_fork+0x116/0x1d0
[   14.262462]  ? __pfx_kthread+0x10/0x10
[   14.262484]  ret_from_fork_asm+0x1a/0x30
[   14.262515]  </TASK>
[   14.262527] 
[   14.269917] Allocated by task 282:
[   14.270105]  kasan_save_stack+0x45/0x70
[   14.270323]  kasan_save_track+0x18/0x40
[   14.270538]  kasan_save_alloc_info+0x3b/0x50
[   14.270917]  __kasan_kmalloc+0xb7/0xc0
[   14.271124]  __kmalloc_cache_noprof+0x189/0x420
[   14.271286]  kasan_atomics+0x95/0x310
[   14.271422]  kunit_try_run_case+0x1a5/0x480
[   14.271573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.271793]  kthread+0x337/0x6f0
[   14.271970]  ret_from_fork+0x116/0x1d0
[   14.272161]  ret_from_fork_asm+0x1a/0x30
[   14.272362] 
[   14.272459] The buggy address belongs to the object at ffff888102fa7d80
[   14.272459]  which belongs to the cache kmalloc-64 of size 64
[   14.272999] The buggy address is located 0 bytes to the right of
[   14.272999]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.273462] 
[   14.273539] The buggy address belongs to the physical page:
[   14.273979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.274336] flags: 0x200000000000000(node=0|zone=2)
[   14.274555] page_type: f5(slab)
[   14.274690] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.275234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.275534] page dumped because: kasan: bad access detected
[   14.275792] 
[   14.275889] Memory state around the buggy address:
[   14.276055]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.276281]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.276506] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.276837]                                      ^
[   14.277068]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.277636]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.278012] ==================================================================
[   13.565241] ==================================================================
[   13.565559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   13.565952] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.566200] 
[   13.566286] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.566331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.566345] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.566368] Call Trace:
[   13.566384]  <TASK>
[   13.566400]  dump_stack_lvl+0x73/0xb0
[   13.566425]  print_report+0xd1/0x650
[   13.566449]  ? __virt_addr_valid+0x1db/0x2d0
[   13.566472]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.566495]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.566522]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.566551]  kasan_report+0x141/0x180
[   13.566574]  ? kasan_atomics_helper+0x7c7/0x5450
[   13.566602]  kasan_check_range+0x10c/0x1c0
[   13.566638]  __kasan_check_write+0x18/0x20
[   13.566659]  kasan_atomics_helper+0x7c7/0x5450
[   13.566684]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.566709]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.566731]  ? kasan_atomics+0x152/0x310
[   13.566756]  kasan_atomics+0x1dc/0x310
[   13.566777]  ? __pfx_kasan_atomics+0x10/0x10
[   13.566799]  ? __pfx_read_tsc+0x10/0x10
[   13.566821]  ? ktime_get_ts64+0x86/0x230
[   13.566846]  kunit_try_run_case+0x1a5/0x480
[   13.566868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.566889]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.566915]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.566941]  ? __kthread_parkme+0x82/0x180
[   13.566963]  ? preempt_count_sub+0x50/0x80
[   13.566987]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.567009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.567035]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.567061]  kthread+0x337/0x6f0
[   13.567082]  ? trace_preempt_on+0x20/0xc0
[   13.567107]  ? __pfx_kthread+0x10/0x10
[   13.567128]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.567153]  ? calculate_sigpending+0x7b/0xa0
[   13.567177]  ? __pfx_kthread+0x10/0x10
[   13.567200]  ret_from_fork+0x116/0x1d0
[   13.567219]  ? __pfx_kthread+0x10/0x10
[   13.567242]  ret_from_fork_asm+0x1a/0x30
[   13.567273]  </TASK>
[   13.567342] 
[   13.575812] Allocated by task 282:
[   13.576121]  kasan_save_stack+0x45/0x70
[   13.576344]  kasan_save_track+0x18/0x40
[   13.576538]  kasan_save_alloc_info+0x3b/0x50
[   13.576726]  __kasan_kmalloc+0xb7/0xc0
[   13.576950]  __kmalloc_cache_noprof+0x189/0x420
[   13.577286]  kasan_atomics+0x95/0x310
[   13.577547]  kunit_try_run_case+0x1a5/0x480
[   13.577716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.577914]  kthread+0x337/0x6f0
[   13.578441]  ret_from_fork+0x116/0x1d0
[   13.578667]  ret_from_fork_asm+0x1a/0x30
[   13.578931] 
[   13.579012] The buggy address belongs to the object at ffff888102fa7d80
[   13.579012]  which belongs to the cache kmalloc-64 of size 64
[   13.579507] The buggy address is located 0 bytes to the right of
[   13.579507]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.579974] 
[   13.580050] The buggy address belongs to the physical page:
[   13.580233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.580494] flags: 0x200000000000000(node=0|zone=2)
[   13.580740] page_type: f5(slab)
[   13.580999] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.581391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.581738] page dumped because: kasan: bad access detected
[   13.581938] 
[   13.582011] Memory state around the buggy address:
[   13.582176]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.582409]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.583068] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.583404]                                      ^
[   13.583658]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.584106]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.584634] ==================================================================
[   13.358516] ==================================================================
[   13.359136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   13.359637] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.360355] 
[   13.360477] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.360657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.360674] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.360697] Call Trace:
[   13.360712]  <TASK>
[   13.360729]  dump_stack_lvl+0x73/0xb0
[   13.360823]  print_report+0xd1/0x650
[   13.360849]  ? __virt_addr_valid+0x1db/0x2d0
[   13.360983]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.361007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.361050]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.361074]  kasan_report+0x141/0x180
[   13.361098]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.361126]  __asan_report_store4_noabort+0x1b/0x30
[   13.361149]  kasan_atomics_helper+0x4b6e/0x5450
[   13.361174]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.361198]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.361221]  ? kasan_atomics+0x152/0x310
[   13.361245]  kasan_atomics+0x1dc/0x310
[   13.361265]  ? __pfx_kasan_atomics+0x10/0x10
[   13.361287]  ? __pfx_read_tsc+0x10/0x10
[   13.361310]  ? ktime_get_ts64+0x86/0x230
[   13.361336]  kunit_try_run_case+0x1a5/0x480
[   13.361359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.361379]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.361405]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.361431]  ? __kthread_parkme+0x82/0x180
[   13.361453]  ? preempt_count_sub+0x50/0x80
[   13.361478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.361500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.361526]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.361553]  kthread+0x337/0x6f0
[   13.361574]  ? trace_preempt_on+0x20/0xc0
[   13.361600]  ? __pfx_kthread+0x10/0x10
[   13.361634]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.361658]  ? calculate_sigpending+0x7b/0xa0
[   13.361683]  ? __pfx_kthread+0x10/0x10
[   13.361706]  ret_from_fork+0x116/0x1d0
[   13.361726]  ? __pfx_kthread+0x10/0x10
[   13.361894]  ret_from_fork_asm+0x1a/0x30
[   13.361938]  </TASK>
[   13.361952] 
[   13.372654] Allocated by task 282:
[   13.372906]  kasan_save_stack+0x45/0x70
[   13.373312]  kasan_save_track+0x18/0x40
[   13.373509]  kasan_save_alloc_info+0x3b/0x50
[   13.374037]  __kasan_kmalloc+0xb7/0xc0
[   13.374339]  __kmalloc_cache_noprof+0x189/0x420
[   13.374644]  kasan_atomics+0x95/0x310
[   13.375022]  kunit_try_run_case+0x1a5/0x480
[   13.375198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.375458]  kthread+0x337/0x6f0
[   13.375644]  ret_from_fork+0x116/0x1d0
[   13.376198]  ret_from_fork_asm+0x1a/0x30
[   13.376385] 
[   13.376485] The buggy address belongs to the object at ffff888102fa7d80
[   13.376485]  which belongs to the cache kmalloc-64 of size 64
[   13.377252] The buggy address is located 0 bytes to the right of
[   13.377252]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.378040] 
[   13.378166] The buggy address belongs to the physical page:
[   13.378373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.378842] flags: 0x200000000000000(node=0|zone=2)
[   13.379205] page_type: f5(slab)
[   13.379510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.379953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.380343] page dumped because: kasan: bad access detected
[   13.380590] 
[   13.380784] Memory state around the buggy address:
[   13.381173]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.381497]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.381991] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.382380]                                      ^
[   13.382570]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.383099]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.383408] ==================================================================
[   14.672939] ==================================================================
[   14.673599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   14.674074] Read of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.674865] 
[   14.675063] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.675114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.675129] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.675151] Call Trace:
[   14.675167]  <TASK>
[   14.675184]  dump_stack_lvl+0x73/0xb0
[   14.675212]  print_report+0xd1/0x650
[   14.675236]  ? __virt_addr_valid+0x1db/0x2d0
[   14.675259]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.675282]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.675306]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.675330]  kasan_report+0x141/0x180
[   14.675354]  ? kasan_atomics_helper+0x4fa5/0x5450
[   14.675382]  __asan_report_load8_noabort+0x18/0x20
[   14.675404]  kasan_atomics_helper+0x4fa5/0x5450
[   14.675429]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.675568]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.675596]  ? kasan_atomics+0x152/0x310
[   14.675635]  kasan_atomics+0x1dc/0x310
[   14.675656]  ? __pfx_kasan_atomics+0x10/0x10
[   14.675679]  ? __pfx_read_tsc+0x10/0x10
[   14.675701]  ? ktime_get_ts64+0x86/0x230
[   14.675728]  kunit_try_run_case+0x1a5/0x480
[   14.675750]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.675796]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.675821]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.675848]  ? __kthread_parkme+0x82/0x180
[   14.675870]  ? preempt_count_sub+0x50/0x80
[   14.675895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.675918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.675943]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.675970]  kthread+0x337/0x6f0
[   14.675990]  ? trace_preempt_on+0x20/0xc0
[   14.676014]  ? __pfx_kthread+0x10/0x10
[   14.676036]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.676059]  ? calculate_sigpending+0x7b/0xa0
[   14.676085]  ? __pfx_kthread+0x10/0x10
[   14.676108]  ret_from_fork+0x116/0x1d0
[   14.676127]  ? __pfx_kthread+0x10/0x10
[   14.676149]  ret_from_fork_asm+0x1a/0x30
[   14.676180]  </TASK>
[   14.676191] 
[   14.686064] Allocated by task 282:
[   14.686361]  kasan_save_stack+0x45/0x70
[   14.686583]  kasan_save_track+0x18/0x40
[   14.686960]  kasan_save_alloc_info+0x3b/0x50
[   14.687238]  __kasan_kmalloc+0xb7/0xc0
[   14.687499]  __kmalloc_cache_noprof+0x189/0x420
[   14.687825]  kasan_atomics+0x95/0x310
[   14.687988]  kunit_try_run_case+0x1a5/0x480
[   14.688206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.688443]  kthread+0x337/0x6f0
[   14.688606]  ret_from_fork+0x116/0x1d0
[   14.689063]  ret_from_fork_asm+0x1a/0x30
[   14.689225] 
[   14.689454] The buggy address belongs to the object at ffff888102fa7d80
[   14.689454]  which belongs to the cache kmalloc-64 of size 64
[   14.690011] The buggy address is located 0 bytes to the right of
[   14.690011]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.690458] 
[   14.690565] The buggy address belongs to the physical page:
[   14.690839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.691197] flags: 0x200000000000000(node=0|zone=2)
[   14.691400] page_type: f5(slab)
[   14.691526] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.691904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.692215] page dumped because: kasan: bad access detected
[   14.692417] 
[   14.692515] Memory state around the buggy address:
[   14.692749]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.693042]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.693371] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.693659]                                      ^
[   14.693902]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.694171]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.694498] ==================================================================
[   13.779077] ==================================================================
[   13.779312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   13.779543] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.780208] 
[   13.780394] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.780442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.780455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.780477] Call Trace:
[   13.780494]  <TASK>
[   13.780511]  dump_stack_lvl+0x73/0xb0
[   13.780538]  print_report+0xd1/0x650
[   13.780562]  ? __virt_addr_valid+0x1db/0x2d0
[   13.780585]  ? kasan_atomics_helper+0x4a84/0x5450
[   13.780621]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.780646]  ? kasan_atomics_helper+0x4a84/0x5450
[   13.780669]  kasan_report+0x141/0x180
[   13.780693]  ? kasan_atomics_helper+0x4a84/0x5450
[   13.780721]  __asan_report_load4_noabort+0x18/0x20
[   13.780742]  kasan_atomics_helper+0x4a84/0x5450
[   13.780937]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.780962]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.780985]  ? kasan_atomics+0x152/0x310
[   13.781009]  kasan_atomics+0x1dc/0x310
[   13.781030]  ? __pfx_kasan_atomics+0x10/0x10
[   13.781051]  ? __pfx_read_tsc+0x10/0x10
[   13.781074]  ? ktime_get_ts64+0x86/0x230
[   13.781100]  kunit_try_run_case+0x1a5/0x480
[   13.781122]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.781143]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.781169]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.781203]  ? __kthread_parkme+0x82/0x180
[   13.781225]  ? preempt_count_sub+0x50/0x80
[   13.781249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.781271]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.781296]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.781322]  kthread+0x337/0x6f0
[   13.781343]  ? trace_preempt_on+0x20/0xc0
[   13.781366]  ? __pfx_kthread+0x10/0x10
[   13.781388]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.781411]  ? calculate_sigpending+0x7b/0xa0
[   13.781436]  ? __pfx_kthread+0x10/0x10
[   13.781458]  ret_from_fork+0x116/0x1d0
[   13.781477]  ? __pfx_kthread+0x10/0x10
[   13.781499]  ret_from_fork_asm+0x1a/0x30
[   13.781531]  </TASK>
[   13.781543] 
[   13.791060] Allocated by task 282:
[   13.791215]  kasan_save_stack+0x45/0x70
[   13.791370]  kasan_save_track+0x18/0x40
[   13.791512]  kasan_save_alloc_info+0x3b/0x50
[   13.791745]  __kasan_kmalloc+0xb7/0xc0
[   13.791939]  __kmalloc_cache_noprof+0x189/0x420
[   13.792161]  kasan_atomics+0x95/0x310
[   13.792548]  kunit_try_run_case+0x1a5/0x480
[   13.793668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.794165]  kthread+0x337/0x6f0
[   13.794580]  ret_from_fork+0x116/0x1d0
[   13.794877]  ret_from_fork_asm+0x1a/0x30
[   13.795309] 
[   13.795428] The buggy address belongs to the object at ffff888102fa7d80
[   13.795428]  which belongs to the cache kmalloc-64 of size 64
[   13.796462] The buggy address is located 0 bytes to the right of
[   13.796462]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.797757] 
[   13.797965] The buggy address belongs to the physical page:
[   13.798399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.799094] flags: 0x200000000000000(node=0|zone=2)
[   13.799459] page_type: f5(slab)
[   13.799653] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.800510] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.801596] page dumped because: kasan: bad access detected
[   13.802073] 
[   13.802172] Memory state around the buggy address:
[   13.802383]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.802675]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.803569] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.804288]                                      ^
[   13.804714]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.805263]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.805777] ==================================================================
[   14.503735] ==================================================================
[   14.504120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   14.504454] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.504714] 
[   14.504804] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.504851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.504865] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.504911] Call Trace:
[   14.504929]  <TASK>
[   14.504947]  dump_stack_lvl+0x73/0xb0
[   14.504975]  print_report+0xd1/0x650
[   14.504999]  ? __virt_addr_valid+0x1db/0x2d0
[   14.505022]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.505045]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.505071]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.505112]  kasan_report+0x141/0x180
[   14.505136]  ? kasan_atomics_helper+0x1eaa/0x5450
[   14.505166]  kasan_check_range+0x10c/0x1c0
[   14.505192]  __kasan_check_write+0x18/0x20
[   14.505213]  kasan_atomics_helper+0x1eaa/0x5450
[   14.505237]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.505260]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.505282]  ? kasan_atomics+0x152/0x310
[   14.505307]  kasan_atomics+0x1dc/0x310
[   14.505327]  ? __pfx_kasan_atomics+0x10/0x10
[   14.505349]  ? __pfx_read_tsc+0x10/0x10
[   14.505370]  ? ktime_get_ts64+0x86/0x230
[   14.505414]  kunit_try_run_case+0x1a5/0x480
[   14.505437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.505458]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.505482]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.505508]  ? __kthread_parkme+0x82/0x180
[   14.505530]  ? preempt_count_sub+0x50/0x80
[   14.505554]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.505576]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.505602]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.505636]  kthread+0x337/0x6f0
[   14.505656]  ? trace_preempt_on+0x20/0xc0
[   14.505680]  ? __pfx_kthread+0x10/0x10
[   14.505701]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.505725]  ? calculate_sigpending+0x7b/0xa0
[   14.505750]  ? __pfx_kthread+0x10/0x10
[   14.505780]  ret_from_fork+0x116/0x1d0
[   14.505799]  ? __pfx_kthread+0x10/0x10
[   14.505821]  ret_from_fork_asm+0x1a/0x30
[   14.505852]  </TASK>
[   14.505862] 
[   14.513556] Allocated by task 282:
[   14.513719]  kasan_save_stack+0x45/0x70
[   14.513951]  kasan_save_track+0x18/0x40
[   14.514174]  kasan_save_alloc_info+0x3b/0x50
[   14.514379]  __kasan_kmalloc+0xb7/0xc0
[   14.514518]  __kmalloc_cache_noprof+0x189/0x420
[   14.514691]  kasan_atomics+0x95/0x310
[   14.515023]  kunit_try_run_case+0x1a5/0x480
[   14.515233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.515511]  kthread+0x337/0x6f0
[   14.515692]  ret_from_fork+0x116/0x1d0
[   14.515922]  ret_from_fork_asm+0x1a/0x30
[   14.516126] 
[   14.516202] The buggy address belongs to the object at ffff888102fa7d80
[   14.516202]  which belongs to the cache kmalloc-64 of size 64
[   14.516725] The buggy address is located 0 bytes to the right of
[   14.516725]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.517255] 
[   14.517356] The buggy address belongs to the physical page:
[   14.517557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.517922] flags: 0x200000000000000(node=0|zone=2)
[   14.518179] page_type: f5(slab)
[   14.518349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.518657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.519162] page dumped because: kasan: bad access detected
[   14.519398] 
[   14.519471] Memory state around the buggy address:
[   14.519639]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.519864]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.520212] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.520552]                                      ^
[   14.520803]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.521142]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.521370] ==================================================================
[   13.607975] ==================================================================
[   13.608681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   13.609352] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.609871] 
[   13.610020] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.610070] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.610084] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.610108] Call Trace:
[   13.610121]  <TASK>
[   13.610138]  dump_stack_lvl+0x73/0xb0
[   13.610165]  print_report+0xd1/0x650
[   13.610190]  ? __virt_addr_valid+0x1db/0x2d0
[   13.610231]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.610255]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.610279]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.610304]  kasan_report+0x141/0x180
[   13.610327]  ? kasan_atomics_helper+0x8f9/0x5450
[   13.610355]  kasan_check_range+0x10c/0x1c0
[   13.610381]  __kasan_check_write+0x18/0x20
[   13.610403]  kasan_atomics_helper+0x8f9/0x5450
[   13.610427]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.610452]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.610476]  ? kasan_atomics+0x152/0x310
[   13.610501]  kasan_atomics+0x1dc/0x310
[   13.610520]  ? __pfx_kasan_atomics+0x10/0x10
[   13.610548]  ? __pfx_read_tsc+0x10/0x10
[   13.610571]  ? ktime_get_ts64+0x86/0x230
[   13.610596]  kunit_try_run_case+0x1a5/0x480
[   13.610637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.610660]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.610686]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.610712]  ? __kthread_parkme+0x82/0x180
[   13.610734]  ? preempt_count_sub+0x50/0x80
[   13.610980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.611009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.611035]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.611061]  kthread+0x337/0x6f0
[   13.611082]  ? trace_preempt_on+0x20/0xc0
[   13.611107]  ? __pfx_kthread+0x10/0x10
[   13.611129]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.611153]  ? calculate_sigpending+0x7b/0xa0
[   13.611178]  ? __pfx_kthread+0x10/0x10
[   13.611201]  ret_from_fork+0x116/0x1d0
[   13.611220]  ? __pfx_kthread+0x10/0x10
[   13.611242]  ret_from_fork_asm+0x1a/0x30
[   13.611273]  </TASK>
[   13.611285] 
[   13.627171] Allocated by task 282:
[   13.627544]  kasan_save_stack+0x45/0x70
[   13.627993]  kasan_save_track+0x18/0x40
[   13.628528]  kasan_save_alloc_info+0x3b/0x50
[   13.629011]  __kasan_kmalloc+0xb7/0xc0
[   13.629374]  __kmalloc_cache_noprof+0x189/0x420
[   13.629543]  kasan_atomics+0x95/0x310
[   13.629689]  kunit_try_run_case+0x1a5/0x480
[   13.630060]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.630595]  kthread+0x337/0x6f0
[   13.631074]  ret_from_fork+0x116/0x1d0
[   13.631538]  ret_from_fork_asm+0x1a/0x30
[   13.632030] 
[   13.632221] The buggy address belongs to the object at ffff888102fa7d80
[   13.632221]  which belongs to the cache kmalloc-64 of size 64
[   13.633396] The buggy address is located 0 bytes to the right of
[   13.633396]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.633870] 
[   13.634117] The buggy address belongs to the physical page:
[   13.634663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.635727] flags: 0x200000000000000(node=0|zone=2)
[   13.636330] page_type: f5(slab)
[   13.636646] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.637337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.637970] page dumped because: kasan: bad access detected
[   13.638157] 
[   13.638233] Memory state around the buggy address:
[   13.638398]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.638742]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.639074] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.639348]                                      ^
[   13.639539]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.640156]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.640402] ==================================================================
[   14.461267] ==================================================================
[   14.461909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   14.462255] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.462546] 
[   14.462675] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.462722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.462736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.462758] Call Trace:
[   14.462776]  <TASK>
[   14.462792]  dump_stack_lvl+0x73/0xb0
[   14.462818]  print_report+0xd1/0x650
[   14.462841]  ? __virt_addr_valid+0x1db/0x2d0
[   14.462864]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.462887]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.462911]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.462934]  kasan_report+0x141/0x180
[   14.462957]  ? kasan_atomics_helper+0x1d7a/0x5450
[   14.462985]  kasan_check_range+0x10c/0x1c0
[   14.463012]  __kasan_check_write+0x18/0x20
[   14.463033]  kasan_atomics_helper+0x1d7a/0x5450
[   14.463057]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.463082]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.463104]  ? kasan_atomics+0x152/0x310
[   14.463129]  kasan_atomics+0x1dc/0x310
[   14.463149]  ? __pfx_kasan_atomics+0x10/0x10
[   14.463171]  ? __pfx_read_tsc+0x10/0x10
[   14.463192]  ? ktime_get_ts64+0x86/0x230
[   14.463219]  kunit_try_run_case+0x1a5/0x480
[   14.463242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.463263]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.463288]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.463314]  ? __kthread_parkme+0x82/0x180
[   14.463335]  ? preempt_count_sub+0x50/0x80
[   14.463359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.463382]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.463408]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.463434]  kthread+0x337/0x6f0
[   14.463454]  ? trace_preempt_on+0x20/0xc0
[   14.463478]  ? __pfx_kthread+0x10/0x10
[   14.463499]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.463523]  ? calculate_sigpending+0x7b/0xa0
[   14.463547]  ? __pfx_kthread+0x10/0x10
[   14.463570]  ret_from_fork+0x116/0x1d0
[   14.463589]  ? __pfx_kthread+0x10/0x10
[   14.463621]  ret_from_fork_asm+0x1a/0x30
[   14.463653]  </TASK>
[   14.463664] 
[   14.471209] Allocated by task 282:
[   14.471377]  kasan_save_stack+0x45/0x70
[   14.471562]  kasan_save_track+0x18/0x40
[   14.471752]  kasan_save_alloc_info+0x3b/0x50
[   14.471933]  __kasan_kmalloc+0xb7/0xc0
[   14.472108]  __kmalloc_cache_noprof+0x189/0x420
[   14.472303]  kasan_atomics+0x95/0x310
[   14.472470]  kunit_try_run_case+0x1a5/0x480
[   14.472911]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.474051]  kthread+0x337/0x6f0
[   14.474314]  ret_from_fork+0x116/0x1d0
[   14.474715]  ret_from_fork_asm+0x1a/0x30
[   14.475206] 
[   14.475306] The buggy address belongs to the object at ffff888102fa7d80
[   14.475306]  which belongs to the cache kmalloc-64 of size 64
[   14.475979] The buggy address is located 0 bytes to the right of
[   14.475979]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.476740] 
[   14.477002] The buggy address belongs to the physical page:
[   14.477478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.477905] flags: 0x200000000000000(node=0|zone=2)
[   14.478266] page_type: f5(slab)
[   14.478433] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.478761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.479070] page dumped because: kasan: bad access detected
[   14.479296] 
[   14.479387] Memory state around the buggy address:
[   14.479591]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.480286]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.480915] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.481353]                                      ^
[   14.481729]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.482349]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.482822] ==================================================================
[   14.436994] ==================================================================
[   14.437345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   14.437762] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.438073] 
[   14.438185] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.438231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.438244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.438267] Call Trace:
[   14.438281]  <TASK>
[   14.438296]  dump_stack_lvl+0x73/0xb0
[   14.438322]  print_report+0xd1/0x650
[   14.438347]  ? __virt_addr_valid+0x1db/0x2d0
[   14.438370]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.438394]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.438419]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.438443]  kasan_report+0x141/0x180
[   14.438467]  ? kasan_atomics_helper+0x1ce1/0x5450
[   14.439129]  kasan_check_range+0x10c/0x1c0
[   14.439155]  __kasan_check_write+0x18/0x20
[   14.440064]  kasan_atomics_helper+0x1ce1/0x5450
[   14.440092]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.440116]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.440138]  ? kasan_atomics+0x152/0x310
[   14.440163]  kasan_atomics+0x1dc/0x310
[   14.440495]  ? __pfx_kasan_atomics+0x10/0x10
[   14.440518]  ? __pfx_read_tsc+0x10/0x10
[   14.440542]  ? ktime_get_ts64+0x86/0x230
[   14.440568]  kunit_try_run_case+0x1a5/0x480
[   14.440591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.440622]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.440648]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.440674]  ? __kthread_parkme+0x82/0x180
[   14.440696]  ? preempt_count_sub+0x50/0x80
[   14.440720]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.440742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.440787]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.440813]  kthread+0x337/0x6f0
[   14.440834]  ? trace_preempt_on+0x20/0xc0
[   14.440857]  ? __pfx_kthread+0x10/0x10
[   14.440879]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.440903]  ? calculate_sigpending+0x7b/0xa0
[   14.440928]  ? __pfx_kthread+0x10/0x10
[   14.440950]  ret_from_fork+0x116/0x1d0
[   14.440969]  ? __pfx_kthread+0x10/0x10
[   14.440991]  ret_from_fork_asm+0x1a/0x30
[   14.441022]  </TASK>
[   14.441034] 
[   14.450743] Allocated by task 282:
[   14.450902]  kasan_save_stack+0x45/0x70
[   14.451484]  kasan_save_track+0x18/0x40
[   14.451734]  kasan_save_alloc_info+0x3b/0x50
[   14.452066]  __kasan_kmalloc+0xb7/0xc0
[   14.452328]  __kmalloc_cache_noprof+0x189/0x420
[   14.452513]  kasan_atomics+0x95/0x310
[   14.452841]  kunit_try_run_case+0x1a5/0x480
[   14.453128]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.453428]  kthread+0x337/0x6f0
[   14.453675]  ret_from_fork+0x116/0x1d0
[   14.453831]  ret_from_fork_asm+0x1a/0x30
[   14.454136] 
[   14.454234] The buggy address belongs to the object at ffff888102fa7d80
[   14.454234]  which belongs to the cache kmalloc-64 of size 64
[   14.454745] The buggy address is located 0 bytes to the right of
[   14.454745]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.455235] 
[   14.455336] The buggy address belongs to the physical page:
[   14.455552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.456298] flags: 0x200000000000000(node=0|zone=2)
[   14.456597] page_type: f5(slab)
[   14.456844] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.457233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.457629] page dumped because: kasan: bad access detected
[   14.457867] 
[   14.457982] Memory state around the buggy address:
[   14.458367]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.458735]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.459117] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.459504]                                      ^
[   14.459704]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.460134]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.460532] ==================================================================
[   14.613218] ==================================================================
[   14.613551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   14.614044] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.614390] 
[   14.614508] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.614562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.614576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.614599] Call Trace:
[   14.614626]  <TASK>
[   14.614642]  dump_stack_lvl+0x73/0xb0
[   14.614670]  print_report+0xd1/0x650
[   14.614694]  ? __virt_addr_valid+0x1db/0x2d0
[   14.614718]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.614748]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.614772]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.614796]  kasan_report+0x141/0x180
[   14.614820]  ? kasan_atomics_helper+0x20c8/0x5450
[   14.614848]  kasan_check_range+0x10c/0x1c0
[   14.614874]  __kasan_check_write+0x18/0x20
[   14.614896]  kasan_atomics_helper+0x20c8/0x5450
[   14.614921]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.614945]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.614968]  ? kasan_atomics+0x152/0x310
[   14.614992]  kasan_atomics+0x1dc/0x310
[   14.615013]  ? __pfx_kasan_atomics+0x10/0x10
[   14.615035]  ? __pfx_read_tsc+0x10/0x10
[   14.615058]  ? ktime_get_ts64+0x86/0x230
[   14.615084]  kunit_try_run_case+0x1a5/0x480
[   14.615106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.615127]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.615153]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.615180]  ? __kthread_parkme+0x82/0x180
[   14.615202]  ? preempt_count_sub+0x50/0x80
[   14.615227]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.615249]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.615275]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.615303]  kthread+0x337/0x6f0
[   14.615323]  ? trace_preempt_on+0x20/0xc0
[   14.615346]  ? __pfx_kthread+0x10/0x10
[   14.615368]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.615392]  ? calculate_sigpending+0x7b/0xa0
[   14.615416]  ? __pfx_kthread+0x10/0x10
[   14.615439]  ret_from_fork+0x116/0x1d0
[   14.615460]  ? __pfx_kthread+0x10/0x10
[   14.615482]  ret_from_fork_asm+0x1a/0x30
[   14.615513]  </TASK>
[   14.615525] 
[   14.626864] Allocated by task 282:
[   14.627082]  kasan_save_stack+0x45/0x70
[   14.627297]  kasan_save_track+0x18/0x40
[   14.627496]  kasan_save_alloc_info+0x3b/0x50
[   14.627668]  __kasan_kmalloc+0xb7/0xc0
[   14.627887]  __kmalloc_cache_noprof+0x189/0x420
[   14.628084]  kasan_atomics+0x95/0x310
[   14.628275]  kunit_try_run_case+0x1a5/0x480
[   14.628434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.628627]  kthread+0x337/0x6f0
[   14.628772]  ret_from_fork+0x116/0x1d0
[   14.628972]  ret_from_fork_asm+0x1a/0x30
[   14.629173] 
[   14.629271] The buggy address belongs to the object at ffff888102fa7d80
[   14.629271]  which belongs to the cache kmalloc-64 of size 64
[   14.629734] The buggy address is located 0 bytes to the right of
[   14.629734]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.630315] 
[   14.630416] The buggy address belongs to the physical page:
[   14.630681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.631027] flags: 0x200000000000000(node=0|zone=2)
[   14.631250] page_type: f5(slab)
[   14.631418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.631733] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.632058] page dumped because: kasan: bad access detected
[   14.632296] 
[   14.632383] Memory state around the buggy address:
[   14.632596]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.632859]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.633141] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.633469]                                      ^
[   14.633659]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.633911]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.634237] ==================================================================
[   14.419888] ==================================================================
[   14.420147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   14.420476] Read of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.420789] 
[   14.420929] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.420995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.421009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.421031] Call Trace:
[   14.421049]  <TASK>
[   14.421066]  dump_stack_lvl+0x73/0xb0
[   14.421094]  print_report+0xd1/0x650
[   14.421117]  ? __virt_addr_valid+0x1db/0x2d0
[   14.421141]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.421163]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.421189]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.421215]  kasan_report+0x141/0x180
[   14.421240]  ? kasan_atomics_helper+0x4f30/0x5450
[   14.421269]  __asan_report_load8_noabort+0x18/0x20
[   14.421293]  kasan_atomics_helper+0x4f30/0x5450
[   14.421317]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.421342]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.421365]  ? kasan_atomics+0x152/0x310
[   14.421390]  kasan_atomics+0x1dc/0x310
[   14.421411]  ? __pfx_kasan_atomics+0x10/0x10
[   14.421433]  ? __pfx_read_tsc+0x10/0x10
[   14.421456]  ? ktime_get_ts64+0x86/0x230
[   14.421481]  kunit_try_run_case+0x1a5/0x480
[   14.421504]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.421525]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.421550]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.421576]  ? __kthread_parkme+0x82/0x180
[   14.421597]  ? preempt_count_sub+0x50/0x80
[   14.421634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.421656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.421681]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.421707]  kthread+0x337/0x6f0
[   14.421727]  ? trace_preempt_on+0x20/0xc0
[   14.421752]  ? __pfx_kthread+0x10/0x10
[   14.421774]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.421797]  ? calculate_sigpending+0x7b/0xa0
[   14.421822]  ? __pfx_kthread+0x10/0x10
[   14.421845]  ret_from_fork+0x116/0x1d0
[   14.421864]  ? __pfx_kthread+0x10/0x10
[   14.421885]  ret_from_fork_asm+0x1a/0x30
[   14.421918]  </TASK>
[   14.421930] 
[   14.429041] Allocated by task 282:
[   14.429237]  kasan_save_stack+0x45/0x70
[   14.429406]  kasan_save_track+0x18/0x40
[   14.429588]  kasan_save_alloc_info+0x3b/0x50
[   14.429749]  __kasan_kmalloc+0xb7/0xc0
[   14.429926]  __kmalloc_cache_noprof+0x189/0x420
[   14.430203]  kasan_atomics+0x95/0x310
[   14.430397]  kunit_try_run_case+0x1a5/0x480
[   14.430584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.430873]  kthread+0x337/0x6f0
[   14.431031]  ret_from_fork+0x116/0x1d0
[   14.431203]  ret_from_fork_asm+0x1a/0x30
[   14.431359] 
[   14.431447] The buggy address belongs to the object at ffff888102fa7d80
[   14.431447]  which belongs to the cache kmalloc-64 of size 64
[   14.431949] The buggy address is located 0 bytes to the right of
[   14.431949]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.432447] 
[   14.432549] The buggy address belongs to the physical page:
[   14.432801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.433127] flags: 0x200000000000000(node=0|zone=2)
[   14.433339] page_type: f5(slab)
[   14.433487] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.433834] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.434142] page dumped because: kasan: bad access detected
[   14.434362] 
[   14.434456] Memory state around the buggy address:
[   14.434639]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.434863]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.435087] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.435352]                                      ^
[   14.435581]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.436093]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.436417] ==================================================================
[   13.545711] ==================================================================
[   13.546040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   13.546392] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.546706] 
[   13.546795] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.546839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.546853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.546874] Call Trace:
[   13.546891]  <TASK>
[   13.546907]  dump_stack_lvl+0x73/0xb0
[   13.546991]  print_report+0xd1/0x650
[   13.547015]  ? __virt_addr_valid+0x1db/0x2d0
[   13.547039]  ? kasan_atomics_helper+0x72f/0x5450
[   13.547061]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.547086]  ? kasan_atomics_helper+0x72f/0x5450
[   13.547110]  kasan_report+0x141/0x180
[   13.547133]  ? kasan_atomics_helper+0x72f/0x5450
[   13.547162]  kasan_check_range+0x10c/0x1c0
[   13.547187]  __kasan_check_write+0x18/0x20
[   13.547208]  kasan_atomics_helper+0x72f/0x5450
[   13.547232]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.547256]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.547279]  ? kasan_atomics+0x152/0x310
[   13.547303]  kasan_atomics+0x1dc/0x310
[   13.547323]  ? __pfx_kasan_atomics+0x10/0x10
[   13.547345]  ? __pfx_read_tsc+0x10/0x10
[   13.547367]  ? ktime_get_ts64+0x86/0x230
[   13.547393]  kunit_try_run_case+0x1a5/0x480
[   13.547415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.547436]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.547461]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.547487]  ? __kthread_parkme+0x82/0x180
[   13.547508]  ? preempt_count_sub+0x50/0x80
[   13.547533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.547556]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.547581]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.547607]  kthread+0x337/0x6f0
[   13.547639]  ? trace_preempt_on+0x20/0xc0
[   13.547662]  ? __pfx_kthread+0x10/0x10
[   13.547685]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.547708]  ? calculate_sigpending+0x7b/0xa0
[   13.547733]  ? __pfx_kthread+0x10/0x10
[   13.547755]  ret_from_fork+0x116/0x1d0
[   13.547775]  ? __pfx_kthread+0x10/0x10
[   13.547797]  ret_from_fork_asm+0x1a/0x30
[   13.547828]  </TASK>
[   13.547840] 
[   13.556055] Allocated by task 282:
[   13.556214]  kasan_save_stack+0x45/0x70
[   13.556422]  kasan_save_track+0x18/0x40
[   13.556592]  kasan_save_alloc_info+0x3b/0x50
[   13.556874]  __kasan_kmalloc+0xb7/0xc0
[   13.557055]  __kmalloc_cache_noprof+0x189/0x420
[   13.557229]  kasan_atomics+0x95/0x310
[   13.557367]  kunit_try_run_case+0x1a5/0x480
[   13.557518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.557715]  kthread+0x337/0x6f0
[   13.557890]  ret_from_fork+0x116/0x1d0
[   13.558242]  ret_from_fork_asm+0x1a/0x30
[   13.558448] 
[   13.558551] The buggy address belongs to the object at ffff888102fa7d80
[   13.558551]  which belongs to the cache kmalloc-64 of size 64
[   13.559235] The buggy address is located 0 bytes to the right of
[   13.559235]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.560142] 
[   13.560259] The buggy address belongs to the physical page:
[   13.560522] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.560942] flags: 0x200000000000000(node=0|zone=2)
[   13.561153] page_type: f5(slab)
[   13.561318] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.561578] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.561872] page dumped because: kasan: bad access detected
[   13.562350] 
[   13.562454] Memory state around the buggy address:
[   13.562677]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.563099]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.563375] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.563599]                                      ^
[   13.563849]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.564370]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.564830] ==================================================================
[   13.309911] ==================================================================
[   13.310165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   13.310505] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.311115] 
[   13.311390] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.311505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.311519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.311550] Call Trace:
[   13.311563]  <TASK>
[   13.311578]  dump_stack_lvl+0x73/0xb0
[   13.311606]  print_report+0xd1/0x650
[   13.311638]  ? __virt_addr_valid+0x1db/0x2d0
[   13.311661]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.311683]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.311706]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.311728]  kasan_report+0x141/0x180
[   13.311751]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.311825]  __asan_report_store4_noabort+0x1b/0x30
[   13.311850]  kasan_atomics_helper+0x4ba2/0x5450
[   13.311873]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.311896]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.311918]  ? kasan_atomics+0x152/0x310
[   13.311941]  kasan_atomics+0x1dc/0x310
[   13.311961]  ? __pfx_kasan_atomics+0x10/0x10
[   13.311982]  ? __pfx_read_tsc+0x10/0x10
[   13.312003]  ? ktime_get_ts64+0x86/0x230
[   13.312027]  kunit_try_run_case+0x1a5/0x480
[   13.312050]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.312070]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.312097]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.312123]  ? __kthread_parkme+0x82/0x180
[   13.312144]  ? preempt_count_sub+0x50/0x80
[   13.312168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.312189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.312214]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.312239]  kthread+0x337/0x6f0
[   13.312259]  ? trace_preempt_on+0x20/0xc0
[   13.312282]  ? __pfx_kthread+0x10/0x10
[   13.312302]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.312326]  ? calculate_sigpending+0x7b/0xa0
[   13.312349]  ? __pfx_kthread+0x10/0x10
[   13.312371]  ret_from_fork+0x116/0x1d0
[   13.312390]  ? __pfx_kthread+0x10/0x10
[   13.312411]  ret_from_fork_asm+0x1a/0x30
[   13.312442]  </TASK>
[   13.312452] 
[   13.322112] Allocated by task 282:
[   13.322648]  kasan_save_stack+0x45/0x70
[   13.323104]  kasan_save_track+0x18/0x40
[   13.323290]  kasan_save_alloc_info+0x3b/0x50
[   13.323561]  __kasan_kmalloc+0xb7/0xc0
[   13.323709]  __kmalloc_cache_noprof+0x189/0x420
[   13.323862]  kasan_atomics+0x95/0x310
[   13.324007]  kunit_try_run_case+0x1a5/0x480
[   13.324267]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.324785]  kthread+0x337/0x6f0
[   13.324970]  ret_from_fork+0x116/0x1d0
[   13.325162]  ret_from_fork_asm+0x1a/0x30
[   13.325363] 
[   13.325446] The buggy address belongs to the object at ffff888102fa7d80
[   13.325446]  which belongs to the cache kmalloc-64 of size 64
[   13.326345] The buggy address is located 0 bytes to the right of
[   13.326345]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.327041] 
[   13.327142] The buggy address belongs to the physical page:
[   13.327579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.328202] flags: 0x200000000000000(node=0|zone=2)
[   13.328401] page_type: f5(slab)
[   13.328574] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.328943] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.329326] page dumped because: kasan: bad access detected
[   13.329649] 
[   13.329723] Memory state around the buggy address:
[   13.329945]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.330358]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.330856] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.331345]                                      ^
[   13.331639]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.332083]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.332414] ==================================================================
[   13.383864] ==================================================================
[   13.384115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   13.384435] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.385362] 
[   13.385479] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.385526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.385540] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.385563] Call Trace:
[   13.385578]  <TASK>
[   13.385716]  dump_stack_lvl+0x73/0xb0
[   13.385749]  print_report+0xd1/0x650
[   13.385791]  ? __virt_addr_valid+0x1db/0x2d0
[   13.385815]  ? kasan_atomics_helper+0x3df/0x5450
[   13.385850]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.385874]  ? kasan_atomics_helper+0x3df/0x5450
[   13.385898]  kasan_report+0x141/0x180
[   13.385922]  ? kasan_atomics_helper+0x3df/0x5450
[   13.385949]  kasan_check_range+0x10c/0x1c0
[   13.385974]  __kasan_check_read+0x15/0x20
[   13.385995]  kasan_atomics_helper+0x3df/0x5450
[   13.386020]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.386044]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.386067]  ? kasan_atomics+0x152/0x310
[   13.386091]  kasan_atomics+0x1dc/0x310
[   13.386111]  ? __pfx_kasan_atomics+0x10/0x10
[   13.386135]  ? __pfx_read_tsc+0x10/0x10
[   13.386159]  ? ktime_get_ts64+0x86/0x230
[   13.386185]  kunit_try_run_case+0x1a5/0x480
[   13.386207]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.386228]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.386253]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.386279]  ? __kthread_parkme+0x82/0x180
[   13.386300]  ? preempt_count_sub+0x50/0x80
[   13.386326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.386348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.386374]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.386400]  kthread+0x337/0x6f0
[   13.386421]  ? trace_preempt_on+0x20/0xc0
[   13.386444]  ? __pfx_kthread+0x10/0x10
[   13.386467]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.386491]  ? calculate_sigpending+0x7b/0xa0
[   13.386515]  ? __pfx_kthread+0x10/0x10
[   13.386551]  ret_from_fork+0x116/0x1d0
[   13.386570]  ? __pfx_kthread+0x10/0x10
[   13.386592]  ret_from_fork_asm+0x1a/0x30
[   13.386634]  </TASK>
[   13.386646] 
[   13.399745] Allocated by task 282:
[   13.400074]  kasan_save_stack+0x45/0x70
[   13.400439]  kasan_save_track+0x18/0x40
[   13.400649]  kasan_save_alloc_info+0x3b/0x50
[   13.401035]  __kasan_kmalloc+0xb7/0xc0
[   13.401219]  __kmalloc_cache_noprof+0x189/0x420
[   13.401521]  kasan_atomics+0x95/0x310
[   13.401764]  kunit_try_run_case+0x1a5/0x480
[   13.402073]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.402500]  kthread+0x337/0x6f0
[   13.402759]  ret_from_fork+0x116/0x1d0
[   13.403079]  ret_from_fork_asm+0x1a/0x30
[   13.403279] 
[   13.403454] The buggy address belongs to the object at ffff888102fa7d80
[   13.403454]  which belongs to the cache kmalloc-64 of size 64
[   13.404206] The buggy address is located 0 bytes to the right of
[   13.404206]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.404762] 
[   13.404971] The buggy address belongs to the physical page:
[   13.405363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.405892] flags: 0x200000000000000(node=0|zone=2)
[   13.406220] page_type: f5(slab)
[   13.406523] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.406990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.407530] page dumped because: kasan: bad access detected
[   13.407831] 
[   13.407925] Memory state around the buggy address:
[   13.408160]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.408745]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.409194] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.409535]                                      ^
[   13.409745]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.410424]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.410717] ==================================================================
[   13.641080] ==================================================================
[   13.641413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   13.641787] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.642207] 
[   13.642305] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.642352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.642366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.642388] Call Trace:
[   13.642403]  <TASK>
[   13.642420]  dump_stack_lvl+0x73/0xb0
[   13.642448]  print_report+0xd1/0x650
[   13.642471]  ? __virt_addr_valid+0x1db/0x2d0
[   13.642495]  ? kasan_atomics_helper+0x992/0x5450
[   13.642517]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.642545]  ? kasan_atomics_helper+0x992/0x5450
[   13.642569]  kasan_report+0x141/0x180
[   13.642592]  ? kasan_atomics_helper+0x992/0x5450
[   13.642630]  kasan_check_range+0x10c/0x1c0
[   13.642656]  __kasan_check_write+0x18/0x20
[   13.642677]  kasan_atomics_helper+0x992/0x5450
[   13.642702]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.642725]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.642748]  ? kasan_atomics+0x152/0x310
[   13.642997]  kasan_atomics+0x1dc/0x310
[   13.643020]  ? __pfx_kasan_atomics+0x10/0x10
[   13.643043]  ? __pfx_read_tsc+0x10/0x10
[   13.643066]  ? ktime_get_ts64+0x86/0x230
[   13.643093]  kunit_try_run_case+0x1a5/0x480
[   13.643115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.643136]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.643162]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.643188]  ? __kthread_parkme+0x82/0x180
[   13.643210]  ? preempt_count_sub+0x50/0x80
[   13.643236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.643259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.643285]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.643311]  kthread+0x337/0x6f0
[   13.643332]  ? trace_preempt_on+0x20/0xc0
[   13.643355]  ? __pfx_kthread+0x10/0x10
[   13.643377]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.643401]  ? calculate_sigpending+0x7b/0xa0
[   13.643426]  ? __pfx_kthread+0x10/0x10
[   13.643449]  ret_from_fork+0x116/0x1d0
[   13.643469]  ? __pfx_kthread+0x10/0x10
[   13.643491]  ret_from_fork_asm+0x1a/0x30
[   13.643522]  </TASK>
[   13.643534] 
[   13.655715] Allocated by task 282:
[   13.656403]  kasan_save_stack+0x45/0x70
[   13.657049]  kasan_save_track+0x18/0x40
[   13.657548]  kasan_save_alloc_info+0x3b/0x50
[   13.658187]  __kasan_kmalloc+0xb7/0xc0
[   13.658690]  __kmalloc_cache_noprof+0x189/0x420
[   13.659203]  kasan_atomics+0x95/0x310
[   13.659352]  kunit_try_run_case+0x1a5/0x480
[   13.659508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.659710]  kthread+0x337/0x6f0
[   13.660179]  ret_from_fork+0x116/0x1d0
[   13.660568]  ret_from_fork_asm+0x1a/0x30
[   13.661220] 
[   13.661394] The buggy address belongs to the object at ffff888102fa7d80
[   13.661394]  which belongs to the cache kmalloc-64 of size 64
[   13.662530] The buggy address is located 0 bytes to the right of
[   13.662530]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.663652] 
[   13.663736] The buggy address belongs to the physical page:
[   13.664336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.665425] flags: 0x200000000000000(node=0|zone=2)
[   13.665619] page_type: f5(slab)
[   13.665748] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.665988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.666235] page dumped because: kasan: bad access detected
[   13.666418] 
[   13.666492] Memory state around the buggy address:
[   13.666667]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.667268]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.668011] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.668635]                                      ^
[   13.669237]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.669941]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.670572] ==================================================================
[   14.341484] ==================================================================
[   14.341944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   14.342324] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.342723] 
[   14.342818] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.342862] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.342875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.342897] Call Trace:
[   14.342912]  <TASK>
[   14.342926]  dump_stack_lvl+0x73/0xb0
[   14.342951]  print_report+0xd1/0x650
[   14.342974]  ? __virt_addr_valid+0x1db/0x2d0
[   14.342997]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.343020]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.343045]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.343068]  kasan_report+0x141/0x180
[   14.343091]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.343119]  kasan_check_range+0x10c/0x1c0
[   14.343145]  __kasan_check_write+0x18/0x20
[   14.343165]  kasan_atomics_helper+0x19e3/0x5450
[   14.343190]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.343214]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.343236]  ? kasan_atomics+0x152/0x310
[   14.343260]  kasan_atomics+0x1dc/0x310
[   14.343280]  ? __pfx_kasan_atomics+0x10/0x10
[   14.343302]  ? __pfx_read_tsc+0x10/0x10
[   14.343323]  ? ktime_get_ts64+0x86/0x230
[   14.343349]  kunit_try_run_case+0x1a5/0x480
[   14.343371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.343392]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.343417]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.343443]  ? __kthread_parkme+0x82/0x180
[   14.343465]  ? preempt_count_sub+0x50/0x80
[   14.343489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.343512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.343539]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.343565]  kthread+0x337/0x6f0
[   14.343585]  ? trace_preempt_on+0x20/0xc0
[   14.343622]  ? __pfx_kthread+0x10/0x10
[   14.343645]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.343669]  ? calculate_sigpending+0x7b/0xa0
[   14.343693]  ? __pfx_kthread+0x10/0x10
[   14.343716]  ret_from_fork+0x116/0x1d0
[   14.343737]  ? __pfx_kthread+0x10/0x10
[   14.343760]  ret_from_fork_asm+0x1a/0x30
[   14.343804]  </TASK>
[   14.343815] 
[   14.351451] Allocated by task 282:
[   14.351622]  kasan_save_stack+0x45/0x70
[   14.351846]  kasan_save_track+0x18/0x40
[   14.351999]  kasan_save_alloc_info+0x3b/0x50
[   14.352212]  __kasan_kmalloc+0xb7/0xc0
[   14.352385]  __kmalloc_cache_noprof+0x189/0x420
[   14.352546]  kasan_atomics+0x95/0x310
[   14.352694]  kunit_try_run_case+0x1a5/0x480
[   14.352845]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.353029]  kthread+0x337/0x6f0
[   14.353156]  ret_from_fork+0x116/0x1d0
[   14.353296]  ret_from_fork_asm+0x1a/0x30
[   14.353440] 
[   14.353516] The buggy address belongs to the object at ffff888102fa7d80
[   14.353516]  which belongs to the cache kmalloc-64 of size 64
[   14.354189] The buggy address is located 0 bytes to the right of
[   14.354189]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.354777] 
[   14.354877] The buggy address belongs to the physical page:
[   14.355134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.355451] flags: 0x200000000000000(node=0|zone=2)
[   14.355628] page_type: f5(slab)
[   14.355752] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.355990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.356223] page dumped because: kasan: bad access detected
[   14.356401] 
[   14.356474] Memory state around the buggy address:
[   14.356722]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.357402]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.357742] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.358073]                                      ^
[   14.358304]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.358657]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.359121] ==================================================================
[   14.088896] ==================================================================
[   14.089336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.089781] Read of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.090250] 
[   14.090435] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.090481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.090494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.090516] Call Trace:
[   14.090538]  <TASK>
[   14.090553]  dump_stack_lvl+0x73/0xb0
[   14.090578]  print_report+0xd1/0x650
[   14.090602]  ? __virt_addr_valid+0x1db/0x2d0
[   14.090636]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.090660]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.090684]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.090707]  kasan_report+0x141/0x180
[   14.090731]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.090796]  kasan_check_range+0x10c/0x1c0
[   14.090821]  __kasan_check_read+0x15/0x20
[   14.090842]  kasan_atomics_helper+0x13b5/0x5450
[   14.090867]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.090891]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.090913]  ? kasan_atomics+0x152/0x310
[   14.090938]  kasan_atomics+0x1dc/0x310
[   14.090959]  ? __pfx_kasan_atomics+0x10/0x10
[   14.090981]  ? __pfx_read_tsc+0x10/0x10
[   14.091004]  ? ktime_get_ts64+0x86/0x230
[   14.091030]  kunit_try_run_case+0x1a5/0x480
[   14.091053]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.091074]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.091100]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.091126]  ? __kthread_parkme+0x82/0x180
[   14.091149]  ? preempt_count_sub+0x50/0x80
[   14.091174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.091196]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.091221]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.091248]  kthread+0x337/0x6f0
[   14.091269]  ? trace_preempt_on+0x20/0xc0
[   14.091292]  ? __pfx_kthread+0x10/0x10
[   14.091314]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.091338]  ? calculate_sigpending+0x7b/0xa0
[   14.091363]  ? __pfx_kthread+0x10/0x10
[   14.091386]  ret_from_fork+0x116/0x1d0
[   14.091406]  ? __pfx_kthread+0x10/0x10
[   14.091428]  ret_from_fork_asm+0x1a/0x30
[   14.091459]  </TASK>
[   14.091470] 
[   14.099412] Allocated by task 282:
[   14.099646]  kasan_save_stack+0x45/0x70
[   14.099989]  kasan_save_track+0x18/0x40
[   14.100192]  kasan_save_alloc_info+0x3b/0x50
[   14.100408]  __kasan_kmalloc+0xb7/0xc0
[   14.100618]  __kmalloc_cache_noprof+0x189/0x420
[   14.100842]  kasan_atomics+0x95/0x310
[   14.101002]  kunit_try_run_case+0x1a5/0x480
[   14.101188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.101446]  kthread+0x337/0x6f0
[   14.101628]  ret_from_fork+0x116/0x1d0
[   14.101869]  ret_from_fork_asm+0x1a/0x30
[   14.102036] 
[   14.102139] The buggy address belongs to the object at ffff888102fa7d80
[   14.102139]  which belongs to the cache kmalloc-64 of size 64
[   14.102622] The buggy address is located 0 bytes to the right of
[   14.102622]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.103017] 
[   14.103094] The buggy address belongs to the physical page:
[   14.103274] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.103527] flags: 0x200000000000000(node=0|zone=2)
[   14.103815] page_type: f5(slab)
[   14.103991] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.104342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.104690] page dumped because: kasan: bad access detected
[   14.104970] 
[   14.105146] Memory state around the buggy address:
[   14.105424]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.105942]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.106521] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.106804]                                      ^
[   14.107032]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.107422]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.107656] ==================================================================
[   13.695228] ==================================================================
[   13.695512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   13.695856] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.696209] 
[   13.696302] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.696350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.696364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.696385] Call Trace:
[   13.696400]  <TASK>
[   13.696417]  dump_stack_lvl+0x73/0xb0
[   13.696443]  print_report+0xd1/0x650
[   13.696468]  ? __virt_addr_valid+0x1db/0x2d0
[   13.696492]  ? kasan_atomics_helper+0xac7/0x5450
[   13.696515]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.696539]  ? kasan_atomics_helper+0xac7/0x5450
[   13.696563]  kasan_report+0x141/0x180
[   13.696587]  ? kasan_atomics_helper+0xac7/0x5450
[   13.696627]  kasan_check_range+0x10c/0x1c0
[   13.696653]  __kasan_check_write+0x18/0x20
[   13.696674]  kasan_atomics_helper+0xac7/0x5450
[   13.696698]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.696723]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.696745]  ? kasan_atomics+0x152/0x310
[   13.696770]  kasan_atomics+0x1dc/0x310
[   13.696790]  ? __pfx_kasan_atomics+0x10/0x10
[   13.696811]  ? __pfx_read_tsc+0x10/0x10
[   13.696834]  ? ktime_get_ts64+0x86/0x230
[   13.696860]  kunit_try_run_case+0x1a5/0x480
[   13.696881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.696902]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.696928]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.696954]  ? __kthread_parkme+0x82/0x180
[   13.696976]  ? preempt_count_sub+0x50/0x80
[   13.697000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.697023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.697048]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.697075]  kthread+0x337/0x6f0
[   13.697096]  ? trace_preempt_on+0x20/0xc0
[   13.697119]  ? __pfx_kthread+0x10/0x10
[   13.697141]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.697164]  ? calculate_sigpending+0x7b/0xa0
[   13.697189]  ? __pfx_kthread+0x10/0x10
[   13.697229]  ret_from_fork+0x116/0x1d0
[   13.697249]  ? __pfx_kthread+0x10/0x10
[   13.697271]  ret_from_fork_asm+0x1a/0x30
[   13.697303]  </TASK>
[   13.697314] 
[   13.705814] Allocated by task 282:
[   13.705998]  kasan_save_stack+0x45/0x70
[   13.706176]  kasan_save_track+0x18/0x40
[   13.706321]  kasan_save_alloc_info+0x3b/0x50
[   13.706474]  __kasan_kmalloc+0xb7/0xc0
[   13.706686]  __kmalloc_cache_noprof+0x189/0x420
[   13.706915]  kasan_atomics+0x95/0x310
[   13.707242]  kunit_try_run_case+0x1a5/0x480
[   13.707553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.707750]  kthread+0x337/0x6f0
[   13.707878]  ret_from_fork+0x116/0x1d0
[   13.708074]  ret_from_fork_asm+0x1a/0x30
[   13.708429] 
[   13.708845] The buggy address belongs to the object at ffff888102fa7d80
[   13.708845]  which belongs to the cache kmalloc-64 of size 64
[   13.709386] The buggy address is located 0 bytes to the right of
[   13.709386]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.710020] 
[   13.710114] The buggy address belongs to the physical page:
[   13.710354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.710680] flags: 0x200000000000000(node=0|zone=2)
[   13.710975] page_type: f5(slab)
[   13.711099] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.711340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.711574] page dumped because: kasan: bad access detected
[   13.711836] 
[   13.711936] Memory state around the buggy address:
[   13.712165]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.712490]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.713081] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.713313]                                      ^
[   13.713484]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.713950]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.714277] ==================================================================
[   13.806445] ==================================================================
[   13.806985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   13.807601] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.808437] 
[   13.808843] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.808900] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.808915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.808938] Call Trace:
[   13.808954]  <TASK>
[   13.808970]  dump_stack_lvl+0x73/0xb0
[   13.809046]  print_report+0xd1/0x650
[   13.809071]  ? __virt_addr_valid+0x1db/0x2d0
[   13.809095]  ? kasan_atomics_helper+0xd47/0x5450
[   13.809117]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.809141]  ? kasan_atomics_helper+0xd47/0x5450
[   13.809164]  kasan_report+0x141/0x180
[   13.809188]  ? kasan_atomics_helper+0xd47/0x5450
[   13.809216]  kasan_check_range+0x10c/0x1c0
[   13.809241]  __kasan_check_write+0x18/0x20
[   13.809263]  kasan_atomics_helper+0xd47/0x5450
[   13.809287]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.809311]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.809333]  ? kasan_atomics+0x152/0x310
[   13.809357]  kasan_atomics+0x1dc/0x310
[   13.809377]  ? __pfx_kasan_atomics+0x10/0x10
[   13.809398]  ? __pfx_read_tsc+0x10/0x10
[   13.809420]  ? ktime_get_ts64+0x86/0x230
[   13.809445]  kunit_try_run_case+0x1a5/0x480
[   13.809468]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.809488]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.809513]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.809540]  ? __kthread_parkme+0x82/0x180
[   13.809560]  ? preempt_count_sub+0x50/0x80
[   13.809586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.809619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.809645]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.809671]  kthread+0x337/0x6f0
[   13.809692]  ? trace_preempt_on+0x20/0xc0
[   13.809714]  ? __pfx_kthread+0x10/0x10
[   13.809736]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.809767]  ? calculate_sigpending+0x7b/0xa0
[   13.809791]  ? __pfx_kthread+0x10/0x10
[   13.809832]  ret_from_fork+0x116/0x1d0
[   13.809854]  ? __pfx_kthread+0x10/0x10
[   13.809879]  ret_from_fork_asm+0x1a/0x30
[   13.809911]  </TASK>
[   13.809923] 
[   13.820288] Allocated by task 282:
[   13.820436]  kasan_save_stack+0x45/0x70
[   13.820661]  kasan_save_track+0x18/0x40
[   13.820862]  kasan_save_alloc_info+0x3b/0x50
[   13.821078]  __kasan_kmalloc+0xb7/0xc0
[   13.821453]  __kmalloc_cache_noprof+0x189/0x420
[   13.821706]  kasan_atomics+0x95/0x310
[   13.822012]  kunit_try_run_case+0x1a5/0x480
[   13.822173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.822443]  kthread+0x337/0x6f0
[   13.822642]  ret_from_fork+0x116/0x1d0
[   13.822932]  ret_from_fork_asm+0x1a/0x30
[   13.823102] 
[   13.823206] The buggy address belongs to the object at ffff888102fa7d80
[   13.823206]  which belongs to the cache kmalloc-64 of size 64
[   13.823707] The buggy address is located 0 bytes to the right of
[   13.823707]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.824391] 
[   13.824497] The buggy address belongs to the physical page:
[   13.824708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.824960] flags: 0x200000000000000(node=0|zone=2)
[   13.825204] page_type: f5(slab)
[   13.825533] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.825890] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.826275] page dumped because: kasan: bad access detected
[   13.826455] 
[   13.826529] Memory state around the buggy address:
[   13.827018]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.827368]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.827709] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.828085]                                      ^
[   13.828294]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.828585]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.828920] ==================================================================
[   13.332906] ==================================================================
[   13.333146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   13.333470] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.334430] 
[   13.334530] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.334668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.334681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.334703] Call Trace:
[   13.334718]  <TASK>
[   13.334734]  dump_stack_lvl+0x73/0xb0
[   13.334776]  print_report+0xd1/0x650
[   13.334799]  ? __virt_addr_valid+0x1db/0x2d0
[   13.334823]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.334846]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.334870]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.334893]  kasan_report+0x141/0x180
[   13.334917]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.335016]  __asan_report_load4_noabort+0x18/0x20
[   13.335041]  kasan_atomics_helper+0x4b88/0x5450
[   13.335064]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.335087]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.335109]  ? kasan_atomics+0x152/0x310
[   13.335132]  kasan_atomics+0x1dc/0x310
[   13.335151]  ? __pfx_kasan_atomics+0x10/0x10
[   13.335172]  ? __pfx_read_tsc+0x10/0x10
[   13.335194]  ? ktime_get_ts64+0x86/0x230
[   13.335218]  kunit_try_run_case+0x1a5/0x480
[   13.335239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.335259]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.335283]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.335308]  ? __kthread_parkme+0x82/0x180
[   13.335328]  ? preempt_count_sub+0x50/0x80
[   13.335352]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.335373]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.335398]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.335423]  kthread+0x337/0x6f0
[   13.335442]  ? trace_preempt_on+0x20/0xc0
[   13.335467]  ? __pfx_kthread+0x10/0x10
[   13.335488]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.335512]  ? calculate_sigpending+0x7b/0xa0
[   13.335537]  ? __pfx_kthread+0x10/0x10
[   13.335559]  ret_from_fork+0x116/0x1d0
[   13.335577]  ? __pfx_kthread+0x10/0x10
[   13.335598]  ret_from_fork_asm+0x1a/0x30
[   13.335640]  </TASK>
[   13.335650] 
[   13.346804] Allocated by task 282:
[   13.347057]  kasan_save_stack+0x45/0x70
[   13.347363]  kasan_save_track+0x18/0x40
[   13.347644]  kasan_save_alloc_info+0x3b/0x50
[   13.347981]  __kasan_kmalloc+0xb7/0xc0
[   13.348140]  __kmalloc_cache_noprof+0x189/0x420
[   13.348372]  kasan_atomics+0x95/0x310
[   13.348541]  kunit_try_run_case+0x1a5/0x480
[   13.348760]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.349383]  kthread+0x337/0x6f0
[   13.349564]  ret_from_fork+0x116/0x1d0
[   13.349745]  ret_from_fork_asm+0x1a/0x30
[   13.350228] 
[   13.350310] The buggy address belongs to the object at ffff888102fa7d80
[   13.350310]  which belongs to the cache kmalloc-64 of size 64
[   13.351012] The buggy address is located 0 bytes to the right of
[   13.351012]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.351731] 
[   13.352013] The buggy address belongs to the physical page:
[   13.352228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.352600] flags: 0x200000000000000(node=0|zone=2)
[   13.352870] page_type: f5(slab)
[   13.353018] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.353359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.354218] page dumped because: kasan: bad access detected
[   13.354575] 
[   13.354693] Memory state around the buggy address:
[   13.355142]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.355463]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.355988] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.356407]                                      ^
[   13.356734]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.357226]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.357544] ==================================================================
[   14.395344] ==================================================================
[   14.395627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   14.396168] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.396453] 
[   14.396566] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.396618] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.396631] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.396653] Call Trace:
[   14.396667]  <TASK>
[   14.396682]  dump_stack_lvl+0x73/0xb0
[   14.396707]  print_report+0xd1/0x650
[   14.396731]  ? __virt_addr_valid+0x1db/0x2d0
[   14.396754]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.396788]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.396812]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.396836]  kasan_report+0x141/0x180
[   14.396860]  ? kasan_atomics_helper+0x1c18/0x5450
[   14.396888]  kasan_check_range+0x10c/0x1c0
[   14.396914]  __kasan_check_write+0x18/0x20
[   14.396936]  kasan_atomics_helper+0x1c18/0x5450
[   14.396960]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.396985]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.397008]  ? kasan_atomics+0x152/0x310
[   14.397033]  kasan_atomics+0x1dc/0x310
[   14.397057]  ? __pfx_kasan_atomics+0x10/0x10
[   14.397081]  ? __pfx_read_tsc+0x10/0x10
[   14.397105]  ? ktime_get_ts64+0x86/0x230
[   14.397131]  kunit_try_run_case+0x1a5/0x480
[   14.397153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.397175]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.397201]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.397228]  ? __kthread_parkme+0x82/0x180
[   14.397250]  ? preempt_count_sub+0x50/0x80
[   14.397275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.397298]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.397326]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.397352]  kthread+0x337/0x6f0
[   14.397372]  ? trace_preempt_on+0x20/0xc0
[   14.397396]  ? __pfx_kthread+0x10/0x10
[   14.397419]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.397442]  ? calculate_sigpending+0x7b/0xa0
[   14.397467]  ? __pfx_kthread+0x10/0x10
[   14.397491]  ret_from_fork+0x116/0x1d0
[   14.397511]  ? __pfx_kthread+0x10/0x10
[   14.397533]  ret_from_fork_asm+0x1a/0x30
[   14.397565]  </TASK>
[   14.397576] 
[   14.407592] Allocated by task 282:
[   14.408021]  kasan_save_stack+0x45/0x70
[   14.408281]  kasan_save_track+0x18/0x40
[   14.408589]  kasan_save_alloc_info+0x3b/0x50
[   14.409066]  __kasan_kmalloc+0xb7/0xc0
[   14.409268]  __kmalloc_cache_noprof+0x189/0x420
[   14.409467]  kasan_atomics+0x95/0x310
[   14.409653]  kunit_try_run_case+0x1a5/0x480
[   14.410038]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.410458]  kthread+0x337/0x6f0
[   14.410771]  ret_from_fork+0x116/0x1d0
[   14.411191]  ret_from_fork_asm+0x1a/0x30
[   14.411415] 
[   14.411512] The buggy address belongs to the object at ffff888102fa7d80
[   14.411512]  which belongs to the cache kmalloc-64 of size 64
[   14.412337] The buggy address is located 0 bytes to the right of
[   14.412337]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.413119] 
[   14.413223] The buggy address belongs to the physical page:
[   14.413464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.414060] flags: 0x200000000000000(node=0|zone=2)
[   14.414332] page_type: f5(slab)
[   14.414740] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.415222] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.415676] page dumped because: kasan: bad access detected
[   14.416104] 
[   14.416331] Memory state around the buggy address:
[   14.416679]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.417151]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.417458] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.417749]                                      ^
[   14.418238]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.418735]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.419246] ==================================================================
[   14.483352] ==================================================================
[   14.483631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   14.483994] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.484306] 
[   14.484427] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.484474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.484488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.484510] Call Trace:
[   14.484525]  <TASK>
[   14.484541]  dump_stack_lvl+0x73/0xb0
[   14.484567]  print_report+0xd1/0x650
[   14.484591]  ? __virt_addr_valid+0x1db/0x2d0
[   14.484625]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.484648]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.484673]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.484696]  kasan_report+0x141/0x180
[   14.484719]  ? kasan_atomics_helper+0x1e12/0x5450
[   14.484747]  kasan_check_range+0x10c/0x1c0
[   14.484772]  __kasan_check_write+0x18/0x20
[   14.484793]  kasan_atomics_helper+0x1e12/0x5450
[   14.484818]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.484844]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.484866]  ? kasan_atomics+0x152/0x310
[   14.484891]  kasan_atomics+0x1dc/0x310
[   14.484911]  ? __pfx_kasan_atomics+0x10/0x10
[   14.484934]  ? __pfx_read_tsc+0x10/0x10
[   14.484955]  ? ktime_get_ts64+0x86/0x230
[   14.484981]  kunit_try_run_case+0x1a5/0x480
[   14.485002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.485023]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.485048]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.485074]  ? __kthread_parkme+0x82/0x180
[   14.485096]  ? preempt_count_sub+0x50/0x80
[   14.485121]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.485143]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.485169]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.485196]  kthread+0x337/0x6f0
[   14.485216]  ? trace_preempt_on+0x20/0xc0
[   14.485240]  ? __pfx_kthread+0x10/0x10
[   14.485261]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.485285]  ? calculate_sigpending+0x7b/0xa0
[   14.485309]  ? __pfx_kthread+0x10/0x10
[   14.485332]  ret_from_fork+0x116/0x1d0
[   14.485351]  ? __pfx_kthread+0x10/0x10
[   14.485373]  ret_from_fork_asm+0x1a/0x30
[   14.485403]  </TASK>
[   14.485414] 
[   14.494864] Allocated by task 282:
[   14.495061]  kasan_save_stack+0x45/0x70
[   14.495273]  kasan_save_track+0x18/0x40
[   14.495473]  kasan_save_alloc_info+0x3b/0x50
[   14.495648]  __kasan_kmalloc+0xb7/0xc0
[   14.495798]  __kmalloc_cache_noprof+0x189/0x420
[   14.496044]  kasan_atomics+0x95/0x310
[   14.496233]  kunit_try_run_case+0x1a5/0x480
[   14.496430]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.496625]  kthread+0x337/0x6f0
[   14.496750]  ret_from_fork+0x116/0x1d0
[   14.496942]  ret_from_fork_asm+0x1a/0x30
[   14.497225] 
[   14.497324] The buggy address belongs to the object at ffff888102fa7d80
[   14.497324]  which belongs to the cache kmalloc-64 of size 64
[   14.497803] The buggy address is located 0 bytes to the right of
[   14.497803]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.498711] 
[   14.498833] The buggy address belongs to the physical page:
[   14.499096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.499531] flags: 0x200000000000000(node=0|zone=2)
[   14.499827] page_type: f5(slab)
[   14.500042] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.500366] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.500735] page dumped because: kasan: bad access detected
[   14.501019] 
[   14.501090] Memory state around the buggy address:
[   14.501249]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.501572]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.501921] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.502184]                                      ^
[   14.502345]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.502617]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.503150] ==================================================================
[   13.910397] ==================================================================
[   13.910913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   13.911237] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.911525] 
[   13.911655] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.911703] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.911717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.911917] Call Trace:
[   13.911940]  <TASK>
[   13.911957]  dump_stack_lvl+0x73/0xb0
[   13.911986]  print_report+0xd1/0x650
[   13.912010]  ? __virt_addr_valid+0x1db/0x2d0
[   13.912033]  ? kasan_atomics_helper+0x4a36/0x5450
[   13.912056]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.912080]  ? kasan_atomics_helper+0x4a36/0x5450
[   13.912104]  kasan_report+0x141/0x180
[   13.912128]  ? kasan_atomics_helper+0x4a36/0x5450
[   13.912156]  __asan_report_load4_noabort+0x18/0x20
[   13.912179]  kasan_atomics_helper+0x4a36/0x5450
[   13.912203]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.912228]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.912250]  ? kasan_atomics+0x152/0x310
[   13.912275]  kasan_atomics+0x1dc/0x310
[   13.912295]  ? __pfx_kasan_atomics+0x10/0x10
[   13.912317]  ? __pfx_read_tsc+0x10/0x10
[   13.912339]  ? ktime_get_ts64+0x86/0x230
[   13.912365]  kunit_try_run_case+0x1a5/0x480
[   13.912387]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.912408]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.912434]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.912461]  ? __kthread_parkme+0x82/0x180
[   13.912483]  ? preempt_count_sub+0x50/0x80
[   13.912507]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.912531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.912556]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.912583]  kthread+0x337/0x6f0
[   13.912604]  ? trace_preempt_on+0x20/0xc0
[   13.912645]  ? __pfx_kthread+0x10/0x10
[   13.912667]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.912691]  ? calculate_sigpending+0x7b/0xa0
[   13.912717]  ? __pfx_kthread+0x10/0x10
[   13.912838]  ret_from_fork+0x116/0x1d0
[   13.912864]  ? __pfx_kthread+0x10/0x10
[   13.912886]  ret_from_fork_asm+0x1a/0x30
[   13.912919]  </TASK>
[   13.912931] 
[   13.921508] Allocated by task 282:
[   13.921713]  kasan_save_stack+0x45/0x70
[   13.922001]  kasan_save_track+0x18/0x40
[   13.922207]  kasan_save_alloc_info+0x3b/0x50
[   13.922373]  __kasan_kmalloc+0xb7/0xc0
[   13.922585]  __kmalloc_cache_noprof+0x189/0x420
[   13.922949]  kasan_atomics+0x95/0x310
[   13.923150]  kunit_try_run_case+0x1a5/0x480
[   13.923365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.923597]  kthread+0x337/0x6f0
[   13.924031]  ret_from_fork+0x116/0x1d0
[   13.924235]  ret_from_fork_asm+0x1a/0x30
[   13.924457] 
[   13.924544] The buggy address belongs to the object at ffff888102fa7d80
[   13.924544]  which belongs to the cache kmalloc-64 of size 64
[   13.925220] The buggy address is located 0 bytes to the right of
[   13.925220]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.925851] 
[   13.925982] The buggy address belongs to the physical page:
[   13.926269] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.926569] flags: 0x200000000000000(node=0|zone=2)
[   13.926964] page_type: f5(slab)
[   13.927162] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.927396] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.927973] page dumped because: kasan: bad access detected
[   13.928233] 
[   13.928307] Memory state around the buggy address:
[   13.928501]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.928826]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.929111] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.929879]                                      ^
[   13.930108]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.930329]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.930550] ==================================================================
[   13.436926] ==================================================================
[   13.437264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   13.438264] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.438556] 
[   13.438661] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.438707] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.438721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.438744] Call Trace:
[   13.439119]  <TASK>
[   13.439140]  dump_stack_lvl+0x73/0xb0
[   13.439172]  print_report+0xd1/0x650
[   13.439196]  ? __virt_addr_valid+0x1db/0x2d0
[   13.439220]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.439243]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.439268]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.439290]  kasan_report+0x141/0x180
[   13.439315]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.439342]  kasan_check_range+0x10c/0x1c0
[   13.439367]  __kasan_check_write+0x18/0x20
[   13.439389]  kasan_atomics_helper+0x4a0/0x5450
[   13.439413]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.439439]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.439461]  ? kasan_atomics+0x152/0x310
[   13.439485]  kasan_atomics+0x1dc/0x310
[   13.439506]  ? __pfx_kasan_atomics+0x10/0x10
[   13.439528]  ? __pfx_read_tsc+0x10/0x10
[   13.439550]  ? ktime_get_ts64+0x86/0x230
[   13.439575]  kunit_try_run_case+0x1a5/0x480
[   13.439598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.439633]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.439660]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.439686]  ? __kthread_parkme+0x82/0x180
[   13.439709]  ? preempt_count_sub+0x50/0x80
[   13.439734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.439830]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.439860]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.439887]  kthread+0x337/0x6f0
[   13.439908]  ? trace_preempt_on+0x20/0xc0
[   13.439933]  ? __pfx_kthread+0x10/0x10
[   13.439955]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.439979]  ? calculate_sigpending+0x7b/0xa0
[   13.440004]  ? __pfx_kthread+0x10/0x10
[   13.440027]  ret_from_fork+0x116/0x1d0
[   13.440047]  ? __pfx_kthread+0x10/0x10
[   13.440069]  ret_from_fork_asm+0x1a/0x30
[   13.440101]  </TASK>
[   13.440114] 
[   13.451451] Allocated by task 282:
[   13.451842]  kasan_save_stack+0x45/0x70
[   13.452214]  kasan_save_track+0x18/0x40
[   13.452408]  kasan_save_alloc_info+0x3b/0x50
[   13.452627]  __kasan_kmalloc+0xb7/0xc0
[   13.453031]  __kmalloc_cache_noprof+0x189/0x420
[   13.453257]  kasan_atomics+0x95/0x310
[   13.453568]  kunit_try_run_case+0x1a5/0x480
[   13.453793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.454370]  kthread+0x337/0x6f0
[   13.454551]  ret_from_fork+0x116/0x1d0
[   13.454955]  ret_from_fork_asm+0x1a/0x30
[   13.455313] 
[   13.455422] The buggy address belongs to the object at ffff888102fa7d80
[   13.455422]  which belongs to the cache kmalloc-64 of size 64
[   13.456225] The buggy address is located 0 bytes to the right of
[   13.456225]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.457014] 
[   13.457109] The buggy address belongs to the physical page:
[   13.457359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.457833] flags: 0x200000000000000(node=0|zone=2)
[   13.458055] page_type: f5(slab)
[   13.458274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.458995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.459337] page dumped because: kasan: bad access detected
[   13.459581] 
[   13.459678] Memory state around the buggy address:
[   13.460190]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.460560]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.461029] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.461409]                                      ^
[   13.461621]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.462295]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.462574] ==================================================================
[   13.463407] ==================================================================
[   13.463812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   13.464122] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.464428] 
[   13.464534] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.464580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.464593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.464627] Call Trace:
[   13.464643]  <TASK>
[   13.464659]  dump_stack_lvl+0x73/0xb0
[   13.464685]  print_report+0xd1/0x650
[   13.464707]  ? __virt_addr_valid+0x1db/0x2d0
[   13.464731]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.464820]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.464847]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.464871]  kasan_report+0x141/0x180
[   13.464895]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.464931]  __asan_report_store4_noabort+0x1b/0x30
[   13.464953]  kasan_atomics_helper+0x4b3a/0x5450
[   13.464977]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.465002]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.465025]  ? kasan_atomics+0x152/0x310
[   13.465048]  kasan_atomics+0x1dc/0x310
[   13.465069]  ? __pfx_kasan_atomics+0x10/0x10
[   13.465090]  ? __pfx_read_tsc+0x10/0x10
[   13.465113]  ? ktime_get_ts64+0x86/0x230
[   13.465139]  kunit_try_run_case+0x1a5/0x480
[   13.465163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.465184]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.465209]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.465236]  ? __kthread_parkme+0x82/0x180
[   13.465257]  ? preempt_count_sub+0x50/0x80
[   13.465282]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.465305]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.465329]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.465356]  kthread+0x337/0x6f0
[   13.465377]  ? trace_preempt_on+0x20/0xc0
[   13.465401]  ? __pfx_kthread+0x10/0x10
[   13.465423]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.465447]  ? calculate_sigpending+0x7b/0xa0
[   13.465472]  ? __pfx_kthread+0x10/0x10
[   13.465495]  ret_from_fork+0x116/0x1d0
[   13.465514]  ? __pfx_kthread+0x10/0x10
[   13.465536]  ret_from_fork_asm+0x1a/0x30
[   13.465568]  </TASK>
[   13.465581] 
[   13.473872] Allocated by task 282:
[   13.474063]  kasan_save_stack+0x45/0x70
[   13.474273]  kasan_save_track+0x18/0x40
[   13.474464]  kasan_save_alloc_info+0x3b/0x50
[   13.474634]  __kasan_kmalloc+0xb7/0xc0
[   13.475066]  __kmalloc_cache_noprof+0x189/0x420
[   13.475315]  kasan_atomics+0x95/0x310
[   13.475507]  kunit_try_run_case+0x1a5/0x480
[   13.475679]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.475863]  kthread+0x337/0x6f0
[   13.476026]  ret_from_fork+0x116/0x1d0
[   13.476319]  ret_from_fork_asm+0x1a/0x30
[   13.476646] 
[   13.476727] The buggy address belongs to the object at ffff888102fa7d80
[   13.476727]  which belongs to the cache kmalloc-64 of size 64
[   13.477384] The buggy address is located 0 bytes to the right of
[   13.477384]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.477790] 
[   13.477928] The buggy address belongs to the physical page:
[   13.478200] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.478574] flags: 0x200000000000000(node=0|zone=2)
[   13.479061] page_type: f5(slab)
[   13.479330] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.479680] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.480016] page dumped because: kasan: bad access detected
[   13.480340] 
[   13.480420] Memory state around the buggy address:
[   13.480645]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.480965]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.481210] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.481532]                                      ^
[   13.481739]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.482142]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.482484] ==================================================================
[   13.829487] ==================================================================
[   13.830044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   13.830372] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.830660] 
[   13.830943] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.830996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.831010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.831033] Call Trace:
[   13.831051]  <TASK>
[   13.831069]  dump_stack_lvl+0x73/0xb0
[   13.831097]  print_report+0xd1/0x650
[   13.831120]  ? __virt_addr_valid+0x1db/0x2d0
[   13.831143]  ? kasan_atomics_helper+0xde0/0x5450
[   13.831167]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.831192]  ? kasan_atomics_helper+0xde0/0x5450
[   13.831216]  kasan_report+0x141/0x180
[   13.831241]  ? kasan_atomics_helper+0xde0/0x5450
[   13.831269]  kasan_check_range+0x10c/0x1c0
[   13.831294]  __kasan_check_write+0x18/0x20
[   13.831316]  kasan_atomics_helper+0xde0/0x5450
[   13.831340]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.831364]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.831388]  ? kasan_atomics+0x152/0x310
[   13.831412]  kasan_atomics+0x1dc/0x310
[   13.831432]  ? __pfx_kasan_atomics+0x10/0x10
[   13.831455]  ? __pfx_read_tsc+0x10/0x10
[   13.831477]  ? ktime_get_ts64+0x86/0x230
[   13.831503]  kunit_try_run_case+0x1a5/0x480
[   13.831525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.831546]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.831572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.831598]  ? __kthread_parkme+0x82/0x180
[   13.831636]  ? preempt_count_sub+0x50/0x80
[   13.831661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.831684]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.831709]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.831736]  kthread+0x337/0x6f0
[   13.831827]  ? trace_preempt_on+0x20/0xc0
[   13.831854]  ? __pfx_kthread+0x10/0x10
[   13.831877]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.831900]  ? calculate_sigpending+0x7b/0xa0
[   13.831925]  ? __pfx_kthread+0x10/0x10
[   13.831949]  ret_from_fork+0x116/0x1d0
[   13.831968]  ? __pfx_kthread+0x10/0x10
[   13.831990]  ret_from_fork_asm+0x1a/0x30
[   13.832022]  </TASK>
[   13.832033] 
[   13.840824] Allocated by task 282:
[   13.840968]  kasan_save_stack+0x45/0x70
[   13.841289]  kasan_save_track+0x18/0x40
[   13.841629]  kasan_save_alloc_info+0x3b/0x50
[   13.841880]  __kasan_kmalloc+0xb7/0xc0
[   13.842047]  __kmalloc_cache_noprof+0x189/0x420
[   13.842249]  kasan_atomics+0x95/0x310
[   13.842394]  kunit_try_run_case+0x1a5/0x480
[   13.842619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.843064]  kthread+0x337/0x6f0
[   13.843246]  ret_from_fork+0x116/0x1d0
[   13.843442]  ret_from_fork_asm+0x1a/0x30
[   13.843627] 
[   13.843727] The buggy address belongs to the object at ffff888102fa7d80
[   13.843727]  which belongs to the cache kmalloc-64 of size 64
[   13.844199] The buggy address is located 0 bytes to the right of
[   13.844199]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.844597] 
[   13.844706] The buggy address belongs to the physical page:
[   13.845028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.845401] flags: 0x200000000000000(node=0|zone=2)
[   13.845590] page_type: f5(slab)
[   13.845729] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.846373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.846749] page dumped because: kasan: bad access detected
[   13.847162] 
[   13.847249] Memory state around the buggy address:
[   13.847449]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.847688]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.847983] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.848305]                                      ^
[   13.848543]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.849033]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.849445] ==================================================================
[   14.011563] ==================================================================
[   14.012089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   14.012389] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.012711] 
[   14.012944] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.012993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.013007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.013027] Call Trace:
[   14.013043]  <TASK>
[   14.013058]  dump_stack_lvl+0x73/0xb0
[   14.013085]  print_report+0xd1/0x650
[   14.013109]  ? __virt_addr_valid+0x1db/0x2d0
[   14.013132]  ? kasan_atomics_helper+0x1217/0x5450
[   14.013155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.013180]  ? kasan_atomics_helper+0x1217/0x5450
[   14.013204]  kasan_report+0x141/0x180
[   14.013228]  ? kasan_atomics_helper+0x1217/0x5450
[   14.013256]  kasan_check_range+0x10c/0x1c0
[   14.013281]  __kasan_check_write+0x18/0x20
[   14.013302]  kasan_atomics_helper+0x1217/0x5450
[   14.013327]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.013351]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.013374]  ? kasan_atomics+0x152/0x310
[   14.013398]  kasan_atomics+0x1dc/0x310
[   14.013419]  ? __pfx_kasan_atomics+0x10/0x10
[   14.013441]  ? __pfx_read_tsc+0x10/0x10
[   14.013463]  ? ktime_get_ts64+0x86/0x230
[   14.013488]  kunit_try_run_case+0x1a5/0x480
[   14.013512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.013533]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.013559]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.013585]  ? __kthread_parkme+0x82/0x180
[   14.013620]  ? preempt_count_sub+0x50/0x80
[   14.013645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.013667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.013693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.013719]  kthread+0x337/0x6f0
[   14.013815]  ? trace_preempt_on+0x20/0xc0
[   14.013843]  ? __pfx_kthread+0x10/0x10
[   14.013866]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.013891]  ? calculate_sigpending+0x7b/0xa0
[   14.013916]  ? __pfx_kthread+0x10/0x10
[   14.013940]  ret_from_fork+0x116/0x1d0
[   14.013960]  ? __pfx_kthread+0x10/0x10
[   14.013982]  ret_from_fork_asm+0x1a/0x30
[   14.014014]  </TASK>
[   14.014026] 
[   14.022412] Allocated by task 282:
[   14.022592]  kasan_save_stack+0x45/0x70
[   14.022914]  kasan_save_track+0x18/0x40
[   14.023098]  kasan_save_alloc_info+0x3b/0x50
[   14.023285]  __kasan_kmalloc+0xb7/0xc0
[   14.023477]  __kmalloc_cache_noprof+0x189/0x420
[   14.023680]  kasan_atomics+0x95/0x310
[   14.024073]  kunit_try_run_case+0x1a5/0x480
[   14.024294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.024527]  kthread+0x337/0x6f0
[   14.024669]  ret_from_fork+0x116/0x1d0
[   14.024996]  ret_from_fork_asm+0x1a/0x30
[   14.025183] 
[   14.025279] The buggy address belongs to the object at ffff888102fa7d80
[   14.025279]  which belongs to the cache kmalloc-64 of size 64
[   14.025855] The buggy address is located 0 bytes to the right of
[   14.025855]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.026291] 
[   14.026369] The buggy address belongs to the physical page:
[   14.026555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.027032] flags: 0x200000000000000(node=0|zone=2)
[   14.027278] page_type: f5(slab)
[   14.027451] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.027980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.028304] page dumped because: kasan: bad access detected
[   14.028507] 
[   14.028581] Memory state around the buggy address:
[   14.028802]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.029136]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.029468] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.029948]                                      ^
[   14.030177]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.030450]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.030877] ==================================================================
[   14.186517] ==================================================================
[   14.186910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.187253] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.187542] 
[   14.187673] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.187719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.187732] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.187755] Call Trace:
[   14.187771]  <TASK>
[   14.187787]  dump_stack_lvl+0x73/0xb0
[   14.187815]  print_report+0xd1/0x650
[   14.187838]  ? __virt_addr_valid+0x1db/0x2d0
[   14.187862]  ? kasan_atomics_helper+0x151d/0x5450
[   14.187885]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.187910]  ? kasan_atomics_helper+0x151d/0x5450
[   14.187933]  kasan_report+0x141/0x180
[   14.187957]  ? kasan_atomics_helper+0x151d/0x5450
[   14.187985]  kasan_check_range+0x10c/0x1c0
[   14.188011]  __kasan_check_write+0x18/0x20
[   14.188033]  kasan_atomics_helper+0x151d/0x5450
[   14.188058]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.188082]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.188105]  ? kasan_atomics+0x152/0x310
[   14.188129]  kasan_atomics+0x1dc/0x310
[   14.188149]  ? __pfx_kasan_atomics+0x10/0x10
[   14.188171]  ? __pfx_read_tsc+0x10/0x10
[   14.188194]  ? ktime_get_ts64+0x86/0x230
[   14.188220]  kunit_try_run_case+0x1a5/0x480
[   14.188242]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.188263]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.188290]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.188316]  ? __kthread_parkme+0x82/0x180
[   14.188338]  ? preempt_count_sub+0x50/0x80
[   14.188362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.188384]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.188409]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.188434]  kthread+0x337/0x6f0
[   14.188455]  ? trace_preempt_on+0x20/0xc0
[   14.188479]  ? __pfx_kthread+0x10/0x10
[   14.188501]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.188524]  ? calculate_sigpending+0x7b/0xa0
[   14.188549]  ? __pfx_kthread+0x10/0x10
[   14.188572]  ret_from_fork+0x116/0x1d0
[   14.188592]  ? __pfx_kthread+0x10/0x10
[   14.188622]  ret_from_fork_asm+0x1a/0x30
[   14.188654]  </TASK>
[   14.188665] 
[   14.196091] Allocated by task 282:
[   14.196226]  kasan_save_stack+0x45/0x70
[   14.196376]  kasan_save_track+0x18/0x40
[   14.196640]  kasan_save_alloc_info+0x3b/0x50
[   14.196859]  __kasan_kmalloc+0xb7/0xc0
[   14.197069]  __kmalloc_cache_noprof+0x189/0x420
[   14.197274]  kasan_atomics+0x95/0x310
[   14.197410]  kunit_try_run_case+0x1a5/0x480
[   14.197561]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.197763]  kthread+0x337/0x6f0
[   14.197947]  ret_from_fork+0x116/0x1d0
[   14.198143]  ret_from_fork_asm+0x1a/0x30
[   14.198345] 
[   14.198446] The buggy address belongs to the object at ffff888102fa7d80
[   14.198446]  which belongs to the cache kmalloc-64 of size 64
[   14.199233] The buggy address is located 0 bytes to the right of
[   14.199233]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.199721] 
[   14.199868] The buggy address belongs to the physical page:
[   14.200078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.200377] flags: 0x200000000000000(node=0|zone=2)
[   14.200546] page_type: f5(slab)
[   14.200731] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.201306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.201573] page dumped because: kasan: bad access detected
[   14.201762] 
[   14.201836] Memory state around the buggy address:
[   14.201998]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.202410]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.202745] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.203418]                                      ^
[   14.203659]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.203921]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.204149] ==================================================================
[   14.241992] ==================================================================
[   14.242436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.242987] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.243328] 
[   14.243423] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.243471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.243485] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.243508] Call Trace:
[   14.243525]  <TASK>
[   14.243542]  dump_stack_lvl+0x73/0xb0
[   14.243568]  print_report+0xd1/0x650
[   14.243592]  ? __virt_addr_valid+0x1db/0x2d0
[   14.243627]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.243651]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.243676]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.243701]  kasan_report+0x141/0x180
[   14.243725]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.243754]  kasan_check_range+0x10c/0x1c0
[   14.243791]  __kasan_check_write+0x18/0x20
[   14.243813]  kasan_atomics_helper+0x16e7/0x5450
[   14.243839]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.243864]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.243887]  ? kasan_atomics+0x152/0x310
[   14.243912]  kasan_atomics+0x1dc/0x310
[   14.243934]  ? __pfx_kasan_atomics+0x10/0x10
[   14.243956]  ? __pfx_read_tsc+0x10/0x10
[   14.243979]  ? ktime_get_ts64+0x86/0x230
[   14.244006]  kunit_try_run_case+0x1a5/0x480
[   14.244030]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.244052]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.244078]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.244104]  ? __kthread_parkme+0x82/0x180
[   14.244127]  ? preempt_count_sub+0x50/0x80
[   14.244153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.244176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.244203]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.244229]  kthread+0x337/0x6f0
[   14.244251]  ? trace_preempt_on+0x20/0xc0
[   14.244276]  ? __pfx_kthread+0x10/0x10
[   14.244299]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.244323]  ? calculate_sigpending+0x7b/0xa0
[   14.244349]  ? __pfx_kthread+0x10/0x10
[   14.244372]  ret_from_fork+0x116/0x1d0
[   14.244393]  ? __pfx_kthread+0x10/0x10
[   14.244416]  ret_from_fork_asm+0x1a/0x30
[   14.244449]  </TASK>
[   14.244460] 
[   14.252054] Allocated by task 282:
[   14.252246]  kasan_save_stack+0x45/0x70
[   14.252441]  kasan_save_track+0x18/0x40
[   14.252650]  kasan_save_alloc_info+0x3b/0x50
[   14.252866]  __kasan_kmalloc+0xb7/0xc0
[   14.253050]  __kmalloc_cache_noprof+0x189/0x420
[   14.253279]  kasan_atomics+0x95/0x310
[   14.253454]  kunit_try_run_case+0x1a5/0x480
[   14.253629]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.253854]  kthread+0x337/0x6f0
[   14.254031]  ret_from_fork+0x116/0x1d0
[   14.254224]  ret_from_fork_asm+0x1a/0x30
[   14.254436] 
[   14.254539] The buggy address belongs to the object at ffff888102fa7d80
[   14.254539]  which belongs to the cache kmalloc-64 of size 64
[   14.255044] The buggy address is located 0 bytes to the right of
[   14.255044]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.255533] 
[   14.255640] The buggy address belongs to the physical page:
[   14.255890] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.256143] flags: 0x200000000000000(node=0|zone=2)
[   14.256313] page_type: f5(slab)
[   14.256440] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.256724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.257210] page dumped because: kasan: bad access detected
[   14.257468] 
[   14.257570] Memory state around the buggy address:
[   14.257877]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.258105]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.258329] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.258556]                                      ^
[   14.258930]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.259264]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.259595] ==================================================================
[   14.540641] ==================================================================
[   14.541104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   14.541438] Read of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.541708] 
[   14.541860] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.541907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.541921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.541942] Call Trace:
[   14.541959]  <TASK>
[   14.541976]  dump_stack_lvl+0x73/0xb0
[   14.542001]  print_report+0xd1/0x650
[   14.542024]  ? __virt_addr_valid+0x1db/0x2d0
[   14.542048]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.542071]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.542097]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.542122]  kasan_report+0x141/0x180
[   14.542146]  ? kasan_atomics_helper+0x4f71/0x5450
[   14.542175]  __asan_report_load8_noabort+0x18/0x20
[   14.542198]  kasan_atomics_helper+0x4f71/0x5450
[   14.542223]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.542250]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.542274]  ? kasan_atomics+0x152/0x310
[   14.542299]  kasan_atomics+0x1dc/0x310
[   14.542320]  ? __pfx_kasan_atomics+0x10/0x10
[   14.542363]  ? __pfx_read_tsc+0x10/0x10
[   14.542387]  ? ktime_get_ts64+0x86/0x230
[   14.542413]  kunit_try_run_case+0x1a5/0x480
[   14.542436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.542457]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.542483]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.542510]  ? __kthread_parkme+0x82/0x180
[   14.542536]  ? preempt_count_sub+0x50/0x80
[   14.542561]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.542584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.542619]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.542645]  kthread+0x337/0x6f0
[   14.542666]  ? trace_preempt_on+0x20/0xc0
[   14.542689]  ? __pfx_kthread+0x10/0x10
[   14.542711]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.542734]  ? calculate_sigpending+0x7b/0xa0
[   14.542759]  ? __pfx_kthread+0x10/0x10
[   14.542781]  ret_from_fork+0x116/0x1d0
[   14.542801]  ? __pfx_kthread+0x10/0x10
[   14.542823]  ret_from_fork_asm+0x1a/0x30
[   14.542855]  </TASK>
[   14.542866] 
[   14.550529] Allocated by task 282:
[   14.550744]  kasan_save_stack+0x45/0x70
[   14.550949]  kasan_save_track+0x18/0x40
[   14.551239]  kasan_save_alloc_info+0x3b/0x50
[   14.551438]  __kasan_kmalloc+0xb7/0xc0
[   14.551578]  __kmalloc_cache_noprof+0x189/0x420
[   14.551745]  kasan_atomics+0x95/0x310
[   14.551946]  kunit_try_run_case+0x1a5/0x480
[   14.552180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.552443]  kthread+0x337/0x6f0
[   14.552644]  ret_from_fork+0x116/0x1d0
[   14.552849]  ret_from_fork_asm+0x1a/0x30
[   14.553026] 
[   14.553146] The buggy address belongs to the object at ffff888102fa7d80
[   14.553146]  which belongs to the cache kmalloc-64 of size 64
[   14.553551] The buggy address is located 0 bytes to the right of
[   14.553551]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.554031] 
[   14.554130] The buggy address belongs to the physical page:
[   14.554387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.554941] flags: 0x200000000000000(node=0|zone=2)
[   14.555113] page_type: f5(slab)
[   14.555265] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.555624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.556086] page dumped because: kasan: bad access detected
[   14.556341] 
[   14.556438] Memory state around the buggy address:
[   14.556656]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.556962]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.557187] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.557507]                                      ^
[   14.557769]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.558047]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.558293] ==================================================================
[   13.285451] ==================================================================
[   13.286079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   13.286730] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.287967] 
[   13.288073] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.288124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.288137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.288160] Call Trace:
[   13.288174]  <TASK>
[   13.288190]  dump_stack_lvl+0x73/0xb0
[   13.288221]  print_report+0xd1/0x650
[   13.288244]  ? __virt_addr_valid+0x1db/0x2d0
[   13.288268]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.288290]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.288313]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.288336]  kasan_report+0x141/0x180
[   13.288358]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.288385]  __asan_report_load4_noabort+0x18/0x20
[   13.288406]  kasan_atomics_helper+0x4bbc/0x5450
[   13.288429]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.288452]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.288474]  ? kasan_atomics+0x152/0x310
[   13.288497]  kasan_atomics+0x1dc/0x310
[   13.288516]  ? __pfx_kasan_atomics+0x10/0x10
[   13.288537]  ? __pfx_read_tsc+0x10/0x10
[   13.288559]  ? ktime_get_ts64+0x86/0x230
[   13.288585]  kunit_try_run_case+0x1a5/0x480
[   13.288607]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.288643]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.288668]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.288693]  ? __kthread_parkme+0x82/0x180
[   13.288713]  ? preempt_count_sub+0x50/0x80
[   13.288737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.288758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.288783]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.288810]  kthread+0x337/0x6f0
[   13.288831]  ? trace_preempt_on+0x20/0xc0
[   13.288854]  ? __pfx_kthread+0x10/0x10
[   13.288875]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.288898]  ? calculate_sigpending+0x7b/0xa0
[   13.288922]  ? __pfx_kthread+0x10/0x10
[   13.288945]  ret_from_fork+0x116/0x1d0
[   13.289026]  ? __pfx_kthread+0x10/0x10
[   13.289047]  ret_from_fork_asm+0x1a/0x30
[   13.289091]  </TASK>
[   13.289103] 
[   13.298996] Allocated by task 282:
[   13.299329]  kasan_save_stack+0x45/0x70
[   13.299550]  kasan_save_track+0x18/0x40
[   13.299916]  kasan_save_alloc_info+0x3b/0x50
[   13.300246]  __kasan_kmalloc+0xb7/0xc0
[   13.300431]  __kmalloc_cache_noprof+0x189/0x420
[   13.300666]  kasan_atomics+0x95/0x310
[   13.300986]  kunit_try_run_case+0x1a5/0x480
[   13.301264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.301795]  kthread+0x337/0x6f0
[   13.302065]  ret_from_fork+0x116/0x1d0
[   13.302244]  ret_from_fork_asm+0x1a/0x30
[   13.302447] 
[   13.302672] The buggy address belongs to the object at ffff888102fa7d80
[   13.302672]  which belongs to the cache kmalloc-64 of size 64
[   13.303359] The buggy address is located 0 bytes to the right of
[   13.303359]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.304231] 
[   13.304328] The buggy address belongs to the physical page:
[   13.304584] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.305017] flags: 0x200000000000000(node=0|zone=2)
[   13.305237] page_type: f5(slab)
[   13.305409] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.305953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.306384] page dumped because: kasan: bad access detected
[   13.306840] 
[   13.306940] Memory state around the buggy address:
[   13.307163]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.307546]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.308072] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.308434]                                      ^
[   13.308705]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.309050]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.309383] ==================================================================
[   14.359606] ==================================================================
[   14.359953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   14.360260] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.360522] 
[   14.360622] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.360668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.360681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.360703] Call Trace:
[   14.360718]  <TASK>
[   14.360733]  dump_stack_lvl+0x73/0xb0
[   14.360759]  print_report+0xd1/0x650
[   14.360782]  ? __virt_addr_valid+0x1db/0x2d0
[   14.360820]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.360843]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.360868]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.360892]  kasan_report+0x141/0x180
[   14.360916]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.360944]  kasan_check_range+0x10c/0x1c0
[   14.360969]  __kasan_check_write+0x18/0x20
[   14.360990]  kasan_atomics_helper+0x1a7f/0x5450
[   14.361015]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.361038]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.361061]  ? kasan_atomics+0x152/0x310
[   14.361085]  kasan_atomics+0x1dc/0x310
[   14.361105]  ? __pfx_kasan_atomics+0x10/0x10
[   14.361127]  ? __pfx_read_tsc+0x10/0x10
[   14.361149]  ? ktime_get_ts64+0x86/0x230
[   14.361176]  kunit_try_run_case+0x1a5/0x480
[   14.361198]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.361219]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.361244]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.361270]  ? __kthread_parkme+0x82/0x180
[   14.361291]  ? preempt_count_sub+0x50/0x80
[   14.361315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.361337]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.361362]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.361388]  kthread+0x337/0x6f0
[   14.361409]  ? trace_preempt_on+0x20/0xc0
[   14.361434]  ? __pfx_kthread+0x10/0x10
[   14.361456]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.361479]  ? calculate_sigpending+0x7b/0xa0
[   14.361504]  ? __pfx_kthread+0x10/0x10
[   14.361526]  ret_from_fork+0x116/0x1d0
[   14.361546]  ? __pfx_kthread+0x10/0x10
[   14.361567]  ret_from_fork_asm+0x1a/0x30
[   14.361598]  </TASK>
[   14.361619] 
[   14.369399] Allocated by task 282:
[   14.369586]  kasan_save_stack+0x45/0x70
[   14.369823]  kasan_save_track+0x18/0x40
[   14.370029]  kasan_save_alloc_info+0x3b/0x50
[   14.370242]  __kasan_kmalloc+0xb7/0xc0
[   14.370426]  __kmalloc_cache_noprof+0x189/0x420
[   14.370652]  kasan_atomics+0x95/0x310
[   14.370854]  kunit_try_run_case+0x1a5/0x480
[   14.371045]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.371281]  kthread+0x337/0x6f0
[   14.371433]  ret_from_fork+0x116/0x1d0
[   14.371602]  ret_from_fork_asm+0x1a/0x30
[   14.371760] 
[   14.371873] The buggy address belongs to the object at ffff888102fa7d80
[   14.371873]  which belongs to the cache kmalloc-64 of size 64
[   14.372382] The buggy address is located 0 bytes to the right of
[   14.372382]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.372950] 
[   14.373038] The buggy address belongs to the physical page:
[   14.373240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.373587] flags: 0x200000000000000(node=0|zone=2)
[   14.373768] page_type: f5(slab)
[   14.373944] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.374283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.374525] page dumped because: kasan: bad access detected
[   14.374799] 
[   14.374897] Memory state around the buggy address:
[   14.375126]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.375388]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.375622] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.376033]                                      ^
[   14.376260]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.376585]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.376914] ==================================================================
[   14.521775] ==================================================================
[   14.522130] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   14.522798] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.523138] 
[   14.523224] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.523270] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.523283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.523306] Call Trace:
[   14.523321]  <TASK>
[   14.523337]  dump_stack_lvl+0x73/0xb0
[   14.523363]  print_report+0xd1/0x650
[   14.523388]  ? __virt_addr_valid+0x1db/0x2d0
[   14.523412]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.523458]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.523484]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.523508]  kasan_report+0x141/0x180
[   14.523532]  ? kasan_atomics_helper+0x1f43/0x5450
[   14.523583]  kasan_check_range+0x10c/0x1c0
[   14.523620]  __kasan_check_write+0x18/0x20
[   14.523642]  kasan_atomics_helper+0x1f43/0x5450
[   14.523667]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.523692]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.523714]  ? kasan_atomics+0x152/0x310
[   14.523738]  kasan_atomics+0x1dc/0x310
[   14.523758]  ? __pfx_kasan_atomics+0x10/0x10
[   14.523795]  ? __pfx_read_tsc+0x10/0x10
[   14.523817]  ? ktime_get_ts64+0x86/0x230
[   14.523844]  kunit_try_run_case+0x1a5/0x480
[   14.523866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.523887]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.523913]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.523939]  ? __kthread_parkme+0x82/0x180
[   14.523961]  ? preempt_count_sub+0x50/0x80
[   14.523985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.524007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.524033]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.524059]  kthread+0x337/0x6f0
[   14.524079]  ? trace_preempt_on+0x20/0xc0
[   14.524103]  ? __pfx_kthread+0x10/0x10
[   14.524125]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.524149]  ? calculate_sigpending+0x7b/0xa0
[   14.524174]  ? __pfx_kthread+0x10/0x10
[   14.524211]  ret_from_fork+0x116/0x1d0
[   14.524231]  ? __pfx_kthread+0x10/0x10
[   14.524253]  ret_from_fork_asm+0x1a/0x30
[   14.524284]  </TASK>
[   14.524295] 
[   14.532094] Allocated by task 282:
[   14.532281]  kasan_save_stack+0x45/0x70
[   14.532498]  kasan_save_track+0x18/0x40
[   14.532732]  kasan_save_alloc_info+0x3b/0x50
[   14.532958]  __kasan_kmalloc+0xb7/0xc0
[   14.533099]  __kmalloc_cache_noprof+0x189/0x420
[   14.533343]  kasan_atomics+0x95/0x310
[   14.533530]  kunit_try_run_case+0x1a5/0x480
[   14.533734]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.534079]  kthread+0x337/0x6f0
[   14.534207]  ret_from_fork+0x116/0x1d0
[   14.534345]  ret_from_fork_asm+0x1a/0x30
[   14.534489] 
[   14.534569] The buggy address belongs to the object at ffff888102fa7d80
[   14.534569]  which belongs to the cache kmalloc-64 of size 64
[   14.535123] The buggy address is located 0 bytes to the right of
[   14.535123]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.535992] 
[   14.536067] The buggy address belongs to the physical page:
[   14.536247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.536577] flags: 0x200000000000000(node=0|zone=2)
[   14.536880] page_type: f5(slab)
[   14.537075] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.537427] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.537758] page dumped because: kasan: bad access detected
[   14.537938] 
[   14.538012] Memory state around the buggy address:
[   14.538241]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.538663]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.538987] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.539211]                                      ^
[   14.539400]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.539745]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.540105] ==================================================================
[   14.653261] ==================================================================
[   14.653620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   14.654117] Write of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.654413] 
[   14.654525] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.654574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.654588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.654621] Call Trace:
[   14.654636]  <TASK>
[   14.654652]  dump_stack_lvl+0x73/0xb0
[   14.654677]  print_report+0xd1/0x650
[   14.654701]  ? __virt_addr_valid+0x1db/0x2d0
[   14.654725]  ? kasan_atomics_helper+0x218a/0x5450
[   14.654748]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.654794]  ? kasan_atomics_helper+0x218a/0x5450
[   14.654818]  kasan_report+0x141/0x180
[   14.654841]  ? kasan_atomics_helper+0x218a/0x5450
[   14.654869]  kasan_check_range+0x10c/0x1c0
[   14.654895]  __kasan_check_write+0x18/0x20
[   14.654916]  kasan_atomics_helper+0x218a/0x5450
[   14.654941]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.654965]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.654988]  ? kasan_atomics+0x152/0x310
[   14.655012]  kasan_atomics+0x1dc/0x310
[   14.655032]  ? __pfx_kasan_atomics+0x10/0x10
[   14.655055]  ? __pfx_read_tsc+0x10/0x10
[   14.655077]  ? ktime_get_ts64+0x86/0x230
[   14.655102]  kunit_try_run_case+0x1a5/0x480
[   14.655124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.655145]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.655170]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.655198]  ? __kthread_parkme+0x82/0x180
[   14.655219]  ? preempt_count_sub+0x50/0x80
[   14.655244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.655266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.655292]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.655318]  kthread+0x337/0x6f0
[   14.655339]  ? trace_preempt_on+0x20/0xc0
[   14.655362]  ? __pfx_kthread+0x10/0x10
[   14.655384]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.655409]  ? calculate_sigpending+0x7b/0xa0
[   14.655434]  ? __pfx_kthread+0x10/0x10
[   14.655457]  ret_from_fork+0x116/0x1d0
[   14.655476]  ? __pfx_kthread+0x10/0x10
[   14.655497]  ret_from_fork_asm+0x1a/0x30
[   14.655529]  </TASK>
[   14.655540] 
[   14.662992] Allocated by task 282:
[   14.663133]  kasan_save_stack+0x45/0x70
[   14.663339]  kasan_save_track+0x18/0x40
[   14.663535]  kasan_save_alloc_info+0x3b/0x50
[   14.663775]  __kasan_kmalloc+0xb7/0xc0
[   14.663917]  __kmalloc_cache_noprof+0x189/0x420
[   14.664125]  kasan_atomics+0x95/0x310
[   14.664313]  kunit_try_run_case+0x1a5/0x480
[   14.664522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.664786]  kthread+0x337/0x6f0
[   14.664916]  ret_from_fork+0x116/0x1d0
[   14.665103]  ret_from_fork_asm+0x1a/0x30
[   14.665305] 
[   14.665404] The buggy address belongs to the object at ffff888102fa7d80
[   14.665404]  which belongs to the cache kmalloc-64 of size 64
[   14.665945] The buggy address is located 0 bytes to the right of
[   14.665945]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.666382] 
[   14.666457] The buggy address belongs to the physical page:
[   14.667371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.667693] flags: 0x200000000000000(node=0|zone=2)
[   14.667935] page_type: f5(slab)
[   14.668075] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.668400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.668721] page dumped because: kasan: bad access detected
[   14.668953] 
[   14.669040] Memory state around the buggy address:
[   14.669246]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.669541]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.670719] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.671151]                                      ^
[   14.671466]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.671873]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.672152] ==================================================================
[   13.714755] ==================================================================
[   13.715119] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   13.715427] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.715732] 
[   13.715891] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.715936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.715950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.715971] Call Trace:
[   13.715987]  <TASK>
[   13.716002]  dump_stack_lvl+0x73/0xb0
[   13.716027]  print_report+0xd1/0x650
[   13.716051]  ? __virt_addr_valid+0x1db/0x2d0
[   13.716073]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.716096]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.716121]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.716144]  kasan_report+0x141/0x180
[   13.716168]  ? kasan_atomics_helper+0xb6a/0x5450
[   13.716196]  kasan_check_range+0x10c/0x1c0
[   13.716221]  __kasan_check_write+0x18/0x20
[   13.716242]  kasan_atomics_helper+0xb6a/0x5450
[   13.716266]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.716290]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.716313]  ? kasan_atomics+0x152/0x310
[   13.716336]  kasan_atomics+0x1dc/0x310
[   13.716356]  ? __pfx_kasan_atomics+0x10/0x10
[   13.716379]  ? __pfx_read_tsc+0x10/0x10
[   13.716401]  ? ktime_get_ts64+0x86/0x230
[   13.716426]  kunit_try_run_case+0x1a5/0x480
[   13.716448]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.716471]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.716497]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.716523]  ? __kthread_parkme+0x82/0x180
[   13.716544]  ? preempt_count_sub+0x50/0x80
[   13.716580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.716603]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.717217]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.717243]  kthread+0x337/0x6f0
[   13.717263]  ? trace_preempt_on+0x20/0xc0
[   13.717287]  ? __pfx_kthread+0x10/0x10
[   13.717309]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.717333]  ? calculate_sigpending+0x7b/0xa0
[   13.717377]  ? __pfx_kthread+0x10/0x10
[   13.717399]  ret_from_fork+0x116/0x1d0
[   13.717419]  ? __pfx_kthread+0x10/0x10
[   13.717440]  ret_from_fork_asm+0x1a/0x30
[   13.717472]  </TASK>
[   13.717483] 
[   13.727042] Allocated by task 282:
[   13.727188]  kasan_save_stack+0x45/0x70
[   13.727347]  kasan_save_track+0x18/0x40
[   13.727490]  kasan_save_alloc_info+0x3b/0x50
[   13.727706]  __kasan_kmalloc+0xb7/0xc0
[   13.728047]  __kmalloc_cache_noprof+0x189/0x420
[   13.728505]  kasan_atomics+0x95/0x310
[   13.729142]  kunit_try_run_case+0x1a5/0x480
[   13.729634]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.730169]  kthread+0x337/0x6f0
[   13.730645]  ret_from_fork+0x116/0x1d0
[   13.731148]  ret_from_fork_asm+0x1a/0x30
[   13.731577] 
[   13.731781] The buggy address belongs to the object at ffff888102fa7d80
[   13.731781]  which belongs to the cache kmalloc-64 of size 64
[   13.733218] The buggy address is located 0 bytes to the right of
[   13.733218]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.734493] 
[   13.734680] The buggy address belongs to the physical page:
[   13.735317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.736227] flags: 0x200000000000000(node=0|zone=2)
[   13.736928] page_type: f5(slab)
[   13.737253] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.737991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.738818] page dumped because: kasan: bad access detected
[   13.739390] 
[   13.739556] Memory state around the buggy address:
[   13.740084]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.740731]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.741340] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.741570]                                      ^
[   13.742075]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.742807]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.743471] ==================================================================
[   13.871054] ==================================================================
[   13.871340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   13.871670] Write of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.872261] 
[   13.872354] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.872401] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.872415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.872436] Call Trace:
[   13.872454]  <TASK>
[   13.872471]  dump_stack_lvl+0x73/0xb0
[   13.872496]  print_report+0xd1/0x650
[   13.872519]  ? __virt_addr_valid+0x1db/0x2d0
[   13.872543]  ? kasan_atomics_helper+0xf10/0x5450
[   13.872566]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.872589]  ? kasan_atomics_helper+0xf10/0x5450
[   13.872627]  kasan_report+0x141/0x180
[   13.872651]  ? kasan_atomics_helper+0xf10/0x5450
[   13.872679]  kasan_check_range+0x10c/0x1c0
[   13.872705]  __kasan_check_write+0x18/0x20
[   13.872726]  kasan_atomics_helper+0xf10/0x5450
[   13.872751]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.872793]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.872816]  ? kasan_atomics+0x152/0x310
[   13.872841]  kasan_atomics+0x1dc/0x310
[   13.872861]  ? __pfx_kasan_atomics+0x10/0x10
[   13.872883]  ? __pfx_read_tsc+0x10/0x10
[   13.872906]  ? ktime_get_ts64+0x86/0x230
[   13.872930]  kunit_try_run_case+0x1a5/0x480
[   13.872953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.872974]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.873000]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.873025]  ? __kthread_parkme+0x82/0x180
[   13.873047]  ? preempt_count_sub+0x50/0x80
[   13.873071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.873093]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.873119]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.873146]  kthread+0x337/0x6f0
[   13.873166]  ? trace_preempt_on+0x20/0xc0
[   13.873190]  ? __pfx_kthread+0x10/0x10
[   13.873213]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.873236]  ? calculate_sigpending+0x7b/0xa0
[   13.873260]  ? __pfx_kthread+0x10/0x10
[   13.873282]  ret_from_fork+0x116/0x1d0
[   13.873302]  ? __pfx_kthread+0x10/0x10
[   13.873323]  ret_from_fork_asm+0x1a/0x30
[   13.873355]  </TASK>
[   13.873367] 
[   13.881686] Allocated by task 282:
[   13.881858]  kasan_save_stack+0x45/0x70
[   13.882010]  kasan_save_track+0x18/0x40
[   13.882151]  kasan_save_alloc_info+0x3b/0x50
[   13.882303]  __kasan_kmalloc+0xb7/0xc0
[   13.882822]  __kmalloc_cache_noprof+0x189/0x420
[   13.883060]  kasan_atomics+0x95/0x310
[   13.883248]  kunit_try_run_case+0x1a5/0x480
[   13.883462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.883733]  kthread+0x337/0x6f0
[   13.884075]  ret_from_fork+0x116/0x1d0
[   13.884272]  ret_from_fork_asm+0x1a/0x30
[   13.884418] 
[   13.884495] The buggy address belongs to the object at ffff888102fa7d80
[   13.884495]  which belongs to the cache kmalloc-64 of size 64
[   13.884938] The buggy address is located 0 bytes to the right of
[   13.884938]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.885778] 
[   13.885882] The buggy address belongs to the physical page:
[   13.886066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.886314] flags: 0x200000000000000(node=0|zone=2)
[   13.886539] page_type: f5(slab)
[   13.886707] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.886996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.887303] page dumped because: kasan: bad access detected
[   13.887525] 
[   13.887891] Memory state around the buggy address:
[   13.888132]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.888435]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.888850] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.889159]                                      ^
[   13.889356]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.889586]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.889936] ==================================================================
[   14.634889] ==================================================================
[   14.635441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   14.636442] Read of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.636972] 
[   14.637094] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.637141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.637155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.637177] Call Trace:
[   14.637194]  <TASK>
[   14.637210]  dump_stack_lvl+0x73/0xb0
[   14.637237]  print_report+0xd1/0x650
[   14.637260]  ? __virt_addr_valid+0x1db/0x2d0
[   14.637283]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.637307]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.637332]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.637356]  kasan_report+0x141/0x180
[   14.637380]  ? kasan_atomics_helper+0x4fb2/0x5450
[   14.637409]  __asan_report_load8_noabort+0x18/0x20
[   14.637431]  kasan_atomics_helper+0x4fb2/0x5450
[   14.637455]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.637480]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.637503]  ? kasan_atomics+0x152/0x310
[   14.637527]  kasan_atomics+0x1dc/0x310
[   14.637548]  ? __pfx_kasan_atomics+0x10/0x10
[   14.637570]  ? __pfx_read_tsc+0x10/0x10
[   14.637593]  ? ktime_get_ts64+0x86/0x230
[   14.637632]  kunit_try_run_case+0x1a5/0x480
[   14.637655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.637677]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.637702]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.637729]  ? __kthread_parkme+0x82/0x180
[   14.637751]  ? preempt_count_sub+0x50/0x80
[   14.637798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.637822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.637848]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.637874]  kthread+0x337/0x6f0
[   14.637894]  ? trace_preempt_on+0x20/0xc0
[   14.637919]  ? __pfx_kthread+0x10/0x10
[   14.637941]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.637965]  ? calculate_sigpending+0x7b/0xa0
[   14.637990]  ? __pfx_kthread+0x10/0x10
[   14.638012]  ret_from_fork+0x116/0x1d0
[   14.638032]  ? __pfx_kthread+0x10/0x10
[   14.638053]  ret_from_fork_asm+0x1a/0x30
[   14.638084]  </TASK>
[   14.638095] 
[   14.645451] Allocated by task 282:
[   14.645623]  kasan_save_stack+0x45/0x70
[   14.645849]  kasan_save_track+0x18/0x40
[   14.646010]  kasan_save_alloc_info+0x3b/0x50
[   14.646163]  __kasan_kmalloc+0xb7/0xc0
[   14.646312]  __kmalloc_cache_noprof+0x189/0x420
[   14.646552]  kasan_atomics+0x95/0x310
[   14.646751]  kunit_try_run_case+0x1a5/0x480
[   14.646950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.647134]  kthread+0x337/0x6f0
[   14.647305]  ret_from_fork+0x116/0x1d0
[   14.647497]  ret_from_fork_asm+0x1a/0x30
[   14.647711] 
[   14.647842] The buggy address belongs to the object at ffff888102fa7d80
[   14.647842]  which belongs to the cache kmalloc-64 of size 64
[   14.648329] The buggy address is located 0 bytes to the right of
[   14.648329]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.648870] 
[   14.648964] The buggy address belongs to the physical page:
[   14.649215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.649534] flags: 0x200000000000000(node=0|zone=2)
[   14.649714] page_type: f5(slab)
[   14.649862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.650103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.650418] page dumped because: kasan: bad access detected
[   14.650690] 
[   14.650814] Memory state around the buggy address:
[   14.651041]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.651305]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.651531] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.651779]                                      ^
[   14.652016]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.652350]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.652699] ==================================================================
[   13.952588] ==================================================================
[   13.953064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   13.953385] Read of size 4 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   13.953662] 
[   13.953863] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   13.953910] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.953923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.953945] Call Trace:
[   13.953961]  <TASK>
[   13.953978]  dump_stack_lvl+0x73/0xb0
[   13.954004]  print_report+0xd1/0x650
[   13.954028]  ? __virt_addr_valid+0x1db/0x2d0
[   13.954051]  ? kasan_atomics_helper+0x4a1c/0x5450
[   13.954074]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.954098]  ? kasan_atomics_helper+0x4a1c/0x5450
[   13.954122]  kasan_report+0x141/0x180
[   13.954145]  ? kasan_atomics_helper+0x4a1c/0x5450
[   13.954174]  __asan_report_load4_noabort+0x18/0x20
[   13.954196]  kasan_atomics_helper+0x4a1c/0x5450
[   13.954220]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.954245]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.954268]  ? kasan_atomics+0x152/0x310
[   13.954292]  kasan_atomics+0x1dc/0x310
[   13.954312]  ? __pfx_kasan_atomics+0x10/0x10
[   13.954334]  ? __pfx_read_tsc+0x10/0x10
[   13.954356]  ? ktime_get_ts64+0x86/0x230
[   13.954382]  kunit_try_run_case+0x1a5/0x480
[   13.954404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.954425]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.954451]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.954476]  ? __kthread_parkme+0x82/0x180
[   13.954498]  ? preempt_count_sub+0x50/0x80
[   13.954523]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.954552]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.954578]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.954603]  kthread+0x337/0x6f0
[   13.954635]  ? trace_preempt_on+0x20/0xc0
[   13.954659]  ? __pfx_kthread+0x10/0x10
[   13.954681]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.954704]  ? calculate_sigpending+0x7b/0xa0
[   13.954729]  ? __pfx_kthread+0x10/0x10
[   13.954853]  ret_from_fork+0x116/0x1d0
[   13.954874]  ? __pfx_kthread+0x10/0x10
[   13.954896]  ret_from_fork_asm+0x1a/0x30
[   13.954929]  </TASK>
[   13.954941] 
[   13.963142] Allocated by task 282:
[   13.963335]  kasan_save_stack+0x45/0x70
[   13.963535]  kasan_save_track+0x18/0x40
[   13.963719]  kasan_save_alloc_info+0x3b/0x50
[   13.964108]  __kasan_kmalloc+0xb7/0xc0
[   13.964279]  __kmalloc_cache_noprof+0x189/0x420
[   13.964506]  kasan_atomics+0x95/0x310
[   13.964663]  kunit_try_run_case+0x1a5/0x480
[   13.964926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.965201]  kthread+0x337/0x6f0
[   13.965381]  ret_from_fork+0x116/0x1d0
[   13.965573]  ret_from_fork_asm+0x1a/0x30
[   13.965837] 
[   13.965917] The buggy address belongs to the object at ffff888102fa7d80
[   13.965917]  which belongs to the cache kmalloc-64 of size 64
[   13.966395] The buggy address is located 0 bytes to the right of
[   13.966395]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   13.967077] 
[   13.967180] The buggy address belongs to the physical page:
[   13.967363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   13.967682] flags: 0x200000000000000(node=0|zone=2)
[   13.968097] page_type: f5(slab)
[   13.968275] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.968569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.969035] page dumped because: kasan: bad access detected
[   13.969257] 
[   13.969356] Memory state around the buggy address:
[   13.969586]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.969941]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.970242] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.970570]                                      ^
[   13.970900]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.971195]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.971489] ==================================================================
[   14.108023] ==================================================================
[   14.108263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.108875] Read of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.109207] 
[   14.109318] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.109363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.109376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.109398] Call Trace:
[   14.109413]  <TASK>
[   14.109430]  dump_stack_lvl+0x73/0xb0
[   14.109457]  print_report+0xd1/0x650
[   14.109480]  ? __virt_addr_valid+0x1db/0x2d0
[   14.109503]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.109526]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.109551]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.109574]  kasan_report+0x141/0x180
[   14.109598]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.109639]  __asan_report_load8_noabort+0x18/0x20
[   14.109660]  kasan_atomics_helper+0x4eae/0x5450
[   14.109685]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.109710]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.109732]  ? kasan_atomics+0x152/0x310
[   14.109763]  kasan_atomics+0x1dc/0x310
[   14.109783]  ? __pfx_kasan_atomics+0x10/0x10
[   14.109806]  ? __pfx_read_tsc+0x10/0x10
[   14.109828]  ? ktime_get_ts64+0x86/0x230
[   14.109854]  kunit_try_run_case+0x1a5/0x480
[   14.109877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.109898]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.109925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.109950]  ? __kthread_parkme+0x82/0x180
[   14.109972]  ? preempt_count_sub+0x50/0x80
[   14.109997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.110019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.110045]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.110071]  kthread+0x337/0x6f0
[   14.110091]  ? trace_preempt_on+0x20/0xc0
[   14.110116]  ? __pfx_kthread+0x10/0x10
[   14.110138]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.110162]  ? calculate_sigpending+0x7b/0xa0
[   14.110186]  ? __pfx_kthread+0x10/0x10
[   14.110210]  ret_from_fork+0x116/0x1d0
[   14.110229]  ? __pfx_kthread+0x10/0x10
[   14.110251]  ret_from_fork_asm+0x1a/0x30
[   14.110283]  </TASK>
[   14.110294] 
[   14.118338] Allocated by task 282:
[   14.118475]  kasan_save_stack+0x45/0x70
[   14.118650]  kasan_save_track+0x18/0x40
[   14.118886]  kasan_save_alloc_info+0x3b/0x50
[   14.119110]  __kasan_kmalloc+0xb7/0xc0
[   14.119306]  __kmalloc_cache_noprof+0x189/0x420
[   14.119528]  kasan_atomics+0x95/0x310
[   14.119849]  kunit_try_run_case+0x1a5/0x480
[   14.120036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.120223]  kthread+0x337/0x6f0
[   14.120411]  ret_from_fork+0x116/0x1d0
[   14.120646]  ret_from_fork_asm+0x1a/0x30
[   14.120940] 
[   14.121041] The buggy address belongs to the object at ffff888102fa7d80
[   14.121041]  which belongs to the cache kmalloc-64 of size 64
[   14.121511] The buggy address is located 0 bytes to the right of
[   14.121511]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.122029] 
[   14.122132] The buggy address belongs to the physical page:
[   14.122349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.122747] flags: 0x200000000000000(node=0|zone=2)
[   14.122976] page_type: f5(slab)
[   14.123153] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.123483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.123861] page dumped because: kasan: bad access detected
[   14.124047] 
[   14.124121] Memory state around the buggy address:
[   14.124284]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.124691]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.125150] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.125401]                                      ^
[   14.125565]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.125940]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.126262] ==================================================================
[   14.712855] ==================================================================
[   14.713225] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   14.713536] Read of size 8 at addr ffff888102fa7db0 by task kunit_try_catch/282
[   14.713901] 
[   14.714016] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250529 #1 PREEMPT(voluntary) 
[   14.714060] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.714075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.714098] Call Trace:
[   14.714114]  <TASK>
[   14.714130]  dump_stack_lvl+0x73/0xb0
[   14.714156]  print_report+0xd1/0x650
[   14.714179]  ? __virt_addr_valid+0x1db/0x2d0
[   14.714202]  ? kasan_atomics_helper+0x5115/0x5450
[   14.714226]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.714250]  ? kasan_atomics_helper+0x5115/0x5450
[   14.714273]  kasan_report+0x141/0x180
[   14.714297]  ? kasan_atomics_helper+0x5115/0x5450
[   14.714325]  __asan_report_load8_noabort+0x18/0x20
[   14.714347]  kasan_atomics_helper+0x5115/0x5450
[   14.714372]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.714395]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.714418]  ? kasan_atomics+0x152/0x310
[   14.714442]  kasan_atomics+0x1dc/0x310
[   14.714463]  ? __pfx_kasan_atomics+0x10/0x10
[   14.714485]  ? __pfx_read_tsc+0x10/0x10
[   14.714507]  ? ktime_get_ts64+0x86/0x230
[   14.714539]  kunit_try_run_case+0x1a5/0x480
[   14.714562]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.714583]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.714619]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.714646]  ? __kthread_parkme+0x82/0x180
[   14.714668]  ? preempt_count_sub+0x50/0x80
[   14.714693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.714715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.714741]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.714788]  kthread+0x337/0x6f0
[   14.714809]  ? trace_preempt_on+0x20/0xc0
[   14.714833]  ? __pfx_kthread+0x10/0x10
[   14.714856]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.714880]  ? calculate_sigpending+0x7b/0xa0
[   14.714905]  ? __pfx_kthread+0x10/0x10
[   14.714928]  ret_from_fork+0x116/0x1d0
[   14.714948]  ? __pfx_kthread+0x10/0x10
[   14.714971]  ret_from_fork_asm+0x1a/0x30
[   14.715001]  </TASK>
[   14.715013] 
[   14.722089] Allocated by task 282:
[   14.722272]  kasan_save_stack+0x45/0x70
[   14.722476]  kasan_save_track+0x18/0x40
[   14.722696]  kasan_save_alloc_info+0x3b/0x50
[   14.722939]  __kasan_kmalloc+0xb7/0xc0
[   14.723132]  __kmalloc_cache_noprof+0x189/0x420
[   14.723350]  kasan_atomics+0x95/0x310
[   14.723514]  kunit_try_run_case+0x1a5/0x480
[   14.723721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.723986]  kthread+0x337/0x6f0
[   14.724141]  ret_from_fork+0x116/0x1d0
[   14.724288]  ret_from_fork_asm+0x1a/0x30
[   14.724490] 
[   14.724588] The buggy address belongs to the object at ffff888102fa7d80
[   14.724588]  which belongs to the cache kmalloc-64 of size 64
[   14.725087] The buggy address is located 0 bytes to the right of
[   14.725087]  allocated 48-byte region [ffff888102fa7d80, ffff888102fa7db0)
[   14.725594] 
[   14.725693] The buggy address belongs to the physical page:
[   14.725955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102fa7
[   14.726262] flags: 0x200000000000000(node=0|zone=2)
[   14.726462] page_type: f5(slab)
[   14.726590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.726975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.727270] page dumped because: kasan: bad access detected
[   14.727464] 
[   14.727563] Memory state around the buggy address:
[   14.727826]  ffff888102fa7c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.728140]  ffff888102fa7d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.728416] >ffff888102fa7d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.728700]                                      ^
[   14.728932]  ffff888102fa7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.729224]  ffff888102fa7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.729513] ==================================================================