Hay
Date
May 30, 2025, 4:14 a.m.

Environment
e850-96
qemu-arm64
qemu-x86_64
x15

[   49.182520] ==================================================================
[   49.189583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858
[   49.196873] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   49.204251] 
[   49.205730] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   49.205779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.205796] Hardware name: WinLink E850-96 board (DT)
[   49.205815] Call trace:
[   49.205828]  show_stack+0x20/0x38 (C)
[   49.205862]  dump_stack_lvl+0x8c/0xd0
[   49.205899]  print_report+0x118/0x608
[   49.205933]  kasan_report+0xdc/0x128
[   49.205966]  kasan_check_range+0x100/0x1a8
[   49.206002]  __kasan_check_write+0x20/0x30
[   49.206032]  kasan_atomics_helper+0x47c/0x4858
[   49.206065]  kasan_atomics+0x198/0x2e0
[   49.206098]  kunit_try_run_case+0x170/0x3f0
[   49.206130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.206168]  kthread+0x328/0x630
[   49.206197]  ret_from_fork+0x10/0x20
[   49.206228] 
[   49.276819] Allocated by task 309:
[   49.280205]  kasan_save_stack+0x3c/0x68
[   49.284024]  kasan_save_track+0x20/0x40
[   49.287844]  kasan_save_alloc_info+0x40/0x58
[   49.292097]  __kasan_kmalloc+0xd4/0xd8
[   49.295830]  __kmalloc_cache_noprof+0x15c/0x3c0
[   49.300343]  kasan_atomics+0xb8/0x2e0
[   49.303989]  kunit_try_run_case+0x170/0x3f0
[   49.308156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.313624]  kthread+0x328/0x630
[   49.316836]  ret_from_fork+0x10/0x20
[   49.320395] 
[   49.321871] The buggy address belongs to the object at ffff000800c2e200
[   49.321871]  which belongs to the cache kmalloc-64 of size 64
[   49.334197] The buggy address is located 0 bytes to the right of
[   49.334197]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   49.347044] 
[   49.348520] The buggy address belongs to the physical page:
[   49.354076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   49.362061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.368571] page_type: f5(slab)
[   49.371704] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.379429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.387148] page dumped because: kasan: bad access detected
[   49.392703] 
[   49.394179] Memory state around the buggy address:
[   49.398957]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.406161]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.413366] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.420567]                                      ^
[   49.425345]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.432550]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.439751] ==================================================================
[   52.618740] ==================================================================
[   52.625817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   52.633106] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   52.640484] 
[   52.641963] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   52.642012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.642029] Hardware name: WinLink E850-96 board (DT)
[   52.642049] Call trace:
[   52.642062]  show_stack+0x20/0x38 (C)
[   52.642094]  dump_stack_lvl+0x8c/0xd0
[   52.642130]  print_report+0x118/0x608
[   52.642163]  kasan_report+0xdc/0x128
[   52.642195]  kasan_check_range+0x100/0x1a8
[   52.642230]  __kasan_check_write+0x20/0x30
[   52.642259]  kasan_atomics_helper+0xa04/0x4858
[   52.642294]  kasan_atomics+0x198/0x2e0
[   52.642326]  kunit_try_run_case+0x170/0x3f0
[   52.642358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.642396]  kthread+0x328/0x630
[   52.642423]  ret_from_fork+0x10/0x20
[   52.642456] 
[   52.713052] Allocated by task 309:
[   52.716438]  kasan_save_stack+0x3c/0x68
[   52.720257]  kasan_save_track+0x20/0x40
[   52.724076]  kasan_save_alloc_info+0x40/0x58
[   52.728330]  __kasan_kmalloc+0xd4/0xd8
[   52.732062]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.736576]  kasan_atomics+0xb8/0x2e0
[   52.740222]  kunit_try_run_case+0x170/0x3f0
[   52.744389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.749857]  kthread+0x328/0x630
[   52.753069]  ret_from_fork+0x10/0x20
[   52.756628] 
[   52.758104] The buggy address belongs to the object at ffff000800c2e200
[   52.758104]  which belongs to the cache kmalloc-64 of size 64
[   52.770430] The buggy address is located 0 bytes to the right of
[   52.770430]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   52.783277] 
[   52.784753] The buggy address belongs to the physical page:
[   52.790309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   52.798294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.804805] page_type: f5(slab)
[   52.807937] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.815662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.823381] page dumped because: kasan: bad access detected
[   52.828936] 
[   52.830411] Memory state around the buggy address:
[   52.835189]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.842394]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.849599] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.856800]                                      ^
[   52.861578]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.868783]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.875984] ==================================================================
[   51.563725] ==================================================================
[   51.570797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858
[   51.578087] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   51.585465] 
[   51.586945] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   51.586993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.587007] Hardware name: WinLink E850-96 board (DT)
[   51.587024] Call trace:
[   51.587037]  show_stack+0x20/0x38 (C)
[   51.587069]  dump_stack_lvl+0x8c/0xd0
[   51.587104]  print_report+0x118/0x608
[   51.587136]  kasan_report+0xdc/0x128
[   51.587169]  kasan_check_range+0x100/0x1a8
[   51.587203]  __kasan_check_write+0x20/0x30
[   51.587235]  kasan_atomics_helper+0x894/0x4858
[   51.587268]  kasan_atomics+0x198/0x2e0
[   51.587297]  kunit_try_run_case+0x170/0x3f0
[   51.587333]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.587371]  kthread+0x328/0x630
[   51.587397]  ret_from_fork+0x10/0x20
[   51.587430] 
[   51.658033] Allocated by task 309:
[   51.661419]  kasan_save_stack+0x3c/0x68
[   51.665238]  kasan_save_track+0x20/0x40
[   51.669058]  kasan_save_alloc_info+0x40/0x58
[   51.673311]  __kasan_kmalloc+0xd4/0xd8
[   51.677044]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.681557]  kasan_atomics+0xb8/0x2e0
[   51.685203]  kunit_try_run_case+0x170/0x3f0
[   51.689370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.694838]  kthread+0x328/0x630
[   51.698050]  ret_from_fork+0x10/0x20
[   51.701610] 
[   51.703085] The buggy address belongs to the object at ffff000800c2e200
[   51.703085]  which belongs to the cache kmalloc-64 of size 64
[   51.715412] The buggy address is located 0 bytes to the right of
[   51.715412]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   51.728258] 
[   51.729734] The buggy address belongs to the physical page:
[   51.735290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   51.743275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.749786] page_type: f5(slab)
[   51.752919] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.760643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.768362] page dumped because: kasan: bad access detected
[   51.773917] 
[   51.775393] Memory state around the buggy address:
[   51.780171]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.787375]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.794580] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.801781]                                      ^
[   51.806559]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.813764]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.820965] ==================================================================
[   56.567459] ==================================================================
[   56.574543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   56.581918] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   56.589296] 
[   56.590776] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   56.590822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.590838] Hardware name: WinLink E850-96 board (DT)
[   56.590856] Call trace:
[   56.590868]  show_stack+0x20/0x38 (C)
[   56.590901]  dump_stack_lvl+0x8c/0xd0
[   56.590937]  print_report+0x118/0x608
[   56.590969]  kasan_report+0xdc/0x128
[   56.591001]  __asan_report_store8_noabort+0x20/0x30
[   56.591033]  kasan_atomics_helper+0x3e5c/0x4858
[   56.591066]  kasan_atomics+0x198/0x2e0
[   56.591097]  kunit_try_run_case+0x170/0x3f0
[   56.591131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.591170]  kthread+0x328/0x630
[   56.591196]  ret_from_fork+0x10/0x20
[   56.591227] 
[   56.658653] Allocated by task 309:
[   56.662038]  kasan_save_stack+0x3c/0x68
[   56.665858]  kasan_save_track+0x20/0x40
[   56.669677]  kasan_save_alloc_info+0x40/0x58
[   56.673931]  __kasan_kmalloc+0xd4/0xd8
[   56.677663]  __kmalloc_cache_noprof+0x15c/0x3c0
[   56.682177]  kasan_atomics+0xb8/0x2e0
[   56.685823]  kunit_try_run_case+0x170/0x3f0
[   56.689989]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.695458]  kthread+0x328/0x630
[   56.698670]  ret_from_fork+0x10/0x20
[   56.702229] 
[   56.703704] The buggy address belongs to the object at ffff000800c2e200
[   56.703704]  which belongs to the cache kmalloc-64 of size 64
[   56.716031] The buggy address is located 0 bytes to the right of
[   56.716031]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   56.728877] 
[   56.730354] The buggy address belongs to the physical page:
[   56.735909] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   56.743895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.750405] page_type: f5(slab)
[   56.753538] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.761262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.768981] page dumped because: kasan: bad access detected
[   56.774537] 
[   56.776012] Memory state around the buggy address:
[   56.780790]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.787995]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.795200] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.802401]                                      ^
[   56.807179]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.814383]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.821585] ==================================================================
[   62.116371] ==================================================================
[   62.123421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   62.130793] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   62.138084] 
[   62.139564] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   62.139608] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.139626] Hardware name: WinLink E850-96 board (DT)
[   62.139645] Call trace:
[   62.139655]  show_stack+0x20/0x38 (C)
[   62.139690]  dump_stack_lvl+0x8c/0xd0
[   62.139724]  print_report+0x118/0x608
[   62.139761]  kasan_report+0xdc/0x128
[   62.139794]  __asan_report_load8_noabort+0x20/0x30
[   62.139824]  kasan_atomics_helper+0x3df4/0x4858
[   62.139858]  kasan_atomics+0x198/0x2e0
[   62.139890]  kunit_try_run_case+0x170/0x3f0
[   62.139924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.139964]  kthread+0x328/0x630
[   62.139989]  ret_from_fork+0x10/0x20
[   62.140022] 
[   62.207354] Allocated by task 309:
[   62.210741]  kasan_save_stack+0x3c/0x68
[   62.214559]  kasan_save_track+0x20/0x40
[   62.218379]  kasan_save_alloc_info+0x40/0x58
[   62.222632]  __kasan_kmalloc+0xd4/0xd8
[   62.226364]  __kmalloc_cache_noprof+0x15c/0x3c0
[   62.230878]  kasan_atomics+0xb8/0x2e0
[   62.234524]  kunit_try_run_case+0x170/0x3f0
[   62.238691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.244159]  kthread+0x328/0x630
[   62.247371]  ret_from_fork+0x10/0x20
[   62.250930] 
[   62.252406] The buggy address belongs to the object at ffff000800c2e200
[   62.252406]  which belongs to the cache kmalloc-64 of size 64
[   62.264732] The buggy address is located 0 bytes to the right of
[   62.264732]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   62.277579] 
[   62.279055] The buggy address belongs to the physical page:
[   62.284611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   62.292596] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.299106] page_type: f5(slab)
[   62.302239] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.309963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.317683] page dumped because: kasan: bad access detected
[   62.323238] 
[   62.324713] Memory state around the buggy address:
[   62.329492]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.336696]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.343901] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.351102]                                      ^
[   62.355880]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.363085]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.370286] ==================================================================
[   57.358098] ==================================================================
[   57.365156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   57.372445] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   57.379822] 
[   57.381302] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   57.381350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.381366] Hardware name: WinLink E850-96 board (DT)
[   57.381384] Call trace:
[   57.381395]  show_stack+0x20/0x38 (C)
[   57.381426]  dump_stack_lvl+0x8c/0xd0
[   57.381463]  print_report+0x118/0x608
[   57.381496]  kasan_report+0xdc/0x128
[   57.381530]  kasan_check_range+0x100/0x1a8
[   57.381565]  __kasan_check_write+0x20/0x30
[   57.381595]  kasan_atomics_helper+0xf88/0x4858
[   57.381628]  kasan_atomics+0x198/0x2e0
[   57.381659]  kunit_try_run_case+0x170/0x3f0
[   57.381691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.381729]  kthread+0x328/0x630
[   57.381755]  ret_from_fork+0x10/0x20
[   57.381787] 
[   57.452391] Allocated by task 309:
[   57.455777]  kasan_save_stack+0x3c/0x68
[   57.459596]  kasan_save_track+0x20/0x40
[   57.463415]  kasan_save_alloc_info+0x40/0x58
[   57.467669]  __kasan_kmalloc+0xd4/0xd8
[   57.471401]  __kmalloc_cache_noprof+0x15c/0x3c0
[   57.475915]  kasan_atomics+0xb8/0x2e0
[   57.479561]  kunit_try_run_case+0x170/0x3f0
[   57.483727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.489196]  kthread+0x328/0x630
[   57.492408]  ret_from_fork+0x10/0x20
[   57.495967] 
[   57.497442] The buggy address belongs to the object at ffff000800c2e200
[   57.497442]  which belongs to the cache kmalloc-64 of size 64
[   57.509769] The buggy address is located 0 bytes to the right of
[   57.509769]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   57.522616] 
[   57.524092] The buggy address belongs to the physical page:
[   57.529647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   57.537633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.544143] page_type: f5(slab)
[   57.547276] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.555000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.562719] page dumped because: kasan: bad access detected
[   57.568275] 
[   57.569750] Memory state around the buggy address:
[   57.574528]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.581733]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.588937] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.596139]                                      ^
[   57.600917]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.608121]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.615323] ==================================================================
[   57.622652] ==================================================================
[   57.629733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   57.637024] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   57.644402] 
[   57.645882] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   57.645928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.645943] Hardware name: WinLink E850-96 board (DT)
[   57.645962] Call trace:
[   57.645973]  show_stack+0x20/0x38 (C)
[   57.646004]  dump_stack_lvl+0x8c/0xd0
[   57.646039]  print_report+0x118/0x608
[   57.646074]  kasan_report+0xdc/0x128
[   57.646105]  kasan_check_range+0x100/0x1a8
[   57.646141]  __kasan_check_write+0x20/0x30
[   57.646171]  kasan_atomics_helper+0xff0/0x4858
[   57.646204]  kasan_atomics+0x198/0x2e0
[   57.646235]  kunit_try_run_case+0x170/0x3f0
[   57.646269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.646307]  kthread+0x328/0x630
[   57.646334]  ret_from_fork+0x10/0x20
[   57.646364] 
[   57.716970] Allocated by task 309:
[   57.720356]  kasan_save_stack+0x3c/0x68
[   57.724175]  kasan_save_track+0x20/0x40
[   57.727995]  kasan_save_alloc_info+0x40/0x58
[   57.732248]  __kasan_kmalloc+0xd4/0xd8
[   57.735981]  __kmalloc_cache_noprof+0x15c/0x3c0
[   57.740494]  kasan_atomics+0xb8/0x2e0
[   57.744140]  kunit_try_run_case+0x170/0x3f0
[   57.748307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.753775]  kthread+0x328/0x630
[   57.756987]  ret_from_fork+0x10/0x20
[   57.760546] 
[   57.762022] The buggy address belongs to the object at ffff000800c2e200
[   57.762022]  which belongs to the cache kmalloc-64 of size 64
[   57.774348] The buggy address is located 0 bytes to the right of
[   57.774348]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   57.787195] 
[   57.788671] The buggy address belongs to the physical page:
[   57.794227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   57.802212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.808723] page_type: f5(slab)
[   57.811855] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.819579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.827299] page dumped because: kasan: bad access detected
[   57.832854] 
[   57.834330] Memory state around the buggy address:
[   57.839108]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.846312]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.853517] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.860718]                                      ^
[   57.865496]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.872701]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.879902] ==================================================================
[   54.199614] ==================================================================
[   54.206696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   54.213985] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   54.221363] 
[   54.222842] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   54.222890] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.222906] Hardware name: WinLink E850-96 board (DT)
[   54.222924] Call trace:
[   54.222936]  show_stack+0x20/0x38 (C)
[   54.222969]  dump_stack_lvl+0x8c/0xd0
[   54.223006]  print_report+0x118/0x608
[   54.223039]  kasan_report+0xdc/0x128
[   54.223071]  kasan_check_range+0x100/0x1a8
[   54.223107]  __kasan_check_write+0x20/0x30
[   54.223138]  kasan_atomics_helper+0xc08/0x4858
[   54.223172]  kasan_atomics+0x198/0x2e0
[   54.223204]  kunit_try_run_case+0x170/0x3f0
[   54.223239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.223279]  kthread+0x328/0x630
[   54.223304]  ret_from_fork+0x10/0x20
[   54.223336] 
[   54.293931] Allocated by task 309:
[   54.297317]  kasan_save_stack+0x3c/0x68
[   54.301137]  kasan_save_track+0x20/0x40
[   54.304956]  kasan_save_alloc_info+0x40/0x58
[   54.309209]  __kasan_kmalloc+0xd4/0xd8
[   54.312942]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.317456]  kasan_atomics+0xb8/0x2e0
[   54.321101]  kunit_try_run_case+0x170/0x3f0
[   54.325268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.330736]  kthread+0x328/0x630
[   54.333948]  ret_from_fork+0x10/0x20
[   54.337507] 
[   54.338983] The buggy address belongs to the object at ffff000800c2e200
[   54.338983]  which belongs to the cache kmalloc-64 of size 64
[   54.351310] The buggy address is located 0 bytes to the right of
[   54.351310]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   54.364156] 
[   54.365632] The buggy address belongs to the physical page:
[   54.371188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   54.379174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.385684] page_type: f5(slab)
[   54.388816] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.396541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.404260] page dumped because: kasan: bad access detected
[   54.409815] 
[   54.411291] Memory state around the buggy address:
[   54.416068]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.423274]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.430478] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.437679]                                      ^
[   54.442457]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.449662]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.456863] ==================================================================
[   51.034563] ==================================================================
[   51.041640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858
[   51.048928] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   51.056306] 
[   51.057785] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   51.057832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.057846] Hardware name: WinLink E850-96 board (DT)
[   51.057864] Call trace:
[   51.057876]  show_stack+0x20/0x38 (C)
[   51.057908]  dump_stack_lvl+0x8c/0xd0
[   51.057942]  print_report+0x118/0x608
[   51.057975]  kasan_report+0xdc/0x128
[   51.058008]  kasan_check_range+0x100/0x1a8
[   51.058042]  __kasan_check_write+0x20/0x30
[   51.058072]  kasan_atomics_helper+0x760/0x4858
[   51.058104]  kasan_atomics+0x198/0x2e0
[   51.058134]  kunit_try_run_case+0x170/0x3f0
[   51.058166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.058207]  kthread+0x328/0x630
[   51.058234]  ret_from_fork+0x10/0x20
[   51.058266] 
[   51.128875] Allocated by task 309:
[   51.132260]  kasan_save_stack+0x3c/0x68
[   51.136080]  kasan_save_track+0x20/0x40
[   51.139899]  kasan_save_alloc_info+0x40/0x58
[   51.144153]  __kasan_kmalloc+0xd4/0xd8
[   51.147885]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.152399]  kasan_atomics+0xb8/0x2e0
[   51.156044]  kunit_try_run_case+0x170/0x3f0
[   51.160211]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.165680]  kthread+0x328/0x630
[   51.168892]  ret_from_fork+0x10/0x20
[   51.172451] 
[   51.173926] The buggy address belongs to the object at ffff000800c2e200
[   51.173926]  which belongs to the cache kmalloc-64 of size 64
[   51.186253] The buggy address is located 0 bytes to the right of
[   51.186253]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   51.199099] 
[   51.200575] The buggy address belongs to the physical page:
[   51.206131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   51.214117] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.220627] page_type: f5(slab)
[   51.223760] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.231484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.239203] page dumped because: kasan: bad access detected
[   51.244758] 
[   51.246234] Memory state around the buggy address:
[   51.251012]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.258217]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.265421] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.272622]                                      ^
[   51.277401]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.284605]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.291806] ==================================================================
[   59.475791] ==================================================================
[   59.482832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   59.490208] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   59.497586] 
[   59.499066] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   59.499113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.499130] Hardware name: WinLink E850-96 board (DT)
[   59.499148] Call trace:
[   59.499159]  show_stack+0x20/0x38 (C)
[   59.499193]  dump_stack_lvl+0x8c/0xd0
[   59.499229]  print_report+0x118/0x608
[   59.499266]  kasan_report+0xdc/0x128
[   59.499298]  kasan_check_range+0x100/0x1a8
[   59.499332]  __kasan_check_write+0x20/0x30
[   59.499362]  kasan_atomics_helper+0x12d8/0x4858
[   59.499395]  kasan_atomics+0x198/0x2e0
[   59.499425]  kunit_try_run_case+0x170/0x3f0
[   59.499458]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.499497]  kthread+0x328/0x630
[   59.499523]  ret_from_fork+0x10/0x20
[   59.499554] 
[   59.570241] Allocated by task 309:
[   59.573627]  kasan_save_stack+0x3c/0x68
[   59.577446]  kasan_save_track+0x20/0x40
[   59.581265]  kasan_save_alloc_info+0x40/0x58
[   59.585519]  __kasan_kmalloc+0xd4/0xd8
[   59.589251]  __kmalloc_cache_noprof+0x15c/0x3c0
[   59.593765]  kasan_atomics+0xb8/0x2e0
[   59.597411]  kunit_try_run_case+0x170/0x3f0
[   59.601577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.607046]  kthread+0x328/0x630
[   59.610258]  ret_from_fork+0x10/0x20
[   59.613817] 
[   59.615294] The buggy address belongs to the object at ffff000800c2e200
[   59.615294]  which belongs to the cache kmalloc-64 of size 64
[   59.627619] The buggy address is located 0 bytes to the right of
[   59.627619]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   59.640466] 
[   59.641941] The buggy address belongs to the physical page:
[   59.647498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   59.655483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.661993] page_type: f5(slab)
[   59.665126] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.672851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.680570] page dumped because: kasan: bad access detected
[   59.686126] 
[   59.687600] Memory state around the buggy address:
[   59.692379]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.699583]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.706788] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.713989]                                      ^
[   59.718766]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.725971]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.733173] ==================================================================
[   63.168413] ==================================================================
[   63.175487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   63.182861] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   63.190152] 
[   63.191632] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   63.191678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.191694] Hardware name: WinLink E850-96 board (DT)
[   63.191715] Call trace:
[   63.191726]  show_stack+0x20/0x38 (C)
[   63.191761]  dump_stack_lvl+0x8c/0xd0
[   63.191796]  print_report+0x118/0x608
[   63.191833]  kasan_report+0xdc/0x128
[   63.191866]  __asan_report_load8_noabort+0x20/0x30
[   63.191899]  kasan_atomics_helper+0x3e20/0x4858
[   63.191931]  kasan_atomics+0x198/0x2e0
[   63.191961]  kunit_try_run_case+0x170/0x3f0
[   63.191994]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.192032]  kthread+0x328/0x630
[   63.192059]  ret_from_fork+0x10/0x20
[   63.192091] 
[   63.259422] Allocated by task 309:
[   63.262807]  kasan_save_stack+0x3c/0x68
[   63.266627]  kasan_save_track+0x20/0x40
[   63.270446]  kasan_save_alloc_info+0x40/0x58
[   63.274699]  __kasan_kmalloc+0xd4/0xd8
[   63.278432]  __kmalloc_cache_noprof+0x15c/0x3c0
[   63.282946]  kasan_atomics+0xb8/0x2e0
[   63.286592]  kunit_try_run_case+0x170/0x3f0
[   63.290758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.296227]  kthread+0x328/0x630
[   63.299439]  ret_from_fork+0x10/0x20
[   63.302998] 
[   63.304473] The buggy address belongs to the object at ffff000800c2e200
[   63.304473]  which belongs to the cache kmalloc-64 of size 64
[   63.316800] The buggy address is located 0 bytes to the right of
[   63.316800]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   63.329646] 
[   63.331122] The buggy address belongs to the physical page:
[   63.336678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   63.344663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.351174] page_type: f5(slab)
[   63.354307] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.362031] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.369750] page dumped because: kasan: bad access detected
[   63.375307] 
[   63.376781] Memory state around the buggy address:
[   63.381559]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.388764]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.395969] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.403170]                                      ^
[   63.407947]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.415152]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.422353] ==================================================================
[   54.725478] ==================================================================
[   54.732557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   54.739845] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   54.747223] 
[   54.748703] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   54.748752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.748768] Hardware name: WinLink E850-96 board (DT)
[   54.748786] Call trace:
[   54.748798]  show_stack+0x20/0x38 (C)
[   54.748832]  dump_stack_lvl+0x8c/0xd0
[   54.748868]  print_report+0x118/0x608
[   54.748902]  kasan_report+0xdc/0x128
[   54.748933]  kasan_check_range+0x100/0x1a8
[   54.748968]  __kasan_check_write+0x20/0x30
[   54.748998]  kasan_atomics_helper+0xca0/0x4858
[   54.749031]  kasan_atomics+0x198/0x2e0
[   54.749065]  kunit_try_run_case+0x170/0x3f0
[   54.749098]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.749138]  kthread+0x328/0x630
[   54.749164]  ret_from_fork+0x10/0x20
[   54.749194] 
[   54.819791] Allocated by task 309:
[   54.823177]  kasan_save_stack+0x3c/0x68
[   54.826996]  kasan_save_track+0x20/0x40
[   54.830816]  kasan_save_alloc_info+0x40/0x58
[   54.835069]  __kasan_kmalloc+0xd4/0xd8
[   54.838802]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.843316]  kasan_atomics+0xb8/0x2e0
[   54.846961]  kunit_try_run_case+0x170/0x3f0
[   54.851128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.856597]  kthread+0x328/0x630
[   54.859808]  ret_from_fork+0x10/0x20
[   54.863367] 
[   54.864843] The buggy address belongs to the object at ffff000800c2e200
[   54.864843]  which belongs to the cache kmalloc-64 of size 64
[   54.877169] The buggy address is located 0 bytes to the right of
[   54.877169]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   54.890016] 
[   54.891494] The buggy address belongs to the physical page:
[   54.897048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   54.905033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.911544] page_type: f5(slab)
[   54.914676] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.922401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.930120] page dumped because: kasan: bad access detected
[   54.935675] 
[   54.937151] Memory state around the buggy address:
[   54.941929]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.949134]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.956338] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.963540]                                      ^
[   54.968317]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.975522]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.982723] ==================================================================
[   49.447087] ==================================================================
[   49.454163] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858
[   49.461452] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   49.468830] 
[   49.470310] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   49.470358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.470372] Hardware name: WinLink E850-96 board (DT)
[   49.470390] Call trace:
[   49.470403]  show_stack+0x20/0x38 (C)
[   49.470434]  dump_stack_lvl+0x8c/0xd0
[   49.470470]  print_report+0x118/0x608
[   49.470506]  kasan_report+0xdc/0x128
[   49.470538]  kasan_check_range+0x100/0x1a8
[   49.470573]  __kasan_check_write+0x20/0x30
[   49.470603]  kasan_atomics_helper+0x4e4/0x4858
[   49.470637]  kasan_atomics+0x198/0x2e0
[   49.470668]  kunit_try_run_case+0x170/0x3f0
[   49.470700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.470738]  kthread+0x328/0x630
[   49.470764]  ret_from_fork+0x10/0x20
[   49.470796] 
[   49.541398] Allocated by task 309:
[   49.544784]  kasan_save_stack+0x3c/0x68
[   49.548604]  kasan_save_track+0x20/0x40
[   49.552423]  kasan_save_alloc_info+0x40/0x58
[   49.556676]  __kasan_kmalloc+0xd4/0xd8
[   49.560409]  __kmalloc_cache_noprof+0x15c/0x3c0
[   49.564923]  kasan_atomics+0xb8/0x2e0
[   49.568568]  kunit_try_run_case+0x170/0x3f0
[   49.572735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.578204]  kthread+0x328/0x630
[   49.581416]  ret_from_fork+0x10/0x20
[   49.584974] 
[   49.586450] The buggy address belongs to the object at ffff000800c2e200
[   49.586450]  which belongs to the cache kmalloc-64 of size 64
[   49.598777] The buggy address is located 0 bytes to the right of
[   49.598777]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   49.611623] 
[   49.613099] The buggy address belongs to the physical page:
[   49.618655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   49.626641] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.633151] page_type: f5(slab)
[   49.636284] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.644008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.651727] page dumped because: kasan: bad access detected
[   49.657282] 
[   49.658758] Memory state around the buggy address:
[   49.663536]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.670741]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.677945] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.685147]                                      ^
[   49.689924]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.697129]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.704330] ==================================================================
[   47.865999] ==================================================================
[   47.873112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858
[   47.880486] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   47.887778] 
[   47.889258] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   47.889312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.889327] Hardware name: WinLink E850-96 board (DT)
[   47.889348] Call trace:
[   47.889360]  show_stack+0x20/0x38 (C)
[   47.889391]  dump_stack_lvl+0x8c/0xd0
[   47.889429]  print_report+0x118/0x608
[   47.889464]  kasan_report+0xdc/0x128
[   47.889496]  __asan_report_load4_noabort+0x20/0x30
[   47.889528]  kasan_atomics_helper+0x40fc/0x4858
[   47.889560]  kasan_atomics+0x198/0x2e0
[   47.889590]  kunit_try_run_case+0x170/0x3f0
[   47.889626]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.889665]  kthread+0x328/0x630
[   47.889693]  ret_from_fork+0x10/0x20
[   47.889727] 
[   47.957047] Allocated by task 309:
[   47.960433]  kasan_save_stack+0x3c/0x68
[   47.964252]  kasan_save_track+0x20/0x40
[   47.968072]  kasan_save_alloc_info+0x40/0x58
[   47.972325]  __kasan_kmalloc+0xd4/0xd8
[   47.976058]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.980571]  kasan_atomics+0xb8/0x2e0
[   47.984217]  kunit_try_run_case+0x170/0x3f0
[   47.988384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.993853]  kthread+0x328/0x630
[   47.997064]  ret_from_fork+0x10/0x20
[   48.000623] 
[   48.002100] The buggy address belongs to the object at ffff000800c2e200
[   48.002100]  which belongs to the cache kmalloc-64 of size 64
[   48.014426] The buggy address is located 0 bytes to the right of
[   48.014426]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   48.027272] 
[   48.028750] The buggy address belongs to the physical page:
[   48.034304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   48.042291] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.048800] page_type: f5(slab)
[   48.051934] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.059657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.067376] page dumped because: kasan: bad access detected
[   48.072931] 
[   48.074407] Memory state around the buggy address:
[   48.079187]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.086389]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.093596] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.100794]                                      ^
[   48.105573]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.112778]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.119979] ==================================================================
[   51.828322] ==================================================================
[   51.835377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   51.842753] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   51.850045] 
[   51.851524] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   51.851570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.851586] Hardware name: WinLink E850-96 board (DT)
[   51.851602] Call trace:
[   51.851614]  show_stack+0x20/0x38 (C)
[   51.851649]  dump_stack_lvl+0x8c/0xd0
[   51.851684]  print_report+0x118/0x608
[   51.851718]  kasan_report+0xdc/0x128
[   51.851749]  __asan_report_load4_noabort+0x20/0x30
[   51.851780]  kasan_atomics_helper+0x42d8/0x4858
[   51.851814]  kasan_atomics+0x198/0x2e0
[   51.851844]  kunit_try_run_case+0x170/0x3f0
[   51.851877]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.851915]  kthread+0x328/0x630
[   51.851942]  ret_from_fork+0x10/0x20
[   51.851974] 
[   51.919314] Allocated by task 309:
[   51.922700]  kasan_save_stack+0x3c/0x68
[   51.926519]  kasan_save_track+0x20/0x40
[   51.930338]  kasan_save_alloc_info+0x40/0x58
[   51.934592]  __kasan_kmalloc+0xd4/0xd8
[   51.938325]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.942838]  kasan_atomics+0xb8/0x2e0
[   51.946484]  kunit_try_run_case+0x170/0x3f0
[   51.950651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.956119]  kthread+0x328/0x630
[   51.959331]  ret_from_fork+0x10/0x20
[   51.962890] 
[   51.964365] The buggy address belongs to the object at ffff000800c2e200
[   51.964365]  which belongs to the cache kmalloc-64 of size 64
[   51.976693] The buggy address is located 0 bytes to the right of
[   51.976693]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   51.989539] 
[   51.991015] The buggy address belongs to the physical page:
[   51.996571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   52.004557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.011066] page_type: f5(slab)
[   52.014199] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.021924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.029642] page dumped because: kasan: bad access detected
[   52.035198] 
[   52.036674] Memory state around the buggy address:
[   52.041452]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.048656]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.055861] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.063062]                                      ^
[   52.067840]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.075045]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.082246] ==================================================================
[   56.302907] ==================================================================
[   56.309963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   56.317252] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   56.324630] 
[   56.326109] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   56.326156] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.326172] Hardware name: WinLink E850-96 board (DT)
[   56.326190] Call trace:
[   56.326200]  show_stack+0x20/0x38 (C)
[   56.326233]  dump_stack_lvl+0x8c/0xd0
[   56.326268]  print_report+0x118/0x608
[   56.326302]  kasan_report+0xdc/0x128
[   56.326335]  kasan_check_range+0x100/0x1a8
[   56.326370]  __kasan_check_write+0x20/0x30
[   56.326400]  kasan_atomics_helper+0xe44/0x4858
[   56.326432]  kasan_atomics+0x198/0x2e0
[   56.326464]  kunit_try_run_case+0x170/0x3f0
[   56.326497]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.326536]  kthread+0x328/0x630
[   56.326563]  ret_from_fork+0x10/0x20
[   56.326593] 
[   56.397198] Allocated by task 309:
[   56.400584]  kasan_save_stack+0x3c/0x68
[   56.404403]  kasan_save_track+0x20/0x40
[   56.408223]  kasan_save_alloc_info+0x40/0x58
[   56.412476]  __kasan_kmalloc+0xd4/0xd8
[   56.416209]  __kmalloc_cache_noprof+0x15c/0x3c0
[   56.420723]  kasan_atomics+0xb8/0x2e0
[   56.424368]  kunit_try_run_case+0x170/0x3f0
[   56.428535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.434004]  kthread+0x328/0x630
[   56.437215]  ret_from_fork+0x10/0x20
[   56.440774] 
[   56.442250] The buggy address belongs to the object at ffff000800c2e200
[   56.442250]  which belongs to the cache kmalloc-64 of size 64
[   56.454577] The buggy address is located 0 bytes to the right of
[   56.454577]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   56.467423] 
[   56.468899] The buggy address belongs to the physical page:
[   56.474455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   56.482441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.488951] page_type: f5(slab)
[   56.492083] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.499808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.507527] page dumped because: kasan: bad access detected
[   56.513082] 
[   56.514558] Memory state around the buggy address:
[   56.519336]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.526541]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.533745] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.540946]                                      ^
[   56.545724]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.552929]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.560130] ==================================================================
[   61.851567] ==================================================================
[   61.858668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   61.866040] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   61.873418] 
[   61.874900] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   61.874947] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.874962] Hardware name: WinLink E850-96 board (DT)
[   61.874980] Call trace:
[   61.874993]  show_stack+0x20/0x38 (C)
[   61.875028]  dump_stack_lvl+0x8c/0xd0
[   61.875062]  print_report+0x118/0x608
[   61.875098]  kasan_report+0xdc/0x128
[   61.875131]  kasan_check_range+0x100/0x1a8
[   61.875167]  __kasan_check_write+0x20/0x30
[   61.875195]  kasan_atomics_helper+0x1644/0x4858
[   61.875230]  kasan_atomics+0x198/0x2e0
[   61.875260]  kunit_try_run_case+0x170/0x3f0
[   61.875295]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.875334]  kthread+0x328/0x630
[   61.875360]  ret_from_fork+0x10/0x20
[   61.875392] 
[   61.946073] Allocated by task 309:
[   61.949462]  kasan_save_stack+0x3c/0x68
[   61.953279]  kasan_save_track+0x20/0x40
[   61.957098]  kasan_save_alloc_info+0x40/0x58
[   61.961351]  __kasan_kmalloc+0xd4/0xd8
[   61.965084]  __kmalloc_cache_noprof+0x15c/0x3c0
[   61.969598]  kasan_atomics+0xb8/0x2e0
[   61.973243]  kunit_try_run_case+0x170/0x3f0
[   61.977410]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.982879]  kthread+0x328/0x630
[   61.986090]  ret_from_fork+0x10/0x20
[   61.989649] 
[   61.991125] The buggy address belongs to the object at ffff000800c2e200
[   61.991125]  which belongs to the cache kmalloc-64 of size 64
[   62.003452] The buggy address is located 0 bytes to the right of
[   62.003452]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   62.016298] 
[   62.017774] The buggy address belongs to the physical page:
[   62.023330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   62.031317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.037826] page_type: f5(slab)
[   62.040958] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.048682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.056402] page dumped because: kasan: bad access detected
[   62.061957] 
[   62.063432] Memory state around the buggy address:
[   62.068211]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.075416]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.082620] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.089821]                                      ^
[   62.094599]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.101804]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.109005] ==================================================================
[   60.005265] ==================================================================
[   60.012340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   60.019714] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   60.027005] 
[   60.028485] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   60.028530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.028545] Hardware name: WinLink E850-96 board (DT)
[   60.028562] Call trace:
[   60.028575]  show_stack+0x20/0x38 (C)
[   60.028609]  dump_stack_lvl+0x8c/0xd0
[   60.028644]  print_report+0x118/0x608
[   60.028680]  kasan_report+0xdc/0x128
[   60.028713]  __asan_report_load8_noabort+0x20/0x30
[   60.028746]  kasan_atomics_helper+0x3f04/0x4858
[   60.028781]  kasan_atomics+0x198/0x2e0
[   60.028811]  kunit_try_run_case+0x170/0x3f0
[   60.028846]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.028885]  kthread+0x328/0x630
[   60.028913]  ret_from_fork+0x10/0x20
[   60.028943] 
[   60.096275] Allocated by task 309:
[   60.099660]  kasan_save_stack+0x3c/0x68
[   60.103480]  kasan_save_track+0x20/0x40
[   60.107299]  kasan_save_alloc_info+0x40/0x58
[   60.111552]  __kasan_kmalloc+0xd4/0xd8
[   60.115285]  __kmalloc_cache_noprof+0x15c/0x3c0
[   60.119799]  kasan_atomics+0xb8/0x2e0
[   60.123445]  kunit_try_run_case+0x170/0x3f0
[   60.127611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.133080]  kthread+0x328/0x630
[   60.136292]  ret_from_fork+0x10/0x20
[   60.139851] 
[   60.141328] The buggy address belongs to the object at ffff000800c2e200
[   60.141328]  which belongs to the cache kmalloc-64 of size 64
[   60.153654] The buggy address is located 0 bytes to the right of
[   60.153654]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   60.166499] 
[   60.167976] The buggy address belongs to the physical page:
[   60.173531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   60.181517] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.188027] page_type: f5(slab)
[   60.191160] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.198884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.206603] page dumped because: kasan: bad access detected
[   60.212160] 
[   60.213634] Memory state around the buggy address:
[   60.218412]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.225617]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.232821] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.240023]                                      ^
[   60.244801]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.252005]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.259206] ==================================================================
[   48.391917] ==================================================================
[   48.398969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858
[   48.406347] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   48.413725] 
[   48.415207] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   48.415256] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.415272] Hardware name: WinLink E850-96 board (DT)
[   48.415292] Call trace:
[   48.415305]  show_stack+0x20/0x38 (C)
[   48.415339]  dump_stack_lvl+0x8c/0xd0
[   48.415374]  print_report+0x118/0x608
[   48.415410]  kasan_report+0xdc/0x128
[   48.415443]  __asan_report_store4_noabort+0x20/0x30
[   48.415475]  kasan_atomics_helper+0x3f94/0x4858
[   48.415509]  kasan_atomics+0x198/0x2e0
[   48.415539]  kunit_try_run_case+0x170/0x3f0
[   48.415574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.415614]  kthread+0x328/0x630
[   48.415641]  ret_from_fork+0x10/0x20
[   48.415674] 
[   48.483081] Allocated by task 309:
[   48.486468]  kasan_save_stack+0x3c/0x68
[   48.490286]  kasan_save_track+0x20/0x40
[   48.494106]  kasan_save_alloc_info+0x40/0x58
[   48.498359]  __kasan_kmalloc+0xd4/0xd8
[   48.502091]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.506605]  kasan_atomics+0xb8/0x2e0
[   48.510251]  kunit_try_run_case+0x170/0x3f0
[   48.514418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.519886]  kthread+0x328/0x630
[   48.523098]  ret_from_fork+0x10/0x20
[   48.526657] 
[   48.528133] The buggy address belongs to the object at ffff000800c2e200
[   48.528133]  which belongs to the cache kmalloc-64 of size 64
[   48.540461] The buggy address is located 0 bytes to the right of
[   48.540461]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   48.553306] 
[   48.554782] The buggy address belongs to the physical page:
[   48.560339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   48.568325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.574833] page_type: f5(slab)
[   48.577966] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.585690] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.593410] page dumped because: kasan: bad access detected
[   48.598965] 
[   48.600440] Memory state around the buggy address:
[   48.605218]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.612423]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.619630] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.626829]                                      ^
[   48.631607]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.638812]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.646013] ==================================================================
[   62.642405] ==================================================================
[   62.649453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   62.656827] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   62.664118] 
[   62.665597] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   62.665647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.665664] Hardware name: WinLink E850-96 board (DT)
[   62.665681] Call trace:
[   62.665693]  show_stack+0x20/0x38 (C)
[   62.665726]  dump_stack_lvl+0x8c/0xd0
[   62.665760]  print_report+0x118/0x608
[   62.665795]  kasan_report+0xdc/0x128
[   62.665827]  __asan_report_load8_noabort+0x20/0x30
[   62.665859]  kasan_atomics_helper+0x3e10/0x4858
[   62.665891]  kasan_atomics+0x198/0x2e0
[   62.665924]  kunit_try_run_case+0x170/0x3f0
[   62.665957]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.665997]  kthread+0x328/0x630
[   62.666024]  ret_from_fork+0x10/0x20
[   62.666055] 
[   62.733388] Allocated by task 309:
[   62.736777]  kasan_save_stack+0x3c/0x68
[   62.740593]  kasan_save_track+0x20/0x40
[   62.744412]  kasan_save_alloc_info+0x40/0x58
[   62.748666]  __kasan_kmalloc+0xd4/0xd8
[   62.752398]  __kmalloc_cache_noprof+0x15c/0x3c0
[   62.756912]  kasan_atomics+0xb8/0x2e0
[   62.760558]  kunit_try_run_case+0x170/0x3f0
[   62.764724]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.770193]  kthread+0x328/0x630
[   62.773405]  ret_from_fork+0x10/0x20
[   62.776964] 
[   62.778440] The buggy address belongs to the object at ffff000800c2e200
[   62.778440]  which belongs to the cache kmalloc-64 of size 64
[   62.790766] The buggy address is located 0 bytes to the right of
[   62.790766]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   62.803613] 
[   62.805089] The buggy address belongs to the physical page:
[   62.810645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   62.818630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.825140] page_type: f5(slab)
[   62.828273] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.835997] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.843716] page dumped because: kasan: bad access detected
[   62.849273] 
[   62.850747] Memory state around the buggy address:
[   62.855525]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.862730]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.869935] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.877136]                                      ^
[   62.881914]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.889118]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.896320] ==================================================================
[   53.938347] ==================================================================
[   53.945415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   53.952791] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   53.960082] 
[   53.961562] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   53.961610] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.961625] Hardware name: WinLink E850-96 board (DT)
[   53.961643] Call trace:
[   53.961655]  show_stack+0x20/0x38 (C)
[   53.961685]  dump_stack_lvl+0x8c/0xd0
[   53.961720]  print_report+0x118/0x608
[   53.961756]  kasan_report+0xdc/0x128
[   53.961789]  __asan_report_load4_noabort+0x20/0x30
[   53.961821]  kasan_atomics_helper+0x3dbc/0x4858
[   53.961854]  kasan_atomics+0x198/0x2e0
[   53.961886]  kunit_try_run_case+0x170/0x3f0
[   53.961919]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.961957]  kthread+0x328/0x630
[   53.961984]  ret_from_fork+0x10/0x20
[   53.962015] 
[   54.029352] Allocated by task 309:
[   54.032738]  kasan_save_stack+0x3c/0x68
[   54.036557]  kasan_save_track+0x20/0x40
[   54.040376]  kasan_save_alloc_info+0x40/0x58
[   54.044630]  __kasan_kmalloc+0xd4/0xd8
[   54.048362]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.052876]  kasan_atomics+0xb8/0x2e0
[   54.056522]  kunit_try_run_case+0x170/0x3f0
[   54.060688]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.066157]  kthread+0x328/0x630
[   54.069369]  ret_from_fork+0x10/0x20
[   54.072928] 
[   54.074403] The buggy address belongs to the object at ffff000800c2e200
[   54.074403]  which belongs to the cache kmalloc-64 of size 64
[   54.086730] The buggy address is located 0 bytes to the right of
[   54.086730]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   54.099577] 
[   54.101052] The buggy address belongs to the physical page:
[   54.106609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   54.114594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.121104] page_type: f5(slab)
[   54.124237] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.131961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.139680] page dumped because: kasan: bad access detected
[   54.145236] 
[   54.146711] Memory state around the buggy address:
[   54.151489]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.158694]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.165899] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.173100]                                      ^
[   54.177878]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.185082]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.192284] ==================================================================
[   47.601600] ==================================================================
[   47.608707] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858
[   47.615996] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   47.623285] 
[   47.624765] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   47.624814] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.624831] Hardware name: WinLink E850-96 board (DT)
[   47.624853] Call trace:
[   47.624865]  show_stack+0x20/0x38 (C)
[   47.624900]  dump_stack_lvl+0x8c/0xd0
[   47.624939]  print_report+0x118/0x608
[   47.624974]  kasan_report+0xdc/0x128
[   47.625007]  kasan_check_range+0x100/0x1a8
[   47.625044]  __kasan_check_read+0x20/0x30
[   47.625072]  kasan_atomics_helper+0x2b0/0x4858
[   47.625105]  kasan_atomics+0x198/0x2e0
[   47.625137]  kunit_try_run_case+0x170/0x3f0
[   47.625173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.625214]  kthread+0x328/0x630
[   47.625240]  ret_from_fork+0x10/0x20
[   47.625274] 
[   47.695768] Allocated by task 309:
[   47.699152]  kasan_save_stack+0x3c/0x68
[   47.702972]  kasan_save_track+0x20/0x40
[   47.706791]  kasan_save_alloc_info+0x40/0x58
[   47.711044]  __kasan_kmalloc+0xd4/0xd8
[   47.714777]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.719291]  kasan_atomics+0xb8/0x2e0
[   47.722936]  kunit_try_run_case+0x170/0x3f0
[   47.727103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.732572]  kthread+0x328/0x630
[   47.735783]  ret_from_fork+0x10/0x20
[   47.739343] 
[   47.740821] The buggy address belongs to the object at ffff000800c2e200
[   47.740821]  which belongs to the cache kmalloc-64 of size 64
[   47.753145] The buggy address is located 0 bytes to the right of
[   47.753145]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   47.765991] 
[   47.767469] The buggy address belongs to the physical page:
[   47.773023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   47.781010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.787520] page_type: f5(slab)
[   47.790653] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.798375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.806095] page dumped because: kasan: bad access detected
[   47.811652] 
[   47.813126] Memory state around the buggy address:
[   47.817907]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.825108]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.832317] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.839515]                                      ^
[   47.844292]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.851497]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.858698] ==================================================================
[   53.147897] ==================================================================
[   53.154975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   53.162265] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   53.169643] 
[   53.171122] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   53.171170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.171187] Hardware name: WinLink E850-96 board (DT)
[   53.171205] Call trace:
[   53.171217]  show_stack+0x20/0x38 (C)
[   53.171248]  dump_stack_lvl+0x8c/0xd0
[   53.171282]  print_report+0x118/0x608
[   53.171320]  kasan_report+0xdc/0x128
[   53.171352]  kasan_check_range+0x100/0x1a8
[   53.171386]  __kasan_check_write+0x20/0x30
[   53.171415]  kasan_atomics_helper+0xad4/0x4858
[   53.171450]  kasan_atomics+0x198/0x2e0
[   53.171481]  kunit_try_run_case+0x170/0x3f0
[   53.171513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.171553]  kthread+0x328/0x630
[   53.171579]  ret_from_fork+0x10/0x20
[   53.171611] 
[   53.242211] Allocated by task 309:
[   53.245596]  kasan_save_stack+0x3c/0x68
[   53.249416]  kasan_save_track+0x20/0x40
[   53.253235]  kasan_save_alloc_info+0x40/0x58
[   53.257489]  __kasan_kmalloc+0xd4/0xd8
[   53.261221]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.265735]  kasan_atomics+0xb8/0x2e0
[   53.269381]  kunit_try_run_case+0x170/0x3f0
[   53.273548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.279016]  kthread+0x328/0x630
[   53.282228]  ret_from_fork+0x10/0x20
[   53.285787] 
[   53.287263] The buggy address belongs to the object at ffff000800c2e200
[   53.287263]  which belongs to the cache kmalloc-64 of size 64
[   53.299589] The buggy address is located 0 bytes to the right of
[   53.299589]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   53.312436] 
[   53.313911] The buggy address belongs to the physical page:
[   53.319468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   53.327453] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.333963] page_type: f5(slab)
[   53.337096] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.344821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.352539] page dumped because: kasan: bad access detected
[   53.358095] 
[   53.359570] Memory state around the buggy address:
[   53.364348]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.371553]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.378758] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.385959]                                      ^
[   53.390737]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.397941]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.405143] ==================================================================
[   58.681481] ==================================================================
[   58.688575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   58.695949] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   58.703327] 
[   58.704806] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   58.704855] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.704872] Hardware name: WinLink E850-96 board (DT)
[   58.704889] Call trace:
[   58.704902]  show_stack+0x20/0x38 (C)
[   58.704936]  dump_stack_lvl+0x8c/0xd0
[   58.704971]  print_report+0x118/0x608
[   58.705004]  kasan_report+0xdc/0x128
[   58.705036]  kasan_check_range+0x100/0x1a8
[   58.705071]  __kasan_check_write+0x20/0x30
[   58.705101]  kasan_atomics_helper+0x1190/0x4858
[   58.705134]  kasan_atomics+0x198/0x2e0
[   58.705165]  kunit_try_run_case+0x170/0x3f0
[   58.705197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.705237]  kthread+0x328/0x630
[   58.705264]  ret_from_fork+0x10/0x20
[   58.705295] 
[   58.775982] Allocated by task 309:
[   58.779368]  kasan_save_stack+0x3c/0x68
[   58.783187]  kasan_save_track+0x20/0x40
[   58.787006]  kasan_save_alloc_info+0x40/0x58
[   58.791260]  __kasan_kmalloc+0xd4/0xd8
[   58.794992]  __kmalloc_cache_noprof+0x15c/0x3c0
[   58.799506]  kasan_atomics+0xb8/0x2e0
[   58.803152]  kunit_try_run_case+0x170/0x3f0
[   58.807318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.812787]  kthread+0x328/0x630
[   58.815999]  ret_from_fork+0x10/0x20
[   58.819558] 
[   58.821035] The buggy address belongs to the object at ffff000800c2e200
[   58.821035]  which belongs to the cache kmalloc-64 of size 64
[   58.833360] The buggy address is located 0 bytes to the right of
[   58.833360]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   58.846207] 
[   58.847683] The buggy address belongs to the physical page:
[   58.853239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   58.861224] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.867734] page_type: f5(slab)
[   58.870867] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.878591] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.886311] page dumped because: kasan: bad access detected
[   58.891867] 
[   58.893341] Memory state around the buggy address:
[   58.898120]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.905324]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.912529] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.919730]                                      ^
[   58.924508]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.931713]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.938914] ==================================================================
[   46.542852] ==================================================================
[   46.556985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858
[   46.564363] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   46.571651] 
[   46.573141] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   46.573202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.573219] Hardware name: WinLink E850-96 board (DT)
[   46.573242] Call trace:
[   46.573257]  show_stack+0x20/0x38 (C)
[   46.573296]  dump_stack_lvl+0x8c/0xd0
[   46.573333]  print_report+0x118/0x608
[   46.573370]  kasan_report+0xdc/0x128
[   46.573402]  __asan_report_load4_noabort+0x20/0x30
[   46.573436]  kasan_atomics_helper+0x40a8/0x4858
[   46.573472]  kasan_atomics+0x198/0x2e0
[   46.573504]  kunit_try_run_case+0x170/0x3f0
[   46.573541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.573582]  kthread+0x328/0x630
[   46.573611]  ret_from_fork+0x10/0x20
[   46.573650] 
[   46.640923] Allocated by task 309:
[   46.644311]  kasan_save_stack+0x3c/0x68
[   46.648126]  kasan_save_track+0x20/0x40
[   46.651946]  kasan_save_alloc_info+0x40/0x58
[   46.656199]  __kasan_kmalloc+0xd4/0xd8
[   46.659932]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.664445]  kasan_atomics+0xb8/0x2e0
[   46.668091]  kunit_try_run_case+0x170/0x3f0
[   46.672258]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.677728]  kthread+0x328/0x630
[   46.680938]  ret_from_fork+0x10/0x20
[   46.684497] 
[   46.685975] The buggy address belongs to the object at ffff000800c2e200
[   46.685975]  which belongs to the cache kmalloc-64 of size 64
[   46.698301] The buggy address is located 0 bytes to the right of
[   46.698301]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   46.711146] 
[   46.712624] The buggy address belongs to the physical page:
[   46.718181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   46.726168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.732675] page_type: f5(slab)
[   46.735812] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   46.743531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   46.751251] page dumped because: kasan: bad access detected
[   46.756807] 
[   46.758281] Memory state around the buggy address:
[   46.763062]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.770263]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   46.777470] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   46.784669]                                      ^
[   46.789447]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.796652]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   46.803854] ==================================================================
[   50.769991] ==================================================================
[   50.777059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858
[   50.784349] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   50.791727] 
[   50.793207] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   50.793254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.793271] Hardware name: WinLink E850-96 board (DT)
[   50.793290] Call trace:
[   50.793302]  show_stack+0x20/0x38 (C)
[   50.793336]  dump_stack_lvl+0x8c/0xd0
[   50.793371]  print_report+0x118/0x608
[   50.793405]  kasan_report+0xdc/0x128
[   50.793438]  kasan_check_range+0x100/0x1a8
[   50.793473]  __kasan_check_write+0x20/0x30
[   50.793502]  kasan_atomics_helper+0x6ec/0x4858
[   50.793535]  kasan_atomics+0x198/0x2e0
[   50.793566]  kunit_try_run_case+0x170/0x3f0
[   50.793599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.793637]  kthread+0x328/0x630
[   50.793663]  ret_from_fork+0x10/0x20
[   50.793692] 
[   50.864295] Allocated by task 309:
[   50.867681]  kasan_save_stack+0x3c/0x68
[   50.871500]  kasan_save_track+0x20/0x40
[   50.875320]  kasan_save_alloc_info+0x40/0x58
[   50.879573]  __kasan_kmalloc+0xd4/0xd8
[   50.883305]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.887819]  kasan_atomics+0xb8/0x2e0
[   50.891465]  kunit_try_run_case+0x170/0x3f0
[   50.895632]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.901101]  kthread+0x328/0x630
[   50.904312]  ret_from_fork+0x10/0x20
[   50.907871] 
[   50.909347] The buggy address belongs to the object at ffff000800c2e200
[   50.909347]  which belongs to the cache kmalloc-64 of size 64
[   50.921673] The buggy address is located 0 bytes to the right of
[   50.921673]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   50.934520] 
[   50.935996] The buggy address belongs to the physical page:
[   50.941552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   50.949538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.956047] page_type: f5(slab)
[   50.959180] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.966905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.974624] page dumped because: kasan: bad access detected
[   50.980179] 
[   50.981655] Memory state around the buggy address:
[   50.986433]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.993638]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.000842] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.008043]                                      ^
[   51.012821]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.020026]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.027227] ==================================================================
[   56.041603] ==================================================================
[   56.048683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   56.056058] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   56.063349] 
[   56.064829] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   56.064875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.064890] Hardware name: WinLink E850-96 board (DT)
[   56.064908] Call trace:
[   56.064920]  show_stack+0x20/0x38 (C)
[   56.064952]  dump_stack_lvl+0x8c/0xd0
[   56.064987]  print_report+0x118/0x608
[   56.065021]  kasan_report+0xdc/0x128
[   56.065054]  __asan_report_load8_noabort+0x20/0x30
[   56.065086]  kasan_atomics_helper+0x3f58/0x4858
[   56.065120]  kasan_atomics+0x198/0x2e0
[   56.065151]  kunit_try_run_case+0x170/0x3f0
[   56.065185]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.065223]  kthread+0x328/0x630
[   56.065248]  ret_from_fork+0x10/0x20
[   56.065279] 
[   56.132619] Allocated by task 309:
[   56.136004]  kasan_save_stack+0x3c/0x68
[   56.139824]  kasan_save_track+0x20/0x40
[   56.143643]  kasan_save_alloc_info+0x40/0x58
[   56.147897]  __kasan_kmalloc+0xd4/0xd8
[   56.151629]  __kmalloc_cache_noprof+0x15c/0x3c0
[   56.156143]  kasan_atomics+0xb8/0x2e0
[   56.159789]  kunit_try_run_case+0x170/0x3f0
[   56.163956]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.169424]  kthread+0x328/0x630
[   56.172636]  ret_from_fork+0x10/0x20
[   56.176195] 
[   56.177671] The buggy address belongs to the object at ffff000800c2e200
[   56.177671]  which belongs to the cache kmalloc-64 of size 64
[   56.189997] The buggy address is located 0 bytes to the right of
[   56.189997]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   56.202844] 
[   56.204320] The buggy address belongs to the physical page:
[   56.209875] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   56.217861] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   56.224371] page_type: f5(slab)
[   56.227504] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   56.235229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   56.242948] page dumped because: kasan: bad access detected
[   56.248503] 
[   56.249978] Memory state around the buggy address:
[   56.254756]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.261961]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.269166] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.276367]                                      ^
[   56.281145]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.288349]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.295551] ==================================================================
[   50.240898] ==================================================================
[   50.247900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   50.255190] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   50.262568] 
[   50.264048] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   50.264095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.264113] Hardware name: WinLink E850-96 board (DT)
[   50.264129] Call trace:
[   50.264141]  show_stack+0x20/0x38 (C)
[   50.264175]  dump_stack_lvl+0x8c/0xd0
[   50.264214]  print_report+0x118/0x608
[   50.264251]  kasan_report+0xdc/0x128
[   50.264284]  kasan_check_range+0x100/0x1a8
[   50.264318]  __kasan_check_write+0x20/0x30
[   50.264348]  kasan_atomics_helper+0x61c/0x4858
[   50.264380]  kasan_atomics+0x198/0x2e0
[   50.264410]  kunit_try_run_case+0x170/0x3f0
[   50.264443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.264483]  kthread+0x328/0x630
[   50.264511]  ret_from_fork+0x10/0x20
[   50.264541] 
[   50.335137] Allocated by task 309:
[   50.338522]  kasan_save_stack+0x3c/0x68
[   50.342342]  kasan_save_track+0x20/0x40
[   50.346161]  kasan_save_alloc_info+0x40/0x58
[   50.350414]  __kasan_kmalloc+0xd4/0xd8
[   50.354147]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.358661]  kasan_atomics+0xb8/0x2e0
[   50.362306]  kunit_try_run_case+0x170/0x3f0
[   50.366473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.371942]  kthread+0x328/0x630
[   50.375154]  ret_from_fork+0x10/0x20
[   50.378713] 
[   50.380188] The buggy address belongs to the object at ffff000800c2e200
[   50.380188]  which belongs to the cache kmalloc-64 of size 64
[   50.392515] The buggy address is located 0 bytes to the right of
[   50.392515]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   50.405361] 
[   50.406838] The buggy address belongs to the physical page:
[   50.412393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   50.420378] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.426889] page_type: f5(slab)
[   50.430023] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.437746] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.445465] page dumped because: kasan: bad access detected
[   50.451021] 
[   50.452496] Memory state around the buggy address:
[   50.457274]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.464479]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.471684] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.478884]                                      ^
[   50.483662]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.490867]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.498068] ==================================================================
[   59.211010] ==================================================================
[   59.218081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   59.225455] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   59.232833] 
[   59.234314] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   59.234359] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.234376] Hardware name: WinLink E850-96 board (DT)
[   59.234393] Call trace:
[   59.234404]  show_stack+0x20/0x38 (C)
[   59.234438]  dump_stack_lvl+0x8c/0xd0
[   59.234473]  print_report+0x118/0x608
[   59.234510]  kasan_report+0xdc/0x128
[   59.234543]  kasan_check_range+0x100/0x1a8
[   59.234577]  __kasan_check_write+0x20/0x30
[   59.234609]  kasan_atomics_helper+0x126c/0x4858
[   59.234644]  kasan_atomics+0x198/0x2e0
[   59.234675]  kunit_try_run_case+0x170/0x3f0
[   59.234711]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.234749]  kthread+0x328/0x630
[   59.234775]  ret_from_fork+0x10/0x20
[   59.234805] 
[   59.305488] Allocated by task 309:
[   59.308875]  kasan_save_stack+0x3c/0x68
[   59.312693]  kasan_save_track+0x20/0x40
[   59.316513]  kasan_save_alloc_info+0x40/0x58
[   59.320766]  __kasan_kmalloc+0xd4/0xd8
[   59.324498]  __kmalloc_cache_noprof+0x15c/0x3c0
[   59.329012]  kasan_atomics+0xb8/0x2e0
[   59.332658]  kunit_try_run_case+0x170/0x3f0
[   59.336825]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.342293]  kthread+0x328/0x630
[   59.345505]  ret_from_fork+0x10/0x20
[   59.349064] 
[   59.350540] The buggy address belongs to the object at ffff000800c2e200
[   59.350540]  which belongs to the cache kmalloc-64 of size 64
[   59.362866] The buggy address is located 0 bytes to the right of
[   59.362866]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   59.375713] 
[   59.377188] The buggy address belongs to the physical page:
[   59.382745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   59.390730] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.397240] page_type: f5(slab)
[   59.400373] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.408097] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.415816] page dumped because: kasan: bad access detected
[   59.421373] 
[   59.422847] Memory state around the buggy address:
[   59.427625]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.434830]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.442035] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.449236]                                      ^
[   59.454014]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.461218]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.468420] ==================================================================
[   62.377633] ==================================================================
[   62.384699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   62.392074] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   62.399452] 
[   62.400934] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   62.400983] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.401000] Hardware name: WinLink E850-96 board (DT)
[   62.401016] Call trace:
[   62.401027]  show_stack+0x20/0x38 (C)
[   62.401062]  dump_stack_lvl+0x8c/0xd0
[   62.401097]  print_report+0x118/0x608
[   62.401133]  kasan_report+0xdc/0x128
[   62.401166]  kasan_check_range+0x100/0x1a8
[   62.401201]  __kasan_check_write+0x20/0x30
[   62.401229]  kasan_atomics_helper+0x16d0/0x4858
[   62.401262]  kasan_atomics+0x198/0x2e0
[   62.401294]  kunit_try_run_case+0x170/0x3f0
[   62.401326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.401365]  kthread+0x328/0x630
[   62.401392]  ret_from_fork+0x10/0x20
[   62.401425] 
[   62.472107] Allocated by task 309:
[   62.475494]  kasan_save_stack+0x3c/0x68
[   62.479312]  kasan_save_track+0x20/0x40
[   62.483132]  kasan_save_alloc_info+0x40/0x58
[   62.487385]  __kasan_kmalloc+0xd4/0xd8
[   62.491118]  __kmalloc_cache_noprof+0x15c/0x3c0
[   62.495632]  kasan_atomics+0xb8/0x2e0
[   62.499277]  kunit_try_run_case+0x170/0x3f0
[   62.503444]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.508912]  kthread+0x328/0x630
[   62.512124]  ret_from_fork+0x10/0x20
[   62.515683] 
[   62.517160] The buggy address belongs to the object at ffff000800c2e200
[   62.517160]  which belongs to the cache kmalloc-64 of size 64
[   62.529486] The buggy address is located 0 bytes to the right of
[   62.529486]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   62.542332] 
[   62.543809] The buggy address belongs to the physical page:
[   62.549364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   62.557349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   62.563860] page_type: f5(slab)
[   62.566992] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   62.574717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   62.582435] page dumped because: kasan: bad access detected
[   62.587992] 
[   62.589466] Memory state around the buggy address:
[   62.594245]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.601449]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   62.608654] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   62.615855]                                      ^
[   62.620633]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.627838]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   62.635039] ==================================================================
[   54.990081] ==================================================================
[   54.997135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   55.004511] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   55.011803] 
[   55.013282] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   55.013330] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.013346] Hardware name: WinLink E850-96 board (DT)
[   55.013367] Call trace:
[   55.013379]  show_stack+0x20/0x38 (C)
[   55.013412]  dump_stack_lvl+0x8c/0xd0
[   55.013448]  print_report+0x118/0x608
[   55.013482]  kasan_report+0xdc/0x128
[   55.013515]  __asan_report_load4_noabort+0x20/0x30
[   55.013546]  kasan_atomics_helper+0x3dd8/0x4858
[   55.013580]  kasan_atomics+0x198/0x2e0
[   55.013611]  kunit_try_run_case+0x170/0x3f0
[   55.013646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.013684]  kthread+0x328/0x630
[   55.013711]  ret_from_fork+0x10/0x20
[   55.013743] 
[   55.081072] Allocated by task 309:
[   55.084458]  kasan_save_stack+0x3c/0x68
[   55.088277]  kasan_save_track+0x20/0x40
[   55.092097]  kasan_save_alloc_info+0x40/0x58
[   55.096350]  __kasan_kmalloc+0xd4/0xd8
[   55.100083]  __kmalloc_cache_noprof+0x15c/0x3c0
[   55.104596]  kasan_atomics+0xb8/0x2e0
[   55.108242]  kunit_try_run_case+0x170/0x3f0
[   55.112409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.117877]  kthread+0x328/0x630
[   55.121089]  ret_from_fork+0x10/0x20
[   55.124648] 
[   55.126124] The buggy address belongs to the object at ffff000800c2e200
[   55.126124]  which belongs to the cache kmalloc-64 of size 64
[   55.138450] The buggy address is located 0 bytes to the right of
[   55.138450]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   55.151297] 
[   55.152773] The buggy address belongs to the physical page:
[   55.158329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   55.166314] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.172825] page_type: f5(slab)
[   55.175957] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.183682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.191400] page dumped because: kasan: bad access detected
[   55.196956] 
[   55.198432] Memory state around the buggy address:
[   55.203209]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.210414]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.217619] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.224820]                                      ^
[   55.229598]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.236803]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.244004] ==================================================================
[   59.740516] ==================================================================
[   59.747587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   59.754961] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   59.762339] 
[   59.763819] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   59.763863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   59.763881] Hardware name: WinLink E850-96 board (DT)
[   59.763898] Call trace:
[   59.763910]  show_stack+0x20/0x38 (C)
[   59.763945]  dump_stack_lvl+0x8c/0xd0
[   59.763980]  print_report+0x118/0x608
[   59.764018]  kasan_report+0xdc/0x128
[   59.764049]  kasan_check_range+0x100/0x1a8
[   59.764083]  __kasan_check_write+0x20/0x30
[   59.764114]  kasan_atomics_helper+0x1384/0x4858
[   59.764148]  kasan_atomics+0x198/0x2e0
[   59.764180]  kunit_try_run_case+0x170/0x3f0
[   59.764214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.764253]  kthread+0x328/0x630
[   59.764281]  ret_from_fork+0x10/0x20
[   59.764312] 
[   59.834994] Allocated by task 309:
[   59.838380]  kasan_save_stack+0x3c/0x68
[   59.842199]  kasan_save_track+0x20/0x40
[   59.846018]  kasan_save_alloc_info+0x40/0x58
[   59.850272]  __kasan_kmalloc+0xd4/0xd8
[   59.854004]  __kmalloc_cache_noprof+0x15c/0x3c0
[   59.858518]  kasan_atomics+0xb8/0x2e0
[   59.862164]  kunit_try_run_case+0x170/0x3f0
[   59.866331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.871799]  kthread+0x328/0x630
[   59.875011]  ret_from_fork+0x10/0x20
[   59.878570] 
[   59.880047] The buggy address belongs to the object at ffff000800c2e200
[   59.880047]  which belongs to the cache kmalloc-64 of size 64
[   59.892372] The buggy address is located 0 bytes to the right of
[   59.892372]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   59.905219] 
[   59.906696] The buggy address belongs to the physical page:
[   59.912251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   59.920236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.926746] page_type: f5(slab)
[   59.929879] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.937604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.945322] page dumped because: kasan: bad access detected
[   59.950879] 
[   59.952353] Memory state around the buggy address:
[   59.957131]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.964336]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.971541] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.978742]                                      ^
[   59.983520]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.990724]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.997925] ==================================================================
[   49.711690] ==================================================================
[   49.718742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858
[   49.726032] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   49.733410] 
[   49.734889] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   49.734938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.734956] Hardware name: WinLink E850-96 board (DT)
[   49.734973] Call trace:
[   49.734985]  show_stack+0x20/0x38 (C)
[   49.735020]  dump_stack_lvl+0x8c/0xd0
[   49.735056]  print_report+0x118/0x608
[   49.735093]  kasan_report+0xdc/0x128
[   49.735126]  kasan_check_range+0x100/0x1a8
[   49.735161]  __kasan_check_write+0x20/0x30
[   49.735190]  kasan_atomics_helper+0x54c/0x4858
[   49.735225]  kasan_atomics+0x198/0x2e0
[   49.735257]  kunit_try_run_case+0x170/0x3f0
[   49.735289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.735327]  kthread+0x328/0x630
[   49.735354]  ret_from_fork+0x10/0x20
[   49.735384] 
[   49.805978] Allocated by task 309:
[   49.809364]  kasan_save_stack+0x3c/0x68
[   49.813183]  kasan_save_track+0x20/0x40
[   49.817002]  kasan_save_alloc_info+0x40/0x58
[   49.821255]  __kasan_kmalloc+0xd4/0xd8
[   49.824988]  __kmalloc_cache_noprof+0x15c/0x3c0
[   49.829502]  kasan_atomics+0xb8/0x2e0
[   49.833148]  kunit_try_run_case+0x170/0x3f0
[   49.837314]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.842783]  kthread+0x328/0x630
[   49.845995]  ret_from_fork+0x10/0x20
[   49.849554] 
[   49.851029] The buggy address belongs to the object at ffff000800c2e200
[   49.851029]  which belongs to the cache kmalloc-64 of size 64
[   49.863356] The buggy address is located 0 bytes to the right of
[   49.863356]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   49.876203] 
[   49.877679] The buggy address belongs to the physical page:
[   49.883234] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   49.891220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.897730] page_type: f5(slab)
[   49.900863] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.908587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.916306] page dumped because: kasan: bad access detected
[   49.921861] 
[   49.923337] Memory state around the buggy address:
[   49.928115]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.935320]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.942525] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.949726]                                      ^
[   49.954503]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.961709]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.968910] ==================================================================
[   60.531331] ==================================================================
[   60.538375] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   60.545748] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   60.553126] 
[   60.554605] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   60.554652] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.554668] Hardware name: WinLink E850-96 board (DT)
[   60.554686] Call trace:
[   60.554699]  show_stack+0x20/0x38 (C)
[   60.554733]  dump_stack_lvl+0x8c/0xd0
[   60.554767]  print_report+0x118/0x608
[   60.554803]  kasan_report+0xdc/0x128
[   60.554835]  kasan_check_range+0x100/0x1a8
[   60.554871]  __kasan_check_write+0x20/0x30
[   60.554899]  kasan_atomics_helper+0x147c/0x4858
[   60.554934]  kasan_atomics+0x198/0x2e0
[   60.554966]  kunit_try_run_case+0x170/0x3f0
[   60.554999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.555038]  kthread+0x328/0x630
[   60.555066]  ret_from_fork+0x10/0x20
[   60.555098] 
[   60.625781] Allocated by task 309:
[   60.629168]  kasan_save_stack+0x3c/0x68
[   60.632986]  kasan_save_track+0x20/0x40
[   60.636805]  kasan_save_alloc_info+0x40/0x58
[   60.641058]  __kasan_kmalloc+0xd4/0xd8
[   60.644791]  __kmalloc_cache_noprof+0x15c/0x3c0
[   60.649305]  kasan_atomics+0xb8/0x2e0
[   60.652951]  kunit_try_run_case+0x170/0x3f0
[   60.657117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.662586]  kthread+0x328/0x630
[   60.665798]  ret_from_fork+0x10/0x20
[   60.669357] 
[   60.670832] The buggy address belongs to the object at ffff000800c2e200
[   60.670832]  which belongs to the cache kmalloc-64 of size 64
[   60.683159] The buggy address is located 0 bytes to the right of
[   60.683159]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   60.696006] 
[   60.697482] The buggy address belongs to the physical page:
[   60.703037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   60.711023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.717533] page_type: f5(slab)
[   60.720666] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.728390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.736109] page dumped because: kasan: bad access detected
[   60.741666] 
[   60.743140] Memory state around the buggy address:
[   60.747920]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.755123]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.762328] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.769528]                                      ^
[   60.774307]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.781511]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.788713] ==================================================================
[   48.653380] ==================================================================
[   48.660426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858
[   48.667714] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   48.675092] 
[   48.676573] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   48.676620] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.676636] Hardware name: WinLink E850-96 board (DT)
[   48.676656] Call trace:
[   48.676670]  show_stack+0x20/0x38 (C)
[   48.676701]  dump_stack_lvl+0x8c/0xd0
[   48.676737]  print_report+0x118/0x608
[   48.676772]  kasan_report+0xdc/0x128
[   48.676805]  kasan_check_range+0x100/0x1a8
[   48.676843]  __kasan_check_write+0x20/0x30
[   48.676872]  kasan_atomics_helper+0x3ac/0x4858
[   48.676904]  kasan_atomics+0x198/0x2e0
[   48.676935]  kunit_try_run_case+0x170/0x3f0
[   48.676968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.677007]  kthread+0x328/0x630
[   48.677035]  ret_from_fork+0x10/0x20
[   48.677066] 
[   48.747661] Allocated by task 309:
[   48.751046]  kasan_save_stack+0x3c/0x68
[   48.754866]  kasan_save_track+0x20/0x40
[   48.758685]  kasan_save_alloc_info+0x40/0x58
[   48.762938]  __kasan_kmalloc+0xd4/0xd8
[   48.766671]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.771185]  kasan_atomics+0xb8/0x2e0
[   48.774830]  kunit_try_run_case+0x170/0x3f0
[   48.778997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.784466]  kthread+0x328/0x630
[   48.787677]  ret_from_fork+0x10/0x20
[   48.791236] 
[   48.792712] The buggy address belongs to the object at ffff000800c2e200
[   48.792712]  which belongs to the cache kmalloc-64 of size 64
[   48.805039] The buggy address is located 0 bytes to the right of
[   48.805039]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   48.817885] 
[   48.819361] The buggy address belongs to the physical page:
[   48.824917] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   48.832903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.839413] page_type: f5(slab)
[   48.842546] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.850270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.857989] page dumped because: kasan: bad access detected
[   48.863544] 
[   48.865020] Memory state around the buggy address:
[   48.869798]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.877002]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.884209] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.891408]                                      ^
[   48.896186]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.903391]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.910592] ==================================================================
[   50.505432] ==================================================================
[   50.512480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858
[   50.519770] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   50.527147] 
[   50.528629] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   50.528674] Tainted: [B]=BAD_PAGE, [N]=TEST
[   50.528690] Hardware name: WinLink E850-96 board (DT)
[   50.528708] Call trace:
[   50.528720]  show_stack+0x20/0x38 (C)
[   50.528753]  dump_stack_lvl+0x8c/0xd0
[   50.528788]  print_report+0x118/0x608
[   50.528821]  kasan_report+0xdc/0x128
[   50.528854]  kasan_check_range+0x100/0x1a8
[   50.528891]  __kasan_check_write+0x20/0x30
[   50.528922]  kasan_atomics_helper+0x684/0x4858
[   50.528957]  kasan_atomics+0x198/0x2e0
[   50.528987]  kunit_try_run_case+0x170/0x3f0
[   50.529020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.529058]  kthread+0x328/0x630
[   50.529084]  ret_from_fork+0x10/0x20
[   50.529114] 
[   50.599716] Allocated by task 309:
[   50.603101]  kasan_save_stack+0x3c/0x68
[   50.606921]  kasan_save_track+0x20/0x40
[   50.610740]  kasan_save_alloc_info+0x40/0x58
[   50.614994]  __kasan_kmalloc+0xd4/0xd8
[   50.618726]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.623240]  kasan_atomics+0xb8/0x2e0
[   50.626886]  kunit_try_run_case+0x170/0x3f0
[   50.631053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.636521]  kthread+0x328/0x630
[   50.639733]  ret_from_fork+0x10/0x20
[   50.643292] 
[   50.644767] The buggy address belongs to the object at ffff000800c2e200
[   50.644767]  which belongs to the cache kmalloc-64 of size 64
[   50.657094] The buggy address is located 0 bytes to the right of
[   50.657094]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   50.669941] 
[   50.671416] The buggy address belongs to the physical page:
[   50.676973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   50.684958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.691468] page_type: f5(slab)
[   50.694601] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.702325] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.710044] page dumped because: kasan: bad access detected
[   50.715599] 
[   50.717075] Memory state around the buggy address:
[   50.721853]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.729058]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.736263] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.743464]                                      ^
[   50.748242]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.755447]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.762648] ==================================================================
[   52.354168] ==================================================================
[   52.361237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   52.368527] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   52.375905] 
[   52.377384] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   52.377430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.377445] Hardware name: WinLink E850-96 board (DT)
[   52.377463] Call trace:
[   52.377475]  show_stack+0x20/0x38 (C)
[   52.377507]  dump_stack_lvl+0x8c/0xd0
[   52.377542]  print_report+0x118/0x608
[   52.377576]  kasan_report+0xdc/0x128
[   52.377609]  kasan_check_range+0x100/0x1a8
[   52.377642]  __kasan_check_write+0x20/0x30
[   52.377671]  kasan_atomics_helper+0x99c/0x4858
[   52.377704]  kasan_atomics+0x198/0x2e0
[   52.377735]  kunit_try_run_case+0x170/0x3f0
[   52.377769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.377806]  kthread+0x328/0x630
[   52.377833]  ret_from_fork+0x10/0x20
[   52.377864] 
[   52.448473] Allocated by task 309:
[   52.451859]  kasan_save_stack+0x3c/0x68
[   52.455678]  kasan_save_track+0x20/0x40
[   52.459497]  kasan_save_alloc_info+0x40/0x58
[   52.463751]  __kasan_kmalloc+0xd4/0xd8
[   52.467483]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.471997]  kasan_atomics+0xb8/0x2e0
[   52.475643]  kunit_try_run_case+0x170/0x3f0
[   52.479809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.485278]  kthread+0x328/0x630
[   52.488490]  ret_from_fork+0x10/0x20
[   52.492049] 
[   52.493524] The buggy address belongs to the object at ffff000800c2e200
[   52.493524]  which belongs to the cache kmalloc-64 of size 64
[   52.505851] The buggy address is located 0 bytes to the right of
[   52.505851]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   52.518698] 
[   52.520174] The buggy address belongs to the physical page:
[   52.525729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   52.533715] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.540225] page_type: f5(slab)
[   52.543358] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.551082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.558801] page dumped because: kasan: bad access detected
[   52.564357] 
[   52.565832] Memory state around the buggy address:
[   52.570610]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.577815]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.585020] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.592221]                                      ^
[   52.596999]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.604204]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.611405] ==================================================================
[   53.412507] ==================================================================
[   53.419556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   53.426931] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   53.434222] 
[   53.435702] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   53.435749] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.435766] Hardware name: WinLink E850-96 board (DT)
[   53.435784] Call trace:
[   53.435796]  show_stack+0x20/0x38 (C)
[   53.435830]  dump_stack_lvl+0x8c/0xd0
[   53.435865]  print_report+0x118/0x608
[   53.435896]  kasan_report+0xdc/0x128
[   53.435930]  __asan_report_load4_noabort+0x20/0x30
[   53.435961]  kasan_atomics_helper+0x3dcc/0x4858
[   53.435996]  kasan_atomics+0x198/0x2e0
[   53.436027]  kunit_try_run_case+0x170/0x3f0
[   53.436062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.436100]  kthread+0x328/0x630
[   53.436129]  ret_from_fork+0x10/0x20
[   53.436161] 
[   53.503492] Allocated by task 309:
[   53.506878]  kasan_save_stack+0x3c/0x68
[   53.510697]  kasan_save_track+0x20/0x40
[   53.514516]  kasan_save_alloc_info+0x40/0x58
[   53.518770]  __kasan_kmalloc+0xd4/0xd8
[   53.522502]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.527016]  kasan_atomics+0xb8/0x2e0
[   53.530662]  kunit_try_run_case+0x170/0x3f0
[   53.534828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.540297]  kthread+0x328/0x630
[   53.543509]  ret_from_fork+0x10/0x20
[   53.547068] 
[   53.548543] The buggy address belongs to the object at ffff000800c2e200
[   53.548543]  which belongs to the cache kmalloc-64 of size 64
[   53.560870] The buggy address is located 0 bytes to the right of
[   53.560870]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   53.573717] 
[   53.575192] The buggy address belongs to the physical page:
[   53.580748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   53.588734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.595244] page_type: f5(slab)
[   53.598377] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.606101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.613820] page dumped because: kasan: bad access detected
[   53.619376] 
[   53.620851] Memory state around the buggy address:
[   53.625629]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.632834]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.640039] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.647240]                                      ^
[   53.652018]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.659222]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.666423] ==================================================================
[   55.251322] ==================================================================
[   55.258416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   55.265706] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   55.273083] 
[   55.274563] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   55.274611] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.274628] Hardware name: WinLink E850-96 board (DT)
[   55.274648] Call trace:
[   55.274661]  show_stack+0x20/0x38 (C)
[   55.274693]  dump_stack_lvl+0x8c/0xd0
[   55.274728]  print_report+0x118/0x608
[   55.274762]  kasan_report+0xdc/0x128
[   55.274796]  kasan_check_range+0x100/0x1a8
[   55.274832]  __kasan_check_write+0x20/0x30
[   55.274861]  kasan_atomics_helper+0xd3c/0x4858
[   55.274895]  kasan_atomics+0x198/0x2e0
[   55.274927]  kunit_try_run_case+0x170/0x3f0
[   55.274960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.274998]  kthread+0x328/0x630
[   55.275024]  ret_from_fork+0x10/0x20
[   55.275058] 
[   55.345652] Allocated by task 309:
[   55.349038]  kasan_save_stack+0x3c/0x68
[   55.352857]  kasan_save_track+0x20/0x40
[   55.356676]  kasan_save_alloc_info+0x40/0x58
[   55.360929]  __kasan_kmalloc+0xd4/0xd8
[   55.364662]  __kmalloc_cache_noprof+0x15c/0x3c0
[   55.369176]  kasan_atomics+0xb8/0x2e0
[   55.372822]  kunit_try_run_case+0x170/0x3f0
[   55.376988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.382457]  kthread+0x328/0x630
[   55.385669]  ret_from_fork+0x10/0x20
[   55.389227] 
[   55.390703] The buggy address belongs to the object at ffff000800c2e200
[   55.390703]  which belongs to the cache kmalloc-64 of size 64
[   55.403030] The buggy address is located 0 bytes to the right of
[   55.403030]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   55.415877] 
[   55.417353] The buggy address belongs to the physical page:
[   55.422908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   55.430894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.437404] page_type: f5(slab)
[   55.440536] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.448261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.455980] page dumped because: kasan: bad access detected
[   55.461535] 
[   55.463011] Memory state around the buggy address:
[   55.467789]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.474994]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.482199] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.489399]                                      ^
[   55.494177]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.501382]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.508583] ==================================================================
[   52.883344] ==================================================================
[   52.890397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   52.897685] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   52.905064] 
[   52.906543] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   52.906590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.906604] Hardware name: WinLink E850-96 board (DT)
[   52.906624] Call trace:
[   52.906634]  show_stack+0x20/0x38 (C)
[   52.906668]  dump_stack_lvl+0x8c/0xd0
[   52.906701]  print_report+0x118/0x608
[   52.906738]  kasan_report+0xdc/0x128
[   52.906771]  kasan_check_range+0x100/0x1a8
[   52.906805]  __kasan_check_write+0x20/0x30
[   52.906834]  kasan_atomics_helper+0xa6c/0x4858
[   52.906867]  kasan_atomics+0x198/0x2e0
[   52.906900]  kunit_try_run_case+0x170/0x3f0
[   52.906932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.906971]  kthread+0x328/0x630
[   52.906998]  ret_from_fork+0x10/0x20
[   52.907029] 
[   52.977632] Allocated by task 309:
[   52.981017]  kasan_save_stack+0x3c/0x68
[   52.984837]  kasan_save_track+0x20/0x40
[   52.988656]  kasan_save_alloc_info+0x40/0x58
[   52.992910]  __kasan_kmalloc+0xd4/0xd8
[   52.996642]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.001156]  kasan_atomics+0xb8/0x2e0
[   53.004802]  kunit_try_run_case+0x170/0x3f0
[   53.008968]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.014437]  kthread+0x328/0x630
[   53.017648]  ret_from_fork+0x10/0x20
[   53.021208] 
[   53.022683] The buggy address belongs to the object at ffff000800c2e200
[   53.022683]  which belongs to the cache kmalloc-64 of size 64
[   53.035010] The buggy address is located 0 bytes to the right of
[   53.035010]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   53.047856] 
[   53.049332] The buggy address belongs to the physical page:
[   53.054888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   53.062874] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.069384] page_type: f5(slab)
[   53.072517] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.080241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.087960] page dumped because: kasan: bad access detected
[   53.093515] 
[   53.094991] Memory state around the buggy address:
[   53.099769]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.106974]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.114178] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.121380]                                      ^
[   53.126157]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.133363]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.140564] ==================================================================
[   47.337022] ==================================================================
[   47.344127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   47.351414] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   47.358793] 
[   47.360274] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   47.360327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.360345] Hardware name: WinLink E850-96 board (DT)
[   47.360365] Call trace:
[   47.360377]  show_stack+0x20/0x38 (C)
[   47.360412]  dump_stack_lvl+0x8c/0xd0
[   47.360450]  print_report+0x118/0x608
[   47.360487]  kasan_report+0xdc/0x128
[   47.360522]  kasan_check_range+0x100/0x1a8
[   47.360559]  __kasan_check_write+0x20/0x30
[   47.360587]  kasan_atomics_helper+0x24c/0x4858
[   47.360624]  kasan_atomics+0x198/0x2e0
[   47.360654]  kunit_try_run_case+0x170/0x3f0
[   47.360691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.360731]  kthread+0x328/0x630
[   47.360759]  ret_from_fork+0x10/0x20
[   47.360792] 
[   47.431361] Allocated by task 309:
[   47.434748]  kasan_save_stack+0x3c/0x68
[   47.438567]  kasan_save_track+0x20/0x40
[   47.442385]  kasan_save_alloc_info+0x40/0x58
[   47.446638]  __kasan_kmalloc+0xd4/0xd8
[   47.450371]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.454885]  kasan_atomics+0xb8/0x2e0
[   47.458531]  kunit_try_run_case+0x170/0x3f0
[   47.462697]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.468166]  kthread+0x328/0x630
[   47.471378]  ret_from_fork+0x10/0x20
[   47.474937] 
[   47.476415] The buggy address belongs to the object at ffff000800c2e200
[   47.476415]  which belongs to the cache kmalloc-64 of size 64
[   47.488740] The buggy address is located 0 bytes to the right of
[   47.488740]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   47.501585] 
[   47.503063] The buggy address belongs to the physical page:
[   47.508617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   47.516604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.523114] page_type: f5(slab)
[   47.526248] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.533970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.541689] page dumped because: kasan: bad access detected
[   47.547246] 
[   47.548720] Memory state around the buggy address:
[   47.553500]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.560703]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.567909] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.575109]                                      ^
[   47.579887]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.587091]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.594292] ==================================================================
[   46.811247] ==================================================================
[   46.818268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858
[   46.825641] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   46.833019] 
[   46.834505] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   46.834561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   46.834576] Hardware name: WinLink E850-96 board (DT)
[   46.834598] Call trace:
[   46.834612]  show_stack+0x20/0x38 (C)
[   46.834646]  dump_stack_lvl+0x8c/0xd0
[   46.834685]  print_report+0x118/0x608
[   46.834720]  kasan_report+0xdc/0x128
[   46.834752]  __asan_report_store4_noabort+0x20/0x30
[   46.834785]  kasan_atomics_helper+0x3f7c/0x4858
[   46.834818]  kasan_atomics+0x198/0x2e0
[   46.834849]  kunit_try_run_case+0x170/0x3f0
[   46.834886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.834926]  kthread+0x328/0x630
[   46.834959]  ret_from_fork+0x10/0x20
[   46.834992] 
[   46.902376] Allocated by task 309:
[   46.905763]  kasan_save_stack+0x3c/0x68
[   46.909580]  kasan_save_track+0x20/0x40
[   46.913400]  kasan_save_alloc_info+0x40/0x58
[   46.917653]  __kasan_kmalloc+0xd4/0xd8
[   46.921386]  __kmalloc_cache_noprof+0x15c/0x3c0
[   46.925900]  kasan_atomics+0xb8/0x2e0
[   46.929545]  kunit_try_run_case+0x170/0x3f0
[   46.933712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   46.939181]  kthread+0x328/0x630
[   46.942393]  ret_from_fork+0x10/0x20
[   46.945951] 
[   46.947430] The buggy address belongs to the object at ffff000800c2e200
[   46.947430]  which belongs to the cache kmalloc-64 of size 64
[   46.959755] The buggy address is located 0 bytes to the right of
[   46.959755]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   46.972600] 
[   46.974078] The buggy address belongs to the physical page:
[   46.979634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   46.987621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   46.994129] page_type: f5(slab)
[   46.997263] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.004985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.012704] page dumped because: kasan: bad access detected
[   47.018260] 
[   47.019735] Memory state around the buggy address:
[   47.024515]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.031718]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.038924] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.046124]                                      ^
[   47.050901]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.058106]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.065307] ==================================================================
[   48.127288] ==================================================================
[   48.134393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   48.141680] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   48.149058] 
[   48.150541] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   48.150593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.150610] Hardware name: WinLink E850-96 board (DT)
[   48.150631] Call trace:
[   48.150644]  show_stack+0x20/0x38 (C)
[   48.150680]  dump_stack_lvl+0x8c/0xd0
[   48.150717]  print_report+0x118/0x608
[   48.150753]  kasan_report+0xdc/0x128
[   48.150785]  kasan_check_range+0x100/0x1a8
[   48.150822]  __kasan_check_write+0x20/0x30
[   48.150851]  kasan_atomics_helper+0x32c/0x4858
[   48.150886]  kasan_atomics+0x198/0x2e0
[   48.150917]  kunit_try_run_case+0x170/0x3f0
[   48.150952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.150990]  kthread+0x328/0x630
[   48.151018]  ret_from_fork+0x10/0x20
[   48.151050] 
[   48.221627] Allocated by task 309:
[   48.225012]  kasan_save_stack+0x3c/0x68
[   48.228832]  kasan_save_track+0x20/0x40
[   48.232651]  kasan_save_alloc_info+0x40/0x58
[   48.236904]  __kasan_kmalloc+0xd4/0xd8
[   48.240637]  __kmalloc_cache_noprof+0x15c/0x3c0
[   48.245151]  kasan_atomics+0xb8/0x2e0
[   48.248797]  kunit_try_run_case+0x170/0x3f0
[   48.252963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.258432]  kthread+0x328/0x630
[   48.261643]  ret_from_fork+0x10/0x20
[   48.265202] 
[   48.266679] The buggy address belongs to the object at ffff000800c2e200
[   48.266679]  which belongs to the cache kmalloc-64 of size 64
[   48.279005] The buggy address is located 0 bytes to the right of
[   48.279005]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   48.291851] 
[   48.293329] The buggy address belongs to the physical page:
[   48.298884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   48.306870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   48.313379] page_type: f5(slab)
[   48.316513] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   48.324236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   48.331955] page dumped because: kasan: bad access detected
[   48.337512] 
[   48.338986] Memory state around the buggy address:
[   48.343767]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.350969]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   48.358175] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   48.365375]                                      ^
[   48.370152]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.377357]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   48.384559] ==================================================================
[   55.515923] ==================================================================
[   55.522995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   55.530371] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   55.537663] 
[   55.539142] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   55.539191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.539207] Hardware name: WinLink E850-96 board (DT)
[   55.539228] Call trace:
[   55.539240]  show_stack+0x20/0x38 (C)
[   55.539271]  dump_stack_lvl+0x8c/0xd0
[   55.539304]  print_report+0x118/0x608
[   55.539338]  kasan_report+0xdc/0x128
[   55.539369]  __asan_report_load4_noabort+0x20/0x30
[   55.539400]  kasan_atomics_helper+0x3e04/0x4858
[   55.539435]  kasan_atomics+0x198/0x2e0
[   55.539467]  kunit_try_run_case+0x170/0x3f0
[   55.539501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.539538]  kthread+0x328/0x630
[   55.539565]  ret_from_fork+0x10/0x20
[   55.539596] 
[   55.606933] Allocated by task 309:
[   55.610319]  kasan_save_stack+0x3c/0x68
[   55.614138]  kasan_save_track+0x20/0x40
[   55.617957]  kasan_save_alloc_info+0x40/0x58
[   55.622210]  __kasan_kmalloc+0xd4/0xd8
[   55.625943]  __kmalloc_cache_noprof+0x15c/0x3c0
[   55.630457]  kasan_atomics+0xb8/0x2e0
[   55.634102]  kunit_try_run_case+0x170/0x3f0
[   55.638269]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.643738]  kthread+0x328/0x630
[   55.646949]  ret_from_fork+0x10/0x20
[   55.650509] 
[   55.651984] The buggy address belongs to the object at ffff000800c2e200
[   55.651984]  which belongs to the cache kmalloc-64 of size 64
[   55.664311] The buggy address is located 0 bytes to the right of
[   55.664311]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   55.677157] 
[   55.678633] The buggy address belongs to the physical page:
[   55.684189] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   55.692174] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.698684] page_type: f5(slab)
[   55.701817] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.709542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.717261] page dumped because: kasan: bad access detected
[   55.722816] 
[   55.724292] Memory state around the buggy address:
[   55.729070]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.736275]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   55.743479] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   55.750680]                                      ^
[   55.755458]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.762663]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   55.769864] ==================================================================
[   63.429675] ==================================================================
[   63.436768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   63.444141] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   63.451520] 
[   63.452999] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   63.453047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   63.453064] Hardware name: WinLink E850-96 board (DT)
[   63.453082] Call trace:
[   63.453096]  show_stack+0x20/0x38 (C)
[   63.453127]  dump_stack_lvl+0x8c/0xd0
[   63.453166]  print_report+0x118/0x608
[   63.453200]  kasan_report+0xdc/0x128
[   63.453234]  kasan_check_range+0x100/0x1a8
[   63.453268]  __kasan_check_write+0x20/0x30
[   63.453299]  kasan_atomics_helper+0x17ec/0x4858
[   63.453333]  kasan_atomics+0x198/0x2e0
[   63.453365]  kunit_try_run_case+0x170/0x3f0
[   63.453396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.453437]  kthread+0x328/0x630
[   63.453464]  ret_from_fork+0x10/0x20
[   63.453497] 
[   63.524175] Allocated by task 309:
[   63.527560]  kasan_save_stack+0x3c/0x68
[   63.531380]  kasan_save_track+0x20/0x40
[   63.535199]  kasan_save_alloc_info+0x40/0x58
[   63.539452]  __kasan_kmalloc+0xd4/0xd8
[   63.543185]  __kmalloc_cache_noprof+0x15c/0x3c0
[   63.547699]  kasan_atomics+0xb8/0x2e0
[   63.551345]  kunit_try_run_case+0x170/0x3f0
[   63.555511]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.560980]  kthread+0x328/0x630
[   63.564192]  ret_from_fork+0x10/0x20
[   63.567751] 
[   63.569226] The buggy address belongs to the object at ffff000800c2e200
[   63.569226]  which belongs to the cache kmalloc-64 of size 64
[   63.581553] The buggy address is located 0 bytes to the right of
[   63.581553]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   63.594399] 
[   63.595875] The buggy address belongs to the physical page:
[   63.601431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   63.609416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.615927] page_type: f5(slab)
[   63.619060] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.626784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.634503] page dumped because: kasan: bad access detected
[   63.640060] 
[   63.641534] Memory state around the buggy address:
[   63.646314]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.653517]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.660722] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.667923]                                      ^
[   63.672701]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.679905]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.687107] ==================================================================
[   60.266528] ==================================================================
[   60.273621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   60.280995] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   60.288373] 
[   60.289852] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   60.289899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.289915] Hardware name: WinLink E850-96 board (DT)
[   60.289934] Call trace:
[   60.289946]  show_stack+0x20/0x38 (C)
[   60.289979]  dump_stack_lvl+0x8c/0xd0
[   60.290012]  print_report+0x118/0x608
[   60.290048]  kasan_report+0xdc/0x128
[   60.290080]  kasan_check_range+0x100/0x1a8
[   60.290114]  __kasan_check_write+0x20/0x30
[   60.290143]  kasan_atomics_helper+0x1414/0x4858
[   60.290177]  kasan_atomics+0x198/0x2e0
[   60.290207]  kunit_try_run_case+0x170/0x3f0
[   60.290240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.290279]  kthread+0x328/0x630
[   60.290306]  ret_from_fork+0x10/0x20
[   60.290336] 
[   60.361028] Allocated by task 309:
[   60.364414]  kasan_save_stack+0x3c/0x68
[   60.368233]  kasan_save_track+0x20/0x40
[   60.372052]  kasan_save_alloc_info+0x40/0x58
[   60.376306]  __kasan_kmalloc+0xd4/0xd8
[   60.380038]  __kmalloc_cache_noprof+0x15c/0x3c0
[   60.384552]  kasan_atomics+0xb8/0x2e0
[   60.388198]  kunit_try_run_case+0x170/0x3f0
[   60.392364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.397833]  kthread+0x328/0x630
[   60.401044]  ret_from_fork+0x10/0x20
[   60.404604] 
[   60.406080] The buggy address belongs to the object at ffff000800c2e200
[   60.406080]  which belongs to the cache kmalloc-64 of size 64
[   60.418406] The buggy address is located 0 bytes to the right of
[   60.418406]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   60.431252] 
[   60.432729] The buggy address belongs to the physical page:
[   60.438284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   60.446270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.452780] page_type: f5(slab)
[   60.455913] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.463637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   60.471356] page dumped because: kasan: bad access detected
[   60.476913] 
[   60.478387] Memory state around the buggy address:
[   60.483165]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.490370]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   60.497574] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   60.504776]                                      ^
[   60.509554]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.516759]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   60.523959] ==================================================================
[   56.828929] ==================================================================
[   56.835998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   56.843286] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   56.850664] 
[   56.852143] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   56.852190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   56.852206] Hardware name: WinLink E850-96 board (DT)
[   56.852223] Call trace:
[   56.852235]  show_stack+0x20/0x38 (C)
[   56.852265]  dump_stack_lvl+0x8c/0xd0
[   56.852301]  print_report+0x118/0x608
[   56.852334]  kasan_report+0xdc/0x128
[   56.852369]  kasan_check_range+0x100/0x1a8
[   56.852405]  __kasan_check_write+0x20/0x30
[   56.852435]  kasan_atomics_helper+0xeb8/0x4858
[   56.852468]  kasan_atomics+0x198/0x2e0
[   56.852499]  kunit_try_run_case+0x170/0x3f0
[   56.852532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.852570]  kthread+0x328/0x630
[   56.852596]  ret_from_fork+0x10/0x20
[   56.852627] 
[   56.923232] Allocated by task 309:
[   56.926618]  kasan_save_stack+0x3c/0x68
[   56.930437]  kasan_save_track+0x20/0x40
[   56.934257]  kasan_save_alloc_info+0x40/0x58
[   56.938510]  __kasan_kmalloc+0xd4/0xd8
[   56.942242]  __kmalloc_cache_noprof+0x15c/0x3c0
[   56.946756]  kasan_atomics+0xb8/0x2e0
[   56.950402]  kunit_try_run_case+0x170/0x3f0
[   56.954568]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   56.960037]  kthread+0x328/0x630
[   56.963249]  ret_from_fork+0x10/0x20
[   56.966808] 
[   56.968284] The buggy address belongs to the object at ffff000800c2e200
[   56.968284]  which belongs to the cache kmalloc-64 of size 64
[   56.980610] The buggy address is located 0 bytes to the right of
[   56.980610]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   56.993457] 
[   56.994933] The buggy address belongs to the physical page:
[   57.000488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   57.008474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.014984] page_type: f5(slab)
[   57.018117] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.025842] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.033561] page dumped because: kasan: bad access detected
[   57.039116] 
[   57.040591] Memory state around the buggy address:
[   57.045369]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.052574]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.059779] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.066980]                                      ^
[   57.071758]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.078963]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.086164] ==================================================================
[   53.673738] ==================================================================
[   53.680836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   53.688125] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   53.695503] 
[   53.696982] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   53.697030] Tainted: [B]=BAD_PAGE, [N]=TEST
[   53.697047] Hardware name: WinLink E850-96 board (DT)
[   53.697065] Call trace:
[   53.697079]  show_stack+0x20/0x38 (C)
[   53.697109]  dump_stack_lvl+0x8c/0xd0
[   53.697143]  print_report+0x118/0x608
[   53.697177]  kasan_report+0xdc/0x128
[   53.697212]  kasan_check_range+0x100/0x1a8
[   53.697247]  __kasan_check_write+0x20/0x30
[   53.697277]  kasan_atomics_helper+0xb70/0x4858
[   53.697311]  kasan_atomics+0x198/0x2e0
[   53.697344]  kunit_try_run_case+0x170/0x3f0
[   53.697377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.697414]  kthread+0x328/0x630
[   53.697440]  ret_from_fork+0x10/0x20
[   53.697471] 
[   53.768071] Allocated by task 309:
[   53.771457]  kasan_save_stack+0x3c/0x68
[   53.775276]  kasan_save_track+0x20/0x40
[   53.779096]  kasan_save_alloc_info+0x40/0x58
[   53.783349]  __kasan_kmalloc+0xd4/0xd8
[   53.787082]  __kmalloc_cache_noprof+0x15c/0x3c0
[   53.791595]  kasan_atomics+0xb8/0x2e0
[   53.795241]  kunit_try_run_case+0x170/0x3f0
[   53.799408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   53.804876]  kthread+0x328/0x630
[   53.808088]  ret_from_fork+0x10/0x20
[   53.811647] 
[   53.813123] The buggy address belongs to the object at ffff000800c2e200
[   53.813123]  which belongs to the cache kmalloc-64 of size 64
[   53.825449] The buggy address is located 0 bytes to the right of
[   53.825449]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   53.838296] 
[   53.839772] The buggy address belongs to the physical page:
[   53.845328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   53.853313] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   53.859823] page_type: f5(slab)
[   53.862956] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   53.870681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   53.878400] page dumped because: kasan: bad access detected
[   53.883955] 
[   53.885430] Memory state around the buggy address:
[   53.890208]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.897413]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   53.904618] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   53.911819]                                      ^
[   53.916597]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.923802]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   53.931003] ==================================================================
[   61.325569] ==================================================================
[   61.332632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   61.340007] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   61.347385] 
[   61.348864] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   61.348918] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.348933] Hardware name: WinLink E850-96 board (DT)
[   61.348951] Call trace:
[   61.348964]  show_stack+0x20/0x38 (C)
[   61.348998]  dump_stack_lvl+0x8c/0xd0
[   61.349033]  print_report+0x118/0x608
[   61.349069]  kasan_report+0xdc/0x128
[   61.349101]  kasan_check_range+0x100/0x1a8
[   61.349135]  __kasan_check_write+0x20/0x30
[   61.349164]  kasan_atomics_helper+0x15b4/0x4858
[   61.349197]  kasan_atomics+0x198/0x2e0
[   61.349229]  kunit_try_run_case+0x170/0x3f0
[   61.349263]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.349304]  kthread+0x328/0x630
[   61.349332]  ret_from_fork+0x10/0x20
[   61.349363] 
[   61.420040] Allocated by task 309:
[   61.423427]  kasan_save_stack+0x3c/0x68
[   61.427245]  kasan_save_track+0x20/0x40
[   61.431064]  kasan_save_alloc_info+0x40/0x58
[   61.435317]  __kasan_kmalloc+0xd4/0xd8
[   61.439050]  __kmalloc_cache_noprof+0x15c/0x3c0
[   61.443564]  kasan_atomics+0xb8/0x2e0
[   61.447209]  kunit_try_run_case+0x170/0x3f0
[   61.451376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.456845]  kthread+0x328/0x630
[   61.460056]  ret_from_fork+0x10/0x20
[   61.463615] 
[   61.465091] The buggy address belongs to the object at ffff000800c2e200
[   61.465091]  which belongs to the cache kmalloc-64 of size 64
[   61.477418] The buggy address is located 0 bytes to the right of
[   61.477418]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   61.490264] 
[   61.491740] The buggy address belongs to the physical page:
[   61.497296] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   61.505282] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.511792] page_type: f5(slab)
[   61.514925] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.522649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.530368] page dumped because: kasan: bad access detected
[   61.535923] 
[   61.537399] Memory state around the buggy address:
[   61.542177]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.549381]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.556586] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.563788]                                      ^
[   61.568566]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.575770]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.582972] ==================================================================
[   51.299168] ==================================================================
[   51.306217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   51.313507] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   51.320886] 
[   51.322365] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   51.322412] Tainted: [B]=BAD_PAGE, [N]=TEST
[   51.322427] Hardware name: WinLink E850-96 board (DT)
[   51.322443] Call trace:
[   51.322456]  show_stack+0x20/0x38 (C)
[   51.322492]  dump_stack_lvl+0x8c/0xd0
[   51.322527]  print_report+0x118/0x608
[   51.322562]  kasan_report+0xdc/0x128
[   51.322593]  kasan_check_range+0x100/0x1a8
[   51.322632]  __kasan_check_write+0x20/0x30
[   51.322661]  kasan_atomics_helper+0x7cc/0x4858
[   51.322694]  kasan_atomics+0x198/0x2e0
[   51.322725]  kunit_try_run_case+0x170/0x3f0
[   51.322757]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.322795]  kthread+0x328/0x630
[   51.322823]  ret_from_fork+0x10/0x20
[   51.322852] 
[   51.393454] Allocated by task 309:
[   51.396840]  kasan_save_stack+0x3c/0x68
[   51.400659]  kasan_save_track+0x20/0x40
[   51.404478]  kasan_save_alloc_info+0x40/0x58
[   51.408732]  __kasan_kmalloc+0xd4/0xd8
[   51.412464]  __kmalloc_cache_noprof+0x15c/0x3c0
[   51.416978]  kasan_atomics+0xb8/0x2e0
[   51.420624]  kunit_try_run_case+0x170/0x3f0
[   51.424791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   51.430259]  kthread+0x328/0x630
[   51.433471]  ret_from_fork+0x10/0x20
[   51.437030] 
[   51.438505] The buggy address belongs to the object at ffff000800c2e200
[   51.438505]  which belongs to the cache kmalloc-64 of size 64
[   51.450832] The buggy address is located 0 bytes to the right of
[   51.450832]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   51.463679] 
[   51.465155] The buggy address belongs to the physical page:
[   51.470711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   51.478696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   51.485206] page_type: f5(slab)
[   51.488339] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   51.496063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   51.503783] page dumped because: kasan: bad access detected
[   51.509338] 
[   51.510813] Memory state around the buggy address:
[   51.515591]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.522796]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   51.530001] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   51.537202]                                      ^
[   51.541980]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.549185]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   51.556386] ==================================================================
[   61.590316] ==================================================================
[   61.597384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   61.604760] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   61.612051] 
[   61.613532] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   61.613579] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.613596] Hardware name: WinLink E850-96 board (DT)
[   61.613615] Call trace:
[   61.613627]  show_stack+0x20/0x38 (C)
[   61.613660]  dump_stack_lvl+0x8c/0xd0
[   61.613695]  print_report+0x118/0x608
[   61.613729]  kasan_report+0xdc/0x128
[   61.613761]  __asan_report_load8_noabort+0x20/0x30
[   61.613792]  kasan_atomics_helper+0x3db0/0x4858
[   61.613828]  kasan_atomics+0x198/0x2e0
[   61.613859]  kunit_try_run_case+0x170/0x3f0
[   61.613896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.613932]  kthread+0x328/0x630
[   61.613958]  ret_from_fork+0x10/0x20
[   61.613991] 
[   61.681320] Allocated by task 309:
[   61.684706]  kasan_save_stack+0x3c/0x68
[   61.688525]  kasan_save_track+0x20/0x40
[   61.692345]  kasan_save_alloc_info+0x40/0x58
[   61.696598]  __kasan_kmalloc+0xd4/0xd8
[   61.700331]  __kmalloc_cache_noprof+0x15c/0x3c0
[   61.704845]  kasan_atomics+0xb8/0x2e0
[   61.708490]  kunit_try_run_case+0x170/0x3f0
[   61.712657]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.718126]  kthread+0x328/0x630
[   61.721337]  ret_from_fork+0x10/0x20
[   61.724896] 
[   61.726372] The buggy address belongs to the object at ffff000800c2e200
[   61.726372]  which belongs to the cache kmalloc-64 of size 64
[   61.738698] The buggy address is located 0 bytes to the right of
[   61.738698]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   61.751545] 
[   61.753021] The buggy address belongs to the physical page:
[   61.758577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   61.766563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.773072] page_type: f5(slab)
[   61.776205] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.783930] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.791649] page dumped because: kasan: bad access detected
[   61.797204] 
[   61.798680] Memory state around the buggy address:
[   61.803458]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.810663]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.817867] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.825068]                                      ^
[   61.829846]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.837051]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.844252] ==================================================================
[   55.777199] ==================================================================
[   55.784277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   55.791565] Read of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   55.798857] 
[   55.800336] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   55.800382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   55.800396] Hardware name: WinLink E850-96 board (DT)
[   55.800416] Call trace:
[   55.800430]  show_stack+0x20/0x38 (C)
[   55.800462]  dump_stack_lvl+0x8c/0xd0
[   55.800497]  print_report+0x118/0x608
[   55.800532]  kasan_report+0xdc/0x128
[   55.800565]  kasan_check_range+0x100/0x1a8
[   55.800601]  __kasan_check_read+0x20/0x30
[   55.800630]  kasan_atomics_helper+0xdd4/0x4858
[   55.800664]  kasan_atomics+0x198/0x2e0
[   55.800695]  kunit_try_run_case+0x170/0x3f0
[   55.800730]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.800767]  kthread+0x328/0x630
[   55.800795]  ret_from_fork+0x10/0x20
[   55.800827] 
[   55.871338] Allocated by task 309:
[   55.874724]  kasan_save_stack+0x3c/0x68
[   55.878543]  kasan_save_track+0x20/0x40
[   55.882363]  kasan_save_alloc_info+0x40/0x58
[   55.886616]  __kasan_kmalloc+0xd4/0xd8
[   55.890348]  __kmalloc_cache_noprof+0x15c/0x3c0
[   55.894862]  kasan_atomics+0xb8/0x2e0
[   55.898508]  kunit_try_run_case+0x170/0x3f0
[   55.902675]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   55.908143]  kthread+0x328/0x630
[   55.911355]  ret_from_fork+0x10/0x20
[   55.914914] 
[   55.916389] The buggy address belongs to the object at ffff000800c2e200
[   55.916389]  which belongs to the cache kmalloc-64 of size 64
[   55.928717] The buggy address is located 0 bytes to the right of
[   55.928717]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   55.941563] 
[   55.943039] The buggy address belongs to the physical page:
[   55.948595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   55.956580] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   55.963091] page_type: f5(slab)
[   55.966223] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   55.973947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   55.981667] page dumped because: kasan: bad access detected
[   55.987222] 
[   55.988697] Memory state around the buggy address:
[   55.993475]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.000681]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   56.007885] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   56.015086]                                      ^
[   56.019864]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.027069]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   56.034270] ==================================================================
[   47.072642] ==================================================================
[   47.079724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   47.087009] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   47.094300] 
[   47.095784] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   47.095837] Tainted: [B]=BAD_PAGE, [N]=TEST
[   47.095859] Hardware name: WinLink E850-96 board (DT)
[   47.095880] Call trace:
[   47.095893]  show_stack+0x20/0x38 (C)
[   47.095929]  dump_stack_lvl+0x8c/0xd0
[   47.095964]  print_report+0x118/0x608
[   47.096002]  kasan_report+0xdc/0x128
[   47.096034]  kasan_check_range+0x100/0x1a8
[   47.096071]  __kasan_check_read+0x20/0x30
[   47.096101]  kasan_atomics_helper+0x1ec/0x4858
[   47.096134]  kasan_atomics+0x198/0x2e0
[   47.096166]  kunit_try_run_case+0x170/0x3f0
[   47.096205]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.096242]  kthread+0x328/0x630
[   47.096273]  ret_from_fork+0x10/0x20
[   47.096306] 
[   47.166781] Allocated by task 309:
[   47.170168]  kasan_save_stack+0x3c/0x68
[   47.173986]  kasan_save_track+0x20/0x40
[   47.177806]  kasan_save_alloc_info+0x40/0x58
[   47.182059]  __kasan_kmalloc+0xd4/0xd8
[   47.185792]  __kmalloc_cache_noprof+0x15c/0x3c0
[   47.190306]  kasan_atomics+0xb8/0x2e0
[   47.193951]  kunit_try_run_case+0x170/0x3f0
[   47.198118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   47.203586]  kthread+0x328/0x630
[   47.206799]  ret_from_fork+0x10/0x20
[   47.210357] 
[   47.211836] The buggy address belongs to the object at ffff000800c2e200
[   47.211836]  which belongs to the cache kmalloc-64 of size 64
[   47.224162] The buggy address is located 0 bytes to the right of
[   47.224162]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   47.237006] 
[   47.238483] The buggy address belongs to the physical page:
[   47.244041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   47.252027] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   47.258535] page_type: f5(slab)
[   47.261670] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   47.269391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   47.277111] page dumped because: kasan: bad access detected
[   47.282666] 
[   47.284141] Memory state around the buggy address:
[   47.288922]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.296123]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   47.303330] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   47.310530]                                      ^
[   47.315307]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.322512]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   47.329713] ==================================================================
[   57.093478] ==================================================================
[   57.100576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   57.107865] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   57.115243] 
[   57.116723] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   57.116769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.116786] Hardware name: WinLink E850-96 board (DT)
[   57.116803] Call trace:
[   57.116815]  show_stack+0x20/0x38 (C)
[   57.116846]  dump_stack_lvl+0x8c/0xd0
[   57.116882]  print_report+0x118/0x608
[   57.116916]  kasan_report+0xdc/0x128
[   57.116947]  kasan_check_range+0x100/0x1a8
[   57.116981]  __kasan_check_write+0x20/0x30
[   57.117011]  kasan_atomics_helper+0xf20/0x4858
[   57.117044]  kasan_atomics+0x198/0x2e0
[   57.117075]  kunit_try_run_case+0x170/0x3f0
[   57.117109]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.117150]  kthread+0x328/0x630
[   57.117176]  ret_from_fork+0x10/0x20
[   57.117206] 
[   57.187812] Allocated by task 309:
[   57.191199]  kasan_save_stack+0x3c/0x68
[   57.195017]  kasan_save_track+0x20/0x40
[   57.198836]  kasan_save_alloc_info+0x40/0x58
[   57.203089]  __kasan_kmalloc+0xd4/0xd8
[   57.206822]  __kmalloc_cache_noprof+0x15c/0x3c0
[   57.211336]  kasan_atomics+0xb8/0x2e0
[   57.214981]  kunit_try_run_case+0x170/0x3f0
[   57.219148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.224617]  kthread+0x328/0x630
[   57.227828]  ret_from_fork+0x10/0x20
[   57.231388] 
[   57.232863] The buggy address belongs to the object at ffff000800c2e200
[   57.232863]  which belongs to the cache kmalloc-64 of size 64
[   57.245190] The buggy address is located 0 bytes to the right of
[   57.245190]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   57.258036] 
[   57.259512] The buggy address belongs to the physical page:
[   57.265068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   57.273054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   57.279564] page_type: f5(slab)
[   57.282697] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   57.290421] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   57.298140] page dumped because: kasan: bad access detected
[   57.303695] 
[   57.305170] Memory state around the buggy address:
[   57.309949]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.317153]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   57.324359] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   57.331560]                                      ^
[   57.336338]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.343542]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   57.350743] ==================================================================
[   58.416751] ==================================================================
[   58.423821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   58.431197] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   58.438574] 
[   58.440057] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   58.440104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.440121] Hardware name: WinLink E850-96 board (DT)
[   58.440138] Call trace:
[   58.440151]  show_stack+0x20/0x38 (C)
[   58.440181]  dump_stack_lvl+0x8c/0xd0
[   58.440216]  print_report+0x118/0x608
[   58.440251]  kasan_report+0xdc/0x128
[   58.440283]  kasan_check_range+0x100/0x1a8
[   58.440319]  __kasan_check_write+0x20/0x30
[   58.440350]  kasan_atomics_helper+0x1128/0x4858
[   58.440383]  kasan_atomics+0x198/0x2e0
[   58.440413]  kunit_try_run_case+0x170/0x3f0
[   58.440447]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.440485]  kthread+0x328/0x630
[   58.440511]  ret_from_fork+0x10/0x20
[   58.440544] 
[   58.511229] Allocated by task 309:
[   58.514615]  kasan_save_stack+0x3c/0x68
[   58.518434]  kasan_save_track+0x20/0x40
[   58.522254]  kasan_save_alloc_info+0x40/0x58
[   58.526507]  __kasan_kmalloc+0xd4/0xd8
[   58.530239]  __kmalloc_cache_noprof+0x15c/0x3c0
[   58.534753]  kasan_atomics+0xb8/0x2e0
[   58.538399]  kunit_try_run_case+0x170/0x3f0
[   58.542566]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.548034]  kthread+0x328/0x630
[   58.551246]  ret_from_fork+0x10/0x20
[   58.554805] 
[   58.556282] The buggy address belongs to the object at ffff000800c2e200
[   58.556282]  which belongs to the cache kmalloc-64 of size 64
[   58.568608] The buggy address is located 0 bytes to the right of
[   58.568608]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   58.581454] 
[   58.582930] The buggy address belongs to the physical page:
[   58.588486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   58.596471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.602982] page_type: f5(slab)
[   58.606115] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.613838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.621558] page dumped because: kasan: bad access detected
[   58.627114] 
[   58.628588] Memory state around the buggy address:
[   58.633367]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.640571]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.647776] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.654977]                                      ^
[   58.659755]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.666959]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.674161] ==================================================================
[   58.151989] ==================================================================
[   58.159067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   58.166443] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   58.173821] 
[   58.175301] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   58.175347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.175363] Hardware name: WinLink E850-96 board (DT)
[   58.175378] Call trace:
[   58.175392]  show_stack+0x20/0x38 (C)
[   58.175424]  dump_stack_lvl+0x8c/0xd0
[   58.175458]  print_report+0x118/0x608
[   58.175496]  kasan_report+0xdc/0x128
[   58.175527]  kasan_check_range+0x100/0x1a8
[   58.175562]  __kasan_check_write+0x20/0x30
[   58.175593]  kasan_atomics_helper+0x10c0/0x4858
[   58.175626]  kasan_atomics+0x198/0x2e0
[   58.175657]  kunit_try_run_case+0x170/0x3f0
[   58.175691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.175729]  kthread+0x328/0x630
[   58.175759]  ret_from_fork+0x10/0x20
[   58.175789] 
[   58.246476] Allocated by task 309:
[   58.249862]  kasan_save_stack+0x3c/0x68
[   58.253681]  kasan_save_track+0x20/0x40
[   58.257501]  kasan_save_alloc_info+0x40/0x58
[   58.261754]  __kasan_kmalloc+0xd4/0xd8
[   58.265486]  __kmalloc_cache_noprof+0x15c/0x3c0
[   58.270000]  kasan_atomics+0xb8/0x2e0
[   58.273646]  kunit_try_run_case+0x170/0x3f0
[   58.277813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.283281]  kthread+0x328/0x630
[   58.286493]  ret_from_fork+0x10/0x20
[   58.290052] 
[   58.291527] The buggy address belongs to the object at ffff000800c2e200
[   58.291527]  which belongs to the cache kmalloc-64 of size 64
[   58.303854] The buggy address is located 0 bytes to the right of
[   58.303854]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   58.316701] 
[   58.318177] The buggy address belongs to the physical page:
[   58.323733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   58.331718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.338229] page_type: f5(slab)
[   58.341361] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.349085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.356805] page dumped because: kasan: bad access detected
[   58.362360] 
[   58.363836] Memory state around the buggy address:
[   58.368613]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.375818]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.383023] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.390224]                                      ^
[   58.395002]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.402207]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.409408] ==================================================================
[   62.903663] ==================================================================
[   62.910734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   62.918108] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   62.925486] 
[   62.926965] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   62.927012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   62.927028] Hardware name: WinLink E850-96 board (DT)
[   62.927046] Call trace:
[   62.927060]  show_stack+0x20/0x38 (C)
[   62.927092]  dump_stack_lvl+0x8c/0xd0
[   62.927128]  print_report+0x118/0x608
[   62.927162]  kasan_report+0xdc/0x128
[   62.927195]  kasan_check_range+0x100/0x1a8
[   62.927231]  __kasan_check_write+0x20/0x30
[   62.927262]  kasan_atomics_helper+0x175c/0x4858
[   62.927296]  kasan_atomics+0x198/0x2e0
[   62.927327]  kunit_try_run_case+0x170/0x3f0
[   62.927360]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   62.927401]  kthread+0x328/0x630
[   62.927427]  ret_from_fork+0x10/0x20
[   62.927459] 
[   62.998141] Allocated by task 309:
[   63.001528]  kasan_save_stack+0x3c/0x68
[   63.005346]  kasan_save_track+0x20/0x40
[   63.009166]  kasan_save_alloc_info+0x40/0x58
[   63.013418]  __kasan_kmalloc+0xd4/0xd8
[   63.017151]  __kmalloc_cache_noprof+0x15c/0x3c0
[   63.021665]  kasan_atomics+0xb8/0x2e0
[   63.025311]  kunit_try_run_case+0x170/0x3f0
[   63.029477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   63.034946]  kthread+0x328/0x630
[   63.038158]  ret_from_fork+0x10/0x20
[   63.041717] 
[   63.043192] The buggy address belongs to the object at ffff000800c2e200
[   63.043192]  which belongs to the cache kmalloc-64 of size 64
[   63.055519] The buggy address is located 0 bytes to the right of
[   63.055519]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   63.068366] 
[   63.069842] The buggy address belongs to the physical page:
[   63.075397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   63.083383] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   63.089893] page_type: f5(slab)
[   63.093026] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   63.100750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   63.108469] page dumped because: kasan: bad access detected
[   63.114026] 
[   63.115500] Memory state around the buggy address:
[   63.120278]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.127483]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   63.134688] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   63.141889]                                      ^
[   63.146667]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.153872]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   63.161072] ==================================================================
[   52.089568] ==================================================================
[   52.096659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   52.103947] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   52.111325] 
[   52.112805] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   52.112853] Tainted: [B]=BAD_PAGE, [N]=TEST
[   52.112868] Hardware name: WinLink E850-96 board (DT)
[   52.112886] Call trace:
[   52.112898]  show_stack+0x20/0x38 (C)
[   52.112930]  dump_stack_lvl+0x8c/0xd0
[   52.112966]  print_report+0x118/0x608
[   52.113000]  kasan_report+0xdc/0x128
[   52.113032]  kasan_check_range+0x100/0x1a8
[   52.113066]  __kasan_check_write+0x20/0x30
[   52.113098]  kasan_atomics_helper+0x934/0x4858
[   52.113130]  kasan_atomics+0x198/0x2e0
[   52.113161]  kunit_try_run_case+0x170/0x3f0
[   52.113193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.113230]  kthread+0x328/0x630
[   52.113257]  ret_from_fork+0x10/0x20
[   52.113287] 
[   52.183894] Allocated by task 309:
[   52.187279]  kasan_save_stack+0x3c/0x68
[   52.191099]  kasan_save_track+0x20/0x40
[   52.194918]  kasan_save_alloc_info+0x40/0x58
[   52.199171]  __kasan_kmalloc+0xd4/0xd8
[   52.202904]  __kmalloc_cache_noprof+0x15c/0x3c0
[   52.207418]  kasan_atomics+0xb8/0x2e0
[   52.211064]  kunit_try_run_case+0x170/0x3f0
[   52.215230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   52.220699]  kthread+0x328/0x630
[   52.223910]  ret_from_fork+0x10/0x20
[   52.227470] 
[   52.228945] The buggy address belongs to the object at ffff000800c2e200
[   52.228945]  which belongs to the cache kmalloc-64 of size 64
[   52.241272] The buggy address is located 0 bytes to the right of
[   52.241272]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   52.254118] 
[   52.255594] The buggy address belongs to the physical page:
[   52.261150] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   52.269136] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   52.275646] page_type: f5(slab)
[   52.278779] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   52.286503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   52.294222] page dumped because: kasan: bad access detected
[   52.299777] 
[   52.301253] Memory state around the buggy address:
[   52.306031]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.313236]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   52.320440] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   52.327641]                                      ^
[   52.332419]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.339624]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   52.346825] ==================================================================
[   57.887256] ==================================================================
[   57.894314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   57.901690] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   57.909070] 
[   57.910548] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   57.910595] Tainted: [B]=BAD_PAGE, [N]=TEST
[   57.910611] Hardware name: WinLink E850-96 board (DT)
[   57.910630] Call trace:
[   57.910643]  show_stack+0x20/0x38 (C)
[   57.910674]  dump_stack_lvl+0x8c/0xd0
[   57.910709]  print_report+0x118/0x608
[   57.910742]  kasan_report+0xdc/0x128
[   57.910774]  kasan_check_range+0x100/0x1a8
[   57.910810]  __kasan_check_write+0x20/0x30
[   57.910840]  kasan_atomics_helper+0x1058/0x4858
[   57.910874]  kasan_atomics+0x198/0x2e0
[   57.910904]  kunit_try_run_case+0x170/0x3f0
[   57.910940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   57.910981]  kthread+0x328/0x630
[   57.911008]  ret_from_fork+0x10/0x20
[   57.911040] 
[   57.981723] Allocated by task 309:
[   57.985109]  kasan_save_stack+0x3c/0x68
[   57.988928]  kasan_save_track+0x20/0x40
[   57.992748]  kasan_save_alloc_info+0x40/0x58
[   57.997001]  __kasan_kmalloc+0xd4/0xd8
[   58.000734]  __kmalloc_cache_noprof+0x15c/0x3c0
[   58.005247]  kasan_atomics+0xb8/0x2e0
[   58.008893]  kunit_try_run_case+0x170/0x3f0
[   58.013060]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.018529]  kthread+0x328/0x630
[   58.021740]  ret_from_fork+0x10/0x20
[   58.025299] 
[   58.026775] The buggy address belongs to the object at ffff000800c2e200
[   58.026775]  which belongs to the cache kmalloc-64 of size 64
[   58.039101] The buggy address is located 0 bytes to the right of
[   58.039101]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   58.051948] 
[   58.053424] The buggy address belongs to the physical page:
[   58.058980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   58.066965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   58.073475] page_type: f5(slab)
[   58.076608] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   58.084333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   58.092051] page dumped because: kasan: bad access detected
[   58.097607] 
[   58.099083] Memory state around the buggy address:
[   58.103860]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.111065]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   58.118270] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   58.125471]                                      ^
[   58.130249]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.137454]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   58.144655] ==================================================================
[   48.917915] ==================================================================
[   48.925003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858
[   48.932293] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   48.939672] 
[   48.941152] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   48.941200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   48.941217] Hardware name: WinLink E850-96 board (DT)
[   48.941237] Call trace:
[   48.941249]  show_stack+0x20/0x38 (C)
[   48.941281]  dump_stack_lvl+0x8c/0xd0
[   48.941317]  print_report+0x118/0x608
[   48.941355]  kasan_report+0xdc/0x128
[   48.941387]  kasan_check_range+0x100/0x1a8
[   48.941423]  __kasan_check_write+0x20/0x30
[   48.941453]  kasan_atomics_helper+0x414/0x4858
[   48.941488]  kasan_atomics+0x198/0x2e0
[   48.941520]  kunit_try_run_case+0x170/0x3f0
[   48.941554]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   48.941592]  kthread+0x328/0x630
[   48.941617]  ret_from_fork+0x10/0x20
[   48.941651] 
[   49.012240] Allocated by task 309:
[   49.015625]  kasan_save_stack+0x3c/0x68
[   49.019445]  kasan_save_track+0x20/0x40
[   49.023264]  kasan_save_alloc_info+0x40/0x58
[   49.027518]  __kasan_kmalloc+0xd4/0xd8
[   49.031250]  __kmalloc_cache_noprof+0x15c/0x3c0
[   49.035764]  kasan_atomics+0xb8/0x2e0
[   49.039411]  kunit_try_run_case+0x170/0x3f0
[   49.043576]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.049045]  kthread+0x328/0x630
[   49.052257]  ret_from_fork+0x10/0x20
[   49.055816] 
[   49.057291] The buggy address belongs to the object at ffff000800c2e200
[   49.057291]  which belongs to the cache kmalloc-64 of size 64
[   49.069618] The buggy address is located 0 bytes to the right of
[   49.069618]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   49.082465] 
[   49.083941] The buggy address belongs to the physical page:
[   49.089496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   49.097482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   49.103992] page_type: f5(slab)
[   49.107125] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   49.114849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   49.122568] page dumped because: kasan: bad access detected
[   49.128124] 
[   49.129599] Memory state around the buggy address:
[   49.134377]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.141582]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   49.148788] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   49.155988]                                      ^
[   49.160765]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.167970]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   49.175171] ==================================================================
[   58.946286] ==================================================================
[   58.953327] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   58.960702] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   58.968080] 
[   58.969560] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   58.969604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   58.969619] Hardware name: WinLink E850-96 board (DT)
[   58.969637] Call trace:
[   58.969649]  show_stack+0x20/0x38 (C)
[   58.969687]  dump_stack_lvl+0x8c/0xd0
[   58.969721]  print_report+0x118/0x608
[   58.969758]  kasan_report+0xdc/0x128
[   58.969792]  kasan_check_range+0x100/0x1a8
[   58.969826]  __kasan_check_write+0x20/0x30
[   58.969856]  kasan_atomics_helper+0x11f8/0x4858
[   58.969890]  kasan_atomics+0x198/0x2e0
[   58.969920]  kunit_try_run_case+0x170/0x3f0
[   58.969952]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   58.969992]  kthread+0x328/0x630
[   58.970018]  ret_from_fork+0x10/0x20
[   58.970050] 
[   59.040735] Allocated by task 309:
[   59.044121]  kasan_save_stack+0x3c/0x68
[   59.047940]  kasan_save_track+0x20/0x40
[   59.051759]  kasan_save_alloc_info+0x40/0x58
[   59.056013]  __kasan_kmalloc+0xd4/0xd8
[   59.059745]  __kmalloc_cache_noprof+0x15c/0x3c0
[   59.064259]  kasan_atomics+0xb8/0x2e0
[   59.067905]  kunit_try_run_case+0x170/0x3f0
[   59.072071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   59.077540]  kthread+0x328/0x630
[   59.080752]  ret_from_fork+0x10/0x20
[   59.084311] 
[   59.085787] The buggy address belongs to the object at ffff000800c2e200
[   59.085787]  which belongs to the cache kmalloc-64 of size 64
[   59.098113] The buggy address is located 0 bytes to the right of
[   59.098113]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   59.110959] 
[   59.112436] The buggy address belongs to the physical page:
[   59.117992] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   59.125977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   59.132487] page_type: f5(slab)
[   59.135620] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   59.143345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   59.151064] page dumped because: kasan: bad access detected
[   59.156620] 
[   59.158095] Memory state around the buggy address:
[   59.162872]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.170077]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   59.177284] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   59.184483]                                      ^
[   59.189261]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.196466]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   59.203667] ==================================================================
[   60.796057] ==================================================================
[   60.803126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   60.810501] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   60.817879] 
[   60.819358] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   60.819404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   60.819422] Hardware name: WinLink E850-96 board (DT)
[   60.819438] Call trace:
[   60.819452]  show_stack+0x20/0x38 (C)
[   60.819482]  dump_stack_lvl+0x8c/0xd0
[   60.819517]  print_report+0x118/0x608
[   60.819553]  kasan_report+0xdc/0x128
[   60.819586]  kasan_check_range+0x100/0x1a8
[   60.819619]  __kasan_check_write+0x20/0x30
[   60.819648]  kasan_atomics_helper+0x14e4/0x4858
[   60.819681]  kasan_atomics+0x198/0x2e0
[   60.819713]  kunit_try_run_case+0x170/0x3f0
[   60.819747]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.819787]  kthread+0x328/0x630
[   60.819813]  ret_from_fork+0x10/0x20
[   60.819846] 
[   60.890534] Allocated by task 309:
[   60.893921]  kasan_save_stack+0x3c/0x68
[   60.897739]  kasan_save_track+0x20/0x40
[   60.901558]  kasan_save_alloc_info+0x40/0x58
[   60.905812]  __kasan_kmalloc+0xd4/0xd8
[   60.909544]  __kmalloc_cache_noprof+0x15c/0x3c0
[   60.914058]  kasan_atomics+0xb8/0x2e0
[   60.917704]  kunit_try_run_case+0x170/0x3f0
[   60.921870]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   60.927339]  kthread+0x328/0x630
[   60.930551]  ret_from_fork+0x10/0x20
[   60.934109] 
[   60.935585] The buggy address belongs to the object at ffff000800c2e200
[   60.935585]  which belongs to the cache kmalloc-64 of size 64
[   60.947911] The buggy address is located 0 bytes to the right of
[   60.947911]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   60.960758] 
[   60.962236] The buggy address belongs to the physical page:
[   60.967790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   60.975776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   60.982286] page_type: f5(slab)
[   60.985419] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   60.993143] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.000862] page dumped because: kasan: bad access detected
[   61.006419] 
[   61.007893] Memory state around the buggy address:
[   61.012671]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.019875]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.027080] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.034282]                                      ^
[   61.039059]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.046264]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.053465] ==================================================================
[   61.060946] ==================================================================
[   61.067878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   61.075253] Write of size 8 at addr ffff000800c2e230 by task kunit_try_catch/309
[   61.082632] 
[   61.084113] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   61.084162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   61.084179] Hardware name: WinLink E850-96 board (DT)
[   61.084198] Call trace:
[   61.084210]  show_stack+0x20/0x38 (C)
[   61.084240]  dump_stack_lvl+0x8c/0xd0
[   61.084275]  print_report+0x118/0x608
[   61.084307]  kasan_report+0xdc/0x128
[   61.084339]  kasan_check_range+0x100/0x1a8
[   61.084374]  __kasan_check_write+0x20/0x30
[   61.084403]  kasan_atomics_helper+0x154c/0x4858
[   61.084438]  kasan_atomics+0x198/0x2e0
[   61.084470]  kunit_try_run_case+0x170/0x3f0
[   61.084502]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.084544]  kthread+0x328/0x630
[   61.084571]  ret_from_fork+0x10/0x20
[   61.084602] 
[   61.155287] Allocated by task 309:
[   61.158675]  kasan_save_stack+0x3c/0x68
[   61.162492]  kasan_save_track+0x20/0x40
[   61.166311]  kasan_save_alloc_info+0x40/0x58
[   61.170564]  __kasan_kmalloc+0xd4/0xd8
[   61.174297]  __kmalloc_cache_noprof+0x15c/0x3c0
[   61.178811]  kasan_atomics+0xb8/0x2e0
[   61.182457]  kunit_try_run_case+0x170/0x3f0
[   61.186623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   61.192092]  kthread+0x328/0x630
[   61.195304]  ret_from_fork+0x10/0x20
[   61.198863] 
[   61.200340] The buggy address belongs to the object at ffff000800c2e200
[   61.200340]  which belongs to the cache kmalloc-64 of size 64
[   61.212665] The buggy address is located 0 bytes to the right of
[   61.212665]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   61.225511] 
[   61.226989] The buggy address belongs to the physical page:
[   61.232544] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   61.240529] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   61.247039] page_type: f5(slab)
[   61.250172] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   61.257896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   61.265615] page dumped because: kasan: bad access detected
[   61.271172] 
[   61.272646] Memory state around the buggy address:
[   61.277424]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.284629]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   61.291834] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   61.299034]                                      ^
[   61.303813]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.311017]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   61.318219] ==================================================================
[   54.464222] ==================================================================
[   54.471276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   54.478651] Read of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   54.485943] 
[   54.487422] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   54.487470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   54.487488] Hardware name: WinLink E850-96 board (DT)
[   54.487506] Call trace:
[   54.487516]  show_stack+0x20/0x38 (C)
[   54.487549]  dump_stack_lvl+0x8c/0xd0
[   54.487583]  print_report+0x118/0x608
[   54.487617]  kasan_report+0xdc/0x128
[   54.487650]  __asan_report_load4_noabort+0x20/0x30
[   54.487681]  kasan_atomics_helper+0x3de4/0x4858
[   54.487714]  kasan_atomics+0x198/0x2e0
[   54.487747]  kunit_try_run_case+0x170/0x3f0
[   54.487779]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.487819]  kthread+0x328/0x630
[   54.487845]  ret_from_fork+0x10/0x20
[   54.487877] 
[   54.555212] Allocated by task 309:
[   54.558598]  kasan_save_stack+0x3c/0x68
[   54.562417]  kasan_save_track+0x20/0x40
[   54.566237]  kasan_save_alloc_info+0x40/0x58
[   54.570490]  __kasan_kmalloc+0xd4/0xd8
[   54.574223]  __kmalloc_cache_noprof+0x15c/0x3c0
[   54.578736]  kasan_atomics+0xb8/0x2e0
[   54.582382]  kunit_try_run_case+0x170/0x3f0
[   54.586549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   54.592017]  kthread+0x328/0x630
[   54.595229]  ret_from_fork+0x10/0x20
[   54.598788] 
[   54.600263] The buggy address belongs to the object at ffff000800c2e200
[   54.600263]  which belongs to the cache kmalloc-64 of size 64
[   54.612590] The buggy address is located 0 bytes to the right of
[   54.612590]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   54.625437] 
[   54.626913] The buggy address belongs to the physical page:
[   54.632469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   54.640454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   54.646964] page_type: f5(slab)
[   54.650097] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   54.657822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   54.665540] page dumped because: kasan: bad access detected
[   54.671096] 
[   54.672571] Memory state around the buggy address:
[   54.677349]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.684554]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   54.691759] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   54.698960]                                      ^
[   54.703738]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.710943]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   54.718144] ==================================================================
[   49.976240] ==================================================================
[   49.983321] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858
[   49.990611] Write of size 4 at addr ffff000800c2e230 by task kunit_try_catch/309
[   49.997989] 
[   49.999469] CPU: 5 UID: 0 PID: 309 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   49.999517] Tainted: [B]=BAD_PAGE, [N]=TEST
[   49.999535] Hardware name: WinLink E850-96 board (DT)
[   49.999551] Call trace:
[   49.999563]  show_stack+0x20/0x38 (C)
[   49.999596]  dump_stack_lvl+0x8c/0xd0
[   49.999632]  print_report+0x118/0x608
[   49.999666]  kasan_report+0xdc/0x128
[   49.999701]  kasan_check_range+0x100/0x1a8
[   49.999736]  __kasan_check_write+0x20/0x30
[   49.999766]  kasan_atomics_helper+0x5b4/0x4858
[   49.999800]  kasan_atomics+0x198/0x2e0
[   49.999831]  kunit_try_run_case+0x170/0x3f0
[   49.999865]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   49.999904]  kthread+0x328/0x630
[   49.999930]  ret_from_fork+0x10/0x20
[   49.999963] 
[   50.070557] Allocated by task 309:
[   50.073943]  kasan_save_stack+0x3c/0x68
[   50.077762]  kasan_save_track+0x20/0x40
[   50.081581]  kasan_save_alloc_info+0x40/0x58
[   50.085835]  __kasan_kmalloc+0xd4/0xd8
[   50.089567]  __kmalloc_cache_noprof+0x15c/0x3c0
[   50.094081]  kasan_atomics+0xb8/0x2e0
[   50.097727]  kunit_try_run_case+0x170/0x3f0
[   50.101894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   50.107362]  kthread+0x328/0x630
[   50.110574]  ret_from_fork+0x10/0x20
[   50.114133] 
[   50.115609] The buggy address belongs to the object at ffff000800c2e200
[   50.115609]  which belongs to the cache kmalloc-64 of size 64
[   50.127936] The buggy address is located 0 bytes to the right of
[   50.127936]  allocated 48-byte region [ffff000800c2e200, ffff000800c2e230)
[   50.140782] 
[   50.142258] The buggy address belongs to the physical page:
[   50.147814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x880c2e
[   50.155800] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   50.162310] page_type: f5(slab)
[   50.165442] raw: 0bfffe0000000000 ffff0008000028c0 dead000000000122 0000000000000000
[   50.173167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   50.180886] page dumped because: kasan: bad access detected
[   50.186441] 
[   50.187917] Memory state around the buggy address:
[   50.192695]  ffff000800c2e100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.199899]  ffff000800c2e180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   50.207104] >ffff000800c2e200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   50.214305]                                      ^
[   50.219083]  ffff000800c2e280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.226288]  ffff000800c2e300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   50.233489] ==================================================================

[   29.330678] ==================================================================
[   29.331107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   29.331324] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.331513] 
[   29.331613] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.331839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.331946] Hardware name: linux,dummy-virt (DT)
[   29.332029] Call trace:
[   29.332086]  show_stack+0x20/0x38 (C)
[   29.332204]  dump_stack_lvl+0x8c/0xd0
[   29.332327]  print_report+0x118/0x608
[   29.332472]  kasan_report+0xdc/0x128
[   29.332596]  kasan_check_range+0x100/0x1a8
[   29.332741]  __kasan_check_write+0x20/0x30
[   29.332948]  kasan_atomics_helper+0xf20/0x4858
[   29.333453]  kasan_atomics+0x198/0x2e0
[   29.333777]  kunit_try_run_case+0x170/0x3f0
[   29.334032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.334221]  kthread+0x328/0x630
[   29.334342]  ret_from_fork+0x10/0x20
[   29.335031] 
[   29.335274] Allocated by task 266:
[   29.335593]  kasan_save_stack+0x3c/0x68
[   29.335789]  kasan_save_track+0x20/0x40
[   29.335995]  kasan_save_alloc_info+0x40/0x58
[   29.336358]  __kasan_kmalloc+0xd4/0xd8
[   29.336776]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.336937]  kasan_atomics+0xb8/0x2e0
[   29.337264]  kunit_try_run_case+0x170/0x3f0
[   29.337614]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.337908]  kthread+0x328/0x630
[   29.338402]  ret_from_fork+0x10/0x20
[   29.338736] 
[   29.338808] The buggy address belongs to the object at fff00000c7772d80
[   29.338808]  which belongs to the cache kmalloc-64 of size 64
[   29.338971] The buggy address is located 0 bytes to the right of
[   29.338971]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.340840] 
[   29.340874] The buggy address belongs to the physical page:
[   29.340915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.341005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.341221] page_type: f5(slab)
[   29.341353] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.341483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.341600] page dumped because: kasan: bad access detected
[   29.341743] 
[   29.341796] Memory state around the buggy address:
[   29.341907]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.342010]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.342148] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.342246]                                      ^
[   29.342330]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.342440]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.342560] ==================================================================
[   29.343106] ==================================================================
[   29.343223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   29.343361] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.343499] 
[   29.343580] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.343812] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.343898] Hardware name: linux,dummy-virt (DT)
[   29.343986] Call trace:
[   29.344056]  show_stack+0x20/0x38 (C)
[   29.344201]  dump_stack_lvl+0x8c/0xd0
[   29.344354]  print_report+0x118/0x608
[   29.344511]  kasan_report+0xdc/0x128
[   29.344665]  kasan_check_range+0x100/0x1a8
[   29.344825]  __kasan_check_write+0x20/0x30
[   29.344995]  kasan_atomics_helper+0xf88/0x4858
[   29.345133]  kasan_atomics+0x198/0x2e0
[   29.345275]  kunit_try_run_case+0x170/0x3f0
[   29.345571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.345777]  kthread+0x328/0x630
[   29.345901]  ret_from_fork+0x10/0x20
[   29.346016] 
[   29.346074] Allocated by task 266:
[   29.346159]  kasan_save_stack+0x3c/0x68
[   29.346274]  kasan_save_track+0x20/0x40
[   29.346397]  kasan_save_alloc_info+0x40/0x58
[   29.346593]  __kasan_kmalloc+0xd4/0xd8
[   29.346747]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.346912]  kasan_atomics+0xb8/0x2e0
[   29.347065]  kunit_try_run_case+0x170/0x3f0
[   29.347366]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.347531]  kthread+0x328/0x630
[   29.347727]  ret_from_fork+0x10/0x20
[   29.348068] 
[   29.348127] The buggy address belongs to the object at fff00000c7772d80
[   29.348127]  which belongs to the cache kmalloc-64 of size 64
[   29.348268] The buggy address is located 0 bytes to the right of
[   29.348268]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.349477] 
[   29.349633] The buggy address belongs to the physical page:
[   29.350414] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.350553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.351395] page_type: f5(slab)
[   29.351534] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.351728] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.351871] page dumped because: kasan: bad access detected
[   29.351946] 
[   29.351994] Memory state around the buggy address:
[   29.352072]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.352172]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.352288] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.352471]                                      ^
[   29.352559]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.352851]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.353128] ==================================================================
[   29.309353] ==================================================================
[   29.309469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   29.309602] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.309761] 
[   29.309860] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.310114] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.310237] Hardware name: linux,dummy-virt (DT)
[   29.310365] Call trace:
[   29.310433]  show_stack+0x20/0x38 (C)
[   29.310562]  dump_stack_lvl+0x8c/0xd0
[   29.310776]  print_report+0x118/0x608
[   29.310929]  kasan_report+0xdc/0x128
[   29.311085]  __asan_report_store8_noabort+0x20/0x30
[   29.311248]  kasan_atomics_helper+0x3e5c/0x4858
[   29.311445]  kasan_atomics+0x198/0x2e0
[   29.311577]  kunit_try_run_case+0x170/0x3f0
[   29.311766]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.311965]  kthread+0x328/0x630
[   29.312112]  ret_from_fork+0x10/0x20
[   29.312239] 
[   29.312290] Allocated by task 266:
[   29.312473]  kasan_save_stack+0x3c/0x68
[   29.312626]  kasan_save_track+0x20/0x40
[   29.312770]  kasan_save_alloc_info+0x40/0x58
[   29.312953]  __kasan_kmalloc+0xd4/0xd8
[   29.313127]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.313299]  kasan_atomics+0xb8/0x2e0
[   29.313475]  kunit_try_run_case+0x170/0x3f0
[   29.313591]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.313722]  kthread+0x328/0x630
[   29.313811]  ret_from_fork+0x10/0x20
[   29.313926] 
[   29.313984] The buggy address belongs to the object at fff00000c7772d80
[   29.313984]  which belongs to the cache kmalloc-64 of size 64
[   29.314125] The buggy address is located 0 bytes to the right of
[   29.314125]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.314283] 
[   29.314349] The buggy address belongs to the physical page:
[   29.314424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.314567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.314706] page_type: f5(slab)
[   29.314825] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.315077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.315225] page dumped because: kasan: bad access detected
[   29.315317] 
[   29.315379] Memory state around the buggy address:
[   29.315466]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.315586]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.315769] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.315900]                                      ^
[   29.316114]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.316289]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.316746] ==================================================================
[   29.552928] ==================================================================
[   29.554291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   29.554505] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.554643] 
[   29.555482] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.555973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.556069] Hardware name: linux,dummy-virt (DT)
[   29.556161] Call trace:
[   29.556414]  show_stack+0x20/0x38 (C)
[   29.556599]  dump_stack_lvl+0x8c/0xd0
[   29.556982]  print_report+0x118/0x608
[   29.557231]  kasan_report+0xdc/0x128
[   29.557376]  __asan_report_load8_noabort+0x20/0x30
[   29.557539]  kasan_atomics_helper+0x3db0/0x4858
[   29.557755]  kasan_atomics+0x198/0x2e0
[   29.557948]  kunit_try_run_case+0x170/0x3f0
[   29.558107]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.558264]  kthread+0x328/0x630
[   29.558445]  ret_from_fork+0x10/0x20
[   29.558577] 
[   29.558703] Allocated by task 266:
[   29.558789]  kasan_save_stack+0x3c/0x68
[   29.559104]  kasan_save_track+0x20/0x40
[   29.559233]  kasan_save_alloc_info+0x40/0x58
[   29.559344]  __kasan_kmalloc+0xd4/0xd8
[   29.559617]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.559868]  kasan_atomics+0xb8/0x2e0
[   29.559973]  kunit_try_run_case+0x170/0x3f0
[   29.560074]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.560357]  kthread+0x328/0x630
[   29.560461]  ret_from_fork+0x10/0x20
[   29.560596] 
[   29.560648] The buggy address belongs to the object at fff00000c7772d80
[   29.560648]  which belongs to the cache kmalloc-64 of size 64
[   29.561033] The buggy address is located 0 bytes to the right of
[   29.561033]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.561466] 
[   29.561577] The buggy address belongs to the physical page:
[   29.561655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.561804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.562053] page_type: f5(slab)
[   29.562224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.562371] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.562487] page dumped because: kasan: bad access detected
[   29.562575] 
[   29.562666] Memory state around the buggy address:
[   29.562772]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.563007]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.563131] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.563239]                                      ^
[   29.563343]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.563468]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.563572] ==================================================================
[   29.633073] ==================================================================
[   29.633171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   29.633303] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.633431] 
[   29.633505] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.634041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.634116] Hardware name: linux,dummy-virt (DT)
[   29.634185] Call trace:
[   29.634236]  show_stack+0x20/0x38 (C)
[   29.635393]  dump_stack_lvl+0x8c/0xd0
[   29.635550]  print_report+0x118/0x608
[   29.636514]  kasan_report+0xdc/0x128
[   29.636669]  kasan_check_range+0x100/0x1a8
[   29.636835]  __kasan_check_write+0x20/0x30
[   29.636968]  kasan_atomics_helper+0x17ec/0x4858
[   29.637109]  kasan_atomics+0x198/0x2e0
[   29.637261]  kunit_try_run_case+0x170/0x3f0
[   29.637669]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.637853]  kthread+0x328/0x630
[   29.637980]  ret_from_fork+0x10/0x20
[   29.638109] 
[   29.638170] Allocated by task 266:
[   29.638255]  kasan_save_stack+0x3c/0x68
[   29.638375]  kasan_save_track+0x20/0x40
[   29.638490]  kasan_save_alloc_info+0x40/0x58
[   29.638600]  __kasan_kmalloc+0xd4/0xd8
[   29.638781]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.638895]  kasan_atomics+0xb8/0x2e0
[   29.638996]  kunit_try_run_case+0x170/0x3f0
[   29.639101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.639214]  kthread+0x328/0x630
[   29.639311]  ret_from_fork+0x10/0x20
[   29.639418] 
[   29.639476] The buggy address belongs to the object at fff00000c7772d80
[   29.639476]  which belongs to the cache kmalloc-64 of size 64
[   29.639624] The buggy address is located 0 bytes to the right of
[   29.639624]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.639808] 
[   29.639895] The buggy address belongs to the physical page:
[   29.639977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.640129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.640351] page_type: f5(slab)
[   29.642125] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.642323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.642443] page dumped because: kasan: bad access detected
[   29.642537] 
[   29.642594] Memory state around the buggy address:
[   29.644778]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.644913]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.645033] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.646392]                                      ^
[   29.646499]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.646725]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.646875] ==================================================================
[   29.606735] ==================================================================
[   29.607004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   29.607124] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.607260] 
[   29.607336] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.610012] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.610091] Hardware name: linux,dummy-virt (DT)
[   29.610188] Call trace:
[   29.610252]  show_stack+0x20/0x38 (C)
[   29.610399]  dump_stack_lvl+0x8c/0xd0
[   29.610532]  print_report+0x118/0x608
[   29.610942]  kasan_report+0xdc/0x128
[   29.611071]  kasan_check_range+0x100/0x1a8
[   29.611197]  __kasan_check_write+0x20/0x30
[   29.611379]  kasan_atomics_helper+0x175c/0x4858
[   29.611519]  kasan_atomics+0x198/0x2e0
[   29.612143]  kunit_try_run_case+0x170/0x3f0
[   29.612307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.612443]  kthread+0x328/0x630
[   29.613646]  ret_from_fork+0x10/0x20
[   29.614129] 
[   29.614239] Allocated by task 266:
[   29.614441]  kasan_save_stack+0x3c/0x68
[   29.614560]  kasan_save_track+0x20/0x40
[   29.615184]  kasan_save_alloc_info+0x40/0x58
[   29.615400]  __kasan_kmalloc+0xd4/0xd8
[   29.615510]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.615620]  kasan_atomics+0xb8/0x2e0
[   29.615741]  kunit_try_run_case+0x170/0x3f0
[   29.615847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.616305]  kthread+0x328/0x630
[   29.616446]  ret_from_fork+0x10/0x20
[   29.616906] 
[   29.616980] The buggy address belongs to the object at fff00000c7772d80
[   29.616980]  which belongs to the cache kmalloc-64 of size 64
[   29.617583] The buggy address is located 0 bytes to the right of
[   29.617583]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.617764] 
[   29.617823] The buggy address belongs to the physical page:
[   29.617907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.618317] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.619063] page_type: f5(slab)
[   29.619286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.619425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.619553] page dumped because: kasan: bad access detected
[   29.619638] 
[   29.620316] Memory state around the buggy address:
[   29.620704]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.620846]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.621076] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.621193]                                      ^
[   29.621605]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.621878]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.622125] ==================================================================
[   29.252918] ==================================================================
[   29.253207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   29.253342] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.253463] 
[   29.253532] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.253762] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.253846] Hardware name: linux,dummy-virt (DT)
[   29.254027] Call trace:
[   29.254098]  show_stack+0x20/0x38 (C)
[   29.254272]  dump_stack_lvl+0x8c/0xd0
[   29.254422]  print_report+0x118/0x608
[   29.254566]  kasan_report+0xdc/0x128
[   29.254961]  kasan_check_range+0x100/0x1a8
[   29.255122]  __kasan_check_write+0x20/0x30
[   29.255317]  kasan_atomics_helper+0xd3c/0x4858
[   29.255460]  kasan_atomics+0x198/0x2e0
[   29.256199]  kunit_try_run_case+0x170/0x3f0
[   29.256433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.256988]  kthread+0x328/0x630
[   29.257148]  ret_from_fork+0x10/0x20
[   29.257417] 
[   29.257511] Allocated by task 266:
[   29.257606]  kasan_save_stack+0x3c/0x68
[   29.257739]  kasan_save_track+0x20/0x40
[   29.257855]  kasan_save_alloc_info+0x40/0x58
[   29.257961]  __kasan_kmalloc+0xd4/0xd8
[   29.258397]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.258525]  kasan_atomics+0xb8/0x2e0
[   29.258636]  kunit_try_run_case+0x170/0x3f0
[   29.258813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.259153]  kthread+0x328/0x630
[   29.259591]  ret_from_fork+0x10/0x20
[   29.259786] 
[   29.259847] The buggy address belongs to the object at fff00000c7772d80
[   29.259847]  which belongs to the cache kmalloc-64 of size 64
[   29.259931] The buggy address is located 0 bytes to the right of
[   29.259931]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.260056] 
[   29.260167] The buggy address belongs to the physical page:
[   29.260253] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.260664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.261027] page_type: f5(slab)
[   29.261674] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.262095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.262456] page dumped because: kasan: bad access detected
[   29.262705] 
[   29.262776] Memory state around the buggy address:
[   29.262873]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.263201]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.263329] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.263739]                                      ^
[   29.263893]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.264082]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.264198] ==================================================================
[   29.526238] ==================================================================
[   29.526346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   29.526465] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.526584] 
[   29.527098] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.527402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.527996] Hardware name: linux,dummy-virt (DT)
[   29.528157] Call trace:
[   29.528225]  show_stack+0x20/0x38 (C)
[   29.528352]  dump_stack_lvl+0x8c/0xd0
[   29.528494]  print_report+0x118/0x608
[   29.528673]  kasan_report+0xdc/0x128
[   29.529464]  kasan_check_range+0x100/0x1a8
[   29.529605]  __kasan_check_write+0x20/0x30
[   29.529762]  kasan_atomics_helper+0x154c/0x4858
[   29.530148]  kasan_atomics+0x198/0x2e0
[   29.530468]  kunit_try_run_case+0x170/0x3f0
[   29.530830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.531451]  kthread+0x328/0x630
[   29.532140]  ret_from_fork+0x10/0x20
[   29.532526] 
[   29.533106] Allocated by task 266:
[   29.533345]  kasan_save_stack+0x3c/0x68
[   29.533516]  kasan_save_track+0x20/0x40
[   29.533621]  kasan_save_alloc_info+0x40/0x58
[   29.533745]  __kasan_kmalloc+0xd4/0xd8
[   29.534723]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.534862]  kasan_atomics+0xb8/0x2e0
[   29.535243]  kunit_try_run_case+0x170/0x3f0
[   29.535586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.535731]  kthread+0x328/0x630
[   29.536523]  ret_from_fork+0x10/0x20
[   29.536969] 
[   29.537276] The buggy address belongs to the object at fff00000c7772d80
[   29.537276]  which belongs to the cache kmalloc-64 of size 64
[   29.537436] The buggy address is located 0 bytes to the right of
[   29.537436]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.537594] 
[   29.537650] The buggy address belongs to the physical page:
[   29.537745] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.538206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.538744] page_type: f5(slab)
[   29.539043] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.539176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.539280] page dumped because: kasan: bad access detected
[   29.539361] 
[   29.539411] Memory state around the buggy address:
[   29.539531]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.539647]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.539917] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.540018]                                      ^
[   29.540228]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.540339]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.540435] ==================================================================
[   29.441460] ==================================================================
[   29.441604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   29.442804] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.443416] 
[   29.443500] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.443969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.444149] Hardware name: linux,dummy-virt (DT)
[   29.444257] Call trace:
[   29.444405]  show_stack+0x20/0x38 (C)
[   29.444636]  dump_stack_lvl+0x8c/0xd0
[   29.444781]  print_report+0x118/0x608
[   29.444904]  kasan_report+0xdc/0x128
[   29.445051]  kasan_check_range+0x100/0x1a8
[   29.445422]  __kasan_check_write+0x20/0x30
[   29.445615]  kasan_atomics_helper+0x12d8/0x4858
[   29.446258]  kasan_atomics+0x198/0x2e0
[   29.446804]  kunit_try_run_case+0x170/0x3f0
[   29.447362]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.447756]  kthread+0x328/0x630
[   29.447952]  ret_from_fork+0x10/0x20
[   29.448078] 
[   29.448129] Allocated by task 266:
[   29.448215]  kasan_save_stack+0x3c/0x68
[   29.448321]  kasan_save_track+0x20/0x40
[   29.448501]  kasan_save_alloc_info+0x40/0x58
[   29.448622]  __kasan_kmalloc+0xd4/0xd8
[   29.448748]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.449453]  kasan_atomics+0xb8/0x2e0
[   29.449579]  kunit_try_run_case+0x170/0x3f0
[   29.449756]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.449937]  kthread+0x328/0x630
[   29.451738]  ret_from_fork+0x10/0x20
[   29.451919] 
[   29.452006] The buggy address belongs to the object at fff00000c7772d80
[   29.452006]  which belongs to the cache kmalloc-64 of size 64
[   29.452172] The buggy address is located 0 bytes to the right of
[   29.452172]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.452367] 
[   29.452592] The buggy address belongs to the physical page:
[   29.452786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.452930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.453111] page_type: f5(slab)
[   29.453256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.453391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.453522] page dumped because: kasan: bad access detected
[   29.453640] 
[   29.453708] Memory state around the buggy address:
[   29.453800]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.454115]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.454251] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.454424]                                      ^
[   29.454560]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.454775]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.454955] ==================================================================
[   29.179693] ==================================================================
[   29.179800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   29.179916] Read of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.180575] 
[   29.180708] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.180928] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.181972]  kasan_atomics_helper+0x3dcc/0x4858
[   29.184093]  kunit_try_run_case+0x170/0x3f0
[   29.184539]  kthread+0x328/0x630
[   29.184642]  ret_from_fork+0x10/0x20
[   29.185717] The buggy address is located 0 bytes to the right of
[   29.185717]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.186365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.188915]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.192416]  __kasan_check_write+0x20/0x30
[   29.193965]  ret_from_fork+0x10/0x20
[   29.197920]  kthread+0x328/0x630
[   29.198829] The buggy address is located 0 bytes to the right of
[   29.198829]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.200034] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.200934] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.201363]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.202381] 
[   29.203293]  show_stack+0x20/0x38 (C)
[   29.204208]  __asan_report_load4_noabort+0x20/0x30
[   29.205489]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.206549] Allocated by task 266:
[   29.206957]  kasan_save_track+0x20/0x40
[   29.213009] The buggy address belongs to the object at fff00000c7772d80
[   29.213009]  which belongs to the cache kmalloc-64 of size 64
[   29.213453] The buggy address is located 0 bytes to the right of
[   29.213453]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.214259] 
[   29.214368] The buggy address belongs to the physical page:
[   29.214470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.214605] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.214905] page_type: f5(slab)
[   29.215130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.215265] page dumped because: kasan: bad access detected
[   29.215351] 
[   29.215400] Memory state around the buggy address:
[   29.215490]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.215624]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.215765] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.215863]                                      ^
[   29.215969]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.217831] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.220608]  kunit_try_run_case+0x170/0x3f0
[   29.223846] The buggy address is located 0 bytes to the right of
[   29.223846]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.224602] The buggy address belongs to the physical page:
[   29.225174] page_type: f5(slab)
[   29.225854]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.227756] 
[   29.228761]  dump_stack_lvl+0x8c/0xd0
[   29.230229]  kthread+0x328/0x630
[   29.232229]  kthread+0x328/0x630
[   29.233424] 
[   29.233573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.234813]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.236560] 
[   29.236996] Call trace:
[   29.241909] 
[   29.242053] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.242189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.242420] page_type: f5(slab)
[   29.242733] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.242894] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.242999] page dumped because: kasan: bad access detected
[   29.243085] 
[   29.243139] Memory state around the buggy address:
[   29.243267]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.243446]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.243593] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.243711]                                      ^
[   29.243795]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.244086]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.244328] ==================================================================
[   29.277398] ==================================================================
[   29.277506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   29.277622] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.277765] 
[   29.277842] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.278043] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.278117] Hardware name: linux,dummy-virt (DT)
[   29.278192] Call trace:
[   29.278250]  show_stack+0x20/0x38 (C)
[   29.278368]  dump_stack_lvl+0x8c/0xd0
[   29.278489]  print_report+0x118/0x608
[   29.278616]  kasan_report+0xdc/0x128
[   29.278825]  kasan_check_range+0x100/0x1a8
[   29.278978]  __kasan_check_read+0x20/0x30
[   29.279125]  kasan_atomics_helper+0xdd4/0x4858
[   29.279276]  kasan_atomics+0x198/0x2e0
[   29.279411]  kunit_try_run_case+0x170/0x3f0
[   29.279971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.280136]  kthread+0x328/0x630
[   29.280253]  ret_from_fork+0x10/0x20
[   29.280373] 
[   29.280425] Allocated by task 266:
[   29.280553]  kasan_save_stack+0x3c/0x68
[   29.280697]  kasan_save_track+0x20/0x40
[   29.282052]  kasan_save_alloc_info+0x40/0x58
[   29.282179]  __kasan_kmalloc+0xd4/0xd8
[   29.282289]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.282469]  kasan_atomics+0xb8/0x2e0
[   29.282651]  kunit_try_run_case+0x170/0x3f0
[   29.282786]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.282919]  kthread+0x328/0x630
[   29.283025]  ret_from_fork+0x10/0x20
[   29.283187] 
[   29.283488] The buggy address belongs to the object at fff00000c7772d80
[   29.283488]  which belongs to the cache kmalloc-64 of size 64
[   29.283646] The buggy address is located 0 bytes to the right of
[   29.283646]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.283976] 
[   29.284141] The buggy address belongs to the physical page:
[   29.284364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.284700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.284827] page_type: f5(slab)
[   29.284918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.285039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.285211] page dumped because: kasan: bad access detected
[   29.285359] 
[   29.285424] Memory state around the buggy address:
[   29.285548]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.285671]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.285813] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.285976]                                      ^
[   29.286458]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.286721]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.286831] ==================================================================
[   29.104432] ==================================================================
[   29.104534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   29.104652] Read of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.104816] 
[   29.104904] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.105101] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.105175] Hardware name: linux,dummy-virt (DT)
[   29.105265] Call trace:
[   29.105329]  show_stack+0x20/0x38 (C)
[   29.105463]  dump_stack_lvl+0x8c/0xd0
[   29.105600]  print_report+0x118/0x608
[   29.107810]  kasan_report+0xdc/0x128
[   29.107966]  __asan_report_load4_noabort+0x20/0x30
[   29.108094]  kasan_atomics_helper+0x42d8/0x4858
[   29.108215]  kasan_atomics+0x198/0x2e0
[   29.108332]  kunit_try_run_case+0x170/0x3f0
[   29.108468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.109478]  kthread+0x328/0x630
[   29.109607]  ret_from_fork+0x10/0x20
[   29.113045] The buggy address is located 0 bytes to the right of
[   29.113045]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.116237]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.118895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   29.122732]  kunit_try_run_case+0x170/0x3f0
[   29.122886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.123255]  kthread+0x328/0x630
[   29.123385]  ret_from_fork+0x10/0x20
[   29.123734] 
[   29.123799] Allocated by task 266:
[   29.123895]  kasan_save_stack+0x3c/0x68
[   29.124002]  kasan_save_track+0x20/0x40
[   29.124115]  kasan_save_alloc_info+0x40/0x58
[   29.124233]  __kasan_kmalloc+0xd4/0xd8
[   29.124347]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.124472]  kasan_atomics+0xb8/0x2e0
[   29.124576]  kunit_try_run_case+0x170/0x3f0
[   29.124784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.125098]  kthread+0x328/0x630
[   29.125233]  ret_from_fork+0x10/0x20
[   29.125526] 
[   29.125702] The buggy address belongs to the object at fff00000c7772d80
[   29.125702]  which belongs to the cache kmalloc-64 of size 64
[   29.125862] The buggy address is located 0 bytes to the right of
[   29.125862]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.126038] 
[   29.126102] The buggy address belongs to the physical page:
[   29.126205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.126442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.126589] page_type: f5(slab)
[   29.126765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.126905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.127104] page dumped because: kasan: bad access detected
[   29.127222] 
[   29.127377] Memory state around the buggy address:
[   29.127463]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.128108]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.128227] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.128327]                                      ^
[   29.128410]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.128516]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.129363] ==================================================================
[   29.165172] ==================================================================
[   29.165352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   29.165515] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.165641] 
[   29.165734] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.165943] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.166014] Hardware name: linux,dummy-virt (DT)
[   29.166090] Call trace:
[   29.166147]  show_stack+0x20/0x38 (C)
[   29.166265]  dump_stack_lvl+0x8c/0xd0
[   29.166409]  print_report+0x118/0x608
[   29.167000]  kasan_report+0xdc/0x128
[   29.167340]  kasan_check_range+0x100/0x1a8
[   29.167837]  __kasan_check_write+0x20/0x30
[   29.168453]  kasan_atomics_helper+0xad4/0x4858
[   29.168627]  kasan_atomics+0x198/0x2e0
[   29.169019]  kunit_try_run_case+0x170/0x3f0
[   29.169303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.169599]  kthread+0x328/0x630
[   29.169732]  ret_from_fork+0x10/0x20
[   29.169880] 
[   29.169946] Allocated by task 266:
[   29.170036]  kasan_save_stack+0x3c/0x68
[   29.170147]  kasan_save_track+0x20/0x40
[   29.170244]  kasan_save_alloc_info+0x40/0x58
[   29.170348]  __kasan_kmalloc+0xd4/0xd8
[   29.170449]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.170556]  kasan_atomics+0xb8/0x2e0
[   29.170657]  kunit_try_run_case+0x170/0x3f0
[   29.170788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.170901]  kthread+0x328/0x630
[   29.171661]  ret_from_fork+0x10/0x20
[   29.171950] 
[   29.172867] The buggy address belongs to the object at fff00000c7772d80
[   29.172867]  which belongs to the cache kmalloc-64 of size 64
[   29.173205] The buggy address is located 0 bytes to the right of
[   29.173205]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.174627] 
[   29.174756] The buggy address belongs to the physical page:
[   29.174834] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.174909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.174990] page_type: f5(slab)
[   29.175094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.175285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.176188] page dumped because: kasan: bad access detected
[   29.176334] 
[   29.176390] Memory state around the buggy address:
[   29.176868]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.177066]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.177238] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.177447]                                      ^
[   29.177582]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.178307]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.178450] ==================================================================
[   29.622646] ==================================================================
[   29.622906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   29.623204] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.623342] 
[   29.623535] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.623756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.624163] Hardware name: linux,dummy-virt (DT)
[   29.624261] Call trace:
[   29.624329]  show_stack+0x20/0x38 (C)
[   29.624447]  dump_stack_lvl+0x8c/0xd0
[   29.624579]  print_report+0x118/0x608
[   29.624952]  kasan_report+0xdc/0x128
[   29.625125]  __asan_report_load8_noabort+0x20/0x30
[   29.625740]  kasan_atomics_helper+0x3e20/0x4858
[   29.626171]  kasan_atomics+0x198/0x2e0
[   29.626374]  kunit_try_run_case+0x170/0x3f0
[   29.626529]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.626743]  kthread+0x328/0x630
[   29.626873]  ret_from_fork+0x10/0x20
[   29.627166] 
[   29.627255] Allocated by task 266:
[   29.627455]  kasan_save_stack+0x3c/0x68
[   29.627576]  kasan_save_track+0x20/0x40
[   29.627905]  kasan_save_alloc_info+0x40/0x58
[   29.628066]  __kasan_kmalloc+0xd4/0xd8
[   29.628337]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.628451]  kasan_atomics+0xb8/0x2e0
[   29.628594]  kunit_try_run_case+0x170/0x3f0
[   29.629240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.629380]  kthread+0x328/0x630
[   29.629537]  ret_from_fork+0x10/0x20
[   29.629750] 
[   29.629818] The buggy address belongs to the object at fff00000c7772d80
[   29.629818]  which belongs to the cache kmalloc-64 of size 64
[   29.629981] The buggy address is located 0 bytes to the right of
[   29.629981]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.630225] 
[   29.630302] The buggy address belongs to the physical page:
[   29.630381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.630513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.631295] page_type: f5(slab)
[   29.631402] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.631527] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.631631] page dumped because: kasan: bad access detected
[   29.631856] 
[   29.631913] Memory state around the buggy address:
[   29.632002]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.632119]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.632229] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.632331]                                      ^
[   29.632424]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.632538]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.632625] ==================================================================
[   29.574438] ==================================================================
[   29.574722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   29.574943] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.575207] 
[   29.575291] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.575639] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.575743] Hardware name: linux,dummy-virt (DT)
[   29.575838] Call trace:
[   29.575893]  show_stack+0x20/0x38 (C)
[   29.576027]  dump_stack_lvl+0x8c/0xd0
[   29.576159]  print_report+0x118/0x608
[   29.576287]  kasan_report+0xdc/0x128
[   29.578179]  __asan_report_load8_noabort+0x20/0x30
[   29.578326]  kasan_atomics_helper+0x3df4/0x4858
[   29.578622]  kasan_atomics+0x198/0x2e0
[   29.578925]  kunit_try_run_case+0x170/0x3f0
[   29.579329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.579478]  kthread+0x328/0x630
[   29.579598]  ret_from_fork+0x10/0x20
[   29.579788] 
[   29.579855] Allocated by task 266:
[   29.579991]  kasan_save_stack+0x3c/0x68
[   29.580096]  kasan_save_track+0x20/0x40
[   29.580196]  kasan_save_alloc_info+0x40/0x58
[   29.580297]  __kasan_kmalloc+0xd4/0xd8
[   29.580468]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.580725]  kasan_atomics+0xb8/0x2e0
[   29.580992]  kunit_try_run_case+0x170/0x3f0
[   29.581102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.581217]  kthread+0x328/0x630
[   29.581324]  ret_from_fork+0x10/0x20
[   29.581452] 
[   29.581605] The buggy address belongs to the object at fff00000c7772d80
[   29.581605]  which belongs to the cache kmalloc-64 of size 64
[   29.581773] The buggy address is located 0 bytes to the right of
[   29.581773]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.581952] 
[   29.582016] The buggy address belongs to the physical page:
[   29.582107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.582240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.582561] page_type: f5(slab)
[   29.582902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.583096] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.583292] page dumped because: kasan: bad access detected
[   29.583439] 
[   29.583529] Memory state around the buggy address:
[   29.583772]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.583880]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.583987] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.584087]                                      ^
[   29.584213]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.584310]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.584402] ==================================================================
[   29.244748] ==================================================================
[   29.244954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   29.245110] Read of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.245232] 
[   29.245326] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.245552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.245718] Hardware name: linux,dummy-virt (DT)
[   29.245793] Call trace:
[   29.245898]  show_stack+0x20/0x38 (C)
[   29.246037]  dump_stack_lvl+0x8c/0xd0
[   29.246383]  print_report+0x118/0x608
[   29.246738]  kasan_report+0xdc/0x128
[   29.246872]  __asan_report_load4_noabort+0x20/0x30
[   29.247104]  kasan_atomics_helper+0x3dd8/0x4858
[   29.247240]  kasan_atomics+0x198/0x2e0
[   29.247478]  kunit_try_run_case+0x170/0x3f0
[   29.247618]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.248055]  kthread+0x328/0x630
[   29.248204]  ret_from_fork+0x10/0x20
[   29.248362] 
[   29.248415] Allocated by task 266:
[   29.248492]  kasan_save_stack+0x3c/0x68
[   29.248616]  kasan_save_track+0x20/0x40
[   29.248734]  kasan_save_alloc_info+0x40/0x58
[   29.248895]  __kasan_kmalloc+0xd4/0xd8
[   29.249001]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.249108]  kasan_atomics+0xb8/0x2e0
[   29.249235]  kunit_try_run_case+0x170/0x3f0
[   29.249358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.249591]  kthread+0x328/0x630
[   29.249703]  ret_from_fork+0x10/0x20
[   29.249827] 
[   29.249931] The buggy address belongs to the object at fff00000c7772d80
[   29.249931]  which belongs to the cache kmalloc-64 of size 64
[   29.250185] The buggy address is located 0 bytes to the right of
[   29.250185]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.250352] 
[   29.250411] The buggy address belongs to the physical page:
[   29.250497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.250663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.250817] page_type: f5(slab)
[   29.250927] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.251070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.251388] page dumped because: kasan: bad access detected
[   29.251495] 
[   29.251557] Memory state around the buggy address:
[   29.251646]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.251793]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.251990] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.252149]                                      ^
[   29.252239]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.252348]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.252446] ==================================================================
[   29.430990] ==================================================================
[   29.431092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   29.431213] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.431358] 
[   29.431449] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.431989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.432203] Hardware name: linux,dummy-virt (DT)
[   29.432288] Call trace:
[   29.432343]  show_stack+0x20/0x38 (C)
[   29.432467]  dump_stack_lvl+0x8c/0xd0
[   29.432585]  print_report+0x118/0x608
[   29.432724]  kasan_report+0xdc/0x128
[   29.432851]  kasan_check_range+0x100/0x1a8
[   29.432975]  __kasan_check_write+0x20/0x30
[   29.433088]  kasan_atomics_helper+0x126c/0x4858
[   29.433212]  kasan_atomics+0x198/0x2e0
[   29.433346]  kunit_try_run_case+0x170/0x3f0
[   29.433467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.433601]  kthread+0x328/0x630
[   29.433729]  ret_from_fork+0x10/0x20
[   29.433854] 
[   29.433902] Allocated by task 266:
[   29.433973]  kasan_save_stack+0x3c/0x68
[   29.434074]  kasan_save_track+0x20/0x40
[   29.434176]  kasan_save_alloc_info+0x40/0x58
[   29.434274]  __kasan_kmalloc+0xd4/0xd8
[   29.434373]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.434483]  kasan_atomics+0xb8/0x2e0
[   29.434582]  kunit_try_run_case+0x170/0x3f0
[   29.434725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.434903]  kthread+0x328/0x630
[   29.435076]  ret_from_fork+0x10/0x20
[   29.435868] 
[   29.436063] The buggy address belongs to the object at fff00000c7772d80
[   29.436063]  which belongs to the cache kmalloc-64 of size 64
[   29.436495] The buggy address is located 0 bytes to the right of
[   29.436495]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.436661] 
[   29.436737] The buggy address belongs to the physical page:
[   29.437618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.437901] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.438553] page_type: f5(slab)
[   29.438670] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.438835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.439649] page dumped because: kasan: bad access detected
[   29.439824] 
[   29.439886] Memory state around the buggy address:
[   29.440320]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.440438]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.440614] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.440737]                                      ^
[   29.440826]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.440932]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.441031] ==================================================================
[   29.455874] ==================================================================
[   29.456360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   29.456529] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.456656] 
[   29.456757] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.457097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.457435] Hardware name: linux,dummy-virt (DT)
[   29.457751] Call trace:
[   29.457817]  show_stack+0x20/0x38 (C)
[   29.457946]  dump_stack_lvl+0x8c/0xd0
[   29.458073]  print_report+0x118/0x608
[   29.458199]  kasan_report+0xdc/0x128
[   29.458667]  kasan_check_range+0x100/0x1a8
[   29.460701]  __kasan_check_write+0x20/0x30
[   29.460853]  kasan_atomics_helper+0x1384/0x4858
[   29.461004]  kasan_atomics+0x198/0x2e0
[   29.461116]  kunit_try_run_case+0x170/0x3f0
[   29.461184]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.461272]  kthread+0x328/0x630
[   29.461330]  ret_from_fork+0x10/0x20
[   29.461394] 
[   29.461419] Allocated by task 266:
[   29.461459]  kasan_save_stack+0x3c/0x68
[   29.461513]  kasan_save_track+0x20/0x40
[   29.461565]  kasan_save_alloc_info+0x40/0x58
[   29.461614]  __kasan_kmalloc+0xd4/0xd8
[   29.461663]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.461748]  kasan_atomics+0xb8/0x2e0
[   29.461800]  kunit_try_run_case+0x170/0x3f0
[   29.461851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.461909]  kthread+0x328/0x630
[   29.461953]  ret_from_fork+0x10/0x20
[   29.461999] 
[   29.462028] The buggy address belongs to the object at fff00000c7772d80
[   29.462028]  which belongs to the cache kmalloc-64 of size 64
[   29.462105] The buggy address is located 0 bytes to the right of
[   29.462105]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.462189] 
[   29.462217] The buggy address belongs to the physical page:
[   29.462257] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.462320] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.462383] page_type: f5(slab)
[   29.462431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.462493] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.462545] page dumped because: kasan: bad access detected
[   29.462587] 
[   29.462610] Memory state around the buggy address:
[   29.462670]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.462843]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.462957] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.463048]                                      ^
[   29.463211]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.463356]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.463729] ==================================================================
[   29.486060] ==================================================================
[   29.486263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   29.486564] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.486713] 
[   29.486810] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.487414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.487499] Hardware name: linux,dummy-virt (DT)
[   29.487607] Call trace:
[   29.487672]  show_stack+0x20/0x38 (C)
[   29.487830]  dump_stack_lvl+0x8c/0xd0
[   29.487963]  print_report+0x118/0x608
[   29.489585]  kasan_report+0xdc/0x128
[   29.489937]  kasan_check_range+0x100/0x1a8
[   29.490448]  __kasan_check_write+0x20/0x30
[   29.490710]  kasan_atomics_helper+0x1414/0x4858
[   29.490864]  kasan_atomics+0x198/0x2e0
[   29.491021]  kunit_try_run_case+0x170/0x3f0
[   29.491377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.491519]  kthread+0x328/0x630
[   29.491650]  ret_from_fork+0x10/0x20
[   29.492610] 
[   29.492677] Allocated by task 266:
[   29.492850]  kasan_save_stack+0x3c/0x68
[   29.492958]  kasan_save_track+0x20/0x40
[   29.493298]  kasan_save_alloc_info+0x40/0x58
[   29.493611]  __kasan_kmalloc+0xd4/0xd8
[   29.493794]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.493925]  kasan_atomics+0xb8/0x2e0
[   29.494394]  kunit_try_run_case+0x170/0x3f0
[   29.494543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.494936]  kthread+0x328/0x630
[   29.495070]  ret_from_fork+0x10/0x20
[   29.495414] 
[   29.495535] The buggy address belongs to the object at fff00000c7772d80
[   29.495535]  which belongs to the cache kmalloc-64 of size 64
[   29.495876] The buggy address is located 0 bytes to the right of
[   29.495876]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.496064] 
[   29.496177] The buggy address belongs to the physical page:
[   29.496322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.496582] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.496840] page_type: f5(slab)
[   29.496943] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.497758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.497870] page dumped because: kasan: bad access detected
[   29.498008] 
[   29.498169] Memory state around the buggy address:
[   29.498288]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.498398]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.498584] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.498818]                                      ^
[   29.498920]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.499468]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.499841] ==================================================================
[   29.564072] ==================================================================
[   29.564171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   29.564478] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.564849] 
[   29.565052] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.565588] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.565662] Hardware name: linux,dummy-virt (DT)
[   29.565768] Call trace:
[   29.565894]  show_stack+0x20/0x38 (C)
[   29.566092]  dump_stack_lvl+0x8c/0xd0
[   29.566241]  print_report+0x118/0x608
[   29.566446]  kasan_report+0xdc/0x128
[   29.566581]  kasan_check_range+0x100/0x1a8
[   29.566936]  __kasan_check_write+0x20/0x30
[   29.567072]  kasan_atomics_helper+0x1644/0x4858
[   29.567294]  kasan_atomics+0x198/0x2e0
[   29.567445]  kunit_try_run_case+0x170/0x3f0
[   29.567695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.567954]  kthread+0x328/0x630
[   29.568220]  ret_from_fork+0x10/0x20
[   29.568417] 
[   29.568473] Allocated by task 266:
[   29.568594]  kasan_save_stack+0x3c/0x68
[   29.568720]  kasan_save_track+0x20/0x40
[   29.569012]  kasan_save_alloc_info+0x40/0x58
[   29.569301]  __kasan_kmalloc+0xd4/0xd8
[   29.569543]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.570007]  kasan_atomics+0xb8/0x2e0
[   29.570143]  kunit_try_run_case+0x170/0x3f0
[   29.570260]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.570325]  kthread+0x328/0x630
[   29.570369]  ret_from_fork+0x10/0x20
[   29.570515] 
[   29.570583] The buggy address belongs to the object at fff00000c7772d80
[   29.570583]  which belongs to the cache kmalloc-64 of size 64
[   29.570804] The buggy address is located 0 bytes to the right of
[   29.570804]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.571015] 
[   29.571177] The buggy address belongs to the physical page:
[   29.571362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.571490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.571761] page_type: f5(slab)
[   29.571993] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.572161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.572287] page dumped because: kasan: bad access detected
[   29.572378] 
[   29.572425] Memory state around the buggy address:
[   29.572631]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.573161]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.573293] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.573407]                                      ^
[   29.573506]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.573632]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.573824] ==================================================================
[   29.130641] ==================================================================
[   29.130793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   29.130935] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.131540] 
[   29.131652] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.132527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.132604] Hardware name: linux,dummy-virt (DT)
[   29.132701] Call trace:
[   29.133184]  show_stack+0x20/0x38 (C)
[   29.133426]  dump_stack_lvl+0x8c/0xd0
[   29.134135]  print_report+0x118/0x608
[   29.134481]  kasan_report+0xdc/0x128
[   29.134631]  kasan_check_range+0x100/0x1a8
[   29.134795]  __kasan_check_write+0x20/0x30
[   29.135595]  kasan_atomics_helper+0x99c/0x4858
[   29.135891]  kasan_atomics+0x198/0x2e0
[   29.136077]  kunit_try_run_case+0x170/0x3f0
[   29.136596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.137002]  kthread+0x328/0x630
[   29.137130]  ret_from_fork+0x10/0x20
[   29.137259] 
[   29.137316] Allocated by task 266:
[   29.137409]  kasan_save_stack+0x3c/0x68
[   29.137534]  kasan_save_track+0x20/0x40
[   29.137828]  kasan_save_alloc_info+0x40/0x58
[   29.137932]  __kasan_kmalloc+0xd4/0xd8
[   29.138035]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.138136]  kasan_atomics+0xb8/0x2e0
[   29.138234]  kunit_try_run_case+0x170/0x3f0
[   29.138345]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.139480]  kthread+0x328/0x630
[   29.139711]  ret_from_fork+0x10/0x20
[   29.139824] 
[   29.139938] The buggy address belongs to the object at fff00000c7772d80
[   29.139938]  which belongs to the cache kmalloc-64 of size 64
[   29.140196] The buggy address is located 0 bytes to the right of
[   29.140196]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.140990] 
[   29.141169] The buggy address belongs to the physical page:
[   29.141304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.141443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.141572] page_type: f5(slab)
[   29.141781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.142090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.142209] page dumped because: kasan: bad access detected
[   29.142302] 
[   29.142429] Memory state around the buggy address:
[   29.142523]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.142770]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.142901] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.143016]                                      ^
[   29.143319]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.143440]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.143553] ==================================================================
[   29.365196] ==================================================================
[   29.365425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   29.365556] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.365695] 
[   29.365768] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.365970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.366041] Hardware name: linux,dummy-virt (DT)
[   29.366118] Call trace:
[   29.366175]  show_stack+0x20/0x38 (C)
[   29.366291]  dump_stack_lvl+0x8c/0xd0
[   29.366413]  print_report+0x118/0x608
[   29.366526]  kasan_report+0xdc/0x128
[   29.367215]  kasan_check_range+0x100/0x1a8
[   29.368559]  __kasan_check_write+0x20/0x30
[   29.368721]  kasan_atomics_helper+0x1058/0x4858
[   29.368866]  kasan_atomics+0x198/0x2e0
[   29.368994]  kunit_try_run_case+0x170/0x3f0
[   29.369136]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.369279]  kthread+0x328/0x630
[   29.369401]  ret_from_fork+0x10/0x20
[   29.369520] 
[   29.369568] Allocated by task 266:
[   29.369639]  kasan_save_stack+0x3c/0x68
[   29.369770]  kasan_save_track+0x20/0x40
[   29.369874]  kasan_save_alloc_info+0x40/0x58
[   29.369983]  __kasan_kmalloc+0xd4/0xd8
[   29.370092]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.370208]  kasan_atomics+0xb8/0x2e0
[   29.370306]  kunit_try_run_case+0x170/0x3f0
[   29.370416]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.370526]  kthread+0x328/0x630
[   29.370613]  ret_from_fork+0x10/0x20
[   29.373340] 
[   29.373403] The buggy address belongs to the object at fff00000c7772d80
[   29.373403]  which belongs to the cache kmalloc-64 of size 64
[   29.374073] The buggy address is located 0 bytes to the right of
[   29.374073]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.374770] 
[   29.374836] The buggy address belongs to the physical page:
[   29.374921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.375057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.375187] page_type: f5(slab)
[   29.375286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.375412] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.375517] page dumped because: kasan: bad access detected
[   29.375603] 
[   29.375655] Memory state around the buggy address:
[   29.375760]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.375877]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.375995] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.376094]                                      ^
[   29.376185]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.376297]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.376395] ==================================================================
[   29.390223] ==================================================================
[   29.390391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   29.390519] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.390662] 
[   29.390752] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.390987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.391080] Hardware name: linux,dummy-virt (DT)
[   29.391434] Call trace:
[   29.391652]  show_stack+0x20/0x38 (C)
[   29.391903]  dump_stack_lvl+0x8c/0xd0
[   29.392137]  print_report+0x118/0x608
[   29.392312]  kasan_report+0xdc/0x128
[   29.392453]  kasan_check_range+0x100/0x1a8
[   29.392842]  __kasan_check_write+0x20/0x30
[   29.392919]  kasan_atomics_helper+0x1128/0x4858
[   29.392985]  kasan_atomics+0x198/0x2e0
[   29.393049]  kunit_try_run_case+0x170/0x3f0
[   29.393114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.393185]  kthread+0x328/0x630
[   29.393239]  ret_from_fork+0x10/0x20
[   29.393312] 
[   29.393337] Allocated by task 266:
[   29.393378]  kasan_save_stack+0x3c/0x68
[   29.393437]  kasan_save_track+0x20/0x40
[   29.393488]  kasan_save_alloc_info+0x40/0x58
[   29.393536]  __kasan_kmalloc+0xd4/0xd8
[   29.393586]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.393643]  kasan_atomics+0xb8/0x2e0
[   29.393729]  kunit_try_run_case+0x170/0x3f0
[   29.393836]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.394012]  kthread+0x328/0x630
[   29.394322]  ret_from_fork+0x10/0x20
[   29.394803] 
[   29.394985] The buggy address belongs to the object at fff00000c7772d80
[   29.394985]  which belongs to the cache kmalloc-64 of size 64
[   29.395387] The buggy address is located 0 bytes to the right of
[   29.395387]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.395558] 
[   29.395651] The buggy address belongs to the physical page:
[   29.395761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.395906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.396291] page_type: f5(slab)
[   29.396434] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.396697] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.396804] page dumped because: kasan: bad access detected
[   29.396954] 
[   29.397070] Memory state around the buggy address:
[   29.397162]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.397289]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.397557] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.397817]                                      ^
[   29.398586]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.398803]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.398916] ==================================================================
[   29.145019] ==================================================================
[   29.145294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   29.145468] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.145621] 
[   29.145755] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.145973] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.146066] Hardware name: linux,dummy-virt (DT)
[   29.146164] Call trace:
[   29.146230]  show_stack+0x20/0x38 (C)
[   29.146363]  dump_stack_lvl+0x8c/0xd0
[   29.146500]  print_report+0x118/0x608
[   29.146655]  kasan_report+0xdc/0x128
[   29.146835]  kasan_check_range+0x100/0x1a8
[   29.146974]  __kasan_check_write+0x20/0x30
[   29.147121]  kasan_atomics_helper+0xa04/0x4858
[   29.147324]  kasan_atomics+0x198/0x2e0
[   29.147487]  kunit_try_run_case+0x170/0x3f0
[   29.147702]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.147928]  kthread+0x328/0x630
[   29.148119]  ret_from_fork+0x10/0x20
[   29.148341] 
[   29.148425] Allocated by task 266:
[   29.148531]  kasan_save_stack+0x3c/0x68
[   29.148644]  kasan_save_track+0x20/0x40
[   29.148769]  kasan_save_alloc_info+0x40/0x58
[   29.148865]  __kasan_kmalloc+0xd4/0xd8
[   29.148965]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.149088]  kasan_atomics+0xb8/0x2e0
[   29.149189]  kunit_try_run_case+0x170/0x3f0
[   29.149302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.149418]  kthread+0x328/0x630
[   29.149518]  ret_from_fork+0x10/0x20
[   29.149634] 
[   29.149726] The buggy address belongs to the object at fff00000c7772d80
[   29.149726]  which belongs to the cache kmalloc-64 of size 64
[   29.149884] The buggy address is located 0 bytes to the right of
[   29.149884]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.150067] 
[   29.150152] The buggy address belongs to the physical page:
[   29.150268] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.150417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.150594] page_type: f5(slab)
[   29.150764] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.150839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.150890] page dumped because: kasan: bad access detected
[   29.150965] 
[   29.151083] Memory state around the buggy address:
[   29.151178]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.151290]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.151404] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.151507]                                      ^
[   29.151671]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.152013]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.152117] ==================================================================
[   28.933773] ==================================================================
[   28.935641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858
[   28.937892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.938112]  show_stack+0x20/0x38 (C)
[   28.939601]  kasan_atomics_helper+0x32c/0x4858
[   28.940972]  kasan_save_stack+0x3c/0x68
[   28.941655]  kasan_atomics+0xb8/0x2e0
[   28.942394] 
[   28.942525] The buggy address is located 0 bytes to the right of
[   28.942525]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   28.943596] page dumped because: kasan: bad access detected
[   28.943708] 
[   28.943824] Memory state around the buggy address:
[   28.943971]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.944603]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.944723] ==================================================================
[   29.300325] ==================================================================
[   29.300437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   29.300555] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.300675] 
[   29.300766] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.300967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.301037] Hardware name: linux,dummy-virt (DT)
[   29.301113] Call trace:
[   29.301166]  show_stack+0x20/0x38 (C)
[   29.301295]  dump_stack_lvl+0x8c/0xd0
[   29.301420]  print_report+0x118/0x608
[   29.301536]  kasan_report+0xdc/0x128
[   29.303038]  kasan_check_range+0x100/0x1a8
[   29.303957]  __kasan_check_write+0x20/0x30
[   29.304246]  kasan_atomics_helper+0xe44/0x4858
[   29.304529]  kasan_atomics+0x198/0x2e0
[   29.304664]  kunit_try_run_case+0x170/0x3f0
[   29.305660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.305850]  kthread+0x328/0x630
[   29.305986]  ret_from_fork+0x10/0x20
[   29.306071] 
[   29.306099] Allocated by task 266:
[   29.306143]  kasan_save_stack+0x3c/0x68
[   29.306202]  kasan_save_track+0x20/0x40
[   29.306253]  kasan_save_alloc_info+0x40/0x58
[   29.306302]  __kasan_kmalloc+0xd4/0xd8
[   29.306351]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.306408]  kasan_atomics+0xb8/0x2e0
[   29.306458]  kunit_try_run_case+0x170/0x3f0
[   29.306510]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.306567]  kthread+0x328/0x630
[   29.306611]  ret_from_fork+0x10/0x20
[   29.306820] 
[   29.306882] The buggy address belongs to the object at fff00000c7772d80
[   29.306882]  which belongs to the cache kmalloc-64 of size 64
[   29.307033] The buggy address is located 0 bytes to the right of
[   29.307033]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.307192] 
[   29.307243] The buggy address belongs to the physical page:
[   29.307323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.307445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.307564] page_type: f5(slab)
[   29.307660] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.307810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.307909] page dumped because: kasan: bad access detected
[   29.307986] 
[   29.308046] Memory state around the buggy address:
[   29.308128]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.308235]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.308343] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.308494]                                      ^
[   29.308591]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.308736]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.308848] ==================================================================
[   29.353748] ==================================================================
[   29.353867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   29.354006] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.354146] 
[   29.354423] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.354756] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.355293] Hardware name: linux,dummy-virt (DT)
[   29.355749] Call trace:
[   29.356024]  show_stack+0x20/0x38 (C)
[   29.356284]  dump_stack_lvl+0x8c/0xd0
[   29.356420]  print_report+0x118/0x608
[   29.356844]  kasan_report+0xdc/0x128
[   29.357066]  kasan_check_range+0x100/0x1a8
[   29.357206]  __kasan_check_write+0x20/0x30
[   29.357350]  kasan_atomics_helper+0xff0/0x4858
[   29.357487]  kasan_atomics+0x198/0x2e0
[   29.357694]  kunit_try_run_case+0x170/0x3f0
[   29.358536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.358784]  kthread+0x328/0x630
[   29.358913]  ret_from_fork+0x10/0x20
[   29.359051] 
[   29.359271] Allocated by task 266:
[   29.359360]  kasan_save_stack+0x3c/0x68
[   29.359486]  kasan_save_track+0x20/0x40
[   29.359645]  kasan_save_alloc_info+0x40/0x58
[   29.359814]  __kasan_kmalloc+0xd4/0xd8
[   29.359935]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.360061]  kasan_atomics+0xb8/0x2e0
[   29.360173]  kunit_try_run_case+0x170/0x3f0
[   29.360274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.360620]  kthread+0x328/0x630
[   29.360735]  ret_from_fork+0x10/0x20
[   29.360845] 
[   29.360957] The buggy address belongs to the object at fff00000c7772d80
[   29.360957]  which belongs to the cache kmalloc-64 of size 64
[   29.361128] The buggy address is located 0 bytes to the right of
[   29.361128]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.361393] 
[   29.361472] The buggy address belongs to the physical page:
[   29.361579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.361725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.361866] page_type: f5(slab)
[   29.361974] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.362119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.362580] page dumped because: kasan: bad access detected
[   29.362727] 
[   29.362789] Memory state around the buggy address:
[   29.362868]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.362977]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.363086] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.363180]                                      ^
[   29.363268]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.363383]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.363478] ==================================================================
[   29.595615] ==================================================================
[   29.595854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   29.595973] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.596099] 
[   29.596167] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.596363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.596433] Hardware name: linux,dummy-virt (DT)
[   29.596509] Call trace:
[   29.596568]  show_stack+0x20/0x38 (C)
[   29.596763]  dump_stack_lvl+0x8c/0xd0
[   29.597113]  print_report+0x118/0x608
[   29.597270]  kasan_report+0xdc/0x128
[   29.597408]  __asan_report_load8_noabort+0x20/0x30
[   29.597585]  kasan_atomics_helper+0x3e10/0x4858
[   29.597841]  kasan_atomics+0x198/0x2e0
[   29.598046]  kunit_try_run_case+0x170/0x3f0
[   29.598279]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.598424]  kthread+0x328/0x630
[   29.598558]  ret_from_fork+0x10/0x20
[   29.599367] 
[   29.599452] Allocated by task 266:
[   29.599555]  kasan_save_stack+0x3c/0x68
[   29.599712]  kasan_save_track+0x20/0x40
[   29.599881]  kasan_save_alloc_info+0x40/0x58
[   29.599987]  __kasan_kmalloc+0xd4/0xd8
[   29.600127]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.600236]  kasan_atomics+0xb8/0x2e0
[   29.600340]  kunit_try_run_case+0x170/0x3f0
[   29.600441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.600563]  kthread+0x328/0x630
[   29.600847]  ret_from_fork+0x10/0x20
[   29.600951] 
[   29.601004] The buggy address belongs to the object at fff00000c7772d80
[   29.601004]  which belongs to the cache kmalloc-64 of size 64
[   29.601333] The buggy address is located 0 bytes to the right of
[   29.601333]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.602008] 
[   29.602079] The buggy address belongs to the physical page:
[   29.602169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.602426] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.602569] page_type: f5(slab)
[   29.602786] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.603312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.603429] page dumped because: kasan: bad access detected
[   29.603527] 
[   29.603588] Memory state around the buggy address:
[   29.603677]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.603809]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.603917] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.604801]                                      ^
[   29.605071]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.605375]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.605507] ==================================================================
[   29.381004] ==================================================================
[   29.381314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   29.381460] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.381589] 
[   29.381666] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.381898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.381971] Hardware name: linux,dummy-virt (DT)
[   29.382049] Call trace:
[   29.382104]  show_stack+0x20/0x38 (C)
[   29.382223]  dump_stack_lvl+0x8c/0xd0
[   29.383856]  print_report+0x118/0x608
[   29.384135]  kasan_report+0xdc/0x128
[   29.384277]  kasan_check_range+0x100/0x1a8
[   29.384432]  __kasan_check_write+0x20/0x30
[   29.384722]  kasan_atomics_helper+0x10c0/0x4858
[   29.384866]  kasan_atomics+0x198/0x2e0
[   29.384988]  kunit_try_run_case+0x170/0x3f0
[   29.385165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.385556]  kthread+0x328/0x630
[   29.385718]  ret_from_fork+0x10/0x20
[   29.385867] 
[   29.385963] Allocated by task 266:
[   29.386098]  kasan_save_stack+0x3c/0x68
[   29.386208]  kasan_save_track+0x20/0x40
[   29.386308]  kasan_save_alloc_info+0x40/0x58
[   29.386409]  __kasan_kmalloc+0xd4/0xd8
[   29.386546]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.386798]  kasan_atomics+0xb8/0x2e0
[   29.386961]  kunit_try_run_case+0x170/0x3f0
[   29.387575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.387970]  kthread+0x328/0x630
[   29.388095]  ret_from_fork+0x10/0x20
[   29.388301] 
[   29.388362] The buggy address belongs to the object at fff00000c7772d80
[   29.388362]  which belongs to the cache kmalloc-64 of size 64
[   29.388554] The buggy address is located 0 bytes to the right of
[   29.388554]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.388937] 
[   29.389038] The buggy address belongs to the physical page:
[   29.389087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.389157] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.389221] page_type: f5(slab)
[   29.389288] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.389353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.389403] page dumped because: kasan: bad access detected
[   29.389447] 
[   29.389471] Memory state around the buggy address:
[   29.389510]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.389567]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.389621] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.389668]                                      ^
[   29.389744]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.389801]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.389851] ==================================================================
[   29.399397] ==================================================================
[   29.399503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   29.399637] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.400175] 
[   29.400493] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.400721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.400795] Hardware name: linux,dummy-virt (DT)
[   29.400869] Call trace:
[   29.400926]  show_stack+0x20/0x38 (C)
[   29.401048]  dump_stack_lvl+0x8c/0xd0
[   29.401169]  print_report+0x118/0x608
[   29.402631]  kasan_report+0xdc/0x128
[   29.402992]  kasan_check_range+0x100/0x1a8
[   29.403117]  __kasan_check_write+0x20/0x30
[   29.403234]  kasan_atomics_helper+0x1190/0x4858
[   29.403359]  kasan_atomics+0x198/0x2e0
[   29.403474]  kunit_try_run_case+0x170/0x3f0
[   29.403603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.408939]  kthread+0x328/0x630
[   29.410739]  ret_from_fork+0x10/0x20
[   29.410937] 
[   29.410995] Allocated by task 266:
[   29.411153]  kasan_save_stack+0x3c/0x68
[   29.411274]  kasan_save_track+0x20/0x40
[   29.411429]  kasan_save_alloc_info+0x40/0x58
[   29.411555]  __kasan_kmalloc+0xd4/0xd8
[   29.411671]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.411816]  kasan_atomics+0xb8/0x2e0
[   29.411958]  kunit_try_run_case+0x170/0x3f0
[   29.412207]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.412408]  kthread+0x328/0x630
[   29.412746]  ret_from_fork+0x10/0x20
[   29.412969] 
[   29.413023] The buggy address belongs to the object at fff00000c7772d80
[   29.413023]  which belongs to the cache kmalloc-64 of size 64
[   29.413164] The buggy address is located 0 bytes to the right of
[   29.413164]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.413476] 
[   29.413540] The buggy address belongs to the physical page:
[   29.413654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.413806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.413929] page_type: f5(slab)
[   29.414025] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.414176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.414284] page dumped because: kasan: bad access detected
[   29.414365] 
[   29.414413] Memory state around the buggy address:
[   29.414487]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.414592]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.415457] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.415998]                                      ^
[   29.416916]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.417124]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.417444] ==================================================================
[   29.287729] ==================================================================
[   29.287848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   29.288051] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.288351] 
[   29.288465] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.288669] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.288851] Hardware name: linux,dummy-virt (DT)
[   29.288951] Call trace:
[   29.289175]  show_stack+0x20/0x38 (C)
[   29.289565]  dump_stack_lvl+0x8c/0xd0
[   29.289733]  print_report+0x118/0x608
[   29.289932]  kasan_report+0xdc/0x128
[   29.290239]  __asan_report_load8_noabort+0x20/0x30
[   29.290929]  kasan_atomics_helper+0x3f58/0x4858
[   29.291116]  kasan_atomics+0x198/0x2e0
[   29.291388]  kunit_try_run_case+0x170/0x3f0
[   29.291533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.291716]  kthread+0x328/0x630
[   29.291841]  ret_from_fork+0x10/0x20
[   29.292010] 
[   29.292067] Allocated by task 266:
[   29.292170]  kasan_save_stack+0x3c/0x68
[   29.292321]  kasan_save_track+0x20/0x40
[   29.292453]  kasan_save_alloc_info+0x40/0x58
[   29.292765]  __kasan_kmalloc+0xd4/0xd8
[   29.292904]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.293120]  kasan_atomics+0xb8/0x2e0
[   29.293217]  kunit_try_run_case+0x170/0x3f0
[   29.293441]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.293557]  kthread+0x328/0x630
[   29.293654]  ret_from_fork+0x10/0x20
[   29.294483] 
[   29.294566] The buggy address belongs to the object at fff00000c7772d80
[   29.294566]  which belongs to the cache kmalloc-64 of size 64
[   29.294978] The buggy address is located 0 bytes to the right of
[   29.294978]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.295274] 
[   29.295445] The buggy address belongs to the physical page:
[   29.295576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.295766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.295899] page_type: f5(slab)
[   29.296207] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.296403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.296605] page dumped because: kasan: bad access detected
[   29.296739] 
[   29.296795] Memory state around the buggy address:
[   29.296899]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.297099]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.297221] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.297609]                                      ^
[   29.298074]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.298339]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.299083] ==================================================================
[   29.540920] ==================================================================
[   29.541064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   29.541203] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.541359] 
[   29.541677] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.542126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.542325] Hardware name: linux,dummy-virt (DT)
[   29.542549] Call trace:
[   29.542743]  show_stack+0x20/0x38 (C)
[   29.543030]  dump_stack_lvl+0x8c/0xd0
[   29.543181]  print_report+0x118/0x608
[   29.543394]  kasan_report+0xdc/0x128
[   29.543663]  kasan_check_range+0x100/0x1a8
[   29.544145]  __kasan_check_write+0x20/0x30
[   29.544279]  kasan_atomics_helper+0x15b4/0x4858
[   29.544602]  kasan_atomics+0x198/0x2e0
[   29.544751]  kunit_try_run_case+0x170/0x3f0
[   29.545121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.545272]  kthread+0x328/0x630
[   29.545393]  ret_from_fork+0x10/0x20
[   29.545570] 
[   29.545623] Allocated by task 266:
[   29.545717]  kasan_save_stack+0x3c/0x68
[   29.545845]  kasan_save_track+0x20/0x40
[   29.545971]  kasan_save_alloc_info+0x40/0x58
[   29.546126]  __kasan_kmalloc+0xd4/0xd8
[   29.546277]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.546430]  kasan_atomics+0xb8/0x2e0
[   29.546578]  kunit_try_run_case+0x170/0x3f0
[   29.546704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.546822]  kthread+0x328/0x630
[   29.547185]  ret_from_fork+0x10/0x20
[   29.548142] 
[   29.548231] The buggy address belongs to the object at fff00000c7772d80
[   29.548231]  which belongs to the cache kmalloc-64 of size 64
[   29.548395] The buggy address is located 0 bytes to the right of
[   29.548395]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.548563] 
[   29.548630] The buggy address belongs to the physical page:
[   29.548771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.549054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.549186] page_type: f5(slab)
[   29.549514] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.549645] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.549791] page dumped because: kasan: bad access detected
[   29.549875] 
[   29.549924] Memory state around the buggy address:
[   29.550000]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.550118]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.550744] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.551034]                                      ^
[   29.551312]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.551997]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.552139] ==================================================================
[   29.500496] ==================================================================
[   29.500740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   29.501013] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.501942] 
[   29.502059] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.502266] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.502340] Hardware name: linux,dummy-virt (DT)
[   29.502418] Call trace:
[   29.502477]  show_stack+0x20/0x38 (C)
[   29.503022]  dump_stack_lvl+0x8c/0xd0
[   29.503262]  print_report+0x118/0x608
[   29.503443]  kasan_report+0xdc/0x128
[   29.503677]  kasan_check_range+0x100/0x1a8
[   29.503981]  __kasan_check_write+0x20/0x30
[   29.504116]  kasan_atomics_helper+0x147c/0x4858
[   29.505180]  kasan_atomics+0x198/0x2e0
[   29.505384]  kunit_try_run_case+0x170/0x3f0
[   29.505717]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.506401]  kthread+0x328/0x630
[   29.506555]  ret_from_fork+0x10/0x20
[   29.507143] 
[   29.507202] Allocated by task 266:
[   29.507288]  kasan_save_stack+0x3c/0x68
[   29.507869]  kasan_save_track+0x20/0x40
[   29.507984]  kasan_save_alloc_info+0x40/0x58
[   29.508095]  __kasan_kmalloc+0xd4/0xd8
[   29.508539]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.508660]  kasan_atomics+0xb8/0x2e0
[   29.508798]  kunit_try_run_case+0x170/0x3f0
[   29.508917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.509035]  kthread+0x328/0x630
[   29.509126]  ret_from_fork+0x10/0x20
[   29.509219] 
[   29.509355] The buggy address belongs to the object at fff00000c7772d80
[   29.509355]  which belongs to the cache kmalloc-64 of size 64
[   29.509519] The buggy address is located 0 bytes to the right of
[   29.509519]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.509677] 
[   29.509762] The buggy address belongs to the physical page:
[   29.509962] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.510091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.510213] page_type: f5(slab)
[   29.510312] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.510434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.510589] page dumped because: kasan: bad access detected
[   29.510725] 
[   29.510789] Memory state around the buggy address:
[   29.510881]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.511007]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.511134] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.512005]                                      ^
[   29.512108]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.512430]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.512531] ==================================================================
[   29.465097] ==================================================================
[   29.465223] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   29.465355] Read of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.465475] 
[   29.465543] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.465758] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.465830] Hardware name: linux,dummy-virt (DT)
[   29.465903] Call trace:
[   29.465961]  show_stack+0x20/0x38 (C)
[   29.466081]  dump_stack_lvl+0x8c/0xd0
[   29.466207]  print_report+0x118/0x608
[   29.466328]  kasan_report+0xdc/0x128
[   29.466448]  __asan_report_load8_noabort+0x20/0x30
[   29.466569]  kasan_atomics_helper+0x3f04/0x4858
[   29.468059]  kasan_atomics+0x198/0x2e0
[   29.468301]  kunit_try_run_case+0x170/0x3f0
[   29.469537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.470522]  kthread+0x328/0x630
[   29.470693]  ret_from_fork+0x10/0x20
[   29.470837] 
[   29.470892] Allocated by task 266:
[   29.470970]  kasan_save_stack+0x3c/0x68
[   29.472016]  kasan_save_track+0x20/0x40
[   29.472185]  kasan_save_alloc_info+0x40/0x58
[   29.472396]  __kasan_kmalloc+0xd4/0xd8
[   29.472500]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.473371]  kasan_atomics+0xb8/0x2e0
[   29.473526]  kunit_try_run_case+0x170/0x3f0
[   29.473780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.474011]  kthread+0x328/0x630
[   29.474107]  ret_from_fork+0x10/0x20
[   29.475108] 
[   29.475175] The buggy address belongs to the object at fff00000c7772d80
[   29.475175]  which belongs to the cache kmalloc-64 of size 64
[   29.475484] The buggy address is located 0 bytes to the right of
[   29.475484]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.475855] 
[   29.476488] The buggy address belongs to the physical page:
[   29.476717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.477347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.477761] page_type: f5(slab)
[   29.478326] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.478552] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.479225] page dumped because: kasan: bad access detected
[   29.479348] 
[   29.479402] Memory state around the buggy address:
[   29.480187]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.480709]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.481143] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.481268]                                      ^
[   29.481578]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.482066]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.482921] ==================================================================
[   29.153873] ==================================================================
[   29.154001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   29.154367] Write of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.154642] 
[   29.155277] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.155497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.155574] Hardware name: linux,dummy-virt (DT)
[   29.155668] Call trace:
[   29.155755]  show_stack+0x20/0x38 (C)
[   29.155888]  dump_stack_lvl+0x8c/0xd0
[   29.156028]  print_report+0x118/0x608
[   29.156179]  kasan_report+0xdc/0x128
[   29.156740]  kasan_check_range+0x100/0x1a8
[   29.157223]  __kasan_check_write+0x20/0x30
[   29.157534]  kasan_atomics_helper+0xa6c/0x4858
[   29.157858]  kasan_atomics+0x198/0x2e0
[   29.158062]  kunit_try_run_case+0x170/0x3f0
[   29.158196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.158367]  kthread+0x328/0x630
[   29.158670]  ret_from_fork+0x10/0x20
[   29.158838] 
[   29.159131] Allocated by task 266:
[   29.159289]  kasan_save_stack+0x3c/0x68
[   29.159416]  kasan_save_track+0x20/0x40
[   29.159534]  kasan_save_alloc_info+0x40/0x58
[   29.159899]  __kasan_kmalloc+0xd4/0xd8
[   29.160099]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.160224]  kasan_atomics+0xb8/0x2e0
[   29.160413]  kunit_try_run_case+0x170/0x3f0
[   29.160944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.161087]  kthread+0x328/0x630
[   29.161203]  ret_from_fork+0x10/0x20
[   29.161350] 
[   29.161489] The buggy address belongs to the object at fff00000c7772d80
[   29.161489]  which belongs to the cache kmalloc-64 of size 64
[   29.161639] The buggy address is located 0 bytes to the right of
[   29.161639]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.161810] 
[   29.161887] The buggy address belongs to the physical page:
[   29.162001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.162135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.162271] page_type: f5(slab)
[   29.162378] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.162513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.162618] page dumped because: kasan: bad access detected
[   29.162728] 
[   29.162790] Memory state around the buggy address:
[   29.162881]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.163005]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.163595] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.163713]                                      ^
[   29.163856]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.164049]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.164192] ==================================================================
[   29.267135] ==================================================================
[   29.267244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   29.267362] Read of size 4 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.267485] 
[   29.267559] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.267781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.267850] Hardware name: linux,dummy-virt (DT)
[   29.267928] Call trace:
[   29.267983]  show_stack+0x20/0x38 (C)
[   29.268109]  dump_stack_lvl+0x8c/0xd0
[   29.268228]  print_report+0x118/0x608
[   29.269025]  kasan_report+0xdc/0x128
[   29.269252]  __asan_report_load4_noabort+0x20/0x30
[   29.269417]  kasan_atomics_helper+0x3e04/0x4858
[   29.269570]  kasan_atomics+0x198/0x2e0
[   29.269715]  kunit_try_run_case+0x170/0x3f0
[   29.270039]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.270197]  kthread+0x328/0x630
[   29.271181]  ret_from_fork+0x10/0x20
[   29.271468] 
[   29.271528] Allocated by task 266:
[   29.271612]  kasan_save_stack+0x3c/0x68
[   29.271748]  kasan_save_track+0x20/0x40
[   29.271893]  kasan_save_alloc_info+0x40/0x58
[   29.272159]  __kasan_kmalloc+0xd4/0xd8
[   29.272274]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.272438]  kasan_atomics+0xb8/0x2e0
[   29.272541]  kunit_try_run_case+0x170/0x3f0
[   29.272651]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.272917]  kthread+0x328/0x630
[   29.273011]  ret_from_fork+0x10/0x20
[   29.273252] 
[   29.273335] The buggy address belongs to the object at fff00000c7772d80
[   29.273335]  which belongs to the cache kmalloc-64 of size 64
[   29.273653] The buggy address is located 0 bytes to the right of
[   29.273653]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.274251] 
[   29.274334] The buggy address belongs to the physical page:
[   29.274457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.274608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.274817] page_type: f5(slab)
[   29.274937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.275068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.275172] page dumped because: kasan: bad access detected
[   29.275463] 
[   29.275653] Memory state around the buggy address:
[   29.275791]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.275907]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.276019] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.276120]                                      ^
[   29.276249]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.276374]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.276491] ==================================================================
[   29.317499] ==================================================================
[   29.317654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   29.317912] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.318089] 
[   29.318164] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.318376] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.318449] Hardware name: linux,dummy-virt (DT)
[   29.318528] Call trace:
[   29.318583]  show_stack+0x20/0x38 (C)
[   29.318817]  dump_stack_lvl+0x8c/0xd0
[   29.318926]  print_report+0x118/0x608
[   29.318988]  kasan_report+0xdc/0x128
[   29.319884]  kasan_check_range+0x100/0x1a8
[   29.320253]  __kasan_check_write+0x20/0x30
[   29.320608]  kasan_atomics_helper+0xeb8/0x4858
[   29.320818]  kasan_atomics+0x198/0x2e0
[   29.321273]  kunit_try_run_case+0x170/0x3f0
[   29.321408]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.321871]  kthread+0x328/0x630
[   29.322019]  ret_from_fork+0x10/0x20
[   29.322600] 
[   29.322703] Allocated by task 266:
[   29.322937]  kasan_save_stack+0x3c/0x68
[   29.323099]  kasan_save_track+0x20/0x40
[   29.323272]  kasan_save_alloc_info+0x40/0x58
[   29.323578]  __kasan_kmalloc+0xd4/0xd8
[   29.323766]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.324042]  kasan_atomics+0xb8/0x2e0
[   29.324605]  kunit_try_run_case+0x170/0x3f0
[   29.324886]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.325383]  kthread+0x328/0x630
[   29.325626]  ret_from_fork+0x10/0x20
[   29.325798] 
[   29.325904] The buggy address belongs to the object at fff00000c7772d80
[   29.325904]  which belongs to the cache kmalloc-64 of size 64
[   29.326076] The buggy address is located 0 bytes to the right of
[   29.326076]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.326778] 
[   29.326847] The buggy address belongs to the physical page:
[   29.326931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.327751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.327892] page_type: f5(slab)
[   29.328294] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.328545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.328661] page dumped because: kasan: bad access detected
[   29.328771] 
[   29.329027] Memory state around the buggy address:
[   29.329110]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.329272]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.329530] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.329643]                                      ^
[   29.329787]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.329910]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.330242] ==================================================================
[   29.418465] ==================================================================
[   29.418566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   29.418703] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.418830] 
[   29.418900] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.419100] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.419169] Hardware name: linux,dummy-virt (DT)
[   29.419246] Call trace:
[   29.419301]  show_stack+0x20/0x38 (C)
[   29.419433]  dump_stack_lvl+0x8c/0xd0
[   29.419731]  print_report+0x118/0x608
[   29.419916]  kasan_report+0xdc/0x128
[   29.420720]  kasan_check_range+0x100/0x1a8
[   29.420878]  __kasan_check_write+0x20/0x30
[   29.421272]  kasan_atomics_helper+0x11f8/0x4858
[   29.421466]  kasan_atomics+0x198/0x2e0
[   29.421600]  kunit_try_run_case+0x170/0x3f0
[   29.421752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.421913]  kthread+0x328/0x630
[   29.422528]  ret_from_fork+0x10/0x20
[   29.422718] 
[   29.422803] Allocated by task 266:
[   29.423018]  kasan_save_stack+0x3c/0x68
[   29.423126]  kasan_save_track+0x20/0x40
[   29.423235]  kasan_save_alloc_info+0x40/0x58
[   29.423392]  __kasan_kmalloc+0xd4/0xd8
[   29.423757]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.423895]  kasan_atomics+0xb8/0x2e0
[   29.424015]  kunit_try_run_case+0x170/0x3f0
[   29.424141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.424269]  kthread+0x328/0x630
[   29.425172]  ret_from_fork+0x10/0x20
[   29.425333] 
[   29.425388] The buggy address belongs to the object at fff00000c7772d80
[   29.425388]  which belongs to the cache kmalloc-64 of size 64
[   29.425741] The buggy address is located 0 bytes to the right of
[   29.425741]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.426548] 
[   29.426962] The buggy address belongs to the physical page:
[   29.427133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.427427] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.427792] page_type: f5(slab)
[   29.427898] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.428027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.428131] page dumped because: kasan: bad access detected
[   29.428213] 
[   29.428260] Memory state around the buggy address:
[   29.428336]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.428464]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.428888] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.429011]                                      ^
[   29.429508]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.429778]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.429938] ==================================================================
[   29.585005] ==================================================================
[   29.586198] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   29.586554] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.586873] 
[   29.586971] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.587200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.587283] Hardware name: linux,dummy-virt (DT)
[   29.587370] Call trace:
[   29.587430]  show_stack+0x20/0x38 (C)
[   29.587579]  dump_stack_lvl+0x8c/0xd0
[   29.587742]  print_report+0x118/0x608
[   29.587887]  kasan_report+0xdc/0x128
[   29.588012]  kasan_check_range+0x100/0x1a8
[   29.588131]  __kasan_check_write+0x20/0x30
[   29.588283]  kasan_atomics_helper+0x16d0/0x4858
[   29.588634]  kasan_atomics+0x198/0x2e0
[   29.588777]  kunit_try_run_case+0x170/0x3f0
[   29.588942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.589206]  kthread+0x328/0x630
[   29.589343]  ret_from_fork+0x10/0x20
[   29.589463] 
[   29.589515] Allocated by task 266:
[   29.589590]  kasan_save_stack+0x3c/0x68
[   29.589713]  kasan_save_track+0x20/0x40
[   29.589827]  kasan_save_alloc_info+0x40/0x58
[   29.589948]  __kasan_kmalloc+0xd4/0xd8
[   29.590152]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.590409]  kasan_atomics+0xb8/0x2e0
[   29.590529]  kunit_try_run_case+0x170/0x3f0
[   29.590707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.590923]  kthread+0x328/0x630
[   29.591025]  ret_from_fork+0x10/0x20
[   29.591150] 
[   29.591249] The buggy address belongs to the object at fff00000c7772d80
[   29.591249]  which belongs to the cache kmalloc-64 of size 64
[   29.591397] The buggy address is located 0 bytes to the right of
[   29.591397]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.591559] 
[   29.591619] The buggy address belongs to the physical page:
[   29.591771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.592032] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.592168] page_type: f5(slab)
[   29.592265] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.592432] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.592638] page dumped because: kasan: bad access detected
[   29.592784] 
[   29.592841] Memory state around the buggy address:
[   29.592929]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.593034]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.593155] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.593288]                                      ^
[   29.593727]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.593897]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.594006] ==================================================================
[   29.513186] ==================================================================
[   29.513429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   29.514097] Write of size 8 at addr fff00000c7772db0 by task kunit_try_catch/266
[   29.514223] 
[   29.514306] CPU: 1 UID: 0 PID: 266 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT 
[   29.514794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.514885] Hardware name: linux,dummy-virt (DT)
[   29.514968] Call trace:
[   29.515250]  show_stack+0x20/0x38 (C)
[   29.515605]  dump_stack_lvl+0x8c/0xd0
[   29.515767]  print_report+0x118/0x608
[   29.516114]  kasan_report+0xdc/0x128
[   29.516297]  kasan_check_range+0x100/0x1a8
[   29.516612]  __kasan_check_write+0x20/0x30
[   29.517096]  kasan_atomics_helper+0x14e4/0x4858
[   29.517261]  kasan_atomics+0x198/0x2e0
[   29.517404]  kunit_try_run_case+0x170/0x3f0
[   29.518725]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.518981]  kthread+0x328/0x630
[   29.519117]  ret_from_fork+0x10/0x20
[   29.519344] 
[   29.519402] Allocated by task 266:
[   29.519577]  kasan_save_stack+0x3c/0x68
[   29.519776]  kasan_save_track+0x20/0x40
[   29.519891]  kasan_save_alloc_info+0x40/0x58
[   29.520050]  __kasan_kmalloc+0xd4/0xd8
[   29.520283]  __kmalloc_cache_noprof+0x15c/0x3c0
[   29.520418]  kasan_atomics+0xb8/0x2e0
[   29.520615]  kunit_try_run_case+0x170/0x3f0
[   29.520813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.520941]  kthread+0x328/0x630
[   29.521295]  ret_from_fork+0x10/0x20
[   29.521451] 
[   29.521509] The buggy address belongs to the object at fff00000c7772d80
[   29.521509]  which belongs to the cache kmalloc-64 of size 64
[   29.521651] The buggy address is located 0 bytes to the right of
[   29.521651]  allocated 48-byte region [fff00000c7772d80, fff00000c7772db0)
[   29.521846] 
[   29.522175] The buggy address belongs to the physical page:
[   29.522294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107772
[   29.522435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.522563] page_type: f5(slab)
[   29.522664] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.522812] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.522941] page dumped because: kasan: bad access detected
[   29.523037] 
[   29.523095] Memory state around the buggy address:
[   29.523388]  fff00000c7772c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.523667]  fff00000c7772d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.523805] >fff00000c7772d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.523900]                                      ^
[   29.524356]  fff00000c7772e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.524924]  fff00000c7772e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.525038] ==================================================================

[   23.402369] ==================================================================
[   23.403413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   23.404222] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.405268] 
[   23.405713] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.405922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.405968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.406018] Call Trace:
[   23.406044]  <TASK>
[   23.406063]  dump_stack_lvl+0x73/0xb0
[   23.406101]  print_report+0xd1/0x650
[   23.406135]  ? __virt_addr_valid+0x1db/0x2d0
[   23.406169]  ? kasan_atomics_helper+0xde0/0x5450
[   23.406203]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.406250]  ? kasan_atomics_helper+0xde0/0x5450
[   23.406284]  kasan_report+0x141/0x180
[   23.406317]  ? kasan_atomics_helper+0xde0/0x5450
[   23.406356]  kasan_check_range+0x10c/0x1c0
[   23.406392]  __kasan_check_write+0x18/0x20
[   23.406421]  kasan_atomics_helper+0xde0/0x5450
[   23.406454]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.406487]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.406517]  ? kasan_atomics+0x152/0x310
[   23.406549]  kasan_atomics+0x1dc/0x310
[   23.406577]  ? __pfx_kasan_atomics+0x10/0x10
[   23.406638]  ? __pfx_read_tsc+0x10/0x10
[   23.406686]  ? ktime_get_ts64+0x86/0x230
[   23.406723]  kunit_try_run_case+0x1a5/0x480
[   23.406755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.406785]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.406823]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.406861]  ? __kthread_parkme+0x82/0x180
[   23.406916]  ? preempt_count_sub+0x50/0x80
[   23.406955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.406987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.407026]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.407065]  kthread+0x337/0x6f0
[   23.407094]  ? trace_preempt_on+0x20/0xc0
[   23.407127]  ? __pfx_kthread+0x10/0x10
[   23.407157]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.407193]  ? calculate_sigpending+0x7b/0xa0
[   23.407229]  ? __pfx_kthread+0x10/0x10
[   23.407260]  ret_from_fork+0x116/0x1d0
[   23.407287]  ? __pfx_kthread+0x10/0x10
[   23.407316]  ret_from_fork_asm+0x1a/0x30
[   23.407359]  </TASK>
[   23.407375] 
[   23.430649] Allocated by task 282:
[   23.431234]  kasan_save_stack+0x45/0x70
[   23.431525]  kasan_save_track+0x18/0x40
[   23.432288]  kasan_save_alloc_info+0x3b/0x50
[   23.432743]  __kasan_kmalloc+0xb7/0xc0
[   23.433151]  __kmalloc_cache_noprof+0x189/0x420
[   23.433661]  kasan_atomics+0x95/0x310
[   23.434063]  kunit_try_run_case+0x1a5/0x480
[   23.434532]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.435059]  kthread+0x337/0x6f0
[   23.435404]  ret_from_fork+0x116/0x1d0
[   23.436366]  ret_from_fork_asm+0x1a/0x30
[   23.436909] 
[   23.437084] The buggy address belongs to the object at ffff888102b73d80
[   23.437084]  which belongs to the cache kmalloc-64 of size 64
[   23.438784] The buggy address is located 0 bytes to the right of
[   23.438784]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.439803] 
[   23.440243] The buggy address belongs to the physical page:
[   23.441169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.442026] flags: 0x200000000000000(node=0|zone=2)
[   23.442431] page_type: f5(slab)
[   23.442835] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.443479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.444484] page dumped because: kasan: bad access detected
[   23.445122] 
[   23.445371] Memory state around the buggy address:
[   23.446053]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.446751]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.447392] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.448429]                                      ^
[   23.448820]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.449582]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.450431] ==================================================================
[   23.801567] ==================================================================
[   23.802244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   23.803059] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.803893] 
[   23.804137] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.804306] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.804348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.804411] Call Trace:
[   23.804462]  <TASK>
[   23.804562]  dump_stack_lvl+0x73/0xb0
[   23.804771]  print_report+0xd1/0x650
[   23.804910]  ? __virt_addr_valid+0x1db/0x2d0
[   23.805056]  ? kasan_atomics_helper+0x1217/0x5450
[   23.805138]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.805271]  ? kasan_atomics_helper+0x1217/0x5450
[   23.805352]  kasan_report+0x141/0x180
[   23.805436]  ? kasan_atomics_helper+0x1217/0x5450
[   23.805640]  kasan_check_range+0x10c/0x1c0
[   23.805758]  __kasan_check_write+0x18/0x20
[   23.805844]  kasan_atomics_helper+0x1217/0x5450
[   23.805953]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.806039]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.806117]  ? kasan_atomics+0x152/0x310
[   23.806258]  kasan_atomics+0x1dc/0x310
[   23.806424]  ? __pfx_kasan_atomics+0x10/0x10
[   23.806505]  ? __pfx_read_tsc+0x10/0x10
[   23.806668]  ? ktime_get_ts64+0x86/0x230
[   23.806789]  kunit_try_run_case+0x1a5/0x480
[   23.806838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.806889]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.806942]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.806984]  ? __kthread_parkme+0x82/0x180
[   23.807016]  ? preempt_count_sub+0x50/0x80
[   23.807052]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.807084]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.807122]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.807160]  kthread+0x337/0x6f0
[   23.807188]  ? trace_preempt_on+0x20/0xc0
[   23.807222]  ? __pfx_kthread+0x10/0x10
[   23.807255]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.807290]  ? calculate_sigpending+0x7b/0xa0
[   23.807326]  ? __pfx_kthread+0x10/0x10
[   23.807359]  ret_from_fork+0x116/0x1d0
[   23.807385]  ? __pfx_kthread+0x10/0x10
[   23.807416]  ret_from_fork_asm+0x1a/0x30
[   23.807458]  </TASK>
[   23.807474] 
[   23.824648] Allocated by task 282:
[   23.825115]  kasan_save_stack+0x45/0x70
[   23.825601]  kasan_save_track+0x18/0x40
[   23.826072]  kasan_save_alloc_info+0x3b/0x50
[   23.826646]  __kasan_kmalloc+0xb7/0xc0
[   23.827053]  __kmalloc_cache_noprof+0x189/0x420
[   23.827402]  kasan_atomics+0x95/0x310
[   23.827741]  kunit_try_run_case+0x1a5/0x480
[   23.828480]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.829199]  kthread+0x337/0x6f0
[   23.829612]  ret_from_fork+0x116/0x1d0
[   23.830163]  ret_from_fork_asm+0x1a/0x30
[   23.830696] 
[   23.831015] The buggy address belongs to the object at ffff888102b73d80
[   23.831015]  which belongs to the cache kmalloc-64 of size 64
[   23.832193] The buggy address is located 0 bytes to the right of
[   23.832193]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.833367] 
[   23.833562] The buggy address belongs to the physical page:
[   23.833953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.835051] flags: 0x200000000000000(node=0|zone=2)
[   23.835830] page_type: f5(slab)
[   23.836233] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.837093] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.837566] page dumped because: kasan: bad access detected
[   23.838147] 
[   23.838538] Memory state around the buggy address:
[   23.839208]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.840048]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.840729] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.841349]                                      ^
[   23.841726]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.842785]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.843371] ==================================================================
[   23.315459] ==================================================================
[   23.316511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   23.317230] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.318002] 
[   23.318353] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.318535] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.318588] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.318701] Call Trace:
[   23.318748]  <TASK>
[   23.318855]  dump_stack_lvl+0x73/0xb0
[   23.318989]  print_report+0xd1/0x650
[   23.319074]  ? __virt_addr_valid+0x1db/0x2d0
[   23.319157]  ? kasan_atomics_helper+0x4a84/0x5450
[   23.319324]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.319414]  ? kasan_atomics_helper+0x4a84/0x5450
[   23.319551]  kasan_report+0x141/0x180
[   23.319686]  ? kasan_atomics_helper+0x4a84/0x5450
[   23.319771]  __asan_report_load4_noabort+0x18/0x20
[   23.319806]  kasan_atomics_helper+0x4a84/0x5450
[   23.319842]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.319878]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.319940]  ? kasan_atomics+0x152/0x310
[   23.319974]  kasan_atomics+0x1dc/0x310
[   23.320002]  ? __pfx_kasan_atomics+0x10/0x10
[   23.320032]  ? __pfx_read_tsc+0x10/0x10
[   23.320065]  ? ktime_get_ts64+0x86/0x230
[   23.320101]  kunit_try_run_case+0x1a5/0x480
[   23.320133]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.320163]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.320200]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.320238]  ? __kthread_parkme+0x82/0x180
[   23.320270]  ? preempt_count_sub+0x50/0x80
[   23.320304]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.320336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.320374]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.320410]  kthread+0x337/0x6f0
[   23.320439]  ? trace_preempt_on+0x20/0xc0
[   23.320473]  ? __pfx_kthread+0x10/0x10
[   23.320505]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.320539]  ? calculate_sigpending+0x7b/0xa0
[   23.320576]  ? __pfx_kthread+0x10/0x10
[   23.320613]  ret_from_fork+0x116/0x1d0
[   23.320683]  ? __pfx_kthread+0x10/0x10
[   23.320715]  ret_from_fork_asm+0x1a/0x30
[   23.320762]  </TASK>
[   23.320778] 
[   23.336422] Allocated by task 282:
[   23.336744]  kasan_save_stack+0x45/0x70
[   23.337254]  kasan_save_track+0x18/0x40
[   23.337830]  kasan_save_alloc_info+0x3b/0x50
[   23.338311]  __kasan_kmalloc+0xb7/0xc0
[   23.338670]  __kmalloc_cache_noprof+0x189/0x420
[   23.339168]  kasan_atomics+0x95/0x310
[   23.339520]  kunit_try_run_case+0x1a5/0x480
[   23.340064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.340665]  kthread+0x337/0x6f0
[   23.341111]  ret_from_fork+0x116/0x1d0
[   23.341501]  ret_from_fork_asm+0x1a/0x30
[   23.342180] 
[   23.342410] The buggy address belongs to the object at ffff888102b73d80
[   23.342410]  which belongs to the cache kmalloc-64 of size 64
[   23.343116] The buggy address is located 0 bytes to the right of
[   23.343116]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.344220] 
[   23.344475] The buggy address belongs to the physical page:
[   23.345313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.346042] flags: 0x200000000000000(node=0|zone=2)
[   23.346561] page_type: f5(slab)
[   23.346990] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.347553] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.348235] page dumped because: kasan: bad access detected
[   23.348933] 
[   23.349130] Memory state around the buggy address:
[   23.349478]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.350396]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.351156] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.351606]                                      ^
[   23.352089]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.352869]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.355152] ==================================================================
[   24.592479] ==================================================================
[   24.594369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   24.595074] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.595682] 
[   24.595948] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.596082] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.596118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.596153] Call Trace:
[   24.596179]  <TASK>
[   24.596201]  dump_stack_lvl+0x73/0xb0
[   24.596248]  print_report+0xd1/0x650
[   24.596320]  ? __virt_addr_valid+0x1db/0x2d0
[   24.596359]  ? kasan_atomics_helper+0x1a7f/0x5450
[   24.596393]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.596428]  ? kasan_atomics_helper+0x1a7f/0x5450
[   24.596461]  kasan_report+0x141/0x180
[   24.596495]  ? kasan_atomics_helper+0x1a7f/0x5450
[   24.596533]  kasan_check_range+0x10c/0x1c0
[   24.596569]  __kasan_check_write+0x18/0x20
[   24.596600]  kasan_atomics_helper+0x1a7f/0x5450
[   24.596634]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.596667]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.596698]  ? kasan_atomics+0x152/0x310
[   24.596730]  kasan_atomics+0x1dc/0x310
[   24.596758]  ? __pfx_kasan_atomics+0x10/0x10
[   24.596788]  ? __pfx_read_tsc+0x10/0x10
[   24.596821]  ? ktime_get_ts64+0x86/0x230
[   24.596896]  kunit_try_run_case+0x1a5/0x480
[   24.597031]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.597137]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.597252]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.597394]  ? __kthread_parkme+0x82/0x180
[   24.597500]  ? preempt_count_sub+0x50/0x80
[   24.597597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.597641]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.597682]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.597720]  kthread+0x337/0x6f0
[   24.597749]  ? trace_preempt_on+0x20/0xc0
[   24.597782]  ? __pfx_kthread+0x10/0x10
[   24.597813]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.597847]  ? calculate_sigpending+0x7b/0xa0
[   24.597912]  ? __pfx_kthread+0x10/0x10
[   24.597946]  ret_from_fork+0x116/0x1d0
[   24.597972]  ? __pfx_kthread+0x10/0x10
[   24.598003]  ret_from_fork_asm+0x1a/0x30
[   24.598047]  </TASK>
[   24.598063] 
[   24.617972] Allocated by task 282:
[   24.618358]  kasan_save_stack+0x45/0x70
[   24.619389]  kasan_save_track+0x18/0x40
[   24.619751]  kasan_save_alloc_info+0x3b/0x50
[   24.620465]  __kasan_kmalloc+0xb7/0xc0
[   24.621247]  __kmalloc_cache_noprof+0x189/0x420
[   24.622128]  kasan_atomics+0x95/0x310
[   24.622747]  kunit_try_run_case+0x1a5/0x480
[   24.623141]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.623732]  kthread+0x337/0x6f0
[   24.624122]  ret_from_fork+0x116/0x1d0
[   24.624535]  ret_from_fork_asm+0x1a/0x30
[   24.625314] 
[   24.625753] The buggy address belongs to the object at ffff888102b73d80
[   24.625753]  which belongs to the cache kmalloc-64 of size 64
[   24.626678] The buggy address is located 0 bytes to the right of
[   24.626678]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.627686] 
[   24.627902] The buggy address belongs to the physical page:
[   24.628558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.629413] flags: 0x200000000000000(node=0|zone=2)
[   24.630106] page_type: f5(slab)
[   24.630276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.630530] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.630788] page dumped because: kasan: bad access detected
[   24.631461] 
[   24.631931] Memory state around the buggy address:
[   24.632661]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.633703]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.634458] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.635354]                                      ^
[   24.635947]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.636483]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.637306] ==================================================================
[   24.174698] ==================================================================
[   24.176432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   24.177541] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.178635] 
[   24.178830] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.178949] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.178992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.179142] Call Trace:
[   24.179205]  <TASK>
[   24.179260]  dump_stack_lvl+0x73/0xb0
[   24.179409]  print_report+0xd1/0x650
[   24.179528]  ? __virt_addr_valid+0x1db/0x2d0
[   24.179619]  ? kasan_atomics_helper+0x151d/0x5450
[   24.179755]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.179885]  ? kasan_atomics_helper+0x151d/0x5450
[   24.179970]  kasan_report+0x141/0x180
[   24.180102]  ? kasan_atomics_helper+0x151d/0x5450
[   24.180229]  kasan_check_range+0x10c/0x1c0
[   24.180319]  __kasan_check_write+0x18/0x20
[   24.180456]  kasan_atomics_helper+0x151d/0x5450
[   24.180639]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.180725]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.180802]  ? kasan_atomics+0x152/0x310
[   24.180904]  kasan_atomics+0x1dc/0x310
[   24.181033]  ? __pfx_kasan_atomics+0x10/0x10
[   24.181140]  ? __pfx_read_tsc+0x10/0x10
[   24.181213]  ? ktime_get_ts64+0x86/0x230
[   24.181258]  kunit_try_run_case+0x1a5/0x480
[   24.181295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.181327]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.181367]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.181406]  ? __kthread_parkme+0x82/0x180
[   24.181437]  ? preempt_count_sub+0x50/0x80
[   24.181472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.181503]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.181541]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.181579]  kthread+0x337/0x6f0
[   24.181643]  ? trace_preempt_on+0x20/0xc0
[   24.181683]  ? __pfx_kthread+0x10/0x10
[   24.181715]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.181752]  ? calculate_sigpending+0x7b/0xa0
[   24.181789]  ? __pfx_kthread+0x10/0x10
[   24.181822]  ret_from_fork+0x116/0x1d0
[   24.181850]  ? __pfx_kthread+0x10/0x10
[   24.181918]  ret_from_fork_asm+0x1a/0x30
[   24.181969]  </TASK>
[   24.181986] 
[   24.198907] Allocated by task 282:
[   24.199922]  kasan_save_stack+0x45/0x70
[   24.200381]  kasan_save_track+0x18/0x40
[   24.201517]  kasan_save_alloc_info+0x3b/0x50
[   24.201880]  __kasan_kmalloc+0xb7/0xc0
[   24.202883]  __kmalloc_cache_noprof+0x189/0x420
[   24.203428]  kasan_atomics+0x95/0x310
[   24.204028]  kunit_try_run_case+0x1a5/0x480
[   24.204510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.205062]  kthread+0x337/0x6f0
[   24.205423]  ret_from_fork+0x116/0x1d0
[   24.205967]  ret_from_fork_asm+0x1a/0x30
[   24.206314] 
[   24.206521] The buggy address belongs to the object at ffff888102b73d80
[   24.206521]  which belongs to the cache kmalloc-64 of size 64
[   24.207560] The buggy address is located 0 bytes to the right of
[   24.207560]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.208496] 
[   24.208836] The buggy address belongs to the physical page:
[   24.209379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.210004] flags: 0x200000000000000(node=0|zone=2)
[   24.210555] page_type: f5(slab)
[   24.210985] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.211606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.212281] page dumped because: kasan: bad access detected
[   24.212859] 
[   24.213072] Memory state around the buggy address:
[   24.213434]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.214165]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.214744] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.215850]                                      ^
[   24.218160]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.219020]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.219571] ==================================================================
[   24.034557] ==================================================================
[   24.035309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   24.035795] Read of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.038001] 
[   24.038772] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.038848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.038892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.038931] Call Trace:
[   24.038961]  <TASK>
[   24.039001]  dump_stack_lvl+0x73/0xb0
[   24.039042]  print_report+0xd1/0x650
[   24.039099]  ? __virt_addr_valid+0x1db/0x2d0
[   24.039138]  ? kasan_atomics_helper+0x4eae/0x5450
[   24.039213]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.039261]  ? kasan_atomics_helper+0x4eae/0x5450
[   24.039309]  kasan_report+0x141/0x180
[   24.039353]  ? kasan_atomics_helper+0x4eae/0x5450
[   24.039407]  __asan_report_load8_noabort+0x18/0x20
[   24.039452]  kasan_atomics_helper+0x4eae/0x5450
[   24.039495]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.039589]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.039668]  ? kasan_atomics+0x152/0x310
[   24.039703]  kasan_atomics+0x1dc/0x310
[   24.039733]  ? __pfx_kasan_atomics+0x10/0x10
[   24.039764]  ? __pfx_read_tsc+0x10/0x10
[   24.039797]  ? ktime_get_ts64+0x86/0x230
[   24.039833]  kunit_try_run_case+0x1a5/0x480
[   24.039885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.039924]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.039967]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.040005]  ? __kthread_parkme+0x82/0x180
[   24.040036]  ? preempt_count_sub+0x50/0x80
[   24.040071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.040101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.040139]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.040177]  kthread+0x337/0x6f0
[   24.040206]  ? trace_preempt_on+0x20/0xc0
[   24.040241]  ? __pfx_kthread+0x10/0x10
[   24.040271]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.040303]  ? calculate_sigpending+0x7b/0xa0
[   24.040339]  ? __pfx_kthread+0x10/0x10
[   24.040371]  ret_from_fork+0x116/0x1d0
[   24.040397]  ? __pfx_kthread+0x10/0x10
[   24.040428]  ret_from_fork_asm+0x1a/0x30
[   24.040471]  </TASK>
[   24.040488] 
[   24.061000] Allocated by task 282:
[   24.061516]  kasan_save_stack+0x45/0x70
[   24.062317]  kasan_save_track+0x18/0x40
[   24.062627]  kasan_save_alloc_info+0x3b/0x50
[   24.063269]  __kasan_kmalloc+0xb7/0xc0
[   24.064067]  __kmalloc_cache_noprof+0x189/0x420
[   24.064434]  kasan_atomics+0x95/0x310
[   24.065036]  kunit_try_run_case+0x1a5/0x480
[   24.065377]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.066276]  kthread+0x337/0x6f0
[   24.066590]  ret_from_fork+0x116/0x1d0
[   24.067170]  ret_from_fork_asm+0x1a/0x30
[   24.067591] 
[   24.068128] The buggy address belongs to the object at ffff888102b73d80
[   24.068128]  which belongs to the cache kmalloc-64 of size 64
[   24.069398] The buggy address is located 0 bytes to the right of
[   24.069398]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.070802] 
[   24.071078] The buggy address belongs to the physical page:
[   24.071856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.072533] flags: 0x200000000000000(node=0|zone=2)
[   24.073251] page_type: f5(slab)
[   24.073820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.074458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.075280] page dumped because: kasan: bad access detected
[   24.076061] 
[   24.076441] Memory state around the buggy address:
[   24.077003]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.077812]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.078425] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.079341]                                      ^
[   24.080032]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.080612]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.081324] ==================================================================
[   23.628143] ==================================================================
[   23.628961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   23.629616] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.630220] 
[   23.630471] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.630604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.630648] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.630713] Call Trace:
[   23.630771]  <TASK>
[   23.630821]  dump_stack_lvl+0x73/0xb0
[   23.630932]  print_report+0xd1/0x650
[   23.631017]  ? __virt_addr_valid+0x1db/0x2d0
[   23.631098]  ? kasan_atomics_helper+0x1079/0x5450
[   23.631177]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.631258]  ? kasan_atomics_helper+0x1079/0x5450
[   23.631337]  kasan_report+0x141/0x180
[   23.631412]  ? kasan_atomics_helper+0x1079/0x5450
[   23.631491]  kasan_check_range+0x10c/0x1c0
[   23.631559]  __kasan_check_write+0x18/0x20
[   23.631616]  kasan_atomics_helper+0x1079/0x5450
[   23.631691]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.631762]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.631830]  ? kasan_atomics+0x152/0x310
[   23.631920]  kasan_atomics+0x1dc/0x310
[   23.631985]  ? __pfx_kasan_atomics+0x10/0x10
[   23.632040]  ? __pfx_read_tsc+0x10/0x10
[   23.632101]  ? ktime_get_ts64+0x86/0x230
[   23.632168]  kunit_try_run_case+0x1a5/0x480
[   23.632302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.632384]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.632507]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.632599]  ? __kthread_parkme+0x82/0x180
[   23.632733]  ? preempt_count_sub+0x50/0x80
[   23.632825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.632929]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.633020]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.633088]  kthread+0x337/0x6f0
[   23.633155]  ? trace_preempt_on+0x20/0xc0
[   23.633236]  ? __pfx_kthread+0x10/0x10
[   23.633310]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.633394]  ? calculate_sigpending+0x7b/0xa0
[   23.633479]  ? __pfx_kthread+0x10/0x10
[   23.633556]  ret_from_fork+0x116/0x1d0
[   23.633625]  ? __pfx_kthread+0x10/0x10
[   23.633708]  ret_from_fork_asm+0x1a/0x30
[   23.633808]  </TASK>
[   23.633850] 
[   23.649849] Allocated by task 282:
[   23.650280]  kasan_save_stack+0x45/0x70
[   23.650695]  kasan_save_track+0x18/0x40
[   23.651109]  kasan_save_alloc_info+0x3b/0x50
[   23.651549]  __kasan_kmalloc+0xb7/0xc0
[   23.652016]  __kmalloc_cache_noprof+0x189/0x420
[   23.652425]  kasan_atomics+0x95/0x310
[   23.652999]  kunit_try_run_case+0x1a5/0x480
[   23.653407]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.653932]  kthread+0x337/0x6f0
[   23.654333]  ret_from_fork+0x116/0x1d0
[   23.654780]  ret_from_fork_asm+0x1a/0x30
[   23.655182] 
[   23.655420] The buggy address belongs to the object at ffff888102b73d80
[   23.655420]  which belongs to the cache kmalloc-64 of size 64
[   23.656456] The buggy address is located 0 bytes to the right of
[   23.656456]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.658546] 
[   23.658839] The buggy address belongs to the physical page:
[   23.659397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.661694] flags: 0x200000000000000(node=0|zone=2)
[   23.662328] page_type: f5(slab)
[   23.662623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.663348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.665108] page dumped because: kasan: bad access detected
[   23.665676] 
[   23.665933] Memory state around the buggy address:
[   23.666326]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.667065]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.667672] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.668293]                                      ^
[   23.668682]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.669295]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.669860] ==================================================================
[   22.448591] ==================================================================
[   22.449178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   22.449655] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   22.450190] 
[   22.450454] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.450577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.450616] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.450674] Call Trace:
[   22.450721]  <TASK>
[   22.450762]  dump_stack_lvl+0x73/0xb0
[   22.450841]  print_report+0xd1/0x650
[   22.450937]  ? __virt_addr_valid+0x1db/0x2d0
[   22.451017]  ? kasan_atomics_helper+0x4ba2/0x5450
[   22.451092]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.451170]  ? kasan_atomics_helper+0x4ba2/0x5450
[   22.451318]  kasan_report+0x141/0x180
[   22.451430]  ? kasan_atomics_helper+0x4ba2/0x5450
[   22.451519]  __asan_report_store4_noabort+0x1b/0x30
[   22.451595]  kasan_atomics_helper+0x4ba2/0x5450
[   22.451676]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.451751]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.451828]  ? kasan_atomics+0x152/0x310
[   22.451905]  kasan_atomics+0x1dc/0x310
[   22.451997]  ? __pfx_kasan_atomics+0x10/0x10
[   22.452066]  ? __pfx_read_tsc+0x10/0x10
[   22.452137]  ? ktime_get_ts64+0x86/0x230
[   22.452222]  kunit_try_run_case+0x1a5/0x480
[   22.452292]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.452362]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.452443]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.452520]  ? __kthread_parkme+0x82/0x180
[   22.452610]  ? preempt_count_sub+0x50/0x80
[   22.452697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.452834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.453019]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.453138]  kthread+0x337/0x6f0
[   22.453210]  ? trace_preempt_on+0x20/0xc0
[   22.453268]  ? __pfx_kthread+0x10/0x10
[   22.453300]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.453334]  ? calculate_sigpending+0x7b/0xa0
[   22.453369]  ? __pfx_kthread+0x10/0x10
[   22.453400]  ret_from_fork+0x116/0x1d0
[   22.453427]  ? __pfx_kthread+0x10/0x10
[   22.453455]  ret_from_fork_asm+0x1a/0x30
[   22.453497]  </TASK>
[   22.453511] 
[   22.469666] Allocated by task 282:
[   22.470054]  kasan_save_stack+0x45/0x70
[   22.470460]  kasan_save_track+0x18/0x40
[   22.470856]  kasan_save_alloc_info+0x3b/0x50
[   22.471391]  __kasan_kmalloc+0xb7/0xc0
[   22.471710]  __kmalloc_cache_noprof+0x189/0x420
[   22.472289]  kasan_atomics+0x95/0x310
[   22.473044]  kunit_try_run_case+0x1a5/0x480
[   22.473555]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.474183]  kthread+0x337/0x6f0
[   22.474674]  ret_from_fork+0x116/0x1d0
[   22.475089]  ret_from_fork_asm+0x1a/0x30
[   22.475415] 
[   22.475597] The buggy address belongs to the object at ffff888102b73d80
[   22.475597]  which belongs to the cache kmalloc-64 of size 64
[   22.476297] The buggy address is located 0 bytes to the right of
[   22.476297]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   22.477080] 
[   22.477439] The buggy address belongs to the physical page:
[   22.477946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   22.478626] flags: 0x200000000000000(node=0|zone=2)
[   22.479118] page_type: f5(slab)
[   22.479488] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.480644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.481329] page dumped because: kasan: bad access detected
[   22.481892] 
[   22.482092] Memory state around the buggy address:
[   22.482717]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.483372]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.484104] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.484874]                                      ^
[   22.485324]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.486134]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.486825] ==================================================================
[   22.913058] ==================================================================
[   22.914085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   22.914817] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   22.915464] 
[   22.915770] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.915926] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.915973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.916072] Call Trace:
[   22.916132]  <TASK>
[   22.916186]  dump_stack_lvl+0x73/0xb0
[   22.916314]  print_report+0xd1/0x650
[   22.916395]  ? __virt_addr_valid+0x1db/0x2d0
[   22.916514]  ? kasan_atomics_helper+0x72f/0x5450
[   22.916628]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.916737]  ? kasan_atomics_helper+0x72f/0x5450
[   22.916821]  kasan_report+0x141/0x180
[   22.916922]  ? kasan_atomics_helper+0x72f/0x5450
[   22.917017]  kasan_check_range+0x10c/0x1c0
[   22.917104]  __kasan_check_write+0x18/0x20
[   22.917178]  kasan_atomics_helper+0x72f/0x5450
[   22.917240]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.917277]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.917311]  ? kasan_atomics+0x152/0x310
[   22.917345]  kasan_atomics+0x1dc/0x310
[   22.917374]  ? __pfx_kasan_atomics+0x10/0x10
[   22.917404]  ? __pfx_read_tsc+0x10/0x10
[   22.917439]  ? ktime_get_ts64+0x86/0x230
[   22.917474]  kunit_try_run_case+0x1a5/0x480
[   22.917506]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.917536]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.917573]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.917614]  ? __kthread_parkme+0x82/0x180
[   22.917687]  ? preempt_count_sub+0x50/0x80
[   22.917725]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.917756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.917794]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.917830]  kthread+0x337/0x6f0
[   22.917858]  ? trace_preempt_on+0x20/0xc0
[   22.917893]  ? __pfx_kthread+0x10/0x10
[   22.917952]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.917989]  ? calculate_sigpending+0x7b/0xa0
[   22.918024]  ? __pfx_kthread+0x10/0x10
[   22.918056]  ret_from_fork+0x116/0x1d0
[   22.918086]  ? __pfx_kthread+0x10/0x10
[   22.918117]  ret_from_fork_asm+0x1a/0x30
[   22.918162]  </TASK>
[   22.918178] 
[   22.933772] Allocated by task 282:
[   22.934199]  kasan_save_stack+0x45/0x70
[   22.934587]  kasan_save_track+0x18/0x40
[   22.934930]  kasan_save_alloc_info+0x3b/0x50
[   22.935273]  __kasan_kmalloc+0xb7/0xc0
[   22.935761]  __kmalloc_cache_noprof+0x189/0x420
[   22.936476]  kasan_atomics+0x95/0x310
[   22.937113]  kunit_try_run_case+0x1a5/0x480
[   22.937470]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.938273]  kthread+0x337/0x6f0
[   22.940646]  ret_from_fork+0x116/0x1d0
[   22.941017]  ret_from_fork_asm+0x1a/0x30
[   22.941933] 
[   22.943149] The buggy address belongs to the object at ffff888102b73d80
[   22.943149]  which belongs to the cache kmalloc-64 of size 64
[   22.944750] The buggy address is located 0 bytes to the right of
[   22.944750]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   22.945835] 
[   22.946083] The buggy address belongs to the physical page:
[   22.946868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   22.947634] flags: 0x200000000000000(node=0|zone=2)
[   22.948243] page_type: f5(slab)
[   22.949005] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.949548] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.950516] page dumped because: kasan: bad access detected
[   22.951479] 
[   22.951887] Memory state around the buggy address:
[   22.952277]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.952833]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.953697] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.954281]                                      ^
[   22.955010]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.955778]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.956522] ==================================================================
[   24.861772] ==================================================================
[   24.862498] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   24.863103] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.863892] 
[   24.864189] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.864341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.864415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.864483] Call Trace:
[   24.864539]  <TASK>
[   24.864638]  dump_stack_lvl+0x73/0xb0
[   24.864758]  print_report+0xd1/0x650
[   24.864860]  ? __virt_addr_valid+0x1db/0x2d0
[   24.864968]  ? kasan_atomics_helper+0x1e12/0x5450
[   24.865079]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.865160]  ? kasan_atomics_helper+0x1e12/0x5450
[   24.865218]  kasan_report+0x141/0x180
[   24.865296]  ? kasan_atomics_helper+0x1e12/0x5450
[   24.865405]  kasan_check_range+0x10c/0x1c0
[   24.865524]  __kasan_check_write+0x18/0x20
[   24.865650]  kasan_atomics_helper+0x1e12/0x5450
[   24.865738]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.865823]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.865921]  ? kasan_atomics+0x152/0x310
[   24.866005]  kasan_atomics+0x1dc/0x310
[   24.866083]  ? __pfx_kasan_atomics+0x10/0x10
[   24.866162]  ? __pfx_read_tsc+0x10/0x10
[   24.866302]  ? ktime_get_ts64+0x86/0x230
[   24.866397]  kunit_try_run_case+0x1a5/0x480
[   24.866479]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.866555]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.866688]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.866773]  ? __kthread_parkme+0x82/0x180
[   24.866815]  ? preempt_count_sub+0x50/0x80
[   24.866878]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.866916]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.866957]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.866998]  kthread+0x337/0x6f0
[   24.867030]  ? trace_preempt_on+0x20/0xc0
[   24.867063]  ? __pfx_kthread+0x10/0x10
[   24.867094]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.867129]  ? calculate_sigpending+0x7b/0xa0
[   24.867164]  ? __pfx_kthread+0x10/0x10
[   24.867196]  ret_from_fork+0x116/0x1d0
[   24.867223]  ? __pfx_kthread+0x10/0x10
[   24.867254]  ret_from_fork_asm+0x1a/0x30
[   24.867298]  </TASK>
[   24.867314] 
[   24.883093] Allocated by task 282:
[   24.883442]  kasan_save_stack+0x45/0x70
[   24.884121]  kasan_save_track+0x18/0x40
[   24.884519]  kasan_save_alloc_info+0x3b/0x50
[   24.884980]  __kasan_kmalloc+0xb7/0xc0
[   24.885489]  __kmalloc_cache_noprof+0x189/0x420
[   24.886035]  kasan_atomics+0x95/0x310
[   24.886495]  kunit_try_run_case+0x1a5/0x480
[   24.887008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.887544]  kthread+0x337/0x6f0
[   24.887997]  ret_from_fork+0x116/0x1d0
[   24.888347]  ret_from_fork_asm+0x1a/0x30
[   24.888722] 
[   24.889106] The buggy address belongs to the object at ffff888102b73d80
[   24.889106]  which belongs to the cache kmalloc-64 of size 64
[   24.890080] The buggy address is located 0 bytes to the right of
[   24.890080]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.891410] 
[   24.891678] The buggy address belongs to the physical page:
[   24.892226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.893124] flags: 0x200000000000000(node=0|zone=2)
[   24.893573] page_type: f5(slab)
[   24.894070] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.894784] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.895451] page dumped because: kasan: bad access detected
[   24.896138] 
[   24.896371] Memory state around the buggy address:
[   24.896960]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.897423]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.898065] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.898784]                                      ^
[   24.899238]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.899713]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.900383] ==================================================================
[   23.988261] ==================================================================
[   23.989801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   23.990564] Read of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.991163] 
[   23.991426] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.991554] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.991579] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.992233] Call Trace:
[   23.992274]  <TASK>
[   23.992301]  dump_stack_lvl+0x73/0xb0
[   23.992345]  print_report+0xd1/0x650
[   23.992380]  ? __virt_addr_valid+0x1db/0x2d0
[   23.992416]  ? kasan_atomics_helper+0x13b5/0x5450
[   23.992450]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.992484]  ? kasan_atomics_helper+0x13b5/0x5450
[   23.992520]  kasan_report+0x141/0x180
[   23.992553]  ? kasan_atomics_helper+0x13b5/0x5450
[   23.992604]  kasan_check_range+0x10c/0x1c0
[   23.992673]  __kasan_check_read+0x15/0x20
[   23.992706]  kasan_atomics_helper+0x13b5/0x5450
[   23.992741]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.992775]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.992806]  ? kasan_atomics+0x152/0x310
[   23.992838]  kasan_atomics+0x1dc/0x310
[   23.992886]  ? __pfx_kasan_atomics+0x10/0x10
[   23.992928]  ? __pfx_read_tsc+0x10/0x10
[   23.992964]  ? ktime_get_ts64+0x86/0x230
[   23.993001]  kunit_try_run_case+0x1a5/0x480
[   23.993033]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.993062]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.993102]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.993139]  ? __kthread_parkme+0x82/0x180
[   23.993171]  ? preempt_count_sub+0x50/0x80
[   23.993206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.993236]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.993274]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.993311]  kthread+0x337/0x6f0
[   23.993341]  ? trace_preempt_on+0x20/0xc0
[   23.993373]  ? __pfx_kthread+0x10/0x10
[   23.993404]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.993438]  ? calculate_sigpending+0x7b/0xa0
[   23.993474]  ? __pfx_kthread+0x10/0x10
[   23.993505]  ret_from_fork+0x116/0x1d0
[   23.993532]  ? __pfx_kthread+0x10/0x10
[   23.993561]  ret_from_fork_asm+0x1a/0x30
[   23.993623]  </TASK>
[   23.993649] 
[   24.013911] Allocated by task 282:
[   24.014443]  kasan_save_stack+0x45/0x70
[   24.014837]  kasan_save_track+0x18/0x40
[   24.015258]  kasan_save_alloc_info+0x3b/0x50
[   24.015688]  __kasan_kmalloc+0xb7/0xc0
[   24.016578]  __kmalloc_cache_noprof+0x189/0x420
[   24.017168]  kasan_atomics+0x95/0x310
[   24.017679]  kunit_try_run_case+0x1a5/0x480
[   24.018213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.018935]  kthread+0x337/0x6f0
[   24.019429]  ret_from_fork+0x116/0x1d0
[   24.019806]  ret_from_fork_asm+0x1a/0x30
[   24.020466] 
[   24.020737] The buggy address belongs to the object at ffff888102b73d80
[   24.020737]  which belongs to the cache kmalloc-64 of size 64
[   24.021601] The buggy address is located 0 bytes to the right of
[   24.021601]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.023101] 
[   24.023643] The buggy address belongs to the physical page:
[   24.024249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.025164] flags: 0x200000000000000(node=0|zone=2)
[   24.025710] page_type: f5(slab)
[   24.026094] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.026679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.027555] page dumped because: kasan: bad access detected
[   24.028226] 
[   24.028560] Memory state around the buggy address:
[   24.028924]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.029897]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.030445] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.031183]                                      ^
[   24.031792]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.032360]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.033094] ==================================================================
[   22.958804] ==================================================================
[   22.960005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   22.960731] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   22.961251] 
[   22.961371] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.961441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.961460] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.961493] Call Trace:
[   22.961518]  <TASK>
[   22.961541]  dump_stack_lvl+0x73/0xb0
[   22.961582]  print_report+0xd1/0x650
[   22.961646]  ? __virt_addr_valid+0x1db/0x2d0
[   22.961700]  ? kasan_atomics_helper+0x7c7/0x5450
[   22.961734]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.961770]  ? kasan_atomics_helper+0x7c7/0x5450
[   22.961803]  kasan_report+0x141/0x180
[   22.961837]  ? kasan_atomics_helper+0x7c7/0x5450
[   22.961875]  kasan_check_range+0x10c/0x1c0
[   22.961957]  __kasan_check_write+0x18/0x20
[   22.962037]  kasan_atomics_helper+0x7c7/0x5450
[   22.962125]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.962192]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.962228]  ? kasan_atomics+0x152/0x310
[   22.962275]  kasan_atomics+0x1dc/0x310
[   22.962306]  ? __pfx_kasan_atomics+0x10/0x10
[   22.962377]  ? __pfx_read_tsc+0x10/0x10
[   22.962416]  ? ktime_get_ts64+0x86/0x230
[   22.962454]  kunit_try_run_case+0x1a5/0x480
[   22.962488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.962519]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.962558]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.962596]  ? __kthread_parkme+0x82/0x180
[   22.963084]  ? preempt_count_sub+0x50/0x80
[   22.963137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.963172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.963213]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.963252]  kthread+0x337/0x6f0
[   22.963282]  ? trace_preempt_on+0x20/0xc0
[   22.963317]  ? __pfx_kthread+0x10/0x10
[   22.963348]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.963384]  ? calculate_sigpending+0x7b/0xa0
[   22.963420]  ? __pfx_kthread+0x10/0x10
[   22.963451]  ret_from_fork+0x116/0x1d0
[   22.963477]  ? __pfx_kthread+0x10/0x10
[   22.963507]  ret_from_fork_asm+0x1a/0x30
[   22.963550]  </TASK>
[   22.963566] 
[   22.978085] Allocated by task 282:
[   22.978488]  kasan_save_stack+0x45/0x70
[   22.978920]  kasan_save_track+0x18/0x40
[   22.979353]  kasan_save_alloc_info+0x3b/0x50
[   22.979781]  __kasan_kmalloc+0xb7/0xc0
[   22.980217]  __kmalloc_cache_noprof+0x189/0x420
[   22.980701]  kasan_atomics+0x95/0x310
[   22.981110]  kunit_try_run_case+0x1a5/0x480
[   22.981552]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.982077]  kthread+0x337/0x6f0
[   22.982430]  ret_from_fork+0x116/0x1d0
[   22.982835]  ret_from_fork_asm+0x1a/0x30
[   22.983285] 
[   22.983527] The buggy address belongs to the object at ffff888102b73d80
[   22.983527]  which belongs to the cache kmalloc-64 of size 64
[   22.984420] The buggy address is located 0 bytes to the right of
[   22.984420]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   22.985465] 
[   22.985747] The buggy address belongs to the physical page:
[   22.986183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   22.986954] flags: 0x200000000000000(node=0|zone=2)
[   22.987406] page_type: f5(slab)
[   22.987781] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.988348] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.989068] page dumped because: kasan: bad access detected
[   22.989456] 
[   22.989693] Memory state around the buggy address:
[   22.990079]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.990548]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.991121] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.991838]                                      ^
[   22.992354]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.993114]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.993821] ==================================================================
[   23.546183] ==================================================================
[   23.546899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   23.547826] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.548839] 
[   23.549353] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.549779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.549803] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.549838] Call Trace:
[   23.549865]  <TASK>
[   23.549913]  dump_stack_lvl+0x73/0xb0
[   23.549959]  print_report+0xd1/0x650
[   23.549995]  ? __virt_addr_valid+0x1db/0x2d0
[   23.550030]  ? kasan_atomics_helper+0xfa9/0x5450
[   23.550062]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.550096]  ? kasan_atomics_helper+0xfa9/0x5450
[   23.550129]  kasan_report+0x141/0x180
[   23.550162]  ? kasan_atomics_helper+0xfa9/0x5450
[   23.550201]  kasan_check_range+0x10c/0x1c0
[   23.550251]  __kasan_check_write+0x18/0x20
[   23.550280]  kasan_atomics_helper+0xfa9/0x5450
[   23.550314]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.550348]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.550378]  ? kasan_atomics+0x152/0x310
[   23.550410]  kasan_atomics+0x1dc/0x310
[   23.550439]  ? __pfx_kasan_atomics+0x10/0x10
[   23.550470]  ? __pfx_read_tsc+0x10/0x10
[   23.550503]  ? ktime_get_ts64+0x86/0x230
[   23.550539]  kunit_try_run_case+0x1a5/0x480
[   23.550571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.550606]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.550679]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.550719]  ? __kthread_parkme+0x82/0x180
[   23.550751]  ? preempt_count_sub+0x50/0x80
[   23.550785]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.550817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.550853]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.550916]  kthread+0x337/0x6f0
[   23.550949]  ? trace_preempt_on+0x20/0xc0
[   23.550985]  ? __pfx_kthread+0x10/0x10
[   23.551016]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.551053]  ? calculate_sigpending+0x7b/0xa0
[   23.551089]  ? __pfx_kthread+0x10/0x10
[   23.551122]  ret_from_fork+0x116/0x1d0
[   23.551149]  ? __pfx_kthread+0x10/0x10
[   23.551181]  ret_from_fork_asm+0x1a/0x30
[   23.551224]  </TASK>
[   23.551240] 
[   23.569844] Allocated by task 282:
[   23.570272]  kasan_save_stack+0x45/0x70
[   23.570755]  kasan_save_track+0x18/0x40
[   23.571152]  kasan_save_alloc_info+0x3b/0x50
[   23.571519]  __kasan_kmalloc+0xb7/0xc0
[   23.572045]  __kmalloc_cache_noprof+0x189/0x420
[   23.572779]  kasan_atomics+0x95/0x310
[   23.573110]  kunit_try_run_case+0x1a5/0x480
[   23.573449]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.574288]  kthread+0x337/0x6f0
[   23.574702]  ret_from_fork+0x116/0x1d0
[   23.575194]  ret_from_fork_asm+0x1a/0x30
[   23.575658] 
[   23.575944] The buggy address belongs to the object at ffff888102b73d80
[   23.575944]  which belongs to the cache kmalloc-64 of size 64
[   23.576970] The buggy address is located 0 bytes to the right of
[   23.576970]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.578045] 
[   23.578279] The buggy address belongs to the physical page:
[   23.578821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.579566] flags: 0x200000000000000(node=0|zone=2)
[   23.580011] page_type: f5(slab)
[   23.580306] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.581127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.581835] page dumped because: kasan: bad access detected
[   23.582310] 
[   23.582590] Memory state around the buggy address:
[   23.583108]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.583708]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.584228] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.584830]                                      ^
[   23.585470]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.586078]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.586538] ==================================================================
[   23.093801] ==================================================================
[   23.095065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   23.096011] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.096612] 
[   23.097387] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.097489] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.097516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.097551] Call Trace:
[   23.097577]  <TASK>
[   23.097599]  dump_stack_lvl+0x73/0xb0
[   23.097667]  print_report+0xd1/0x650
[   23.097704]  ? __virt_addr_valid+0x1db/0x2d0
[   23.097740]  ? kasan_atomics_helper+0x992/0x5450
[   23.097772]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.097807]  ? kasan_atomics_helper+0x992/0x5450
[   23.097839]  kasan_report+0x141/0x180
[   23.097873]  ? kasan_atomics_helper+0x992/0x5450
[   23.097940]  kasan_check_range+0x10c/0x1c0
[   23.097981]  __kasan_check_write+0x18/0x20
[   23.098011]  kasan_atomics_helper+0x992/0x5450
[   23.098046]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.098080]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.098112]  ? kasan_atomics+0x152/0x310
[   23.098143]  kasan_atomics+0x1dc/0x310
[   23.098171]  ? __pfx_kasan_atomics+0x10/0x10
[   23.098201]  ? __pfx_read_tsc+0x10/0x10
[   23.098251]  ? ktime_get_ts64+0x86/0x230
[   23.098288]  kunit_try_run_case+0x1a5/0x480
[   23.098321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.098351]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.098390]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.098872]  ? __kthread_parkme+0x82/0x180
[   23.098937]  ? preempt_count_sub+0x50/0x80
[   23.098976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.099009]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.099047]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.099085]  kthread+0x337/0x6f0
[   23.099114]  ? trace_preempt_on+0x20/0xc0
[   23.099148]  ? __pfx_kthread+0x10/0x10
[   23.099205]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.099246]  ? calculate_sigpending+0x7b/0xa0
[   23.099286]  ? __pfx_kthread+0x10/0x10
[   23.099318]  ret_from_fork+0x116/0x1d0
[   23.099346]  ? __pfx_kthread+0x10/0x10
[   23.099377]  ret_from_fork_asm+0x1a/0x30
[   23.099421]  </TASK>
[   23.099437] 
[   23.120099] Allocated by task 282:
[   23.120375]  kasan_save_stack+0x45/0x70
[   23.121030]  kasan_save_track+0x18/0x40
[   23.121622]  kasan_save_alloc_info+0x3b/0x50
[   23.122315]  __kasan_kmalloc+0xb7/0xc0
[   23.122597]  __kmalloc_cache_noprof+0x189/0x420
[   23.123239]  kasan_atomics+0x95/0x310
[   23.123643]  kunit_try_run_case+0x1a5/0x480
[   23.124374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.125083]  kthread+0x337/0x6f0
[   23.125377]  ret_from_fork+0x116/0x1d0
[   23.126026]  ret_from_fork_asm+0x1a/0x30
[   23.126835] 
[   23.127026] The buggy address belongs to the object at ffff888102b73d80
[   23.127026]  which belongs to the cache kmalloc-64 of size 64
[   23.128313] The buggy address is located 0 bytes to the right of
[   23.128313]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.129377] 
[   23.130006] The buggy address belongs to the physical page:
[   23.130688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.131478] flags: 0x200000000000000(node=0|zone=2)
[   23.132155] page_type: f5(slab)
[   23.132683] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.133303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.134333] page dumped because: kasan: bad access detected
[   23.134753] 
[   23.135032] Memory state around the buggy address:
[   23.135930]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.136690]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.137447] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.138213]                                      ^
[   23.138826]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.139681]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.140322] ==================================================================
[   24.773484] ==================================================================
[   24.774292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   24.775019] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.775782] 
[   24.776600] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.776739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.776778] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.776814] Call Trace:
[   24.776840]  <TASK>
[   24.776904]  dump_stack_lvl+0x73/0xb0
[   24.776957]  print_report+0xd1/0x650
[   24.776994]  ? __virt_addr_valid+0x1db/0x2d0
[   24.777029]  ? kasan_atomics_helper+0x1ce1/0x5450
[   24.777062]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.777095]  ? kasan_atomics_helper+0x1ce1/0x5450
[   24.777128]  kasan_report+0x141/0x180
[   24.777160]  ? kasan_atomics_helper+0x1ce1/0x5450
[   24.777200]  kasan_check_range+0x10c/0x1c0
[   24.777236]  __kasan_check_write+0x18/0x20
[   24.777265]  kasan_atomics_helper+0x1ce1/0x5450
[   24.777299]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.777333]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.777364]  ? kasan_atomics+0x152/0x310
[   24.777396]  kasan_atomics+0x1dc/0x310
[   24.777424]  ? __pfx_kasan_atomics+0x10/0x10
[   24.777457]  ? __pfx_read_tsc+0x10/0x10
[   24.777490]  ? ktime_get_ts64+0x86/0x230
[   24.777527]  kunit_try_run_case+0x1a5/0x480
[   24.777558]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.777985]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.778036]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.778076]  ? __kthread_parkme+0x82/0x180
[   24.778109]  ? preempt_count_sub+0x50/0x80
[   24.778144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.778177]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.778225]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.778265]  kthread+0x337/0x6f0
[   24.778294]  ? trace_preempt_on+0x20/0xc0
[   24.778328]  ? __pfx_kthread+0x10/0x10
[   24.778359]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.778393]  ? calculate_sigpending+0x7b/0xa0
[   24.778429]  ? __pfx_kthread+0x10/0x10
[   24.778463]  ret_from_fork+0x116/0x1d0
[   24.778490]  ? __pfx_kthread+0x10/0x10
[   24.778520]  ret_from_fork_asm+0x1a/0x30
[   24.778564]  </TASK>
[   24.778593] 
[   24.798834] Allocated by task 282:
[   24.799149]  kasan_save_stack+0x45/0x70
[   24.799974]  kasan_save_track+0x18/0x40
[   24.800314]  kasan_save_alloc_info+0x3b/0x50
[   24.801307]  __kasan_kmalloc+0xb7/0xc0
[   24.801648]  __kmalloc_cache_noprof+0x189/0x420
[   24.802329]  kasan_atomics+0x95/0x310
[   24.803023]  kunit_try_run_case+0x1a5/0x480
[   24.803380]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.804051]  kthread+0x337/0x6f0
[   24.804879]  ret_from_fork+0x116/0x1d0
[   24.805242]  ret_from_fork_asm+0x1a/0x30
[   24.805898] 
[   24.806072] The buggy address belongs to the object at ffff888102b73d80
[   24.806072]  which belongs to the cache kmalloc-64 of size 64
[   24.807618] The buggy address is located 0 bytes to the right of
[   24.807618]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.808609] 
[   24.808864] The buggy address belongs to the physical page:
[   24.809332] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.810323] flags: 0x200000000000000(node=0|zone=2)
[   24.810993] page_type: f5(slab)
[   24.811257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.812581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.813312] page dumped because: kasan: bad access detected
[   24.814262] 
[   24.814639] Memory state around the buggy address:
[   24.815084]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.815671]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.816257] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.816881]                                      ^
[   24.817258]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.817880]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.819150] ==================================================================
[   24.946016] ==================================================================
[   24.946506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   24.947111] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.947992] 
[   24.948279] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.948395] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.948417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.948449] Call Trace:
[   24.948475]  <TASK>
[   24.948498]  dump_stack_lvl+0x73/0xb0
[   24.948541]  print_report+0xd1/0x650
[   24.948597]  ? __virt_addr_valid+0x1db/0x2d0
[   24.948645]  ? kasan_atomics_helper+0x1f43/0x5450
[   24.948679]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.948712]  ? kasan_atomics_helper+0x1f43/0x5450
[   24.948745]  kasan_report+0x141/0x180
[   24.948778]  ? kasan_atomics_helper+0x1f43/0x5450
[   24.948817]  kasan_check_range+0x10c/0x1c0
[   24.948886]  __kasan_check_write+0x18/0x20
[   24.948968]  kasan_atomics_helper+0x1f43/0x5450
[   24.949095]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.949185]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.949268]  ? kasan_atomics+0x152/0x310
[   24.949353]  kasan_atomics+0x1dc/0x310
[   24.949473]  ? __pfx_kasan_atomics+0x10/0x10
[   24.949559]  ? __pfx_read_tsc+0x10/0x10
[   24.949829]  ? ktime_get_ts64+0x86/0x230
[   24.949945]  kunit_try_run_case+0x1a5/0x480
[   24.949997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.950033]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.950074]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.950113]  ? __kthread_parkme+0x82/0x180
[   24.950145]  ? preempt_count_sub+0x50/0x80
[   24.950180]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.950227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.950268]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.950306]  kthread+0x337/0x6f0
[   24.950335]  ? trace_preempt_on+0x20/0xc0
[   24.950369]  ? __pfx_kthread+0x10/0x10
[   24.950398]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.950432]  ? calculate_sigpending+0x7b/0xa0
[   24.950468]  ? __pfx_kthread+0x10/0x10
[   24.950498]  ret_from_fork+0x116/0x1d0
[   24.950524]  ? __pfx_kthread+0x10/0x10
[   24.950555]  ret_from_fork_asm+0x1a/0x30
[   24.950793]  </TASK>
[   24.951230] 
[   24.971978] Allocated by task 282:
[   24.972380]  kasan_save_stack+0x45/0x70
[   24.972840]  kasan_save_track+0x18/0x40
[   24.973310]  kasan_save_alloc_info+0x3b/0x50
[   24.973981]  __kasan_kmalloc+0xb7/0xc0
[   24.974301]  __kmalloc_cache_noprof+0x189/0x420
[   24.975620]  kasan_atomics+0x95/0x310
[   24.975955]  kunit_try_run_case+0x1a5/0x480
[   24.976501]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.977371]  kthread+0x337/0x6f0
[   24.978063]  ret_from_fork+0x116/0x1d0
[   24.978417]  ret_from_fork_asm+0x1a/0x30
[   24.979115] 
[   24.979322] The buggy address belongs to the object at ffff888102b73d80
[   24.979322]  which belongs to the cache kmalloc-64 of size 64
[   24.980672] The buggy address is located 0 bytes to the right of
[   24.980672]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.981614] 
[   24.982252] The buggy address belongs to the physical page:
[   24.982865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.983741] flags: 0x200000000000000(node=0|zone=2)
[   24.984380] page_type: f5(slab)
[   24.984923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.985683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.986323] page dumped because: kasan: bad access detected
[   24.986943] 
[   24.987331] Memory state around the buggy address:
[   24.987919]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.988560]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.988829] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.989584]                                      ^
[   24.990477]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.991273]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.991816] ==================================================================
[   24.363973] ==================================================================
[   24.364690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   24.365522] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.366311] 
[   24.366623] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.366757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.366801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.366891] Call Trace:
[   24.366953]  <TASK>
[   24.367052]  dump_stack_lvl+0x73/0xb0
[   24.367159]  print_report+0xd1/0x650
[   24.367329]  ? __virt_addr_valid+0x1db/0x2d0
[   24.367487]  ? kasan_atomics_helper+0x177f/0x5450
[   24.367572]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.367694]  ? kasan_atomics_helper+0x177f/0x5450
[   24.367776]  kasan_report+0x141/0x180
[   24.367878]  ? kasan_atomics_helper+0x177f/0x5450
[   24.368007]  kasan_check_range+0x10c/0x1c0
[   24.368103]  __kasan_check_write+0x18/0x20
[   24.368215]  kasan_atomics_helper+0x177f/0x5450
[   24.368303]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.368469]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.368550]  ? kasan_atomics+0x152/0x310
[   24.368755]  kasan_atomics+0x1dc/0x310
[   24.368832]  ? __pfx_kasan_atomics+0x10/0x10
[   24.368903]  ? __pfx_read_tsc+0x10/0x10
[   24.368945]  ? ktime_get_ts64+0x86/0x230
[   24.368983]  kunit_try_run_case+0x1a5/0x480
[   24.369015]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.369046]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.369086]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.369125]  ? __kthread_parkme+0x82/0x180
[   24.369155]  ? preempt_count_sub+0x50/0x80
[   24.369190]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.369221]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.369259]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.369296]  kthread+0x337/0x6f0
[   24.369325]  ? trace_preempt_on+0x20/0xc0
[   24.369360]  ? __pfx_kthread+0x10/0x10
[   24.369391]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.369424]  ? calculate_sigpending+0x7b/0xa0
[   24.369460]  ? __pfx_kthread+0x10/0x10
[   24.369492]  ret_from_fork+0x116/0x1d0
[   24.369519]  ? __pfx_kthread+0x10/0x10
[   24.369548]  ret_from_fork_asm+0x1a/0x30
[   24.369628]  </TASK>
[   24.369652] 
[   24.386703] Allocated by task 282:
[   24.387269]  kasan_save_stack+0x45/0x70
[   24.387739]  kasan_save_track+0x18/0x40
[   24.388277]  kasan_save_alloc_info+0x3b/0x50
[   24.388773]  __kasan_kmalloc+0xb7/0xc0
[   24.389339]  __kmalloc_cache_noprof+0x189/0x420
[   24.389693]  kasan_atomics+0x95/0x310
[   24.390378]  kunit_try_run_case+0x1a5/0x480
[   24.391031]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.391773]  kthread+0x337/0x6f0
[   24.392103]  ret_from_fork+0x116/0x1d0
[   24.392520]  ret_from_fork_asm+0x1a/0x30
[   24.393112] 
[   24.393364] The buggy address belongs to the object at ffff888102b73d80
[   24.393364]  which belongs to the cache kmalloc-64 of size 64
[   24.394606] The buggy address is located 0 bytes to the right of
[   24.394606]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.395760] 
[   24.396025] The buggy address belongs to the physical page:
[   24.396614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.397459] flags: 0x200000000000000(node=0|zone=2)
[   24.398088] page_type: f5(slab)
[   24.398500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.399309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.400107] page dumped because: kasan: bad access detected
[   24.400610] 
[   24.400943] Memory state around the buggy address:
[   24.401520]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.402325]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.403032] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.403743]                                      ^
[   24.404303]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.405003]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.405744] ==================================================================
[   25.361694] ==================================================================
[   25.362159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   25.364304] Read of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   25.365053] 
[   25.365361] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   25.365877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.365902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.365936] Call Trace:
[   25.365962]  <TASK>
[   25.365985]  dump_stack_lvl+0x73/0xb0
[   25.366025]  print_report+0xd1/0x650
[   25.366058]  ? __virt_addr_valid+0x1db/0x2d0
[   25.366093]  ? kasan_atomics_helper+0x5115/0x5450
[   25.366127]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.366162]  ? kasan_atomics_helper+0x5115/0x5450
[   25.366195]  kasan_report+0x141/0x180
[   25.366240]  ? kasan_atomics_helper+0x5115/0x5450
[   25.366279]  __asan_report_load8_noabort+0x18/0x20
[   25.366310]  kasan_atomics_helper+0x5115/0x5450
[   25.366344]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.366378]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.366408]  ? kasan_atomics+0x152/0x310
[   25.366440]  kasan_atomics+0x1dc/0x310
[   25.366467]  ? __pfx_kasan_atomics+0x10/0x10
[   25.366497]  ? __pfx_read_tsc+0x10/0x10
[   25.366530]  ? ktime_get_ts64+0x86/0x230
[   25.366610]  kunit_try_run_case+0x1a5/0x480
[   25.366648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.366680]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.366718]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.366756]  ? __kthread_parkme+0x82/0x180
[   25.366787]  ? preempt_count_sub+0x50/0x80
[   25.366822]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.366879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.366919]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.366958]  kthread+0x337/0x6f0
[   25.366988]  ? trace_preempt_on+0x20/0xc0
[   25.367023]  ? __pfx_kthread+0x10/0x10
[   25.367055]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.367090]  ? calculate_sigpending+0x7b/0xa0
[   25.367126]  ? __pfx_kthread+0x10/0x10
[   25.367158]  ret_from_fork+0x116/0x1d0
[   25.367186]  ? __pfx_kthread+0x10/0x10
[   25.367216]  ret_from_fork_asm+0x1a/0x30
[   25.367259]  </TASK>
[   25.367274] 
[   25.384376] Allocated by task 282:
[   25.384873]  kasan_save_stack+0x45/0x70
[   25.385282]  kasan_save_track+0x18/0x40
[   25.385663]  kasan_save_alloc_info+0x3b/0x50
[   25.386095]  __kasan_kmalloc+0xb7/0xc0
[   25.386706]  __kmalloc_cache_noprof+0x189/0x420
[   25.387256]  kasan_atomics+0x95/0x310
[   25.387759]  kunit_try_run_case+0x1a5/0x480
[   25.388232]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.388938]  kthread+0x337/0x6f0
[   25.389330]  ret_from_fork+0x116/0x1d0
[   25.389911]  ret_from_fork_asm+0x1a/0x30
[   25.390306] 
[   25.390662] The buggy address belongs to the object at ffff888102b73d80
[   25.390662]  which belongs to the cache kmalloc-64 of size 64
[   25.391787] The buggy address is located 0 bytes to the right of
[   25.391787]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   25.392806] 
[   25.393058] The buggy address belongs to the physical page:
[   25.393783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   25.394669] flags: 0x200000000000000(node=0|zone=2)
[   25.395140] page_type: f5(slab)
[   25.395696] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.396415] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.397176] page dumped because: kasan: bad access detected
[   25.397856] 
[   25.398105] Memory state around the buggy address:
[   25.398704]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.399432]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.400156] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.400860]                                      ^
[   25.401357]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.402070]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.402795] ==================================================================
[   23.189871] ==================================================================
[   23.190694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   23.191201] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.191849] 
[   23.192175] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.192308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.192352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.192416] Call Trace:
[   23.192472]  <TASK>
[   23.192523]  dump_stack_lvl+0x73/0xb0
[   23.192597]  print_report+0xd1/0x650
[   23.192668]  ? __virt_addr_valid+0x1db/0x2d0
[   23.192732]  ? kasan_atomics_helper+0xac7/0x5450
[   23.192790]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.192856]  ? kasan_atomics_helper+0xac7/0x5450
[   23.192941]  kasan_report+0x141/0x180
[   23.193146]  ? kasan_atomics_helper+0xac7/0x5450
[   23.193287]  kasan_check_range+0x10c/0x1c0
[   23.193418]  __kasan_check_write+0x18/0x20
[   23.193520]  kasan_atomics_helper+0xac7/0x5450
[   23.193631]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.193719]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.193795]  ? kasan_atomics+0x152/0x310
[   23.193879]  kasan_atomics+0x1dc/0x310
[   23.193976]  ? __pfx_kasan_atomics+0x10/0x10
[   23.194059]  ? __pfx_read_tsc+0x10/0x10
[   23.194138]  ? ktime_get_ts64+0x86/0x230
[   23.194255]  kunit_try_run_case+0x1a5/0x480
[   23.194364]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.194441]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.194523]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.194607]  ? __kthread_parkme+0x82/0x180
[   23.194680]  ? preempt_count_sub+0x50/0x80
[   23.194719]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.194750]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.194788]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.194827]  kthread+0x337/0x6f0
[   23.194856]  ? trace_preempt_on+0x20/0xc0
[   23.194913]  ? __pfx_kthread+0x10/0x10
[   23.194950]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.194985]  ? calculate_sigpending+0x7b/0xa0
[   23.195021]  ? __pfx_kthread+0x10/0x10
[   23.195053]  ret_from_fork+0x116/0x1d0
[   23.195081]  ? __pfx_kthread+0x10/0x10
[   23.195112]  ret_from_fork_asm+0x1a/0x30
[   23.195156]  </TASK>
[   23.195172] 
[   23.210807] Allocated by task 282:
[   23.211227]  kasan_save_stack+0x45/0x70
[   23.211662]  kasan_save_track+0x18/0x40
[   23.212154]  kasan_save_alloc_info+0x3b/0x50
[   23.212589]  __kasan_kmalloc+0xb7/0xc0
[   23.213061]  __kmalloc_cache_noprof+0x189/0x420
[   23.213571]  kasan_atomics+0x95/0x310
[   23.214023]  kunit_try_run_case+0x1a5/0x480
[   23.214456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.215138]  kthread+0x337/0x6f0
[   23.215512]  ret_from_fork+0x116/0x1d0
[   23.215954]  ret_from_fork_asm+0x1a/0x30
[   23.216290] 
[   23.216483] The buggy address belongs to the object at ffff888102b73d80
[   23.216483]  which belongs to the cache kmalloc-64 of size 64
[   23.217349] The buggy address is located 0 bytes to the right of
[   23.217349]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.218743] 
[   23.218959] The buggy address belongs to the physical page:
[   23.219338] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.219930] flags: 0x200000000000000(node=0|zone=2)
[   23.220417] page_type: f5(slab)
[   23.220696] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.221385] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.222135] page dumped because: kasan: bad access detected
[   23.222663] 
[   23.222944] Memory state around the buggy address:
[   23.223396]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.224051]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.224680] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.225371]                                      ^
[   23.225948]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.226565]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.227247] ==================================================================
[   22.815420] ==================================================================
[   22.817216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   22.818059] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   22.819238] 
[   22.819692] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.819994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.820036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.820073] Call Trace:
[   22.820099]  <TASK>
[   22.820122]  dump_stack_lvl+0x73/0xb0
[   22.820163]  print_report+0xd1/0x650
[   22.820197]  ? __virt_addr_valid+0x1db/0x2d0
[   22.820231]  ? kasan_atomics_helper+0x5fe/0x5450
[   22.820263]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.820296]  ? kasan_atomics_helper+0x5fe/0x5450
[   22.820330]  kasan_report+0x141/0x180
[   22.820363]  ? kasan_atomics_helper+0x5fe/0x5450
[   22.820401]  kasan_check_range+0x10c/0x1c0
[   22.820437]  __kasan_check_write+0x18/0x20
[   22.820466]  kasan_atomics_helper+0x5fe/0x5450
[   22.820500]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.820534]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.820566]  ? kasan_atomics+0x152/0x310
[   22.820601]  kasan_atomics+0x1dc/0x310
[   22.820651]  ? __pfx_kasan_atomics+0x10/0x10
[   22.820696]  ? __pfx_read_tsc+0x10/0x10
[   22.820732]  ? ktime_get_ts64+0x86/0x230
[   22.820769]  kunit_try_run_case+0x1a5/0x480
[   22.820801]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.820830]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.820868]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.820930]  ? __kthread_parkme+0x82/0x180
[   22.820970]  ? preempt_count_sub+0x50/0x80
[   22.821005]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.821038]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.821076]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.821113]  kthread+0x337/0x6f0
[   22.821142]  ? trace_preempt_on+0x20/0xc0
[   22.821175]  ? __pfx_kthread+0x10/0x10
[   22.821205]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.821240]  ? calculate_sigpending+0x7b/0xa0
[   22.821275]  ? __pfx_kthread+0x10/0x10
[   22.821306]  ret_from_fork+0x116/0x1d0
[   22.821333]  ? __pfx_kthread+0x10/0x10
[   22.821363]  ret_from_fork_asm+0x1a/0x30
[   22.821407]  </TASK>
[   22.821422] 
[   22.838285] Allocated by task 282:
[   22.838710]  kasan_save_stack+0x45/0x70
[   22.839160]  kasan_save_track+0x18/0x40
[   22.839572]  kasan_save_alloc_info+0x3b/0x50
[   22.840111]  __kasan_kmalloc+0xb7/0xc0
[   22.840585]  __kmalloc_cache_noprof+0x189/0x420
[   22.841129]  kasan_atomics+0x95/0x310
[   22.841509]  kunit_try_run_case+0x1a5/0x480
[   22.842076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.842503]  kthread+0x337/0x6f0
[   22.842876]  ret_from_fork+0x116/0x1d0
[   22.843452]  ret_from_fork_asm+0x1a/0x30
[   22.844006] 
[   22.844223] The buggy address belongs to the object at ffff888102b73d80
[   22.844223]  which belongs to the cache kmalloc-64 of size 64
[   22.845158] The buggy address is located 0 bytes to the right of
[   22.845158]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   22.846261] 
[   22.846460] The buggy address belongs to the physical page:
[   22.846953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   22.847698] flags: 0x200000000000000(node=0|zone=2)
[   22.848525] page_type: f5(slab)
[   22.848876] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.849489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.850475] page dumped because: kasan: bad access detected
[   22.851393] 
[   22.851584] Memory state around the buggy address:
[   22.851943]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.853847]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.854843] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.855454]                                      ^
[   22.855854]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.856494]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.857304] ==================================================================
[   23.273814] ==================================================================
[   23.274933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   23.275997] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.276538] 
[   23.277052] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.277189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.277253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.277349] Call Trace:
[   23.277407]  <TASK>
[   23.277458]  dump_stack_lvl+0x73/0xb0
[   23.277518]  print_report+0xd1/0x650
[   23.277554]  ? __virt_addr_valid+0x1db/0x2d0
[   23.277589]  ? kasan_atomics_helper+0xc70/0x5450
[   23.277671]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.277711]  ? kasan_atomics_helper+0xc70/0x5450
[   23.277745]  kasan_report+0x141/0x180
[   23.277783]  ? kasan_atomics_helper+0xc70/0x5450
[   23.277821]  kasan_check_range+0x10c/0x1c0
[   23.277857]  __kasan_check_write+0x18/0x20
[   23.277909]  kasan_atomics_helper+0xc70/0x5450
[   23.277951]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.277986]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.278018]  ? kasan_atomics+0x152/0x310
[   23.278050]  kasan_atomics+0x1dc/0x310
[   23.278078]  ? __pfx_kasan_atomics+0x10/0x10
[   23.278109]  ? __pfx_read_tsc+0x10/0x10
[   23.278143]  ? ktime_get_ts64+0x86/0x230
[   23.278178]  kunit_try_run_case+0x1a5/0x480
[   23.278209]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.278249]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.278288]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.278324]  ? __kthread_parkme+0x82/0x180
[   23.278355]  ? preempt_count_sub+0x50/0x80
[   23.278389]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.278419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.278456]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.278493]  kthread+0x337/0x6f0
[   23.278521]  ? trace_preempt_on+0x20/0xc0
[   23.278554]  ? __pfx_kthread+0x10/0x10
[   23.278584]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.278639]  ? calculate_sigpending+0x7b/0xa0
[   23.278687]  ? __pfx_kthread+0x10/0x10
[   23.278720]  ret_from_fork+0x116/0x1d0
[   23.278748]  ? __pfx_kthread+0x10/0x10
[   23.278777]  ret_from_fork_asm+0x1a/0x30
[   23.278821]  </TASK>
[   23.278838] 
[   23.294463] Allocated by task 282:
[   23.294758]  kasan_save_stack+0x45/0x70
[   23.295254]  kasan_save_track+0x18/0x40
[   23.295689]  kasan_save_alloc_info+0x3b/0x50
[   23.296186]  __kasan_kmalloc+0xb7/0xc0
[   23.296854]  __kmalloc_cache_noprof+0x189/0x420
[   23.297339]  kasan_atomics+0x95/0x310
[   23.297661]  kunit_try_run_case+0x1a5/0x480
[   23.298107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.298700]  kthread+0x337/0x6f0
[   23.299138]  ret_from_fork+0x116/0x1d0
[   23.299570]  ret_from_fork_asm+0x1a/0x30
[   23.300064] 
[   23.300259] The buggy address belongs to the object at ffff888102b73d80
[   23.300259]  which belongs to the cache kmalloc-64 of size 64
[   23.301159] The buggy address is located 0 bytes to the right of
[   23.301159]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.303250] 
[   23.303450] The buggy address belongs to the physical page:
[   23.304016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.304758] flags: 0x200000000000000(node=0|zone=2)
[   23.305296] page_type: f5(slab)
[   23.305690] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.306240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.306745] page dumped because: kasan: bad access detected
[   23.307971] 
[   23.308221] Memory state around the buggy address:
[   23.308619]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.310640]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.311291] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.311869]                                      ^
[   23.312388]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.313176]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.313849] ==================================================================
[   23.754774] ==================================================================
[   23.756234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   23.757063] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.758268] 
[   23.758504] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.758636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.758671] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.758706] Call Trace:
[   23.758730]  <TASK>
[   23.758753]  dump_stack_lvl+0x73/0xb0
[   23.758820]  print_report+0xd1/0x650
[   23.758870]  ? __virt_addr_valid+0x1db/0x2d0
[   23.758969]  ? kasan_atomics_helper+0x4a02/0x5450
[   23.759049]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.759102]  ? kasan_atomics_helper+0x4a02/0x5450
[   23.759136]  kasan_report+0x141/0x180
[   23.759170]  ? kasan_atomics_helper+0x4a02/0x5450
[   23.759210]  __asan_report_load4_noabort+0x18/0x20
[   23.759241]  kasan_atomics_helper+0x4a02/0x5450
[   23.759274]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.759308]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.759339]  ? kasan_atomics+0x152/0x310
[   23.759370]  kasan_atomics+0x1dc/0x310
[   23.759398]  ? __pfx_kasan_atomics+0x10/0x10
[   23.759428]  ? __pfx_read_tsc+0x10/0x10
[   23.759460]  ? ktime_get_ts64+0x86/0x230
[   23.759498]  kunit_try_run_case+0x1a5/0x480
[   23.759528]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.759558]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.759605]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.759669]  ? __kthread_parkme+0x82/0x180
[   23.759701]  ? preempt_count_sub+0x50/0x80
[   23.759736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.759768]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.759806]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.759845]  kthread+0x337/0x6f0
[   23.760049]  ? trace_preempt_on+0x20/0xc0
[   23.760100]  ? __pfx_kthread+0x10/0x10
[   23.760134]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.760170]  ? calculate_sigpending+0x7b/0xa0
[   23.760205]  ? __pfx_kthread+0x10/0x10
[   23.760239]  ret_from_fork+0x116/0x1d0
[   23.760267]  ? __pfx_kthread+0x10/0x10
[   23.760299]  ret_from_fork_asm+0x1a/0x30
[   23.760344]  </TASK>
[   23.760360] 
[   23.780863] Allocated by task 282:
[   23.781219]  kasan_save_stack+0x45/0x70
[   23.781665]  kasan_save_track+0x18/0x40
[   23.782484]  kasan_save_alloc_info+0x3b/0x50
[   23.783206]  __kasan_kmalloc+0xb7/0xc0
[   23.783588]  __kmalloc_cache_noprof+0x189/0x420
[   23.784315]  kasan_atomics+0x95/0x310
[   23.784933]  kunit_try_run_case+0x1a5/0x480
[   23.785493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.786172]  kthread+0x337/0x6f0
[   23.786585]  ret_from_fork+0x116/0x1d0
[   23.787295]  ret_from_fork_asm+0x1a/0x30
[   23.787927] 
[   23.788327] The buggy address belongs to the object at ffff888102b73d80
[   23.788327]  which belongs to the cache kmalloc-64 of size 64
[   23.789518] The buggy address is located 0 bytes to the right of
[   23.789518]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.790581] 
[   23.790792] The buggy address belongs to the physical page:
[   23.791440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.792205] flags: 0x200000000000000(node=0|zone=2)
[   23.792643] page_type: f5(slab)
[   23.793179] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.793919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.794793] page dumped because: kasan: bad access detected
[   23.795373] 
[   23.795650] Memory state around the buggy address:
[   23.796156]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.796939]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.797649] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.798292]                                      ^
[   23.798817]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.799498]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.800193] ==================================================================
[   24.128965] ==================================================================
[   24.129569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   24.130347] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.130987] 
[   24.131198] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.131368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.131443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.131514] Call Trace:
[   24.131574]  <TASK>
[   24.131690]  dump_stack_lvl+0x73/0xb0
[   24.131814]  print_report+0xd1/0x650
[   24.131914]  ? __virt_addr_valid+0x1db/0x2d0
[   24.132024]  ? kasan_atomics_helper+0x50d4/0x5450
[   24.132133]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.132214]  ? kasan_atomics_helper+0x50d4/0x5450
[   24.132276]  kasan_report+0x141/0x180
[   24.132332]  ? kasan_atomics_helper+0x50d4/0x5450
[   24.132419]  __asan_report_store8_noabort+0x1b/0x30
[   24.132527]  kasan_atomics_helper+0x50d4/0x5450
[   24.132680]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.132765]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.132892]  ? kasan_atomics+0x152/0x310
[   24.132983]  kasan_atomics+0x1dc/0x310
[   24.133055]  ? __pfx_kasan_atomics+0x10/0x10
[   24.133090]  ? __pfx_read_tsc+0x10/0x10
[   24.133125]  ? ktime_get_ts64+0x86/0x230
[   24.133161]  kunit_try_run_case+0x1a5/0x480
[   24.133195]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.133225]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.133266]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.133304]  ? __kthread_parkme+0x82/0x180
[   24.133335]  ? preempt_count_sub+0x50/0x80
[   24.133370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.133400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.133437]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.133474]  kthread+0x337/0x6f0
[   24.133504]  ? trace_preempt_on+0x20/0xc0
[   24.133537]  ? __pfx_kthread+0x10/0x10
[   24.133568]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.133655]  ? calculate_sigpending+0x7b/0xa0
[   24.133696]  ? __pfx_kthread+0x10/0x10
[   24.133729]  ret_from_fork+0x116/0x1d0
[   24.133757]  ? __pfx_kthread+0x10/0x10
[   24.133788]  ret_from_fork_asm+0x1a/0x30
[   24.133833]  </TASK>
[   24.133850] 
[   24.155266] Allocated by task 282:
[   24.155637]  kasan_save_stack+0x45/0x70
[   24.155983]  kasan_save_track+0x18/0x40
[   24.156293]  kasan_save_alloc_info+0x3b/0x50
[   24.157197]  __kasan_kmalloc+0xb7/0xc0
[   24.157641]  __kmalloc_cache_noprof+0x189/0x420
[   24.158401]  kasan_atomics+0x95/0x310
[   24.158769]  kunit_try_run_case+0x1a5/0x480
[   24.159266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.159878]  kthread+0x337/0x6f0
[   24.160216]  ret_from_fork+0x116/0x1d0
[   24.160610]  ret_from_fork_asm+0x1a/0x30
[   24.161254] 
[   24.161493] The buggy address belongs to the object at ffff888102b73d80
[   24.161493]  which belongs to the cache kmalloc-64 of size 64
[   24.162371] The buggy address is located 0 bytes to the right of
[   24.162371]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.163448] 
[   24.163840] The buggy address belongs to the physical page:
[   24.164660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.165469] flags: 0x200000000000000(node=0|zone=2)
[   24.165967] page_type: f5(slab)
[   24.166469] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.167574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.168174] page dumped because: kasan: bad access detected
[   24.168631] 
[   24.169380] Memory state around the buggy address:
[   24.169804]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.170533]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.171333] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.171919]                                      ^
[   24.172368]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.173058]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.173558] ==================================================================
[   24.639345] ==================================================================
[   24.639950] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   24.640493] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.641745] 
[   24.642424] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.642593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.642640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.642674] Call Trace:
[   24.642693]  <TASK>
[   24.642715]  dump_stack_lvl+0x73/0xb0
[   24.642752]  print_report+0xd1/0x650
[   24.642785]  ? __virt_addr_valid+0x1db/0x2d0
[   24.642820]  ? kasan_atomics_helper+0x1b22/0x5450
[   24.642880]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.642919]  ? kasan_atomics_helper+0x1b22/0x5450
[   24.642954]  kasan_report+0x141/0x180
[   24.642988]  ? kasan_atomics_helper+0x1b22/0x5450
[   24.643028]  kasan_check_range+0x10c/0x1c0
[   24.643064]  __kasan_check_write+0x18/0x20
[   24.643094]  kasan_atomics_helper+0x1b22/0x5450
[   24.643128]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.643163]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.643193]  ? kasan_atomics+0x152/0x310
[   24.643225]  kasan_atomics+0x1dc/0x310
[   24.643255]  ? __pfx_kasan_atomics+0x10/0x10
[   24.643284]  ? __pfx_read_tsc+0x10/0x10
[   24.643317]  ? ktime_get_ts64+0x86/0x230
[   24.643353]  kunit_try_run_case+0x1a5/0x480
[   24.643384]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.643413]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.643450]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.643487]  ? __kthread_parkme+0x82/0x180
[   24.643516]  ? preempt_count_sub+0x50/0x80
[   24.643550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.643591]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.643650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.643689]  kthread+0x337/0x6f0
[   24.643718]  ? trace_preempt_on+0x20/0xc0
[   24.643752]  ? __pfx_kthread+0x10/0x10
[   24.643783]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.643818]  ? calculate_sigpending+0x7b/0xa0
[   24.643875]  ? __pfx_kthread+0x10/0x10
[   24.643914]  ret_from_fork+0x116/0x1d0
[   24.643942]  ? __pfx_kthread+0x10/0x10
[   24.643974]  ret_from_fork_asm+0x1a/0x30
[   24.644018]  </TASK>
[   24.644033] 
[   24.663441] Allocated by task 282:
[   24.664315]  kasan_save_stack+0x45/0x70
[   24.664633]  kasan_save_track+0x18/0x40
[   24.665048]  kasan_save_alloc_info+0x3b/0x50
[   24.665437]  __kasan_kmalloc+0xb7/0xc0
[   24.666412]  __kmalloc_cache_noprof+0x189/0x420
[   24.666708]  kasan_atomics+0x95/0x310
[   24.667565]  kunit_try_run_case+0x1a5/0x480
[   24.668259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.668469]  kthread+0x337/0x6f0
[   24.668777]  ret_from_fork+0x116/0x1d0
[   24.669505]  ret_from_fork_asm+0x1a/0x30
[   24.670181] 
[   24.670475] The buggy address belongs to the object at ffff888102b73d80
[   24.670475]  which belongs to the cache kmalloc-64 of size 64
[   24.671897] The buggy address is located 0 bytes to the right of
[   24.671897]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.673059] 
[   24.673243] The buggy address belongs to the physical page:
[   24.673644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.674228] flags: 0x200000000000000(node=0|zone=2)
[   24.674617] page_type: f5(slab)
[   24.674957] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.675453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.676220] page dumped because: kasan: bad access detected
[   24.676593] 
[   24.676795] Memory state around the buggy address:
[   24.677177]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.677893]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.678488] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.679299]                                      ^
[   24.679887]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.680402]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.681128] ==================================================================
[   22.580797] ==================================================================
[   22.582384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   22.582873] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   22.583546] 
[   22.583775] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.583903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.584007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.584100] Call Trace:
[   22.584156]  <TASK>
[   22.584206]  dump_stack_lvl+0x73/0xb0
[   22.584294]  print_report+0xd1/0x650
[   22.584396]  ? __virt_addr_valid+0x1db/0x2d0
[   22.584511]  ? kasan_atomics_helper+0x3df/0x5450
[   22.584593]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.584724]  ? kasan_atomics_helper+0x3df/0x5450
[   22.584804]  kasan_report+0x141/0x180
[   22.584887]  ? kasan_atomics_helper+0x3df/0x5450
[   22.584978]  kasan_check_range+0x10c/0x1c0
[   22.585017]  __kasan_check_read+0x15/0x20
[   22.585047]  kasan_atomics_helper+0x3df/0x5450
[   22.585081]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.585115]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.585147]  ? kasan_atomics+0x152/0x310
[   22.585178]  kasan_atomics+0x1dc/0x310
[   22.585206]  ? __pfx_kasan_atomics+0x10/0x10
[   22.585236]  ? __pfx_read_tsc+0x10/0x10
[   22.585270]  ? ktime_get_ts64+0x86/0x230
[   22.585305]  kunit_try_run_case+0x1a5/0x480
[   22.585337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.585365]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.585403]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.585440]  ? __kthread_parkme+0x82/0x180
[   22.585470]  ? preempt_count_sub+0x50/0x80
[   22.585505]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.585535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.585571]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.585609]  kthread+0x337/0x6f0
[   22.585688]  ? trace_preempt_on+0x20/0xc0
[   22.585726]  ? __pfx_kthread+0x10/0x10
[   22.585757]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.585792]  ? calculate_sigpending+0x7b/0xa0
[   22.585827]  ? __pfx_kthread+0x10/0x10
[   22.585859]  ret_from_fork+0x116/0x1d0
[   22.585886]  ? __pfx_kthread+0x10/0x10
[   22.585943]  ret_from_fork_asm+0x1a/0x30
[   22.585991]  </TASK>
[   22.586007] 
[   22.601348] Allocated by task 282:
[   22.601703]  kasan_save_stack+0x45/0x70
[   22.602204]  kasan_save_track+0x18/0x40
[   22.602575]  kasan_save_alloc_info+0x3b/0x50
[   22.603111]  __kasan_kmalloc+0xb7/0xc0
[   22.603495]  __kmalloc_cache_noprof+0x189/0x420
[   22.604196]  kasan_atomics+0x95/0x310
[   22.604507]  kunit_try_run_case+0x1a5/0x480
[   22.604843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.605429]  kthread+0x337/0x6f0
[   22.605942]  ret_from_fork+0x116/0x1d0
[   22.606415]  ret_from_fork_asm+0x1a/0x30
[   22.606843] 
[   22.607235] The buggy address belongs to the object at ffff888102b73d80
[   22.607235]  which belongs to the cache kmalloc-64 of size 64
[   22.607966] The buggy address is located 0 bytes to the right of
[   22.607966]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   22.608693] 
[   22.608961] The buggy address belongs to the physical page:
[   22.609803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   22.610572] flags: 0x200000000000000(node=0|zone=2)
[   22.611106] page_type: f5(slab)
[   22.611399] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.611882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.612562] page dumped because: kasan: bad access detected
[   22.613161] 
[   22.614680] Memory state around the buggy address:
[   22.615182]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.617346]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.617742] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.618153]                                      ^
[   22.618504]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.618904]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.621858] ==================================================================
[   23.356026] ==================================================================
[   23.356447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   23.356725] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.357422] 
[   23.357999] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.358135] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.358176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.358250] Call Trace:
[   23.358304]  <TASK>
[   23.358342]  dump_stack_lvl+0x73/0xb0
[   23.358385]  print_report+0xd1/0x650
[   23.358420]  ? __virt_addr_valid+0x1db/0x2d0
[   23.358455]  ? kasan_atomics_helper+0xd47/0x5450
[   23.358537]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.358601]  ? kasan_atomics_helper+0xd47/0x5450
[   23.358683]  kasan_report+0x141/0x180
[   23.358769]  ? kasan_atomics_helper+0xd47/0x5450
[   23.358863]  kasan_check_range+0x10c/0x1c0
[   23.359070]  __kasan_check_write+0x18/0x20
[   23.359151]  kasan_atomics_helper+0xd47/0x5450
[   23.359235]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.359316]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.359393]  ? kasan_atomics+0x152/0x310
[   23.359474]  kasan_atomics+0x1dc/0x310
[   23.359549]  ? __pfx_kasan_atomics+0x10/0x10
[   23.359665]  ? __pfx_read_tsc+0x10/0x10
[   23.359746]  ? ktime_get_ts64+0x86/0x230
[   23.359868]  kunit_try_run_case+0x1a5/0x480
[   23.359970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.360084]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.360219]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.360372]  ? __kthread_parkme+0x82/0x180
[   23.360460]  ? preempt_count_sub+0x50/0x80
[   23.360693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.360782]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.360873]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.360979]  kthread+0x337/0x6f0
[   23.361055]  ? trace_preempt_on+0x20/0xc0
[   23.361135]  ? __pfx_kthread+0x10/0x10
[   23.361212]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.361258]  ? calculate_sigpending+0x7b/0xa0
[   23.361296]  ? __pfx_kthread+0x10/0x10
[   23.361329]  ret_from_fork+0x116/0x1d0
[   23.361357]  ? __pfx_kthread+0x10/0x10
[   23.361388]  ret_from_fork_asm+0x1a/0x30
[   23.361434]  </TASK>
[   23.361449] 
[   23.379096] Allocated by task 282:
[   23.379469]  kasan_save_stack+0x45/0x70
[   23.379802]  kasan_save_track+0x18/0x40
[   23.380302]  kasan_save_alloc_info+0x3b/0x50
[   23.380863]  __kasan_kmalloc+0xb7/0xc0
[   23.381361]  __kmalloc_cache_noprof+0x189/0x420
[   23.381911]  kasan_atomics+0x95/0x310
[   23.382340]  kunit_try_run_case+0x1a5/0x480
[   23.382739]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.383354]  kthread+0x337/0x6f0
[   23.383786]  ret_from_fork+0x116/0x1d0
[   23.384178]  ret_from_fork_asm+0x1a/0x30
[   23.384576] 
[   23.384945] The buggy address belongs to the object at ffff888102b73d80
[   23.384945]  which belongs to the cache kmalloc-64 of size 64
[   23.386454] The buggy address is located 0 bytes to the right of
[   23.386454]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.389196] 
[   23.389459] The buggy address belongs to the physical page:
[   23.390251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.391597] flags: 0x200000000000000(node=0|zone=2)
[   23.392086] page_type: f5(slab)
[   23.392419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.393583] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.394412] page dumped because: kasan: bad access detected
[   23.395194] 
[   23.395584] Memory state around the buggy address:
[   23.395971]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.396799]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.397575] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.398340]                                      ^
[   23.398731]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.399532]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.400311] ==================================================================
[   22.538899] ==================================================================
[   22.539529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   22.540330] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   22.541074] 
[   22.541431] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.541599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.541646] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.541711] Call Trace:
[   22.541820]  <TASK>
[   22.541902]  dump_stack_lvl+0x73/0xb0
[   22.542008]  print_report+0xd1/0x650
[   22.542146]  ? __virt_addr_valid+0x1db/0x2d0
[   22.542273]  ? kasan_atomics_helper+0x4b6e/0x5450
[   22.542345]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.542384]  ? kasan_atomics_helper+0x4b6e/0x5450
[   22.542421]  kasan_report+0x141/0x180
[   22.542456]  ? kasan_atomics_helper+0x4b6e/0x5450
[   22.542495]  __asan_report_store4_noabort+0x1b/0x30
[   22.542527]  kasan_atomics_helper+0x4b6e/0x5450
[   22.542562]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.542596]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.542633]  ? kasan_atomics+0x152/0x310
[   22.542708]  kasan_atomics+0x1dc/0x310
[   22.542738]  ? __pfx_kasan_atomics+0x10/0x10
[   22.542768]  ? __pfx_read_tsc+0x10/0x10
[   22.542802]  ? ktime_get_ts64+0x86/0x230
[   22.542837]  kunit_try_run_case+0x1a5/0x480
[   22.542869]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.542897]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.542965]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.543005]  ? __kthread_parkme+0x82/0x180
[   22.543037]  ? preempt_count_sub+0x50/0x80
[   22.543072]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.543103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.543139]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.543177]  kthread+0x337/0x6f0
[   22.543206]  ? trace_preempt_on+0x20/0xc0
[   22.543239]  ? __pfx_kthread+0x10/0x10
[   22.543269]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.543304]  ? calculate_sigpending+0x7b/0xa0
[   22.543340]  ? __pfx_kthread+0x10/0x10
[   22.543372]  ret_from_fork+0x116/0x1d0
[   22.543398]  ? __pfx_kthread+0x10/0x10
[   22.543429]  ret_from_fork_asm+0x1a/0x30
[   22.543471]  </TASK>
[   22.543487] 
[   22.562175] Allocated by task 282:
[   22.562557]  kasan_save_stack+0x45/0x70
[   22.563100]  kasan_save_track+0x18/0x40
[   22.563580]  kasan_save_alloc_info+0x3b/0x50
[   22.564150]  __kasan_kmalloc+0xb7/0xc0
[   22.564581]  __kmalloc_cache_noprof+0x189/0x420
[   22.565152]  kasan_atomics+0x95/0x310
[   22.565567]  kunit_try_run_case+0x1a5/0x480
[   22.566061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.566608]  kthread+0x337/0x6f0
[   22.567055]  ret_from_fork+0x116/0x1d0
[   22.567410]  ret_from_fork_asm+0x1a/0x30
[   22.567982] 
[   22.568251] The buggy address belongs to the object at ffff888102b73d80
[   22.568251]  which belongs to the cache kmalloc-64 of size 64
[   22.569249] The buggy address is located 0 bytes to the right of
[   22.569249]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   22.570326] 
[   22.570587] The buggy address belongs to the physical page:
[   22.571149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   22.571882] flags: 0x200000000000000(node=0|zone=2)
[   22.572345] page_type: f5(slab)
[   22.572788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.573525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.574249] page dumped because: kasan: bad access detected
[   22.574845] 
[   22.575152] Memory state around the buggy address:
[   22.575564]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.576191]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.576803] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.577435]                                      ^
[   22.577987]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.578611]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.579288] ==================================================================
[   23.671174] ==================================================================
[   23.671629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   23.673150] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.673791] 
[   23.674053] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.674186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.674246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.674312] Call Trace:
[   23.674368]  <TASK>
[   23.674421]  dump_stack_lvl+0x73/0xb0
[   23.674507]  print_report+0xd1/0x650
[   23.674580]  ? __virt_addr_valid+0x1db/0x2d0
[   23.674652]  ? kasan_atomics_helper+0x4a1c/0x5450
[   23.674717]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.674785]  ? kasan_atomics_helper+0x4a1c/0x5450
[   23.674851]  kasan_report+0x141/0x180
[   23.674950]  ? kasan_atomics_helper+0x4a1c/0x5450
[   23.675027]  __asan_report_load4_noabort+0x18/0x20
[   23.675118]  kasan_atomics_helper+0x4a1c/0x5450
[   23.675208]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.675290]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.675374]  ? kasan_atomics+0x152/0x310
[   23.675461]  kasan_atomics+0x1dc/0x310
[   23.675541]  ? __pfx_kasan_atomics+0x10/0x10
[   23.675618]  ? __pfx_read_tsc+0x10/0x10
[   23.675699]  ? ktime_get_ts64+0x86/0x230
[   23.675790]  kunit_try_run_case+0x1a5/0x480
[   23.675890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.675959]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.676035]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.676075]  ? __kthread_parkme+0x82/0x180
[   23.676108]  ? preempt_count_sub+0x50/0x80
[   23.676144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.676176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.676212]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.676249]  kthread+0x337/0x6f0
[   23.676279]  ? trace_preempt_on+0x20/0xc0
[   23.676311]  ? __pfx_kthread+0x10/0x10
[   23.676342]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.676377]  ? calculate_sigpending+0x7b/0xa0
[   23.676413]  ? __pfx_kthread+0x10/0x10
[   23.676444]  ret_from_fork+0x116/0x1d0
[   23.676471]  ? __pfx_kthread+0x10/0x10
[   23.676502]  ret_from_fork_asm+0x1a/0x30
[   23.676544]  </TASK>
[   23.676561] 
[   23.689200] Allocated by task 282:
[   23.689540]  kasan_save_stack+0x45/0x70
[   23.693230]  kasan_save_track+0x18/0x40
[   23.694680]  kasan_save_alloc_info+0x3b/0x50
[   23.696026]  __kasan_kmalloc+0xb7/0xc0
[   23.696386]  __kmalloc_cache_noprof+0x189/0x420
[   23.697730]  kasan_atomics+0x95/0x310
[   23.698502]  kunit_try_run_case+0x1a5/0x480
[   23.698976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.699495]  kthread+0x337/0x6f0
[   23.700326]  ret_from_fork+0x116/0x1d0
[   23.701241]  ret_from_fork_asm+0x1a/0x30
[   23.701649] 
[   23.701920] The buggy address belongs to the object at ffff888102b73d80
[   23.701920]  which belongs to the cache kmalloc-64 of size 64
[   23.702857] The buggy address is located 0 bytes to the right of
[   23.702857]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.703862] 
[   23.704125] The buggy address belongs to the physical page:
[   23.704545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.705262] flags: 0x200000000000000(node=0|zone=2)
[   23.705785] page_type: f5(slab)
[   23.706207] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.706853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.707486] page dumped because: kasan: bad access detected
[   23.708069] 
[   23.708282] Memory state around the buggy address:
[   23.708788]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.709431]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.710096] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.710706]                                      ^
[   23.711148]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.711818]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.712389] ==================================================================
[   24.548299] ==================================================================
[   24.548939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   24.549790] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.550309] 
[   24.550578] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.550746] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.550797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.550875] Call Trace:
[   24.550932]  <TASK>
[   24.550979]  dump_stack_lvl+0x73/0xb0
[   24.551054]  print_report+0xd1/0x650
[   24.551130]  ? __virt_addr_valid+0x1db/0x2d0
[   24.551204]  ? kasan_atomics_helper+0x19e3/0x5450
[   24.551272]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.551369]  ? kasan_atomics_helper+0x19e3/0x5450
[   24.551493]  kasan_report+0x141/0x180
[   24.551581]  ? kasan_atomics_helper+0x19e3/0x5450
[   24.551693]  kasan_check_range+0x10c/0x1c0
[   24.551778]  __kasan_check_write+0x18/0x20
[   24.551871]  kasan_atomics_helper+0x19e3/0x5450
[   24.551958]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.552043]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.552126]  ? kasan_atomics+0x152/0x310
[   24.552205]  kasan_atomics+0x1dc/0x310
[   24.552256]  ? __pfx_kasan_atomics+0x10/0x10
[   24.552327]  ? __pfx_read_tsc+0x10/0x10
[   24.552405]  ? ktime_get_ts64+0x86/0x230
[   24.552492]  kunit_try_run_case+0x1a5/0x480
[   24.552572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.552651]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.552736]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.552817]  ? __kthread_parkme+0x82/0x180
[   24.552920]  ? preempt_count_sub+0x50/0x80
[   24.553006]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.553087]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.553180]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.553266]  kthread+0x337/0x6f0
[   24.553337]  ? trace_preempt_on+0x20/0xc0
[   24.553419]  ? __pfx_kthread+0x10/0x10
[   24.553491]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.553568]  ? calculate_sigpending+0x7b/0xa0
[   24.553674]  ? __pfx_kthread+0x10/0x10
[   24.553750]  ret_from_fork+0x116/0x1d0
[   24.553820]  ? __pfx_kthread+0x10/0x10
[   24.553914]  ret_from_fork_asm+0x1a/0x30
[   24.553971]  </TASK>
[   24.553991] 
[   24.570797] Allocated by task 282:
[   24.571137]  kasan_save_stack+0x45/0x70
[   24.571474]  kasan_save_track+0x18/0x40
[   24.571806]  kasan_save_alloc_info+0x3b/0x50
[   24.572143]  __kasan_kmalloc+0xb7/0xc0
[   24.572423]  __kmalloc_cache_noprof+0x189/0x420
[   24.572738]  kasan_atomics+0x95/0x310
[   24.574421]  kunit_try_run_case+0x1a5/0x480
[   24.575191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.575772]  kthread+0x337/0x6f0
[   24.576174]  ret_from_fork+0x116/0x1d0
[   24.576339]  ret_from_fork_asm+0x1a/0x30
[   24.576505] 
[   24.576685] The buggy address belongs to the object at ffff888102b73d80
[   24.576685]  which belongs to the cache kmalloc-64 of size 64
[   24.578711] The buggy address is located 0 bytes to the right of
[   24.578711]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.579932] 
[   24.580221] The buggy address belongs to the physical page:
[   24.580995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.581895] flags: 0x200000000000000(node=0|zone=2)
[   24.582335] page_type: f5(slab)
[   24.582975] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.584144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.584845] page dumped because: kasan: bad access detected
[   24.585317] 
[   24.585534] Memory state around the buggy address:
[   24.586287]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.587163]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.587987] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.588573]                                      ^
[   24.589429]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.590069]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.590881] ==================================================================
[   22.488153] ==================================================================
[   22.489159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   22.489811] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   22.490632] 
[   22.490973] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.491089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.491126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.491179] Call Trace:
[   22.491226]  <TASK>
[   22.491264]  dump_stack_lvl+0x73/0xb0
[   22.491336]  print_report+0xd1/0x650
[   22.491410]  ? __virt_addr_valid+0x1db/0x2d0
[   22.491491]  ? kasan_atomics_helper+0x4b88/0x5450
[   22.491567]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.491644]  ? kasan_atomics_helper+0x4b88/0x5450
[   22.491721]  kasan_report+0x141/0x180
[   22.491802]  ? kasan_atomics_helper+0x4b88/0x5450
[   22.491892]  __asan_report_load4_noabort+0x18/0x20
[   22.492067]  kasan_atomics_helper+0x4b88/0x5450
[   22.492158]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.492233]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.492305]  ? kasan_atomics+0x152/0x310
[   22.492381]  kasan_atomics+0x1dc/0x310
[   22.492456]  ? __pfx_kasan_atomics+0x10/0x10
[   22.492528]  ? __pfx_read_tsc+0x10/0x10
[   22.492599]  ? ktime_get_ts64+0x86/0x230
[   22.492685]  kunit_try_run_case+0x1a5/0x480
[   22.492764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.492830]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.492929]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.493019]  ? __kthread_parkme+0x82/0x180
[   22.493097]  ? preempt_count_sub+0x50/0x80
[   22.493179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.493255]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.493425]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.493516]  kthread+0x337/0x6f0
[   22.493644]  ? trace_preempt_on+0x20/0xc0
[   22.493751]  ? __pfx_kthread+0x10/0x10
[   22.493828]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.493904]  ? calculate_sigpending+0x7b/0xa0
[   22.494005]  ? __pfx_kthread+0x10/0x10
[   22.494081]  ret_from_fork+0x116/0x1d0
[   22.494146]  ? __pfx_kthread+0x10/0x10
[   22.494219]  ret_from_fork_asm+0x1a/0x30
[   22.494327]  </TASK>
[   22.494424] 
[   22.516521] Allocated by task 282:
[   22.517283]  kasan_save_stack+0x45/0x70
[   22.518174]  kasan_save_track+0x18/0x40
[   22.518542]  kasan_save_alloc_info+0x3b/0x50
[   22.519009]  __kasan_kmalloc+0xb7/0xc0
[   22.520033]  __kmalloc_cache_noprof+0x189/0x420
[   22.520401]  kasan_atomics+0x95/0x310
[   22.521062]  kunit_try_run_case+0x1a5/0x480
[   22.521409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.522330]  kthread+0x337/0x6f0
[   22.522605]  ret_from_fork+0x116/0x1d0
[   22.523450]  ret_from_fork_asm+0x1a/0x30
[   22.524121] 
[   22.524340] The buggy address belongs to the object at ffff888102b73d80
[   22.524340]  which belongs to the cache kmalloc-64 of size 64
[   22.525467] The buggy address is located 0 bytes to the right of
[   22.525467]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   22.526701] 
[   22.526870] The buggy address belongs to the physical page:
[   22.527213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   22.527887] flags: 0x200000000000000(node=0|zone=2)
[   22.528521] page_type: f5(slab)
[   22.528986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.529717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.530259] page dumped because: kasan: bad access detected
[   22.530855] 
[   22.531228] Memory state around the buggy address:
[   22.531803]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.532523]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.533081] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.533858]                                      ^
[   22.534370]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.535141]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.535818] ==================================================================
[   23.713902] ==================================================================
[   23.714482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   23.716009] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.716758] 
[   23.717047] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.717181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.717226] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.717290] Call Trace:
[   23.717344]  <TASK>
[   23.717392]  dump_stack_lvl+0x73/0xb0
[   23.717479]  print_report+0xd1/0x650
[   23.717566]  ? __virt_addr_valid+0x1db/0x2d0
[   23.717698]  ? kasan_atomics_helper+0x1148/0x5450
[   23.717779]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.717865]  ? kasan_atomics_helper+0x1148/0x5450
[   23.717969]  kasan_report+0x141/0x180
[   23.718055]  ? kasan_atomics_helper+0x1148/0x5450
[   23.718143]  kasan_check_range+0x10c/0x1c0
[   23.718233]  __kasan_check_write+0x18/0x20
[   23.718302]  kasan_atomics_helper+0x1148/0x5450
[   23.718343]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.718380]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.718412]  ? kasan_atomics+0x152/0x310
[   23.718445]  kasan_atomics+0x1dc/0x310
[   23.718473]  ? __pfx_kasan_atomics+0x10/0x10
[   23.718503]  ? __pfx_read_tsc+0x10/0x10
[   23.718536]  ? ktime_get_ts64+0x86/0x230
[   23.718572]  kunit_try_run_case+0x1a5/0x480
[   23.718648]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.718686]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.718725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.718762]  ? __kthread_parkme+0x82/0x180
[   23.718793]  ? preempt_count_sub+0x50/0x80
[   23.718828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.718857]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.718921]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.718960]  kthread+0x337/0x6f0
[   23.718990]  ? trace_preempt_on+0x20/0xc0
[   23.719022]  ? __pfx_kthread+0x10/0x10
[   23.719053]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.719087]  ? calculate_sigpending+0x7b/0xa0
[   23.719122]  ? __pfx_kthread+0x10/0x10
[   23.719153]  ret_from_fork+0x116/0x1d0
[   23.719179]  ? __pfx_kthread+0x10/0x10
[   23.719210]  ret_from_fork_asm+0x1a/0x30
[   23.719253]  </TASK>
[   23.719268] 
[   23.733814] Allocated by task 282:
[   23.734208]  kasan_save_stack+0x45/0x70
[   23.734640]  kasan_save_track+0x18/0x40
[   23.735091]  kasan_save_alloc_info+0x3b/0x50
[   23.735537]  __kasan_kmalloc+0xb7/0xc0
[   23.736009]  __kmalloc_cache_noprof+0x189/0x420
[   23.736419]  kasan_atomics+0x95/0x310
[   23.736871]  kunit_try_run_case+0x1a5/0x480
[   23.737228]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.737637]  kthread+0x337/0x6f0
[   23.738218]  ret_from_fork+0x116/0x1d0
[   23.738652]  ret_from_fork_asm+0x1a/0x30
[   23.739223] 
[   23.739492] The buggy address belongs to the object at ffff888102b73d80
[   23.739492]  which belongs to the cache kmalloc-64 of size 64
[   23.740674] The buggy address is located 0 bytes to the right of
[   23.740674]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.741616] 
[   23.741810] The buggy address belongs to the physical page:
[   23.742196] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.742940] flags: 0x200000000000000(node=0|zone=2)
[   23.743496] page_type: f5(slab)
[   23.743959] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.744629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.746656] page dumped because: kasan: bad access detected
[   23.748041] 
[   23.748266] Memory state around the buggy address:
[   23.748708]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.749562]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.750492] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.751258]                                      ^
[   23.751859]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.752623]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.753228] ==================================================================
[   24.407452] ==================================================================
[   24.408079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   24.408961] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.409455] 
[   24.409764] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.409899] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.409939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.409996] Call Trace:
[   24.410048]  <TASK>
[   24.410098]  dump_stack_lvl+0x73/0xb0
[   24.410172]  print_report+0xd1/0x650
[   24.410263]  ? __virt_addr_valid+0x1db/0x2d0
[   24.410343]  ? kasan_atomics_helper+0x1818/0x5450
[   24.410490]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.410607]  ? kasan_atomics_helper+0x1818/0x5450
[   24.410735]  kasan_report+0x141/0x180
[   24.410839]  ? kasan_atomics_helper+0x1818/0x5450
[   24.410944]  kasan_check_range+0x10c/0x1c0
[   24.411063]  __kasan_check_write+0x18/0x20
[   24.411138]  kasan_atomics_helper+0x1818/0x5450
[   24.411224]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.411312]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.411391]  ? kasan_atomics+0x152/0x310
[   24.411472]  kasan_atomics+0x1dc/0x310
[   24.411546]  ? __pfx_kasan_atomics+0x10/0x10
[   24.411638]  ? __pfx_read_tsc+0x10/0x10
[   24.411716]  ? ktime_get_ts64+0x86/0x230
[   24.411803]  kunit_try_run_case+0x1a5/0x480
[   24.411902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.411975]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.412040]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.412116]  ? __kthread_parkme+0x82/0x180
[   24.412192]  ? preempt_count_sub+0x50/0x80
[   24.412280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.412362]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.412450]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.412538]  kthread+0x337/0x6f0
[   24.412639]  ? trace_preempt_on+0x20/0xc0
[   24.412804]  ? __pfx_kthread+0x10/0x10
[   24.412906]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.413040]  ? calculate_sigpending+0x7b/0xa0
[   24.413158]  ? __pfx_kthread+0x10/0x10
[   24.413239]  ret_from_fork+0x116/0x1d0
[   24.413370]  ? __pfx_kthread+0x10/0x10
[   24.413481]  ret_from_fork_asm+0x1a/0x30
[   24.413614]  </TASK>
[   24.413679] 
[   24.430945] Allocated by task 282:
[   24.431534]  kasan_save_stack+0x45/0x70
[   24.432005]  kasan_save_track+0x18/0x40
[   24.432514]  kasan_save_alloc_info+0x3b/0x50
[   24.433143]  __kasan_kmalloc+0xb7/0xc0
[   24.433598]  __kmalloc_cache_noprof+0x189/0x420
[   24.434036]  kasan_atomics+0x95/0x310
[   24.434560]  kunit_try_run_case+0x1a5/0x480
[   24.435066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.435674]  kthread+0x337/0x6f0
[   24.436248]  ret_from_fork+0x116/0x1d0
[   24.436685]  ret_from_fork_asm+0x1a/0x30
[   24.437135] 
[   24.437544] The buggy address belongs to the object at ffff888102b73d80
[   24.437544]  which belongs to the cache kmalloc-64 of size 64
[   24.438566] The buggy address is located 0 bytes to the right of
[   24.438566]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.439842] 
[   24.440227] The buggy address belongs to the physical page:
[   24.440926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.441427] flags: 0x200000000000000(node=0|zone=2)
[   24.441902] page_type: f5(slab)
[   24.442305] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.443209] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.444083] page dumped because: kasan: bad access detected
[   24.444711] 
[   24.444958] Memory state around the buggy address:
[   24.445538]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.446105]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.446571] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.447264]                                      ^
[   24.448103]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.448923]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.449371] ==================================================================
[   23.142046] ==================================================================
[   23.143254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   23.143518] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.143763] 
[   23.143874] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.144003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.144045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.144106] Call Trace:
[   23.144163]  <TASK>
[   23.144210]  dump_stack_lvl+0x73/0xb0
[   23.144300]  print_report+0xd1/0x650
[   23.144382]  ? __virt_addr_valid+0x1db/0x2d0
[   23.144464]  ? kasan_atomics_helper+0xa2b/0x5450
[   23.144630]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.144717]  ? kasan_atomics_helper+0xa2b/0x5450
[   23.144793]  kasan_report+0x141/0x180
[   23.144875]  ? kasan_atomics_helper+0xa2b/0x5450
[   23.144988]  kasan_check_range+0x10c/0x1c0
[   23.145070]  __kasan_check_write+0x18/0x20
[   23.145147]  kasan_atomics_helper+0xa2b/0x5450
[   23.145276]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.145429]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.145545]  ? kasan_atomics+0x152/0x310
[   23.145627]  kasan_atomics+0x1dc/0x310
[   23.145705]  ? __pfx_kasan_atomics+0x10/0x10
[   23.145771]  ? __pfx_read_tsc+0x10/0x10
[   23.145811]  ? ktime_get_ts64+0x86/0x230
[   23.145850]  kunit_try_run_case+0x1a5/0x480
[   23.145882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.145957]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.146025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.146099]  ? __kthread_parkme+0x82/0x180
[   23.146161]  ? preempt_count_sub+0x50/0x80
[   23.146241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.146313]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.146386]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.146485]  kthread+0x337/0x6f0
[   23.146549]  ? trace_preempt_on+0x20/0xc0
[   23.146654]  ? __pfx_kthread+0x10/0x10
[   23.146727]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.146796]  ? calculate_sigpending+0x7b/0xa0
[   23.146860]  ? __pfx_kthread+0x10/0x10
[   23.146948]  ret_from_fork+0x116/0x1d0
[   23.147013]  ? __pfx_kthread+0x10/0x10
[   23.147081]  ret_from_fork_asm+0x1a/0x30
[   23.147175]  </TASK>
[   23.147212] 
[   23.169818] Allocated by task 282:
[   23.170195]  kasan_save_stack+0x45/0x70
[   23.170879]  kasan_save_track+0x18/0x40
[   23.171423]  kasan_save_alloc_info+0x3b/0x50
[   23.171916]  __kasan_kmalloc+0xb7/0xc0
[   23.172513]  __kmalloc_cache_noprof+0x189/0x420
[   23.172873]  kasan_atomics+0x95/0x310
[   23.173385]  kunit_try_run_case+0x1a5/0x480
[   23.173830]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.174530]  kthread+0x337/0x6f0
[   23.174917]  ret_from_fork+0x116/0x1d0
[   23.175383]  ret_from_fork_asm+0x1a/0x30
[   23.176015] 
[   23.176212] The buggy address belongs to the object at ffff888102b73d80
[   23.176212]  which belongs to the cache kmalloc-64 of size 64
[   23.177363] The buggy address is located 0 bytes to the right of
[   23.177363]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.178523] 
[   23.178876] The buggy address belongs to the physical page:
[   23.179516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.180366] flags: 0x200000000000000(node=0|zone=2)
[   23.180746] page_type: f5(slab)
[   23.181149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.182375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.182993] page dumped because: kasan: bad access detected
[   23.183520] 
[   23.183837] Memory state around the buggy address:
[   23.184304]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.185074]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.185786] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.186420]                                      ^
[   23.187038]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.187733]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.188319] ==================================================================
[   25.042527] ==================================================================
[   25.043817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   25.044728] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   25.045416] 
[   25.045795] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   25.045961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.046056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.046153] Call Trace:
[   25.046223]  <TASK>
[   25.046276]  dump_stack_lvl+0x73/0xb0
[   25.046366]  print_report+0xd1/0x650
[   25.046448]  ? __virt_addr_valid+0x1db/0x2d0
[   25.046530]  ? kasan_atomics_helper+0x2006/0x5450
[   25.046628]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.046713]  ? kasan_atomics_helper+0x2006/0x5450
[   25.046902]  kasan_report+0x141/0x180
[   25.046980]  ? kasan_atomics_helper+0x2006/0x5450
[   25.047030]  kasan_check_range+0x10c/0x1c0
[   25.047069]  __kasan_check_write+0x18/0x20
[   25.047100]  kasan_atomics_helper+0x2006/0x5450
[   25.047134]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.047169]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.047201]  ? kasan_atomics+0x152/0x310
[   25.047235]  kasan_atomics+0x1dc/0x310
[   25.047263]  ? __pfx_kasan_atomics+0x10/0x10
[   25.047293]  ? __pfx_read_tsc+0x10/0x10
[   25.047326]  ? ktime_get_ts64+0x86/0x230
[   25.047362]  kunit_try_run_case+0x1a5/0x480
[   25.047393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.047424]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.047461]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.047500]  ? __kthread_parkme+0x82/0x180
[   25.047531]  ? preempt_count_sub+0x50/0x80
[   25.047579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.047636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.047677]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.047714]  kthread+0x337/0x6f0
[   25.047743]  ? trace_preempt_on+0x20/0xc0
[   25.047778]  ? __pfx_kthread+0x10/0x10
[   25.047809]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.047870]  ? calculate_sigpending+0x7b/0xa0
[   25.047910]  ? __pfx_kthread+0x10/0x10
[   25.047941]  ret_from_fork+0x116/0x1d0
[   25.047968]  ? __pfx_kthread+0x10/0x10
[   25.047998]  ret_from_fork_asm+0x1a/0x30
[   25.048042]  </TASK>
[   25.048059] 
[   25.065599] Allocated by task 282:
[   25.066003]  kasan_save_stack+0x45/0x70
[   25.066428]  kasan_save_track+0x18/0x40
[   25.066937]  kasan_save_alloc_info+0x3b/0x50
[   25.067377]  __kasan_kmalloc+0xb7/0xc0
[   25.067886]  __kmalloc_cache_noprof+0x189/0x420
[   25.068325]  kasan_atomics+0x95/0x310
[   25.068798]  kunit_try_run_case+0x1a5/0x480
[   25.069292]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.069910]  kthread+0x337/0x6f0
[   25.070306]  ret_from_fork+0x116/0x1d0
[   25.070828]  ret_from_fork_asm+0x1a/0x30
[   25.071231] 
[   25.071492] The buggy address belongs to the object at ffff888102b73d80
[   25.071492]  which belongs to the cache kmalloc-64 of size 64
[   25.072498] The buggy address is located 0 bytes to the right of
[   25.072498]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   25.073615] 
[   25.073812] The buggy address belongs to the physical page:
[   25.074378] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   25.075100] flags: 0x200000000000000(node=0|zone=2)
[   25.075580] page_type: f5(slab)
[   25.075952] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.076736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.077379] page dumped because: kasan: bad access detected
[   25.077952] 
[   25.078186] Memory state around the buggy address:
[   25.078725]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.080047]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.080918] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.081411]                                      ^
[   25.082298]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.083112]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.083960] ==================================================================
[   22.858616] ==================================================================
[   22.859173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   22.859813] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   22.861368] 
[   22.861653] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.861787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.861833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.861896] Call Trace:
[   22.861972]  <TASK>
[   22.862022]  dump_stack_lvl+0x73/0xb0
[   22.862108]  print_report+0xd1/0x650
[   22.862188]  ? __virt_addr_valid+0x1db/0x2d0
[   22.862275]  ? kasan_atomics_helper+0x697/0x5450
[   22.862353]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.862436]  ? kasan_atomics_helper+0x697/0x5450
[   22.862558]  kasan_report+0x141/0x180
[   22.862647]  ? kasan_atomics_helper+0x697/0x5450
[   22.862776]  kasan_check_range+0x10c/0x1c0
[   22.862865]  __kasan_check_write+0x18/0x20
[   22.862960]  kasan_atomics_helper+0x697/0x5450
[   22.863081]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.863169]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.863254]  ? kasan_atomics+0x152/0x310
[   22.863338]  kasan_atomics+0x1dc/0x310
[   22.863415]  ? __pfx_kasan_atomics+0x10/0x10
[   22.863496]  ? __pfx_read_tsc+0x10/0x10
[   22.863615]  ? ktime_get_ts64+0x86/0x230
[   22.863742]  kunit_try_run_case+0x1a5/0x480
[   22.863829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.863925]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.864059]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.864149]  ? __kthread_parkme+0x82/0x180
[   22.864233]  ? preempt_count_sub+0x50/0x80
[   22.864362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.864450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.864524]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.864565]  kthread+0x337/0x6f0
[   22.864595]  ? trace_preempt_on+0x20/0xc0
[   22.864650]  ? __pfx_kthread+0x10/0x10
[   22.864722]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.864761]  ? calculate_sigpending+0x7b/0xa0
[   22.864798]  ? __pfx_kthread+0x10/0x10
[   22.864830]  ret_from_fork+0x116/0x1d0
[   22.864857]  ? __pfx_kthread+0x10/0x10
[   22.864888]  ret_from_fork_asm+0x1a/0x30
[   22.864962]  </TASK>
[   22.864978] 
[   22.884741] Allocated by task 282:
[   22.886212]  kasan_save_stack+0x45/0x70
[   22.887858]  kasan_save_track+0x18/0x40
[   22.889763]  kasan_save_alloc_info+0x3b/0x50
[   22.891478]  __kasan_kmalloc+0xb7/0xc0
[   22.892429]  __kmalloc_cache_noprof+0x189/0x420
[   22.893590]  kasan_atomics+0x95/0x310
[   22.894887]  kunit_try_run_case+0x1a5/0x480
[   22.895953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.896741]  kthread+0x337/0x6f0
[   22.897053]  ret_from_fork+0x116/0x1d0
[   22.897368]  ret_from_fork_asm+0x1a/0x30
[   22.898097] 
[   22.898571] The buggy address belongs to the object at ffff888102b73d80
[   22.898571]  which belongs to the cache kmalloc-64 of size 64
[   22.899960] The buggy address is located 0 bytes to the right of
[   22.899960]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   22.901477] 
[   22.901676] The buggy address belongs to the physical page:
[   22.902223] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   22.903166] flags: 0x200000000000000(node=0|zone=2)
[   22.903557] page_type: f5(slab)
[   22.904655] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.905267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.906137] page dumped because: kasan: bad access detected
[   22.906778] 
[   22.907058] Memory state around the buggy address:
[   22.907500]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.908066]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.908682] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.909314]                                      ^
[   22.909816]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.910421]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.911072] ==================================================================
[   23.844529] ==================================================================
[   23.845253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   23.846171] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.846647] 
[   23.846893] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.847009] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.847043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.847098] Call Trace:
[   23.847145]  <TASK>
[   23.847215]  dump_stack_lvl+0x73/0xb0
[   23.847285]  print_report+0xd1/0x650
[   23.847355]  ? __virt_addr_valid+0x1db/0x2d0
[   23.847435]  ? kasan_atomics_helper+0x49e8/0x5450
[   23.847626]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.847762]  ? kasan_atomics_helper+0x49e8/0x5450
[   23.847928]  kasan_report+0x141/0x180
[   23.848017]  ? kasan_atomics_helper+0x49e8/0x5450
[   23.848116]  __asan_report_load4_noabort+0x18/0x20
[   23.848194]  kasan_atomics_helper+0x49e8/0x5450
[   23.848276]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.848360]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.848489]  ? kasan_atomics+0x152/0x310
[   23.848607]  kasan_atomics+0x1dc/0x310
[   23.848683]  ? __pfx_kasan_atomics+0x10/0x10
[   23.848765]  ? __pfx_read_tsc+0x10/0x10
[   23.848908]  ? ktime_get_ts64+0x86/0x230
[   23.849018]  kunit_try_run_case+0x1a5/0x480
[   23.849103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.849230]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.849346]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.849429]  ? __kthread_parkme+0x82/0x180
[   23.849497]  ? preempt_count_sub+0x50/0x80
[   23.849576]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.849656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.849782]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.849892]  kthread+0x337/0x6f0
[   23.849979]  ? trace_preempt_on+0x20/0xc0
[   23.850060]  ? __pfx_kthread+0x10/0x10
[   23.850195]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.850318]  ? calculate_sigpending+0x7b/0xa0
[   23.850401]  ? __pfx_kthread+0x10/0x10
[   23.850536]  ret_from_fork+0x116/0x1d0
[   23.850693]  ? __pfx_kthread+0x10/0x10
[   23.850858]  ret_from_fork_asm+0x1a/0x30
[   23.851122]  </TASK>
[   23.851165] 
[   23.869936] Allocated by task 282:
[   23.870346]  kasan_save_stack+0x45/0x70
[   23.871727]  kasan_save_track+0x18/0x40
[   23.872064]  kasan_save_alloc_info+0x3b/0x50
[   23.872613]  __kasan_kmalloc+0xb7/0xc0
[   23.873203]  __kmalloc_cache_noprof+0x189/0x420
[   23.873890]  kasan_atomics+0x95/0x310
[   23.874407]  kunit_try_run_case+0x1a5/0x480
[   23.875115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.875542]  kthread+0x337/0x6f0
[   23.876347]  ret_from_fork+0x116/0x1d0
[   23.876926]  ret_from_fork_asm+0x1a/0x30
[   23.877639] 
[   23.878155] The buggy address belongs to the object at ffff888102b73d80
[   23.878155]  which belongs to the cache kmalloc-64 of size 64
[   23.879309] The buggy address is located 0 bytes to the right of
[   23.879309]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.880749] 
[   23.881099] The buggy address belongs to the physical page:
[   23.881461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.882362] flags: 0x200000000000000(node=0|zone=2)
[   23.882990] page_type: f5(slab)
[   23.883406] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.884245] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.885056] page dumped because: kasan: bad access detected
[   23.885471] 
[   23.885788] Memory state around the buggy address:
[   23.886698]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.887301]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.887922] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.888805]                                      ^
[   23.889385]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.890206]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.891037] ==================================================================
[   24.451151] ==================================================================
[   24.452296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   24.453066] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.453654] 
[   24.453997] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.454109] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.454155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.454233] Call Trace:
[   24.454277]  <TASK>
[   24.454329]  dump_stack_lvl+0x73/0xb0
[   24.454415]  print_report+0xd1/0x650
[   24.454496]  ? __virt_addr_valid+0x1db/0x2d0
[   24.454666]  ? kasan_atomics_helper+0x18b1/0x5450
[   24.454768]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.454905]  ? kasan_atomics_helper+0x18b1/0x5450
[   24.455036]  kasan_report+0x141/0x180
[   24.455128]  ? kasan_atomics_helper+0x18b1/0x5450
[   24.455301]  kasan_check_range+0x10c/0x1c0
[   24.455398]  __kasan_check_write+0x18/0x20
[   24.455526]  kasan_atomics_helper+0x18b1/0x5450
[   24.455641]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.455724]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.455800]  ? kasan_atomics+0x152/0x310
[   24.455956]  kasan_atomics+0x1dc/0x310
[   24.456063]  ? __pfx_kasan_atomics+0x10/0x10
[   24.456175]  ? __pfx_read_tsc+0x10/0x10
[   24.456300]  ? ktime_get_ts64+0x86/0x230
[   24.456419]  kunit_try_run_case+0x1a5/0x480
[   24.456584]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.456666]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.456753]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.456923]  ? __kthread_parkme+0x82/0x180
[   24.457032]  ? preempt_count_sub+0x50/0x80
[   24.457197]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.457362]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.457485]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.457601]  kthread+0x337/0x6f0
[   24.457659]  ? trace_preempt_on+0x20/0xc0
[   24.457697]  ? __pfx_kthread+0x10/0x10
[   24.457728]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.457764]  ? calculate_sigpending+0x7b/0xa0
[   24.457801]  ? __pfx_kthread+0x10/0x10
[   24.457833]  ret_from_fork+0x116/0x1d0
[   24.457884]  ? __pfx_kthread+0x10/0x10
[   24.457920]  ret_from_fork_asm+0x1a/0x30
[   24.457966]  </TASK>
[   24.457981] 
[   24.475102] Allocated by task 282:
[   24.475568]  kasan_save_stack+0x45/0x70
[   24.476161]  kasan_save_track+0x18/0x40
[   24.476594]  kasan_save_alloc_info+0x3b/0x50
[   24.477153]  __kasan_kmalloc+0xb7/0xc0
[   24.477723]  __kmalloc_cache_noprof+0x189/0x420
[   24.478258]  kasan_atomics+0x95/0x310
[   24.478700]  kunit_try_run_case+0x1a5/0x480
[   24.479256]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.479887]  kthread+0x337/0x6f0
[   24.480203]  ret_from_fork+0x116/0x1d0
[   24.480974]  ret_from_fork_asm+0x1a/0x30
[   24.484490] 
[   24.484701] The buggy address belongs to the object at ffff888102b73d80
[   24.484701]  which belongs to the cache kmalloc-64 of size 64
[   24.487667] The buggy address is located 0 bytes to the right of
[   24.487667]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.489510] 
[   24.492106] The buggy address belongs to the physical page:
[   24.492363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.493169] flags: 0x200000000000000(node=0|zone=2)
[   24.493499] page_type: f5(slab)
[   24.493761] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.494189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.494761] page dumped because: kasan: bad access detected
[   24.495298] 
[   24.495530] Memory state around the buggy address:
[   24.496009]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.496613]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.497370] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.498075]                                      ^
[   24.498416]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.498839]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.499321] ==================================================================
[   23.228609] ==================================================================
[   23.230133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   23.230712] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.231424] 
[   23.231655] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.231787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.231852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.231949] Call Trace:
[   23.232004]  <TASK>
[   23.232048]  dump_stack_lvl+0x73/0xb0
[   23.232152]  print_report+0xd1/0x650
[   23.232264]  ? __virt_addr_valid+0x1db/0x2d0
[   23.232352]  ? kasan_atomics_helper+0xb6a/0x5450
[   23.232454]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.232571]  ? kasan_atomics_helper+0xb6a/0x5450
[   23.232656]  kasan_report+0x141/0x180
[   23.232739]  ? kasan_atomics_helper+0xb6a/0x5450
[   23.232884]  kasan_check_range+0x10c/0x1c0
[   23.232990]  __kasan_check_write+0x18/0x20
[   23.233071]  kasan_atomics_helper+0xb6a/0x5450
[   23.233206]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.233294]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.233376]  ? kasan_atomics+0x152/0x310
[   23.233458]  kasan_atomics+0x1dc/0x310
[   23.233536]  ? __pfx_kasan_atomics+0x10/0x10
[   23.233659]  ? __pfx_read_tsc+0x10/0x10
[   23.233740]  ? ktime_get_ts64+0x86/0x230
[   23.233827]  kunit_try_run_case+0x1a5/0x480
[   23.233922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.234000]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.234087]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.234171]  ? __kthread_parkme+0x82/0x180
[   23.234257]  ? preempt_count_sub+0x50/0x80
[   23.234322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.234398]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.234504]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.234626]  kthread+0x337/0x6f0
[   23.234708]  ? trace_preempt_on+0x20/0xc0
[   23.234794]  ? __pfx_kthread+0x10/0x10
[   23.234872]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.234977]  ? calculate_sigpending+0x7b/0xa0
[   23.235055]  ? __pfx_kthread+0x10/0x10
[   23.235137]  ret_from_fork+0x116/0x1d0
[   23.235211]  ? __pfx_kthread+0x10/0x10
[   23.235304]  ret_from_fork_asm+0x1a/0x30
[   23.235436]  </TASK>
[   23.235479] 
[   23.251482] Allocated by task 282:
[   23.252108]  kasan_save_stack+0x45/0x70
[   23.252570]  kasan_save_track+0x18/0x40
[   23.253177]  kasan_save_alloc_info+0x3b/0x50
[   23.255469]  __kasan_kmalloc+0xb7/0xc0
[   23.256537]  __kmalloc_cache_noprof+0x189/0x420
[   23.257542]  kasan_atomics+0x95/0x310
[   23.257959]  kunit_try_run_case+0x1a5/0x480
[   23.258519]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.259126]  kthread+0x337/0x6f0
[   23.259593]  ret_from_fork+0x116/0x1d0
[   23.260001]  ret_from_fork_asm+0x1a/0x30
[   23.260424] 
[   23.260657] The buggy address belongs to the object at ffff888102b73d80
[   23.260657]  which belongs to the cache kmalloc-64 of size 64
[   23.261533] The buggy address is located 0 bytes to the right of
[   23.261533]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.262483] 
[   23.262683] The buggy address belongs to the physical page:
[   23.263134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.263928] flags: 0x200000000000000(node=0|zone=2)
[   23.264411] page_type: f5(slab)
[   23.264966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.265647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.266249] page dumped because: kasan: bad access detected
[   23.266621] 
[   23.266974] Memory state around the buggy address:
[   23.267436]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.268198]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.268834] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.269334]                                      ^
[   23.270086]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.270690]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.271491] ==================================================================
[   22.408758] ==================================================================
[   22.409850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   22.410680] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   22.411777] 
[   22.412016] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.412145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.412185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.412248] Call Trace:
[   22.412290]  <TASK>
[   22.412358]  dump_stack_lvl+0x73/0xb0
[   22.412478]  print_report+0xd1/0x650
[   22.412604]  ? __virt_addr_valid+0x1db/0x2d0
[   22.412691]  ? kasan_atomics_helper+0x4bbc/0x5450
[   22.412763]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.412833]  ? kasan_atomics_helper+0x4bbc/0x5450
[   22.412905]  kasan_report+0x141/0x180
[   22.413002]  ? kasan_atomics_helper+0x4bbc/0x5450
[   22.413111]  __asan_report_load4_noabort+0x18/0x20
[   22.413150]  kasan_atomics_helper+0x4bbc/0x5450
[   22.413186]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.413238]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.413297]  ? kasan_atomics+0x152/0x310
[   22.413333]  kasan_atomics+0x1dc/0x310
[   22.413360]  ? __pfx_kasan_atomics+0x10/0x10
[   22.413392]  ? __pfx_read_tsc+0x10/0x10
[   22.413423]  ? ktime_get_ts64+0x86/0x230
[   22.413459]  kunit_try_run_case+0x1a5/0x480
[   22.413489]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.413516]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.413553]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.413589]  ? __kthread_parkme+0x82/0x180
[   22.413617]  ? preempt_count_sub+0x50/0x80
[   22.413692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.413727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.413766]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.413802]  kthread+0x337/0x6f0
[   22.413829]  ? trace_preempt_on+0x20/0xc0
[   22.413864]  ? __pfx_kthread+0x10/0x10
[   22.413893]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.413954]  ? calculate_sigpending+0x7b/0xa0
[   22.413993]  ? __pfx_kthread+0x10/0x10
[   22.414024]  ret_from_fork+0x116/0x1d0
[   22.414050]  ? __pfx_kthread+0x10/0x10
[   22.414078]  ret_from_fork_asm+0x1a/0x30
[   22.414122]  </TASK>
[   22.414140] 
[   22.429321] Allocated by task 282:
[   22.429774]  kasan_save_stack+0x45/0x70
[   22.430215]  kasan_save_track+0x18/0x40
[   22.430536]  kasan_save_alloc_info+0x3b/0x50
[   22.431229]  __kasan_kmalloc+0xb7/0xc0
[   22.431685]  __kmalloc_cache_noprof+0x189/0x420
[   22.432303]  kasan_atomics+0x95/0x310
[   22.432698]  kunit_try_run_case+0x1a5/0x480
[   22.433175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.433728]  kthread+0x337/0x6f0
[   22.434103]  ret_from_fork+0x116/0x1d0
[   22.434431]  ret_from_fork_asm+0x1a/0x30
[   22.434840] 
[   22.435100] The buggy address belongs to the object at ffff888102b73d80
[   22.435100]  which belongs to the cache kmalloc-64 of size 64
[   22.436154] The buggy address is located 0 bytes to the right of
[   22.436154]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   22.437440] 
[   22.437680] The buggy address belongs to the physical page:
[   22.438164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   22.438828] flags: 0x200000000000000(node=0|zone=2)
[   22.439332] page_type: f5(slab)
[   22.439626] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.440347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.441355] page dumped because: kasan: bad access detected
[   22.441897] 
[   22.442104] Memory state around the buggy address:
[   22.442453]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.443032]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.443647] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.444771]                                      ^
[   22.445434]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.446197]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.446902] ==================================================================
[   22.769148] ==================================================================
[   22.769852] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   22.771301] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   22.772082] 
[   22.772372] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.772544] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.772620] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.772704] Call Trace:
[   22.772763]  <TASK>
[   22.772823]  dump_stack_lvl+0x73/0xb0
[   22.772977]  print_report+0xd1/0x650
[   22.773064]  ? __virt_addr_valid+0x1db/0x2d0
[   22.773153]  ? kasan_atomics_helper+0x565/0x5450
[   22.773229]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.773313]  ? kasan_atomics_helper+0x565/0x5450
[   22.773394]  kasan_report+0x141/0x180
[   22.773477]  ? kasan_atomics_helper+0x565/0x5450
[   22.773607]  kasan_check_range+0x10c/0x1c0
[   22.773717]  __kasan_check_write+0x18/0x20
[   22.773836]  kasan_atomics_helper+0x565/0x5450
[   22.773942]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.774032]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.774112]  ? kasan_atomics+0x152/0x310
[   22.774182]  kasan_atomics+0x1dc/0x310
[   22.774215]  ? __pfx_kasan_atomics+0x10/0x10
[   22.774260]  ? __pfx_read_tsc+0x10/0x10
[   22.774295]  ? ktime_get_ts64+0x86/0x230
[   22.774333]  kunit_try_run_case+0x1a5/0x480
[   22.774368]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.774398]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.774439]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.774478]  ? __kthread_parkme+0x82/0x180
[   22.774510]  ? preempt_count_sub+0x50/0x80
[   22.774546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.774578]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.774614]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.774687]  kthread+0x337/0x6f0
[   22.774718]  ? trace_preempt_on+0x20/0xc0
[   22.774752]  ? __pfx_kthread+0x10/0x10
[   22.774784]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.774818]  ? calculate_sigpending+0x7b/0xa0
[   22.774854]  ? __pfx_kthread+0x10/0x10
[   22.774885]  ret_from_fork+0x116/0x1d0
[   22.774942]  ? __pfx_kthread+0x10/0x10
[   22.774976]  ret_from_fork_asm+0x1a/0x30
[   22.775022]  </TASK>
[   22.775038] 
[   22.791123] Allocated by task 282:
[   22.791566]  kasan_save_stack+0x45/0x70
[   22.792462]  kasan_save_track+0x18/0x40
[   22.794374]  kasan_save_alloc_info+0x3b/0x50
[   22.795799]  __kasan_kmalloc+0xb7/0xc0
[   22.796142]  __kmalloc_cache_noprof+0x189/0x420
[   22.796455]  kasan_atomics+0x95/0x310
[   22.796611]  kunit_try_run_case+0x1a5/0x480
[   22.798029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.798841]  kthread+0x337/0x6f0
[   22.799215]  ret_from_fork+0x116/0x1d0
[   22.799531]  ret_from_fork_asm+0x1a/0x30
[   22.800466] 
[   22.801025] The buggy address belongs to the object at ffff888102b73d80
[   22.801025]  which belongs to the cache kmalloc-64 of size 64
[   22.802115] The buggy address is located 0 bytes to the right of
[   22.802115]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   22.804137] 
[   22.804376] The buggy address belongs to the physical page:
[   22.805154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   22.806004] flags: 0x200000000000000(node=0|zone=2)
[   22.806599] page_type: f5(slab)
[   22.807254] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.807878] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.808723] page dumped because: kasan: bad access detected
[   22.809204] 
[   22.809417] Memory state around the buggy address:
[   22.810298]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.810812]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.811531] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.812280]                                      ^
[   22.812927]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.813667]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.814212] ==================================================================
[   23.893827] ==================================================================
[   23.894566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   23.895375] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.896589] 
[   23.897262] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.897394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.897745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.897782] Call Trace:
[   23.897806]  <TASK>
[   23.897830]  dump_stack_lvl+0x73/0xb0
[   23.897898]  print_report+0xd1/0x650
[   23.897938]  ? __virt_addr_valid+0x1db/0x2d0
[   23.897974]  ? kasan_atomics_helper+0x12e6/0x5450
[   23.898008]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.898042]  ? kasan_atomics_helper+0x12e6/0x5450
[   23.898076]  kasan_report+0x141/0x180
[   23.898109]  ? kasan_atomics_helper+0x12e6/0x5450
[   23.898149]  kasan_check_range+0x10c/0x1c0
[   23.898211]  __kasan_check_write+0x18/0x20
[   23.898257]  kasan_atomics_helper+0x12e6/0x5450
[   23.898291]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.898324]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.898356]  ? kasan_atomics+0x152/0x310
[   23.898387]  kasan_atomics+0x1dc/0x310
[   23.898415]  ? __pfx_kasan_atomics+0x10/0x10
[   23.898444]  ? __pfx_read_tsc+0x10/0x10
[   23.898477]  ? ktime_get_ts64+0x86/0x230
[   23.898513]  kunit_try_run_case+0x1a5/0x480
[   23.898544]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.898573]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.898649]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.898689]  ? __kthread_parkme+0x82/0x180
[   23.898722]  ? preempt_count_sub+0x50/0x80
[   23.898756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.898788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.898824]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.898860]  kthread+0x337/0x6f0
[   23.898918]  ? trace_preempt_on+0x20/0xc0
[   23.898954]  ? __pfx_kthread+0x10/0x10
[   23.898984]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.899019]  ? calculate_sigpending+0x7b/0xa0
[   23.899055]  ? __pfx_kthread+0x10/0x10
[   23.899087]  ret_from_fork+0x116/0x1d0
[   23.899113]  ? __pfx_kthread+0x10/0x10
[   23.899144]  ret_from_fork_asm+0x1a/0x30
[   23.899189]  </TASK>
[   23.899205] 
[   23.916520] Allocated by task 282:
[   23.916901]  kasan_save_stack+0x45/0x70
[   23.917738]  kasan_save_track+0x18/0x40
[   23.918295]  kasan_save_alloc_info+0x3b/0x50
[   23.918765]  __kasan_kmalloc+0xb7/0xc0
[   23.919376]  __kmalloc_cache_noprof+0x189/0x420
[   23.919932]  kasan_atomics+0x95/0x310
[   23.920323]  kunit_try_run_case+0x1a5/0x480
[   23.921006]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.921826]  kthread+0x337/0x6f0
[   23.922217]  ret_from_fork+0x116/0x1d0
[   23.922646]  ret_from_fork_asm+0x1a/0x30
[   23.923275] 
[   23.923525] The buggy address belongs to the object at ffff888102b73d80
[   23.923525]  which belongs to the cache kmalloc-64 of size 64
[   23.924937] The buggy address is located 0 bytes to the right of
[   23.924937]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.926121] 
[   23.926362] The buggy address belongs to the physical page:
[   23.927026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.927838] flags: 0x200000000000000(node=0|zone=2)
[   23.928361] page_type: f5(slab)
[   23.928710] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.929289] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.929837] page dumped because: kasan: bad access detected
[   23.930427] 
[   23.930782] Memory state around the buggy address:
[   23.931151]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.931994]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.932773] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.933319]                                      ^
[   23.933987]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.934713]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.935434] ==================================================================
[   23.451773] ==================================================================
[   23.453430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   23.455094] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.455914] 
[   23.456680] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.456753] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.456775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.456809] Call Trace:
[   23.456835]  <TASK>
[   23.456858]  dump_stack_lvl+0x73/0xb0
[   23.456925]  print_report+0xd1/0x650
[   23.456963]  ? __virt_addr_valid+0x1db/0x2d0
[   23.456996]  ? kasan_atomics_helper+0xe78/0x5450
[   23.457030]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.457063]  ? kasan_atomics_helper+0xe78/0x5450
[   23.457094]  kasan_report+0x141/0x180
[   23.457128]  ? kasan_atomics_helper+0xe78/0x5450
[   23.457166]  kasan_check_range+0x10c/0x1c0
[   23.457201]  __kasan_check_write+0x18/0x20
[   23.457231]  kasan_atomics_helper+0xe78/0x5450
[   23.457265]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.457300]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.457330]  ? kasan_atomics+0x152/0x310
[   23.457361]  kasan_atomics+0x1dc/0x310
[   23.457389]  ? __pfx_kasan_atomics+0x10/0x10
[   23.457419]  ? __pfx_read_tsc+0x10/0x10
[   23.457451]  ? ktime_get_ts64+0x86/0x230
[   23.457487]  kunit_try_run_case+0x1a5/0x480
[   23.457517]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.457546]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.457584]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.457648]  ? __kthread_parkme+0x82/0x180
[   23.457687]  ? preempt_count_sub+0x50/0x80
[   23.457723]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.457755]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.457793]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.457831]  kthread+0x337/0x6f0
[   23.457859]  ? trace_preempt_on+0x20/0xc0
[   23.457919]  ? __pfx_kthread+0x10/0x10
[   23.457954]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.457990]  ? calculate_sigpending+0x7b/0xa0
[   23.458026]  ? __pfx_kthread+0x10/0x10
[   23.458057]  ret_from_fork+0x116/0x1d0
[   23.458086]  ? __pfx_kthread+0x10/0x10
[   23.458117]  ret_from_fork_asm+0x1a/0x30
[   23.458161]  </TASK>
[   23.458177] 
[   23.477679] Allocated by task 282:
[   23.478278]  kasan_save_stack+0x45/0x70
[   23.478695]  kasan_save_track+0x18/0x40
[   23.479592]  kasan_save_alloc_info+0x3b/0x50
[   23.480189]  __kasan_kmalloc+0xb7/0xc0
[   23.480608]  __kmalloc_cache_noprof+0x189/0x420
[   23.481358]  kasan_atomics+0x95/0x310
[   23.481985]  kunit_try_run_case+0x1a5/0x480
[   23.482570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.483021]  kthread+0x337/0x6f0
[   23.483401]  ret_from_fork+0x116/0x1d0
[   23.484188]  ret_from_fork_asm+0x1a/0x30
[   23.484492] 
[   23.484722] The buggy address belongs to the object at ffff888102b73d80
[   23.484722]  which belongs to the cache kmalloc-64 of size 64
[   23.486188] The buggy address is located 0 bytes to the right of
[   23.486188]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.487591] 
[   23.487805] The buggy address belongs to the physical page:
[   23.488616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.489462] flags: 0x200000000000000(node=0|zone=2)
[   23.489985] page_type: f5(slab)
[   23.490256] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.491212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.492026] page dumped because: kasan: bad access detected
[   23.492593] 
[   23.492854] Memory state around the buggy address:
[   23.493469]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.494329]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.494907] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.495516]                                      ^
[   23.496258]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.496969]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.497807] ==================================================================
[   25.085165] ==================================================================
[   25.086871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   25.087488] Read of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   25.088095] 
[   25.088358] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   25.088462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.088483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.088515] Call Trace:
[   25.088538]  <TASK>
[   25.088569]  dump_stack_lvl+0x73/0xb0
[   25.089393]  print_report+0xd1/0x650
[   25.089431]  ? __virt_addr_valid+0x1db/0x2d0
[   25.089470]  ? kasan_atomics_helper+0x4f98/0x5450
[   25.089504]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.089537]  ? kasan_atomics_helper+0x4f98/0x5450
[   25.089590]  kasan_report+0x141/0x180
[   25.089640]  ? kasan_atomics_helper+0x4f98/0x5450
[   25.089680]  __asan_report_load8_noabort+0x18/0x20
[   25.089711]  kasan_atomics_helper+0x4f98/0x5450
[   25.089744]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.089779]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.089811]  ? kasan_atomics+0x152/0x310
[   25.089867]  kasan_atomics+0x1dc/0x310
[   25.089901]  ? __pfx_kasan_atomics+0x10/0x10
[   25.089932]  ? __pfx_read_tsc+0x10/0x10
[   25.089963]  ? ktime_get_ts64+0x86/0x230
[   25.090000]  kunit_try_run_case+0x1a5/0x480
[   25.090032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.090061]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.090099]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.090136]  ? __kthread_parkme+0x82/0x180
[   25.090168]  ? preempt_count_sub+0x50/0x80
[   25.090201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.090243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.090281]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.090318]  kthread+0x337/0x6f0
[   25.090346]  ? trace_preempt_on+0x20/0xc0
[   25.090380]  ? __pfx_kthread+0x10/0x10
[   25.090410]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.090444]  ? calculate_sigpending+0x7b/0xa0
[   25.090480]  ? __pfx_kthread+0x10/0x10
[   25.090510]  ret_from_fork+0x116/0x1d0
[   25.090536]  ? __pfx_kthread+0x10/0x10
[   25.090584]  ret_from_fork_asm+0x1a/0x30
[   25.090641]  </TASK>
[   25.090657] 
[   25.107918] Allocated by task 282:
[   25.108280]  kasan_save_stack+0x45/0x70
[   25.108785]  kasan_save_track+0x18/0x40
[   25.109139]  kasan_save_alloc_info+0x3b/0x50
[   25.109647]  __kasan_kmalloc+0xb7/0xc0
[   25.111612]  __kmalloc_cache_noprof+0x189/0x420
[   25.111990]  kasan_atomics+0x95/0x310
[   25.112531]  kunit_try_run_case+0x1a5/0x480
[   25.113252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.114040]  kthread+0x337/0x6f0
[   25.114572]  ret_from_fork+0x116/0x1d0
[   25.115167]  ret_from_fork_asm+0x1a/0x30
[   25.115599] 
[   25.116094] The buggy address belongs to the object at ffff888102b73d80
[   25.116094]  which belongs to the cache kmalloc-64 of size 64
[   25.117236] The buggy address is located 0 bytes to the right of
[   25.117236]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   25.118836] 
[   25.119184] The buggy address belongs to the physical page:
[   25.119445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   25.120523] flags: 0x200000000000000(node=0|zone=2)
[   25.121255] page_type: f5(slab)
[   25.121604] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.122566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.123377] page dumped because: kasan: bad access detected
[   25.123859] 
[   25.124419] Memory state around the buggy address:
[   25.124930]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.125519]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.126459] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.127235]                                      ^
[   25.127890]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.128695]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.129258] ==================================================================
[   23.044749] ==================================================================
[   23.045501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   23.046347] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.047922] 
[   23.048117] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.048187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.048207] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.048241] Call Trace:
[   23.048265]  <TASK>
[   23.048288]  dump_stack_lvl+0x73/0xb0
[   23.048328]  print_report+0xd1/0x650
[   23.048363]  ? __virt_addr_valid+0x1db/0x2d0
[   23.048398]  ? kasan_atomics_helper+0x8f9/0x5450
[   23.048431]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.048465]  ? kasan_atomics_helper+0x8f9/0x5450
[   23.048498]  kasan_report+0x141/0x180
[   23.048531]  ? kasan_atomics_helper+0x8f9/0x5450
[   23.048569]  kasan_check_range+0x10c/0x1c0
[   23.048605]  __kasan_check_write+0x18/0x20
[   23.048666]  kasan_atomics_helper+0x8f9/0x5450
[   23.048706]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.048740]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.048772]  ? kasan_atomics+0x152/0x310
[   23.048806]  kasan_atomics+0x1dc/0x310
[   23.048834]  ? __pfx_kasan_atomics+0x10/0x10
[   23.048864]  ? __pfx_read_tsc+0x10/0x10
[   23.048919]  ? ktime_get_ts64+0x86/0x230
[   23.048960]  kunit_try_run_case+0x1a5/0x480
[   23.048994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.049026]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.049064]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.049102]  ? __kthread_parkme+0x82/0x180
[   23.049133]  ? preempt_count_sub+0x50/0x80
[   23.049168]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.049199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.049236]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.049274]  kthread+0x337/0x6f0
[   23.049303]  ? trace_preempt_on+0x20/0xc0
[   23.049337]  ? __pfx_kthread+0x10/0x10
[   23.049369]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.049404]  ? calculate_sigpending+0x7b/0xa0
[   23.049440]  ? __pfx_kthread+0x10/0x10
[   23.049472]  ret_from_fork+0x116/0x1d0
[   23.049499]  ? __pfx_kthread+0x10/0x10
[   23.049529]  ret_from_fork_asm+0x1a/0x30
[   23.049573]  </TASK>
[   23.049590] 
[   23.070192] Allocated by task 282:
[   23.070494]  kasan_save_stack+0x45/0x70
[   23.071742]  kasan_save_track+0x18/0x40
[   23.072332]  kasan_save_alloc_info+0x3b/0x50
[   23.073047]  __kasan_kmalloc+0xb7/0xc0
[   23.073885]  __kmalloc_cache_noprof+0x189/0x420
[   23.074359]  kasan_atomics+0x95/0x310
[   23.074817]  kunit_try_run_case+0x1a5/0x480
[   23.075272]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.076016]  kthread+0x337/0x6f0
[   23.076370]  ret_from_fork+0x116/0x1d0
[   23.077171]  ret_from_fork_asm+0x1a/0x30
[   23.078145] 
[   23.078810] The buggy address belongs to the object at ffff888102b73d80
[   23.078810]  which belongs to the cache kmalloc-64 of size 64
[   23.079831] The buggy address is located 0 bytes to the right of
[   23.079831]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.081058] 
[   23.081309] The buggy address belongs to the physical page:
[   23.081867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.082864] flags: 0x200000000000000(node=0|zone=2)
[   23.083415] page_type: f5(slab)
[   23.084172] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.085330] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.086280] page dumped because: kasan: bad access detected
[   23.086875] 
[   23.087044] Memory state around the buggy address:
[   23.087512]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.088198]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.089212] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.089834]                                      ^
[   23.090293]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.090880]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.092008] ==================================================================
[   23.587816] ==================================================================
[   23.588863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   23.589668] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.590420] 
[   23.590623] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.590734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.590775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.590839] Call Trace:
[   23.590909]  <TASK>
[   23.590966]  dump_stack_lvl+0x73/0xb0
[   23.591049]  print_report+0xd1/0x650
[   23.591130]  ? __virt_addr_valid+0x1db/0x2d0
[   23.591207]  ? kasan_atomics_helper+0x4a36/0x5450
[   23.591280]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.591361]  ? kasan_atomics_helper+0x4a36/0x5450
[   23.591440]  kasan_report+0x141/0x180
[   23.591567]  ? kasan_atomics_helper+0x4a36/0x5450
[   23.591687]  __asan_report_load4_noabort+0x18/0x20
[   23.591771]  kasan_atomics_helper+0x4a36/0x5450
[   23.591856]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.592002]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.592082]  ? kasan_atomics+0x152/0x310
[   23.592165]  kasan_atomics+0x1dc/0x310
[   23.592281]  ? __pfx_kasan_atomics+0x10/0x10
[   23.592368]  ? __pfx_read_tsc+0x10/0x10
[   23.592445]  ? ktime_get_ts64+0x86/0x230
[   23.592531]  kunit_try_run_case+0x1a5/0x480
[   23.592657]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.592733]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.592816]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.592924]  ? __kthread_parkme+0x82/0x180
[   23.593049]  ? preempt_count_sub+0x50/0x80
[   23.593144]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.593225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.593347]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.593443]  kthread+0x337/0x6f0
[   23.593518]  ? trace_preempt_on+0x20/0xc0
[   23.593603]  ? __pfx_kthread+0x10/0x10
[   23.593738]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.593827]  ? calculate_sigpending+0x7b/0xa0
[   23.593934]  ? __pfx_kthread+0x10/0x10
[   23.594054]  ret_from_fork+0x116/0x1d0
[   23.594135]  ? __pfx_kthread+0x10/0x10
[   23.594214]  ret_from_fork_asm+0x1a/0x30
[   23.594311]  </TASK>
[   23.594331] 
[   23.609505] Allocated by task 282:
[   23.609936]  kasan_save_stack+0x45/0x70
[   23.610287]  kasan_save_track+0x18/0x40
[   23.610659]  kasan_save_alloc_info+0x3b/0x50
[   23.611157]  __kasan_kmalloc+0xb7/0xc0
[   23.611584]  __kmalloc_cache_noprof+0x189/0x420
[   23.612362]  kasan_atomics+0x95/0x310
[   23.612871]  kunit_try_run_case+0x1a5/0x480
[   23.613354]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.613854]  kthread+0x337/0x6f0
[   23.614323]  ret_from_fork+0x116/0x1d0
[   23.614798]  ret_from_fork_asm+0x1a/0x30
[   23.615273] 
[   23.615501] The buggy address belongs to the object at ffff888102b73d80
[   23.615501]  which belongs to the cache kmalloc-64 of size 64
[   23.616460] The buggy address is located 0 bytes to the right of
[   23.616460]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.617315] 
[   23.617512] The buggy address belongs to the physical page:
[   23.618432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.619200] flags: 0x200000000000000(node=0|zone=2)
[   23.619569] page_type: f5(slab)
[   23.619868] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.620612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.621280] page dumped because: kasan: bad access detected
[   23.622070] 
[   23.622358] Memory state around the buggy address:
[   23.622975]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.623460]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.624101] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.624907]                                      ^
[   23.625348]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.626105]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.626691] ==================================================================
[   25.177801] ==================================================================
[   25.178578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   25.179329] Read of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   25.179988] 
[   25.180281] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   25.180456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.180525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.180591] Call Trace:
[   25.180642]  <TASK>
[   25.180692]  dump_stack_lvl+0x73/0xb0
[   25.180768]  print_report+0xd1/0x650
[   25.180825]  ? __virt_addr_valid+0x1db/0x2d0
[   25.180926]  ? kasan_atomics_helper+0x4fb2/0x5450
[   25.181007]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.181090]  ? kasan_atomics_helper+0x4fb2/0x5450
[   25.181170]  kasan_report+0x141/0x180
[   25.181255]  ? kasan_atomics_helper+0x4fb2/0x5450
[   25.181344]  __asan_report_load8_noabort+0x18/0x20
[   25.181423]  kasan_atomics_helper+0x4fb2/0x5450
[   25.181506]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.181605]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.181730]  ? kasan_atomics+0x152/0x310
[   25.181816]  kasan_atomics+0x1dc/0x310
[   25.181911]  ? __pfx_kasan_atomics+0x10/0x10
[   25.181990]  ? __pfx_read_tsc+0x10/0x10
[   25.182064]  ? ktime_get_ts64+0x86/0x230
[   25.182147]  kunit_try_run_case+0x1a5/0x480
[   25.182234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.182311]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.182367]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.182408]  ? __kthread_parkme+0x82/0x180
[   25.182441]  ? preempt_count_sub+0x50/0x80
[   25.182475]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.182506]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.182545]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.182621]  kthread+0x337/0x6f0
[   25.182655]  ? trace_preempt_on+0x20/0xc0
[   25.182690]  ? __pfx_kthread+0x10/0x10
[   25.182721]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.182757]  ? calculate_sigpending+0x7b/0xa0
[   25.182793]  ? __pfx_kthread+0x10/0x10
[   25.182826]  ret_from_fork+0x116/0x1d0
[   25.182880]  ? __pfx_kthread+0x10/0x10
[   25.182912]  ret_from_fork_asm+0x1a/0x30
[   25.182957]  </TASK>
[   25.182974] 
[   25.197824] Allocated by task 282:
[   25.198263]  kasan_save_stack+0x45/0x70
[   25.198908]  kasan_save_track+0x18/0x40
[   25.199242]  kasan_save_alloc_info+0x3b/0x50
[   25.199582]  __kasan_kmalloc+0xb7/0xc0
[   25.200006]  __kmalloc_cache_noprof+0x189/0x420
[   25.200773]  kasan_atomics+0x95/0x310
[   25.201230]  kunit_try_run_case+0x1a5/0x480
[   25.201785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.202369]  kthread+0x337/0x6f0
[   25.202874]  ret_from_fork+0x116/0x1d0
[   25.203334]  ret_from_fork_asm+0x1a/0x30
[   25.203674] 
[   25.204913] The buggy address belongs to the object at ffff888102b73d80
[   25.204913]  which belongs to the cache kmalloc-64 of size 64
[   25.206913] The buggy address is located 0 bytes to the right of
[   25.206913]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   25.207914] 
[   25.208168] The buggy address belongs to the physical page:
[   25.208643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   25.209339] flags: 0x200000000000000(node=0|zone=2)
[   25.209867] page_type: f5(slab)
[   25.210265] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.210987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.211720] page dumped because: kasan: bad access detected
[   25.212216] 
[   25.212493] Memory state around the buggy address:
[   25.212953]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.213654]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.214293] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.214945]                                      ^
[   25.215439]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.216088]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.216794] ==================================================================
[   24.321036] ==================================================================
[   24.322073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   24.322936] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.323911] 
[   24.324196] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.324289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.324333] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.324399] Call Trace:
[   24.324453]  <TASK>
[   24.324481]  dump_stack_lvl+0x73/0xb0
[   24.324525]  print_report+0xd1/0x650
[   24.324560]  ? __virt_addr_valid+0x1db/0x2d0
[   24.324890]  ? kasan_atomics_helper+0x16e7/0x5450
[   24.324939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.324978]  ? kasan_atomics_helper+0x16e7/0x5450
[   24.325011]  kasan_report+0x141/0x180
[   24.325046]  ? kasan_atomics_helper+0x16e7/0x5450
[   24.325085]  kasan_check_range+0x10c/0x1c0
[   24.325123]  __kasan_check_write+0x18/0x20
[   24.325154]  kasan_atomics_helper+0x16e7/0x5450
[   24.325187]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.325221]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.325255]  ? kasan_atomics+0x152/0x310
[   24.325288]  kasan_atomics+0x1dc/0x310
[   24.325316]  ? __pfx_kasan_atomics+0x10/0x10
[   24.325345]  ? __pfx_read_tsc+0x10/0x10
[   24.325378]  ? ktime_get_ts64+0x86/0x230
[   24.325413]  kunit_try_run_case+0x1a5/0x480
[   24.325445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.325474]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.325511]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.325548]  ? __kthread_parkme+0x82/0x180
[   24.325584]  ? preempt_count_sub+0x50/0x80
[   24.325658]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.325691]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.325730]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.325768]  kthread+0x337/0x6f0
[   24.325797]  ? trace_preempt_on+0x20/0xc0
[   24.325831]  ? __pfx_kthread+0x10/0x10
[   24.325885]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.325925]  ? calculate_sigpending+0x7b/0xa0
[   24.325962]  ? __pfx_kthread+0x10/0x10
[   24.325995]  ret_from_fork+0x116/0x1d0
[   24.326023]  ? __pfx_kthread+0x10/0x10
[   24.326055]  ret_from_fork_asm+0x1a/0x30
[   24.326099]  </TASK>
[   24.326116] 
[   24.344072] Allocated by task 282:
[   24.344447]  kasan_save_stack+0x45/0x70
[   24.344963]  kasan_save_track+0x18/0x40
[   24.345446]  kasan_save_alloc_info+0x3b/0x50
[   24.345964]  __kasan_kmalloc+0xb7/0xc0
[   24.346432]  __kmalloc_cache_noprof+0x189/0x420
[   24.347009]  kasan_atomics+0x95/0x310
[   24.347461]  kunit_try_run_case+0x1a5/0x480
[   24.348016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.348410]  kthread+0x337/0x6f0
[   24.348752]  ret_from_fork+0x116/0x1d0
[   24.349157]  ret_from_fork_asm+0x1a/0x30
[   24.349771] 
[   24.350144] The buggy address belongs to the object at ffff888102b73d80
[   24.350144]  which belongs to the cache kmalloc-64 of size 64
[   24.351413] The buggy address is located 0 bytes to the right of
[   24.351413]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.352657] 
[   24.352851] The buggy address belongs to the physical page:
[   24.353248] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.354240] flags: 0x200000000000000(node=0|zone=2)
[   24.354886] page_type: f5(slab)
[   24.355275] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.356102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.356918] page dumped because: kasan: bad access detected
[   24.357490] 
[   24.357770] Memory state around the buggy address:
[   24.358347]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.359089]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.359635] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.360403]                                      ^
[   24.360917]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.361655]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.362331] ==================================================================
[   23.938150] ==================================================================
[   23.938953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   23.939585] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.940282] 
[   23.940667] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.940995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.941044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.941112] Call Trace:
[   23.941169]  <TASK>
[   23.941224]  dump_stack_lvl+0x73/0xb0
[   23.941312]  print_report+0xd1/0x650
[   23.941393]  ? __virt_addr_valid+0x1db/0x2d0
[   23.941468]  ? kasan_atomics_helper+0x49ce/0x5450
[   23.941506]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.941544]  ? kasan_atomics_helper+0x49ce/0x5450
[   23.941580]  kasan_report+0x141/0x180
[   23.941655]  ? kasan_atomics_helper+0x49ce/0x5450
[   23.941702]  __asan_report_load4_noabort+0x18/0x20
[   23.941734]  kasan_atomics_helper+0x49ce/0x5450
[   23.941769]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.941806]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.941837]  ? kasan_atomics+0x152/0x310
[   23.941892]  kasan_atomics+0x1dc/0x310
[   23.941930]  ? __pfx_kasan_atomics+0x10/0x10
[   23.941962]  ? __pfx_read_tsc+0x10/0x10
[   23.941996]  ? ktime_get_ts64+0x86/0x230
[   23.942034]  kunit_try_run_case+0x1a5/0x480
[   23.942066]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.942095]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.942134]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.942173]  ? __kthread_parkme+0x82/0x180
[   23.942204]  ? preempt_count_sub+0x50/0x80
[   23.942253]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.942286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.942324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.942362]  kthread+0x337/0x6f0
[   23.942390]  ? trace_preempt_on+0x20/0xc0
[   23.942424]  ? __pfx_kthread+0x10/0x10
[   23.942454]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.942488]  ? calculate_sigpending+0x7b/0xa0
[   23.942524]  ? __pfx_kthread+0x10/0x10
[   23.942555]  ret_from_fork+0x116/0x1d0
[   23.942581]  ? __pfx_kthread+0x10/0x10
[   23.942645]  ret_from_fork_asm+0x1a/0x30
[   23.942695]  </TASK>
[   23.942712] 
[   23.966588] Allocated by task 282:
[   23.967718]  kasan_save_stack+0x45/0x70
[   23.968136]  kasan_save_track+0x18/0x40
[   23.968745]  kasan_save_alloc_info+0x3b/0x50
[   23.969176]  __kasan_kmalloc+0xb7/0xc0
[   23.969561]  __kmalloc_cache_noprof+0x189/0x420
[   23.970307]  kasan_atomics+0x95/0x310
[   23.970937]  kunit_try_run_case+0x1a5/0x480
[   23.971515]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.972003]  kthread+0x337/0x6f0
[   23.972348]  ret_from_fork+0x116/0x1d0
[   23.973110]  ret_from_fork_asm+0x1a/0x30
[   23.973601] 
[   23.973865] The buggy address belongs to the object at ffff888102b73d80
[   23.973865]  which belongs to the cache kmalloc-64 of size 64
[   23.974954] The buggy address is located 0 bytes to the right of
[   23.974954]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.976335] 
[   23.976746] The buggy address belongs to the physical page:
[   23.977375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.978310] flags: 0x200000000000000(node=0|zone=2)
[   23.978926] page_type: f5(slab)
[   23.979288] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.980127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.980912] page dumped because: kasan: bad access detected
[   23.981557] 
[   23.981811] Memory state around the buggy address:
[   23.982594]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.983226]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.983998] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.984499]                                      ^
[   23.985300]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.985888]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.986608] ==================================================================
[   24.083007] ==================================================================
[   24.083515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   24.085761] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.087022] 
[   24.087828] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.088201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.088257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.088301] Call Trace:
[   24.088329]  <TASK>
[   24.088354]  dump_stack_lvl+0x73/0xb0
[   24.088397]  print_report+0xd1/0x650
[   24.088431]  ? __virt_addr_valid+0x1db/0x2d0
[   24.088465]  ? kasan_atomics_helper+0x1467/0x5450
[   24.088497]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.088530]  ? kasan_atomics_helper+0x1467/0x5450
[   24.088563]  kasan_report+0x141/0x180
[   24.088655]  ? kasan_atomics_helper+0x1467/0x5450
[   24.088701]  kasan_check_range+0x10c/0x1c0
[   24.088738]  __kasan_check_write+0x18/0x20
[   24.088768]  kasan_atomics_helper+0x1467/0x5450
[   24.088802]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.088837]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.088891]  ? kasan_atomics+0x152/0x310
[   24.088930]  kasan_atomics+0x1dc/0x310
[   24.088958]  ? __pfx_kasan_atomics+0x10/0x10
[   24.088989]  ? __pfx_read_tsc+0x10/0x10
[   24.089022]  ? ktime_get_ts64+0x86/0x230
[   24.089061]  kunit_try_run_case+0x1a5/0x480
[   24.089092]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.089121]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.089159]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.089197]  ? __kthread_parkme+0x82/0x180
[   24.089227]  ? preempt_count_sub+0x50/0x80
[   24.089262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.089293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.089331]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.089368]  kthread+0x337/0x6f0
[   24.089397]  ? trace_preempt_on+0x20/0xc0
[   24.089431]  ? __pfx_kthread+0x10/0x10
[   24.089462]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.089497]  ? calculate_sigpending+0x7b/0xa0
[   24.089533]  ? __pfx_kthread+0x10/0x10
[   24.089565]  ret_from_fork+0x116/0x1d0
[   24.089601]  ? __pfx_kthread+0x10/0x10
[   24.089657]  ret_from_fork_asm+0x1a/0x30
[   24.089704]  </TASK>
[   24.089721] 
[   24.110066] Allocated by task 282:
[   24.110423]  kasan_save_stack+0x45/0x70
[   24.110933]  kasan_save_track+0x18/0x40
[   24.111551]  kasan_save_alloc_info+0x3b/0x50
[   24.112210]  __kasan_kmalloc+0xb7/0xc0
[   24.112534]  __kmalloc_cache_noprof+0x189/0x420
[   24.113093]  kasan_atomics+0x95/0x310
[   24.113613]  kunit_try_run_case+0x1a5/0x480
[   24.114160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.114922]  kthread+0x337/0x6f0
[   24.115212]  ret_from_fork+0x116/0x1d0
[   24.115514]  ret_from_fork_asm+0x1a/0x30
[   24.116103] 
[   24.116263] The buggy address belongs to the object at ffff888102b73d80
[   24.116263]  which belongs to the cache kmalloc-64 of size 64
[   24.117310] The buggy address is located 0 bytes to the right of
[   24.117310]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.118320] 
[   24.118575] The buggy address belongs to the physical page:
[   24.119124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.119702] flags: 0x200000000000000(node=0|zone=2)
[   24.120295] page_type: f5(slab)
[   24.120792] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.121519] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.122270] page dumped because: kasan: bad access detected
[   24.122797] 
[   24.123054] Memory state around the buggy address:
[   24.123395]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.124125]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.124897] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.125520]                                      ^
[   24.126065]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.126819]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.127433] ==================================================================
[   24.501123] ==================================================================
[   24.502270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   24.503022] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.504224] 
[   24.504487] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.504612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.504732] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.504967] Call Trace:
[   24.505204]  <TASK>
[   24.505415]  dump_stack_lvl+0x73/0xb0
[   24.505584]  print_report+0xd1/0x650
[   24.505671]  ? __virt_addr_valid+0x1db/0x2d0
[   24.505752]  ? kasan_atomics_helper+0x194a/0x5450
[   24.505828]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.505931]  ? kasan_atomics_helper+0x194a/0x5450
[   24.506011]  kasan_report+0x141/0x180
[   24.506091]  ? kasan_atomics_helper+0x194a/0x5450
[   24.506182]  kasan_check_range+0x10c/0x1c0
[   24.506279]  __kasan_check_write+0x18/0x20
[   24.506354]  kasan_atomics_helper+0x194a/0x5450
[   24.506436]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.506516]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.506590]  ? kasan_atomics+0x152/0x310
[   24.506669]  kasan_atomics+0x1dc/0x310
[   24.506738]  ? __pfx_kasan_atomics+0x10/0x10
[   24.506811]  ? __pfx_read_tsc+0x10/0x10
[   24.506958]  ? ktime_get_ts64+0x86/0x230
[   24.507047]  kunit_try_run_case+0x1a5/0x480
[   24.507130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.507205]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.507294]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.507416]  ? __kthread_parkme+0x82/0x180
[   24.507498]  ? preempt_count_sub+0x50/0x80
[   24.507583]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.507847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.507979]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.508068]  kthread+0x337/0x6f0
[   24.508142]  ? trace_preempt_on+0x20/0xc0
[   24.508212]  ? __pfx_kthread+0x10/0x10
[   24.508248]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.508284]  ? calculate_sigpending+0x7b/0xa0
[   24.508320]  ? __pfx_kthread+0x10/0x10
[   24.508353]  ret_from_fork+0x116/0x1d0
[   24.508380]  ? __pfx_kthread+0x10/0x10
[   24.508412]  ret_from_fork_asm+0x1a/0x30
[   24.508457]  </TASK>
[   24.508475] 
[   24.529431] Allocated by task 282:
[   24.529812]  kasan_save_stack+0x45/0x70
[   24.530472]  kasan_save_track+0x18/0x40
[   24.530905]  kasan_save_alloc_info+0x3b/0x50
[   24.531952]  __kasan_kmalloc+0xb7/0xc0
[   24.532295]  __kmalloc_cache_noprof+0x189/0x420
[   24.532714]  kasan_atomics+0x95/0x310
[   24.533374]  kunit_try_run_case+0x1a5/0x480
[   24.533944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.534457]  kthread+0x337/0x6f0
[   24.535073]  ret_from_fork+0x116/0x1d0
[   24.535441]  ret_from_fork_asm+0x1a/0x30
[   24.535805] 
[   24.536069] The buggy address belongs to the object at ffff888102b73d80
[   24.536069]  which belongs to the cache kmalloc-64 of size 64
[   24.537041] The buggy address is located 0 bytes to the right of
[   24.537041]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.537985] 
[   24.538226] The buggy address belongs to the physical page:
[   24.538663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.539377] flags: 0x200000000000000(node=0|zone=2)
[   24.539918] page_type: f5(slab)
[   24.540252] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.540773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.541434] page dumped because: kasan: bad access detected
[   24.542087] 
[   24.542291] Memory state around the buggy address:
[   24.542640]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.543327]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.544300] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.545017]                                      ^
[   24.545366]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.546375]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.546971] ==================================================================
[   25.266144] ==================================================================
[   25.267117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   25.267938] Read of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   25.268533] 
[   25.268812] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   25.268961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.269009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.269071] Call Trace:
[   25.269126]  <TASK>
[   25.269177]  dump_stack_lvl+0x73/0xb0
[   25.269232]  print_report+0xd1/0x650
[   25.269283]  ? __virt_addr_valid+0x1db/0x2d0
[   25.269324]  ? kasan_atomics_helper+0x4fa5/0x5450
[   25.269394]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.269434]  ? kasan_atomics_helper+0x4fa5/0x5450
[   25.269470]  kasan_report+0x141/0x180
[   25.269504]  ? kasan_atomics_helper+0x4fa5/0x5450
[   25.269543]  __asan_report_load8_noabort+0x18/0x20
[   25.269910]  kasan_atomics_helper+0x4fa5/0x5450
[   25.270000]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.270051]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.270086]  ? kasan_atomics+0x152/0x310
[   25.270119]  kasan_atomics+0x1dc/0x310
[   25.270146]  ? __pfx_kasan_atomics+0x10/0x10
[   25.270177]  ? __pfx_read_tsc+0x10/0x10
[   25.270225]  ? ktime_get_ts64+0x86/0x230
[   25.270264]  kunit_try_run_case+0x1a5/0x480
[   25.270296]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.270326]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.270364]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.270402]  ? __kthread_parkme+0x82/0x180
[   25.270432]  ? preempt_count_sub+0x50/0x80
[   25.270467]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.270498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.270536]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.270620]  kthread+0x337/0x6f0
[   25.270656]  ? trace_preempt_on+0x20/0xc0
[   25.270691]  ? __pfx_kthread+0x10/0x10
[   25.270722]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.270757]  ? calculate_sigpending+0x7b/0xa0
[   25.270792]  ? __pfx_kthread+0x10/0x10
[   25.270825]  ret_from_fork+0x116/0x1d0
[   25.270880]  ? __pfx_kthread+0x10/0x10
[   25.270918]  ret_from_fork_asm+0x1a/0x30
[   25.270962]  </TASK>
[   25.270980] 
[   25.294226] Allocated by task 282:
[   25.295147]  kasan_save_stack+0x45/0x70
[   25.295593]  kasan_save_track+0x18/0x40
[   25.296027]  kasan_save_alloc_info+0x3b/0x50
[   25.296451]  __kasan_kmalloc+0xb7/0xc0
[   25.296831]  __kmalloc_cache_noprof+0x189/0x420
[   25.297866]  kasan_atomics+0x95/0x310
[   25.298198]  kunit_try_run_case+0x1a5/0x480
[   25.298546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.299609]  kthread+0x337/0x6f0
[   25.300095]  ret_from_fork+0x116/0x1d0
[   25.300635]  ret_from_fork_asm+0x1a/0x30
[   25.300948] 
[   25.301190] The buggy address belongs to the object at ffff888102b73d80
[   25.301190]  which belongs to the cache kmalloc-64 of size 64
[   25.302699] The buggy address is located 0 bytes to the right of
[   25.302699]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   25.303900] 
[   25.304143] The buggy address belongs to the physical page:
[   25.304596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   25.305251] flags: 0x200000000000000(node=0|zone=2)
[   25.305653] page_type: f5(slab)
[   25.306615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.307467] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.308154] page dumped because: kasan: bad access detected
[   25.308716] 
[   25.308957] Memory state around the buggy address:
[   25.309566]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.310178]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.310778] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.311330]                                      ^
[   25.311788]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.312788]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.313487] ==================================================================
[   24.721732] ==================================================================
[   24.722970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   24.723681] Read of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.724284] 
[   24.724516] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.724644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.724687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.724750] Call Trace:
[   24.724801]  <TASK>
[   24.724863]  dump_stack_lvl+0x73/0xb0
[   24.724952]  print_report+0xd1/0x650
[   24.725033]  ? __virt_addr_valid+0x1db/0x2d0
[   24.725112]  ? kasan_atomics_helper+0x4f30/0x5450
[   24.725191]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.725272]  ? kasan_atomics_helper+0x4f30/0x5450
[   24.725354]  kasan_report+0x141/0x180
[   24.725437]  ? kasan_atomics_helper+0x4f30/0x5450
[   24.725526]  __asan_report_load8_noabort+0x18/0x20
[   24.725655]  kasan_atomics_helper+0x4f30/0x5450
[   24.725748]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.725834]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.726782]  ? kasan_atomics+0x152/0x310
[   24.726896]  kasan_atomics+0x1dc/0x310
[   24.726978]  ? __pfx_kasan_atomics+0x10/0x10
[   24.727061]  ? __pfx_read_tsc+0x10/0x10
[   24.727137]  ? ktime_get_ts64+0x86/0x230
[   24.727225]  kunit_try_run_case+0x1a5/0x480
[   24.727268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.727300]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.727338]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.727377]  ? __kthread_parkme+0x82/0x180
[   24.727409]  ? preempt_count_sub+0x50/0x80
[   24.727444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.727476]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.727512]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.727549]  kthread+0x337/0x6f0
[   24.728030]  ? trace_preempt_on+0x20/0xc0
[   24.728150]  ? __pfx_kthread+0x10/0x10
[   24.728220]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.728260]  ? calculate_sigpending+0x7b/0xa0
[   24.728298]  ? __pfx_kthread+0x10/0x10
[   24.728331]  ret_from_fork+0x116/0x1d0
[   24.728359]  ? __pfx_kthread+0x10/0x10
[   24.728391]  ret_from_fork_asm+0x1a/0x30
[   24.728436]  </TASK>
[   24.728451] 
[   24.748215] Allocated by task 282:
[   24.748485]  kasan_save_stack+0x45/0x70
[   24.748795]  kasan_save_track+0x18/0x40
[   24.749344]  kasan_save_alloc_info+0x3b/0x50
[   24.751394]  __kasan_kmalloc+0xb7/0xc0
[   24.752142]  __kmalloc_cache_noprof+0x189/0x420
[   24.753151]  kasan_atomics+0x95/0x310
[   24.754002]  kunit_try_run_case+0x1a5/0x480
[   24.754335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.755925]  kthread+0x337/0x6f0
[   24.756758]  ret_from_fork+0x116/0x1d0
[   24.757813]  ret_from_fork_asm+0x1a/0x30
[   24.758749] 
[   24.759324] The buggy address belongs to the object at ffff888102b73d80
[   24.759324]  which belongs to the cache kmalloc-64 of size 64
[   24.761132] The buggy address is located 0 bytes to the right of
[   24.761132]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.762387] 
[   24.762677] The buggy address belongs to the physical page:
[   24.763319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.764062] flags: 0x200000000000000(node=0|zone=2)
[   24.764642] page_type: f5(slab)
[   24.765094] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.765868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.766601] page dumped because: kasan: bad access detected
[   24.767147] 
[   24.767468] Memory state around the buggy address:
[   24.768070]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.768758]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.769418] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.770123]                                      ^
[   24.770517]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.771068]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.771575] ==================================================================
[   25.218640] ==================================================================
[   25.219201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   25.220901] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   25.221502] 
[   25.221981] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   25.222348] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.222397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.222479] Call Trace:
[   25.222532]  <TASK>
[   25.222584]  dump_stack_lvl+0x73/0xb0
[   25.222671]  print_report+0xd1/0x650
[   25.222752]  ? __virt_addr_valid+0x1db/0x2d0
[   25.222883]  ? kasan_atomics_helper+0x218a/0x5450
[   25.222922]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.222959]  ? kasan_atomics_helper+0x218a/0x5450
[   25.222994]  kasan_report+0x141/0x180
[   25.223028]  ? kasan_atomics_helper+0x218a/0x5450
[   25.223067]  kasan_check_range+0x10c/0x1c0
[   25.223104]  __kasan_check_write+0x18/0x20
[   25.223133]  kasan_atomics_helper+0x218a/0x5450
[   25.223168]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.223203]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.223235]  ? kasan_atomics+0x152/0x310
[   25.223267]  kasan_atomics+0x1dc/0x310
[   25.223293]  ? __pfx_kasan_atomics+0x10/0x10
[   25.223324]  ? __pfx_read_tsc+0x10/0x10
[   25.223356]  ? ktime_get_ts64+0x86/0x230
[   25.223392]  kunit_try_run_case+0x1a5/0x480
[   25.223423]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.223453]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.223491]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.223528]  ? __kthread_parkme+0x82/0x180
[   25.223565]  ? preempt_count_sub+0x50/0x80
[   25.223711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.223746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.223787]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.223825]  kthread+0x337/0x6f0
[   25.223888]  ? trace_preempt_on+0x20/0xc0
[   25.223925]  ? __pfx_kthread+0x10/0x10
[   25.223957]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.223993]  ? calculate_sigpending+0x7b/0xa0
[   25.224029]  ? __pfx_kthread+0x10/0x10
[   25.224061]  ret_from_fork+0x116/0x1d0
[   25.224088]  ? __pfx_kthread+0x10/0x10
[   25.224120]  ret_from_fork_asm+0x1a/0x30
[   25.224164]  </TASK>
[   25.224180] 
[   25.244281] Allocated by task 282:
[   25.244624]  kasan_save_stack+0x45/0x70
[   25.244966]  kasan_save_track+0x18/0x40
[   25.245284]  kasan_save_alloc_info+0x3b/0x50
[   25.245634]  __kasan_kmalloc+0xb7/0xc0
[   25.246732]  __kmalloc_cache_noprof+0x189/0x420
[   25.247441]  kasan_atomics+0x95/0x310
[   25.248269]  kunit_try_run_case+0x1a5/0x480
[   25.249008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.249517]  kthread+0x337/0x6f0
[   25.250150]  ret_from_fork+0x116/0x1d0
[   25.250507]  ret_from_fork_asm+0x1a/0x30
[   25.250895] 
[   25.251094] The buggy address belongs to the object at ffff888102b73d80
[   25.251094]  which belongs to the cache kmalloc-64 of size 64
[   25.252122] The buggy address is located 0 bytes to the right of
[   25.252122]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   25.253200] 
[   25.253412] The buggy address belongs to the physical page:
[   25.254999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   25.255597] flags: 0x200000000000000(node=0|zone=2)
[   25.255985] page_type: f5(slab)
[   25.256259] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.257777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.258424] page dumped because: kasan: bad access detected
[   25.259337] 
[   25.259537] Memory state around the buggy address:
[   25.260314]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.261114]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.261997] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.262729]                                      ^
[   25.263302]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.263974]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.264533] ==================================================================
[   22.622745] ==================================================================
[   22.625708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   22.626251] Read of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   22.628100] 
[   22.628364] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.628483] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.628520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.628574] Call Trace:
[   22.628622]  <TASK>
[   22.628671]  dump_stack_lvl+0x73/0xb0
[   22.628739]  print_report+0xd1/0x650
[   22.628801]  ? __virt_addr_valid+0x1db/0x2d0
[   22.628873]  ? kasan_atomics_helper+0x4b54/0x5450
[   22.628955]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.629014]  ? kasan_atomics_helper+0x4b54/0x5450
[   22.629066]  kasan_report+0x141/0x180
[   22.629122]  ? kasan_atomics_helper+0x4b54/0x5450
[   22.629185]  __asan_report_load4_noabort+0x18/0x20
[   22.629238]  kasan_atomics_helper+0x4b54/0x5450
[   22.629308]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.629367]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.629422]  ? kasan_atomics+0x152/0x310
[   22.629481]  kasan_atomics+0x1dc/0x310
[   22.629529]  ? __pfx_kasan_atomics+0x10/0x10
[   22.629583]  ? __pfx_read_tsc+0x10/0x10
[   22.629637]  ? ktime_get_ts64+0x86/0x230
[   22.629699]  kunit_try_run_case+0x1a5/0x480
[   22.629753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.629803]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.629881]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.630694]  ? __kthread_parkme+0x82/0x180
[   22.630758]  ? preempt_count_sub+0x50/0x80
[   22.630851]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.630960]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.631043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.631086]  kthread+0x337/0x6f0
[   22.631121]  ? trace_preempt_on+0x20/0xc0
[   22.631156]  ? __pfx_kthread+0x10/0x10
[   22.631187]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.631223]  ? calculate_sigpending+0x7b/0xa0
[   22.631260]  ? __pfx_kthread+0x10/0x10
[   22.631291]  ret_from_fork+0x116/0x1d0
[   22.631317]  ? __pfx_kthread+0x10/0x10
[   22.631349]  ret_from_fork_asm+0x1a/0x30
[   22.631406]  </TASK>
[   22.631437] 
[   22.651591] Allocated by task 282:
[   22.652009]  kasan_save_stack+0x45/0x70
[   22.652350]  kasan_save_track+0x18/0x40
[   22.652803]  kasan_save_alloc_info+0x3b/0x50
[   22.653305]  __kasan_kmalloc+0xb7/0xc0
[   22.653713]  __kmalloc_cache_noprof+0x189/0x420
[   22.654152]  kasan_atomics+0x95/0x310
[   22.654524]  kunit_try_run_case+0x1a5/0x480
[   22.655050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.655591]  kthread+0x337/0x6f0
[   22.655894]  ret_from_fork+0x116/0x1d0
[   22.656343]  ret_from_fork_asm+0x1a/0x30
[   22.657146] 
[   22.657626] The buggy address belongs to the object at ffff888102b73d80
[   22.657626]  which belongs to the cache kmalloc-64 of size 64
[   22.659421] The buggy address is located 0 bytes to the right of
[   22.659421]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   22.660699] 
[   22.661157] The buggy address belongs to the physical page:
[   22.661614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   22.662390] flags: 0x200000000000000(node=0|zone=2)
[   22.662989] page_type: f5(slab)
[   22.663481] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.664919] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.665685] page dumped because: kasan: bad access detected
[   22.666443] 
[   22.666898] Memory state around the buggy address:
[   22.667366]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.667976]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.668592] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.669292]                                      ^
[   22.669690]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.670303]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.671058] ==================================================================
[   23.499914] ==================================================================
[   23.500443] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   23.501312] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   23.502202] 
[   23.502448] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.502576] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.502623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.502687] Call Trace:
[   23.503194]  <TASK>
[   23.503225]  dump_stack_lvl+0x73/0xb0
[   23.503268]  print_report+0xd1/0x650
[   23.503305]  ? __virt_addr_valid+0x1db/0x2d0
[   23.503340]  ? kasan_atomics_helper+0xf10/0x5450
[   23.503372]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.503408]  ? kasan_atomics_helper+0xf10/0x5450
[   23.503442]  kasan_report+0x141/0x180
[   23.503476]  ? kasan_atomics_helper+0xf10/0x5450
[   23.503514]  kasan_check_range+0x10c/0x1c0
[   23.503550]  __kasan_check_write+0x18/0x20
[   23.503579]  kasan_atomics_helper+0xf10/0x5450
[   23.503628]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.503682]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.503714]  ? kasan_atomics+0x152/0x310
[   23.503747]  kasan_atomics+0x1dc/0x310
[   23.503777]  ? __pfx_kasan_atomics+0x10/0x10
[   23.503806]  ? __pfx_read_tsc+0x10/0x10
[   23.503839]  ? ktime_get_ts64+0x86/0x230
[   23.503876]  kunit_try_run_case+0x1a5/0x480
[   23.503937]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.503970]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.504010]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.504048]  ? __kthread_parkme+0x82/0x180
[   23.504078]  ? preempt_count_sub+0x50/0x80
[   23.504113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.504144]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.504181]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.504218]  kthread+0x337/0x6f0
[   23.504247]  ? trace_preempt_on+0x20/0xc0
[   23.504281]  ? __pfx_kthread+0x10/0x10
[   23.504312]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.504346]  ? calculate_sigpending+0x7b/0xa0
[   23.504381]  ? __pfx_kthread+0x10/0x10
[   23.504412]  ret_from_fork+0x116/0x1d0
[   23.504441]  ? __pfx_kthread+0x10/0x10
[   23.504470]  ret_from_fork_asm+0x1a/0x30
[   23.504514]  </TASK>
[   23.504530] 
[   23.524505] Allocated by task 282:
[   23.524870]  kasan_save_stack+0x45/0x70
[   23.525311]  kasan_save_track+0x18/0x40
[   23.526104]  kasan_save_alloc_info+0x3b/0x50
[   23.526472]  __kasan_kmalloc+0xb7/0xc0
[   23.526904]  __kmalloc_cache_noprof+0x189/0x420
[   23.527583]  kasan_atomics+0x95/0x310
[   23.528106]  kunit_try_run_case+0x1a5/0x480
[   23.528533]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.529260]  kthread+0x337/0x6f0
[   23.529645]  ret_from_fork+0x116/0x1d0
[   23.530040]  ret_from_fork_asm+0x1a/0x30
[   23.530431] 
[   23.530654] The buggy address belongs to the object at ffff888102b73d80
[   23.530654]  which belongs to the cache kmalloc-64 of size 64
[   23.532076] The buggy address is located 0 bytes to the right of
[   23.532076]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.533297] 
[   23.533819] The buggy address belongs to the physical page:
[   23.534316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.535243] flags: 0x200000000000000(node=0|zone=2)
[   23.535898] page_type: f5(slab)
[   23.536223] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.537297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.538147] page dumped because: kasan: bad access detected
[   23.538814] 
[   23.539220] Memory state around the buggy address:
[   23.539821]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.540567]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.541356] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.542197]                                      ^
[   23.542615]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.543421]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.544181] ==================================================================
[   24.682625] ==================================================================
[   24.683114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   24.683917] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.684495] 
[   24.684723] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.684893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.684936] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.685194] Call Trace:
[   24.685246]  <TASK>
[   24.685288]  dump_stack_lvl+0x73/0xb0
[   24.685367]  print_report+0xd1/0x650
[   24.685444]  ? __virt_addr_valid+0x1db/0x2d0
[   24.685514]  ? kasan_atomics_helper+0x1c18/0x5450
[   24.685592]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.685677]  ? kasan_atomics_helper+0x1c18/0x5450
[   24.685761]  kasan_report+0x141/0x180
[   24.685844]  ? kasan_atomics_helper+0x1c18/0x5450
[   24.686022]  kasan_check_range+0x10c/0x1c0
[   24.686116]  __kasan_check_write+0x18/0x20
[   24.686273]  kasan_atomics_helper+0x1c18/0x5450
[   24.686368]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.686451]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.686531]  ? kasan_atomics+0x152/0x310
[   24.686615]  kasan_atomics+0x1dc/0x310
[   24.686693]  ? __pfx_kasan_atomics+0x10/0x10
[   24.686771]  ? __pfx_read_tsc+0x10/0x10
[   24.686892]  ? ktime_get_ts64+0x86/0x230
[   24.687053]  kunit_try_run_case+0x1a5/0x480
[   24.687140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.687196]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.687238]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.687278]  ? __kthread_parkme+0x82/0x180
[   24.687310]  ? preempt_count_sub+0x50/0x80
[   24.687345]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.687376]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.687415]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.687454]  kthread+0x337/0x6f0
[   24.687485]  ? trace_preempt_on+0x20/0xc0
[   24.687518]  ? __pfx_kthread+0x10/0x10
[   24.687549]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.687623]  ? calculate_sigpending+0x7b/0xa0
[   24.687665]  ? __pfx_kthread+0x10/0x10
[   24.687698]  ret_from_fork+0x116/0x1d0
[   24.687727]  ? __pfx_kthread+0x10/0x10
[   24.687757]  ret_from_fork_asm+0x1a/0x30
[   24.687801]  </TASK>
[   24.687818] 
[   24.703810] Allocated by task 282:
[   24.704205]  kasan_save_stack+0x45/0x70
[   24.704536]  kasan_save_track+0x18/0x40
[   24.704881]  kasan_save_alloc_info+0x3b/0x50
[   24.705566]  __kasan_kmalloc+0xb7/0xc0
[   24.706007]  __kmalloc_cache_noprof+0x189/0x420
[   24.706501]  kasan_atomics+0x95/0x310
[   24.706916]  kunit_try_run_case+0x1a5/0x480
[   24.707362]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.707998]  kthread+0x337/0x6f0
[   24.708426]  ret_from_fork+0x116/0x1d0
[   24.709037]  ret_from_fork_asm+0x1a/0x30
[   24.709381] 
[   24.709579] The buggy address belongs to the object at ffff888102b73d80
[   24.709579]  which belongs to the cache kmalloc-64 of size 64
[   24.710541] The buggy address is located 0 bytes to the right of
[   24.710541]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.711658] 
[   24.711934] The buggy address belongs to the physical page:
[   24.712362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.713295] flags: 0x200000000000000(node=0|zone=2)
[   24.713730] page_type: f5(slab)
[   24.714170] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.715063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.715707] page dumped because: kasan: bad access detected
[   24.716126] 
[   24.716318] Memory state around the buggy address:
[   24.716676]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.717402]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.718335] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.719043]                                      ^
[   24.719395]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.720009]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.720678] ==================================================================
[   24.821169] ==================================================================
[   24.821905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   24.822667] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.823720] 
[   24.824047] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.824382] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.824407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.824441] Call Trace:
[   24.824465]  <TASK>
[   24.824487]  dump_stack_lvl+0x73/0xb0
[   24.824526]  print_report+0xd1/0x650
[   24.824565]  ? __virt_addr_valid+0x1db/0x2d0
[   24.824648]  ? kasan_atomics_helper+0x1d7a/0x5450
[   24.824684]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.824719]  ? kasan_atomics_helper+0x1d7a/0x5450
[   24.824753]  kasan_report+0x141/0x180
[   24.824788]  ? kasan_atomics_helper+0x1d7a/0x5450
[   24.824827]  kasan_check_range+0x10c/0x1c0
[   24.824891]  __kasan_check_write+0x18/0x20
[   24.824925]  kasan_atomics_helper+0x1d7a/0x5450
[   24.824960]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.824994]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.825026]  ? kasan_atomics+0x152/0x310
[   24.825059]  kasan_atomics+0x1dc/0x310
[   24.825086]  ? __pfx_kasan_atomics+0x10/0x10
[   24.825116]  ? __pfx_read_tsc+0x10/0x10
[   24.825150]  ? ktime_get_ts64+0x86/0x230
[   24.825186]  kunit_try_run_case+0x1a5/0x480
[   24.825217]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.825246]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.825284]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.825321]  ? __kthread_parkme+0x82/0x180
[   24.825351]  ? preempt_count_sub+0x50/0x80
[   24.825385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.825416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.825453]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.825491]  kthread+0x337/0x6f0
[   24.825519]  ? trace_preempt_on+0x20/0xc0
[   24.825552]  ? __pfx_kthread+0x10/0x10
[   24.825621]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.825658]  ? calculate_sigpending+0x7b/0xa0
[   24.825694]  ? __pfx_kthread+0x10/0x10
[   24.825727]  ret_from_fork+0x116/0x1d0
[   24.825753]  ? __pfx_kthread+0x10/0x10
[   24.825784]  ret_from_fork_asm+0x1a/0x30
[   24.825827]  </TASK>
[   24.825844] 
[   24.842707] Allocated by task 282:
[   24.843216]  kasan_save_stack+0x45/0x70
[   24.843558]  kasan_save_track+0x18/0x40
[   24.844306]  kasan_save_alloc_info+0x3b/0x50
[   24.844820]  __kasan_kmalloc+0xb7/0xc0
[   24.845271]  __kmalloc_cache_noprof+0x189/0x420
[   24.845808]  kasan_atomics+0x95/0x310
[   24.846405]  kunit_try_run_case+0x1a5/0x480
[   24.847291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.847742]  kthread+0x337/0x6f0
[   24.848180]  ret_from_fork+0x116/0x1d0
[   24.848635]  ret_from_fork_asm+0x1a/0x30
[   24.849076] 
[   24.849324] The buggy address belongs to the object at ffff888102b73d80
[   24.849324]  which belongs to the cache kmalloc-64 of size 64
[   24.850408] The buggy address is located 0 bytes to the right of
[   24.850408]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.851466] 
[   24.851678] The buggy address belongs to the physical page:
[   24.852168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.852913] flags: 0x200000000000000(node=0|zone=2)
[   24.853451] page_type: f5(slab)
[   24.853919] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.854825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.855514] page dumped because: kasan: bad access detected
[   24.856037] 
[   24.856304] Memory state around the buggy address:
[   24.856877]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.857495]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.858149] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.858673]                                      ^
[   24.859212]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.859958]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.860551] ==================================================================
[   22.995284] ==================================================================
[   22.995869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   22.996466] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   22.999506] 
[   23.000173] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   23.000308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.000351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.000415] Call Trace:
[   23.000469]  <TASK>
[   23.000518]  dump_stack_lvl+0x73/0xb0
[   23.000602]  print_report+0xd1/0x650
[   23.000685]  ? __virt_addr_valid+0x1db/0x2d0
[   23.000767]  ? kasan_atomics_helper+0x860/0x5450
[   23.000842]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.000936]  ? kasan_atomics_helper+0x860/0x5450
[   23.001015]  kasan_report+0x141/0x180
[   23.001095]  ? kasan_atomics_helper+0x860/0x5450
[   23.001184]  kasan_check_range+0x10c/0x1c0
[   23.001240]  __kasan_check_write+0x18/0x20
[   23.001272]  kasan_atomics_helper+0x860/0x5450
[   23.001306]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.001340]  ? __kmalloc_cache_noprof+0x189/0x420
[   23.001371]  ? kasan_atomics+0x152/0x310
[   23.001404]  kasan_atomics+0x1dc/0x310
[   23.001435]  ? __pfx_kasan_atomics+0x10/0x10
[   23.001471]  ? __pfx_read_tsc+0x10/0x10
[   23.001505]  ? ktime_get_ts64+0x86/0x230
[   23.001542]  kunit_try_run_case+0x1a5/0x480
[   23.001573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.001602]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.001682]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.001723]  ? __kthread_parkme+0x82/0x180
[   23.001755]  ? preempt_count_sub+0x50/0x80
[   23.001791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.001822]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.001861]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.001969]  kthread+0x337/0x6f0
[   23.002010]  ? trace_preempt_on+0x20/0xc0
[   23.002046]  ? __pfx_kthread+0x10/0x10
[   23.002077]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.002113]  ? calculate_sigpending+0x7b/0xa0
[   23.002149]  ? __pfx_kthread+0x10/0x10
[   23.002180]  ret_from_fork+0x116/0x1d0
[   23.002207]  ? __pfx_kthread+0x10/0x10
[   23.002251]  ret_from_fork_asm+0x1a/0x30
[   23.002297]  </TASK>
[   23.002314] 
[   23.022422] Allocated by task 282:
[   23.023040]  kasan_save_stack+0x45/0x70
[   23.023437]  kasan_save_track+0x18/0x40
[   23.024075]  kasan_save_alloc_info+0x3b/0x50
[   23.024542]  __kasan_kmalloc+0xb7/0xc0
[   23.025135]  __kmalloc_cache_noprof+0x189/0x420
[   23.025941]  kasan_atomics+0x95/0x310
[   23.026450]  kunit_try_run_case+0x1a5/0x480
[   23.027075]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.027559]  kthread+0x337/0x6f0
[   23.027908]  ret_from_fork+0x116/0x1d0
[   23.028323]  ret_from_fork_asm+0x1a/0x30
[   23.028874] 
[   23.029407] The buggy address belongs to the object at ffff888102b73d80
[   23.029407]  which belongs to the cache kmalloc-64 of size 64
[   23.030805] The buggy address is located 0 bytes to the right of
[   23.030805]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   23.031720] 
[   23.031986] The buggy address belongs to the physical page:
[   23.032427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   23.033196] flags: 0x200000000000000(node=0|zone=2)
[   23.033959] page_type: f5(slab)
[   23.034247] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.035992] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.036719] page dumped because: kasan: bad access detected
[   23.037350] 
[   23.037798] Memory state around the buggy address:
[   23.038136]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.038770]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.039733] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.040481]                                      ^
[   23.040996]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.041694]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.042281] ==================================================================
[   24.220801] ==================================================================
[   24.222131] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   24.224038] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.226063] 
[   24.226324] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.226435] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.226468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.226519] Call Trace:
[   24.226564]  <TASK>
[   24.226606]  dump_stack_lvl+0x73/0xb0
[   24.226677]  print_report+0xd1/0x650
[   24.226733]  ? __virt_addr_valid+0x1db/0x2d0
[   24.226791]  ? kasan_atomics_helper+0x15b6/0x5450
[   24.226847]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.226950]  ? kasan_atomics_helper+0x15b6/0x5450
[   24.227008]  kasan_report+0x141/0x180
[   24.227065]  ? kasan_atomics_helper+0x15b6/0x5450
[   24.227132]  kasan_check_range+0x10c/0x1c0
[   24.227190]  __kasan_check_write+0x18/0x20
[   24.227255]  kasan_atomics_helper+0x15b6/0x5450
[   24.227339]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.227425]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.227549]  ? kasan_atomics+0x152/0x310
[   24.227689]  kasan_atomics+0x1dc/0x310
[   24.227767]  ? __pfx_kasan_atomics+0x10/0x10
[   24.227845]  ? __pfx_read_tsc+0x10/0x10
[   24.227960]  ? ktime_get_ts64+0x86/0x230
[   24.228038]  kunit_try_run_case+0x1a5/0x480
[   24.228106]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.228174]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.228246]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.228319]  ? __kthread_parkme+0x82/0x180
[   24.228378]  ? preempt_count_sub+0x50/0x80
[   24.228442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.228500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.228978]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.229046]  kthread+0x337/0x6f0
[   24.229100]  ? trace_preempt_on+0x20/0xc0
[   24.229159]  ? __pfx_kthread+0x10/0x10
[   24.229213]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.229270]  ? calculate_sigpending+0x7b/0xa0
[   24.229333]  ? __pfx_kthread+0x10/0x10
[   24.229402]  ret_from_fork+0x116/0x1d0
[   24.229450]  ? __pfx_kthread+0x10/0x10
[   24.229500]  ret_from_fork_asm+0x1a/0x30
[   24.229571]  </TASK>
[   24.229618] 
[   24.250561] Allocated by task 282:
[   24.250920]  kasan_save_stack+0x45/0x70
[   24.251348]  kasan_save_track+0x18/0x40
[   24.251814]  kasan_save_alloc_info+0x3b/0x50
[   24.252402]  __kasan_kmalloc+0xb7/0xc0
[   24.252981]  __kmalloc_cache_noprof+0x189/0x420
[   24.253347]  kasan_atomics+0x95/0x310
[   24.253681]  kunit_try_run_case+0x1a5/0x480
[   24.254036]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.254454]  kthread+0x337/0x6f0
[   24.255475]  ret_from_fork+0x116/0x1d0
[   24.256065]  ret_from_fork_asm+0x1a/0x30
[   24.256397] 
[   24.256618] The buggy address belongs to the object at ffff888102b73d80
[   24.256618]  which belongs to the cache kmalloc-64 of size 64
[   24.258190] The buggy address is located 0 bytes to the right of
[   24.258190]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.259773] 
[   24.259967] The buggy address belongs to the physical page:
[   24.260367] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.261717] flags: 0x200000000000000(node=0|zone=2)
[   24.262256] page_type: f5(slab)
[   24.262617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.263243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.264178] page dumped because: kasan: bad access detected
[   24.264916] 
[   24.265253] Memory state around the buggy address:
[   24.265578]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.266556]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.267141] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.268075]                                      ^
[   24.268470]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.269348]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.270121] ==================================================================
[   24.992795] ==================================================================
[   24.994496] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   24.995263] Read of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.996196] 
[   24.996318] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.996383] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.996402] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.996435] Call Trace:
[   24.996459]  <TASK>
[   24.996483]  dump_stack_lvl+0x73/0xb0
[   24.996522]  print_report+0xd1/0x650
[   24.996554]  ? __virt_addr_valid+0x1db/0x2d0
[   24.997164]  ? kasan_atomics_helper+0x4f71/0x5450
[   24.997227]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.997267]  ? kasan_atomics_helper+0x4f71/0x5450
[   24.997303]  kasan_report+0x141/0x180
[   24.997338]  ? kasan_atomics_helper+0x4f71/0x5450
[   24.997378]  __asan_report_load8_noabort+0x18/0x20
[   24.997409]  kasan_atomics_helper+0x4f71/0x5450
[   24.997443]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.997477]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.997509]  ? kasan_atomics+0x152/0x310
[   24.997543]  kasan_atomics+0x1dc/0x310
[   24.997578]  ? __pfx_kasan_atomics+0x10/0x10
[   24.997652]  ? __pfx_read_tsc+0x10/0x10
[   24.997688]  ? ktime_get_ts64+0x86/0x230
[   24.997728]  kunit_try_run_case+0x1a5/0x480
[   24.997762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.997793]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.997831]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.997921]  ? __kthread_parkme+0x82/0x180
[   24.997964]  ? preempt_count_sub+0x50/0x80
[   24.997999]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.998030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.998067]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.998105]  kthread+0x337/0x6f0
[   24.998135]  ? trace_preempt_on+0x20/0xc0
[   24.998169]  ? __pfx_kthread+0x10/0x10
[   24.998200]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.998249]  ? calculate_sigpending+0x7b/0xa0
[   24.998286]  ? __pfx_kthread+0x10/0x10
[   24.998318]  ret_from_fork+0x116/0x1d0
[   24.998345]  ? __pfx_kthread+0x10/0x10
[   24.998376]  ret_from_fork_asm+0x1a/0x30
[   24.998420]  </TASK>
[   24.998437] 
[   25.023730] Allocated by task 282:
[   25.025067]  kasan_save_stack+0x45/0x70
[   25.025480]  kasan_save_track+0x18/0x40
[   25.026014]  kasan_save_alloc_info+0x3b/0x50
[   25.026194]  __kasan_kmalloc+0xb7/0xc0
[   25.026364]  __kmalloc_cache_noprof+0x189/0x420
[   25.026535]  kasan_atomics+0x95/0x310
[   25.026718]  kunit_try_run_case+0x1a5/0x480
[   25.027227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.028889]  kthread+0x337/0x6f0
[   25.029500]  ret_from_fork+0x116/0x1d0
[   25.030128]  ret_from_fork_asm+0x1a/0x30
[   25.030509] 
[   25.030756] The buggy address belongs to the object at ffff888102b73d80
[   25.030756]  which belongs to the cache kmalloc-64 of size 64
[   25.031281] The buggy address is located 0 bytes to the right of
[   25.031281]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   25.031804] 
[   25.032026] The buggy address belongs to the physical page:
[   25.032540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   25.033326] flags: 0x200000000000000(node=0|zone=2)
[   25.033694] page_type: f5(slab)
[   25.034050] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.034858] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.035564] page dumped because: kasan: bad access detected
[   25.036134] 
[   25.036324] Memory state around the buggy address:
[   25.036688]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.037578]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.038305] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.039047]                                      ^
[   25.039661]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.040238]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.040956] ==================================================================
[   25.131025] ==================================================================
[   25.132004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   25.132784] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   25.133589] 
[   25.134329] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   25.134642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.134668] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.134701] Call Trace:
[   25.134726]  <TASK>
[   25.134745]  dump_stack_lvl+0x73/0xb0
[   25.134786]  print_report+0xd1/0x650
[   25.134821]  ? __virt_addr_valid+0x1db/0x2d0
[   25.134886]  ? kasan_atomics_helper+0x20c8/0x5450
[   25.134921]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.134956]  ? kasan_atomics_helper+0x20c8/0x5450
[   25.134988]  kasan_report+0x141/0x180
[   25.135021]  ? kasan_atomics_helper+0x20c8/0x5450
[   25.135060]  kasan_check_range+0x10c/0x1c0
[   25.135098]  __kasan_check_write+0x18/0x20
[   25.135127]  kasan_atomics_helper+0x20c8/0x5450
[   25.135161]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.135194]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.135225]  ? kasan_atomics+0x152/0x310
[   25.135257]  kasan_atomics+0x1dc/0x310
[   25.135284]  ? __pfx_kasan_atomics+0x10/0x10
[   25.135314]  ? __pfx_read_tsc+0x10/0x10
[   25.135346]  ? ktime_get_ts64+0x86/0x230
[   25.135381]  kunit_try_run_case+0x1a5/0x480
[   25.135412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.135441]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.135479]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.135517]  ? __kthread_parkme+0x82/0x180
[   25.135547]  ? preempt_count_sub+0x50/0x80
[   25.135620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.135656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.135694]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.135731]  kthread+0x337/0x6f0
[   25.135760]  ? trace_preempt_on+0x20/0xc0
[   25.135794]  ? __pfx_kthread+0x10/0x10
[   25.135824]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.135885]  ? calculate_sigpending+0x7b/0xa0
[   25.135924]  ? __pfx_kthread+0x10/0x10
[   25.135956]  ret_from_fork+0x116/0x1d0
[   25.135982]  ? __pfx_kthread+0x10/0x10
[   25.136012]  ret_from_fork_asm+0x1a/0x30
[   25.136056]  </TASK>
[   25.136072] 
[   25.158005] Allocated by task 282:
[   25.158157]  kasan_save_stack+0x45/0x70
[   25.158339]  kasan_save_track+0x18/0x40
[   25.158501]  kasan_save_alloc_info+0x3b/0x50
[   25.159195]  __kasan_kmalloc+0xb7/0xc0
[   25.160005]  __kmalloc_cache_noprof+0x189/0x420
[   25.160388]  kasan_atomics+0x95/0x310
[   25.160729]  kunit_try_run_case+0x1a5/0x480
[   25.161270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.161978]  kthread+0x337/0x6f0
[   25.162257]  ret_from_fork+0x116/0x1d0
[   25.163359]  ret_from_fork_asm+0x1a/0x30
[   25.163808] 
[   25.164366] The buggy address belongs to the object at ffff888102b73d80
[   25.164366]  which belongs to the cache kmalloc-64 of size 64
[   25.165521] The buggy address is located 0 bytes to the right of
[   25.165521]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   25.166958] 
[   25.167204] The buggy address belongs to the physical page:
[   25.167728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   25.168601] flags: 0x200000000000000(node=0|zone=2)
[   25.169262] page_type: f5(slab)
[   25.169795] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.170618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.171406] page dumped because: kasan: bad access detected
[   25.172074] 
[   25.172434] Memory state around the buggy address:
[   25.173066]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.173894]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.174491] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.175173]                                      ^
[   25.175634]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.176210]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.176771] ==================================================================
[   25.315055] ==================================================================
[   25.316107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   25.317068] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   25.318258] 
[   25.318447] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   25.318516] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.318535] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.319070] Call Trace:
[   25.319105]  <TASK>
[   25.319131]  dump_stack_lvl+0x73/0xb0
[   25.319174]  print_report+0xd1/0x650
[   25.319209]  ? __virt_addr_valid+0x1db/0x2d0
[   25.319245]  ? kasan_atomics_helper+0x224c/0x5450
[   25.319278]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.319312]  ? kasan_atomics_helper+0x224c/0x5450
[   25.319344]  kasan_report+0x141/0x180
[   25.319378]  ? kasan_atomics_helper+0x224c/0x5450
[   25.319416]  kasan_check_range+0x10c/0x1c0
[   25.319452]  __kasan_check_write+0x18/0x20
[   25.319481]  kasan_atomics_helper+0x224c/0x5450
[   25.319515]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.319550]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.319630]  ? kasan_atomics+0x152/0x310
[   25.319665]  kasan_atomics+0x1dc/0x310
[   25.319694]  ? __pfx_kasan_atomics+0x10/0x10
[   25.319724]  ? __pfx_read_tsc+0x10/0x10
[   25.319759]  ? ktime_get_ts64+0x86/0x230
[   25.319795]  kunit_try_run_case+0x1a5/0x480
[   25.319826]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.319886]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.319927]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.319966]  ? __kthread_parkme+0x82/0x180
[   25.319999]  ? preempt_count_sub+0x50/0x80
[   25.320034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.320066]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.320103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.320141]  kthread+0x337/0x6f0
[   25.320170]  ? trace_preempt_on+0x20/0xc0
[   25.320203]  ? __pfx_kthread+0x10/0x10
[   25.320234]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.320268]  ? calculate_sigpending+0x7b/0xa0
[   25.320304]  ? __pfx_kthread+0x10/0x10
[   25.320335]  ret_from_fork+0x116/0x1d0
[   25.320363]  ? __pfx_kthread+0x10/0x10
[   25.320393]  ret_from_fork_asm+0x1a/0x30
[   25.320435]  </TASK>
[   25.320451] 
[   25.340148] Allocated by task 282:
[   25.340910]  kasan_save_stack+0x45/0x70
[   25.341411]  kasan_save_track+0x18/0x40
[   25.342385]  kasan_save_alloc_info+0x3b/0x50
[   25.342800]  __kasan_kmalloc+0xb7/0xc0
[   25.343402]  __kmalloc_cache_noprof+0x189/0x420
[   25.344068]  kasan_atomics+0x95/0x310
[   25.344370]  kunit_try_run_case+0x1a5/0x480
[   25.345217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.345584]  kthread+0x337/0x6f0
[   25.346304]  ret_from_fork+0x116/0x1d0
[   25.346866]  ret_from_fork_asm+0x1a/0x30
[   25.347553] 
[   25.348069] The buggy address belongs to the object at ffff888102b73d80
[   25.348069]  which belongs to the cache kmalloc-64 of size 64
[   25.349062] The buggy address is located 0 bytes to the right of
[   25.349062]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   25.350498] 
[   25.351033] The buggy address belongs to the physical page:
[   25.351443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   25.352542] flags: 0x200000000000000(node=0|zone=2)
[   25.353091] page_type: f5(slab)
[   25.353454] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.354250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.354811] page dumped because: kasan: bad access detected
[   25.355345] 
[   25.355653] Memory state around the buggy address:
[   25.356111]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.357062]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.358045] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.358565]                                      ^
[   25.359175]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.359710]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.360551] ==================================================================
[   22.720534] ==================================================================
[   22.721528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   22.722669] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   22.723602] 
[   22.724217] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.724342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.724386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.724449] Call Trace:
[   22.724501]  <TASK>
[   22.724784]  dump_stack_lvl+0x73/0xb0
[   22.724857]  print_report+0xd1/0x650
[   22.724896]  ? __virt_addr_valid+0x1db/0x2d0
[   22.724962]  ? kasan_atomics_helper+0x4b3a/0x5450
[   22.724997]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.725032]  ? kasan_atomics_helper+0x4b3a/0x5450
[   22.725064]  kasan_report+0x141/0x180
[   22.725098]  ? kasan_atomics_helper+0x4b3a/0x5450
[   22.725138]  __asan_report_store4_noabort+0x1b/0x30
[   22.725439]  kasan_atomics_helper+0x4b3a/0x5450
[   22.725487]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.725523]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.725556]  ? kasan_atomics+0x152/0x310
[   22.725589]  kasan_atomics+0x1dc/0x310
[   22.725619]  ? __pfx_kasan_atomics+0x10/0x10
[   22.725684]  ? __pfx_read_tsc+0x10/0x10
[   22.725719]  ? ktime_get_ts64+0x86/0x230
[   22.725756]  kunit_try_run_case+0x1a5/0x480
[   22.725787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.725816]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.725854]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.725891]  ? __kthread_parkme+0x82/0x180
[   22.725950]  ? preempt_count_sub+0x50/0x80
[   22.725989]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.726022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.726059]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.726096]  kthread+0x337/0x6f0
[   22.726125]  ? trace_preempt_on+0x20/0xc0
[   22.726159]  ? __pfx_kthread+0x10/0x10
[   22.726191]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.726225]  ? calculate_sigpending+0x7b/0xa0
[   22.726273]  ? __pfx_kthread+0x10/0x10
[   22.726305]  ret_from_fork+0x116/0x1d0
[   22.726331]  ? __pfx_kthread+0x10/0x10
[   22.726363]  ret_from_fork_asm+0x1a/0x30
[   22.726405]  </TASK>
[   22.726421] 
[   22.748257] Allocated by task 282:
[   22.748522]  kasan_save_stack+0x45/0x70
[   22.749341]  kasan_save_track+0x18/0x40
[   22.749964]  kasan_save_alloc_info+0x3b/0x50
[   22.750310]  __kasan_kmalloc+0xb7/0xc0
[   22.750626]  __kmalloc_cache_noprof+0x189/0x420
[   22.751660]  kasan_atomics+0x95/0x310
[   22.752219]  kunit_try_run_case+0x1a5/0x480
[   22.752865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.753477]  kthread+0x337/0x6f0
[   22.754052]  ret_from_fork+0x116/0x1d0
[   22.754437]  ret_from_fork_asm+0x1a/0x30
[   22.755046] 
[   22.755289] The buggy address belongs to the object at ffff888102b73d80
[   22.755289]  which belongs to the cache kmalloc-64 of size 64
[   22.756660] The buggy address is located 0 bytes to the right of
[   22.756660]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   22.757987] 
[   22.758546] The buggy address belongs to the physical page:
[   22.759245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   22.759974] flags: 0x200000000000000(node=0|zone=2)
[   22.760352] page_type: f5(slab)
[   22.760621] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.761810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.762484] page dumped because: kasan: bad access detected
[   22.763076] 
[   22.763297] Memory state around the buggy address:
[   22.763793]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.764423]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.765182] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.765868]                                      ^
[   22.766377]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.767079]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.767773] ==================================================================
[   24.901905] ==================================================================
[   24.902384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   24.903190] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.903742] 
[   24.904155] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.904314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.904359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.904422] Call Trace:
[   24.904497]  <TASK>
[   24.904576]  dump_stack_lvl+0x73/0xb0
[   24.904663]  print_report+0xd1/0x650
[   24.904746]  ? __virt_addr_valid+0x1db/0x2d0
[   24.904882]  ? kasan_atomics_helper+0x1eaa/0x5450
[   24.904967]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.905056]  ? kasan_atomics_helper+0x1eaa/0x5450
[   24.905159]  kasan_report+0x141/0x180
[   24.905271]  ? kasan_atomics_helper+0x1eaa/0x5450
[   24.905367]  kasan_check_range+0x10c/0x1c0
[   24.905476]  __kasan_check_write+0x18/0x20
[   24.905584]  kasan_atomics_helper+0x1eaa/0x5450
[   24.905698]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.905784]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.905917]  ? kasan_atomics+0x152/0x310
[   24.906002]  kasan_atomics+0x1dc/0x310
[   24.906069]  ? __pfx_kasan_atomics+0x10/0x10
[   24.906111]  ? __pfx_read_tsc+0x10/0x10
[   24.906147]  ? ktime_get_ts64+0x86/0x230
[   24.906226]  kunit_try_run_case+0x1a5/0x480
[   24.906288]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.906360]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.906448]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.906538]  ? __kthread_parkme+0x82/0x180
[   24.906649]  ? preempt_count_sub+0x50/0x80
[   24.906770]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.906869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.906959]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.907073]  kthread+0x337/0x6f0
[   24.907181]  ? trace_preempt_on+0x20/0xc0
[   24.907264]  ? __pfx_kthread+0x10/0x10
[   24.907362]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.907476]  ? calculate_sigpending+0x7b/0xa0
[   24.907562]  ? __pfx_kthread+0x10/0x10
[   24.907687]  ret_from_fork+0x116/0x1d0
[   24.907792]  ? __pfx_kthread+0x10/0x10
[   24.907892]  ret_from_fork_asm+0x1a/0x30
[   24.908013]  </TASK>
[   24.908058] 
[   24.923369] Allocated by task 282:
[   24.923813]  kasan_save_stack+0x45/0x70
[   24.924729]  kasan_save_track+0x18/0x40
[   24.925282]  kasan_save_alloc_info+0x3b/0x50
[   24.925687]  __kasan_kmalloc+0xb7/0xc0
[   24.926954]  __kmalloc_cache_noprof+0x189/0x420
[   24.928191]  kasan_atomics+0x95/0x310
[   24.928509]  kunit_try_run_case+0x1a5/0x480
[   24.928879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.929279]  kthread+0x337/0x6f0
[   24.929776]  ret_from_fork+0x116/0x1d0
[   24.930313]  ret_from_fork_asm+0x1a/0x30
[   24.930892] 
[   24.931187] The buggy address belongs to the object at ffff888102b73d80
[   24.931187]  which belongs to the cache kmalloc-64 of size 64
[   24.932526] The buggy address is located 0 bytes to the right of
[   24.932526]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.933873] 
[   24.934139] The buggy address belongs to the physical page:
[   24.934773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.935485] flags: 0x200000000000000(node=0|zone=2)
[   24.936042] page_type: f5(slab)
[   24.936509] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.937329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.938090] page dumped because: kasan: bad access detected
[   24.938763] 
[   24.939043] Memory state around the buggy address:
[   24.939666]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.940369]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.941163] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.941896]                                      ^
[   24.942464]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.943303]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.944198] ==================================================================
[   22.672112] ==================================================================
[   22.672638] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   22.675049] Write of size 4 at addr ffff888102b73db0 by task kunit_try_catch/282
[   22.675596] 
[   22.676175] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   22.676265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.676287] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.676324] Call Trace:
[   22.676346]  <TASK>
[   22.676367]  dump_stack_lvl+0x73/0xb0
[   22.676406]  print_report+0xd1/0x650
[   22.676440]  ? __virt_addr_valid+0x1db/0x2d0
[   22.676474]  ? kasan_atomics_helper+0x4a0/0x5450
[   22.676506]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.676538]  ? kasan_atomics_helper+0x4a0/0x5450
[   22.676571]  kasan_report+0x141/0x180
[   22.676603]  ? kasan_atomics_helper+0x4a0/0x5450
[   22.676684]  kasan_check_range+0x10c/0x1c0
[   22.676731]  __kasan_check_write+0x18/0x20
[   22.676762]  kasan_atomics_helper+0x4a0/0x5450
[   22.676796]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.676829]  ? __kmalloc_cache_noprof+0x189/0x420
[   22.676861]  ? kasan_atomics+0x152/0x310
[   22.676892]  kasan_atomics+0x1dc/0x310
[   22.676950]  ? __pfx_kasan_atomics+0x10/0x10
[   22.676983]  ? __pfx_read_tsc+0x10/0x10
[   22.677016]  ? ktime_get_ts64+0x86/0x230
[   22.677051]  kunit_try_run_case+0x1a5/0x480
[   22.677083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.677113]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.677149]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.677187]  ? __kthread_parkme+0x82/0x180
[   22.677217]  ? preempt_count_sub+0x50/0x80
[   22.677250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.677281]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.677317]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.677354]  kthread+0x337/0x6f0
[   22.677382]  ? trace_preempt_on+0x20/0xc0
[   22.677415]  ? __pfx_kthread+0x10/0x10
[   22.677445]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.677479]  ? calculate_sigpending+0x7b/0xa0
[   22.677514]  ? __pfx_kthread+0x10/0x10
[   22.677545]  ret_from_fork+0x116/0x1d0
[   22.677570]  ? __pfx_kthread+0x10/0x10
[   22.677601]  ret_from_fork_asm+0x1a/0x30
[   22.677667]  </TASK>
[   22.677686] 
[   22.697461] Allocated by task 282:
[   22.698052]  kasan_save_stack+0x45/0x70
[   22.698654]  kasan_save_track+0x18/0x40
[   22.699493]  kasan_save_alloc_info+0x3b/0x50
[   22.700264]  __kasan_kmalloc+0xb7/0xc0
[   22.700687]  __kmalloc_cache_noprof+0x189/0x420
[   22.701437]  kasan_atomics+0x95/0x310
[   22.701983]  kunit_try_run_case+0x1a5/0x480
[   22.702397]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.703137]  kthread+0x337/0x6f0
[   22.703666]  ret_from_fork+0x116/0x1d0
[   22.704245]  ret_from_fork_asm+0x1a/0x30
[   22.704837] 
[   22.705033] The buggy address belongs to the object at ffff888102b73d80
[   22.705033]  which belongs to the cache kmalloc-64 of size 64
[   22.706739] The buggy address is located 0 bytes to the right of
[   22.706739]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   22.707800] 
[   22.708269] The buggy address belongs to the physical page:
[   22.708747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   22.709326] flags: 0x200000000000000(node=0|zone=2)
[   22.710129] page_type: f5(slab)
[   22.711191] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.711712] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.712327] page dumped because: kasan: bad access detected
[   22.713063] 
[   22.713464] Memory state around the buggy address:
[   22.714098]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.714974]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.715495] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.716519]                                      ^
[   22.717085]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.717616]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.718523] ==================================================================
[   24.271782] ==================================================================
[   24.273412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   24.273985] Write of size 8 at addr ffff888102b73db0 by task kunit_try_catch/282
[   24.274554] 
[   24.274841] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250530 #1 PREEMPT(voluntary) 
[   24.275935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.275958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.275990] Call Trace:
[   24.276017]  <TASK>
[   24.276042]  dump_stack_lvl+0x73/0xb0
[   24.276083]  print_report+0xd1/0x650
[   24.276118]  ? __virt_addr_valid+0x1db/0x2d0
[   24.276152]  ? kasan_atomics_helper+0x164f/0x5450
[   24.276504]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.276550]  ? kasan_atomics_helper+0x164f/0x5450
[   24.276597]  kasan_report+0x141/0x180
[   24.276667]  ? kasan_atomics_helper+0x164f/0x5450
[   24.276710]  kasan_check_range+0x10c/0x1c0
[   24.276747]  __kasan_check_write+0x18/0x20
[   24.276778]  kasan_atomics_helper+0x164f/0x5450
[   24.276813]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.276846]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.276906]  ? kasan_atomics+0x152/0x310
[   24.276940]  kasan_atomics+0x1dc/0x310
[   24.276971]  ? __pfx_kasan_atomics+0x10/0x10
[   24.277002]  ? __pfx_read_tsc+0x10/0x10
[   24.277037]  ? ktime_get_ts64+0x86/0x230
[   24.277073]  kunit_try_run_case+0x1a5/0x480
[   24.277105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.277136]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.277174]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.277211]  ? __kthread_parkme+0x82/0x180
[   24.277243]  ? preempt_count_sub+0x50/0x80
[   24.277277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.277308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.277346]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.277383]  kthread+0x337/0x6f0
[   24.277413]  ? trace_preempt_on+0x20/0xc0
[   24.277447]  ? __pfx_kthread+0x10/0x10
[   24.277478]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.277513]  ? calculate_sigpending+0x7b/0xa0
[   24.277549]  ? __pfx_kthread+0x10/0x10
[   24.277581]  ret_from_fork+0x116/0x1d0
[   24.277643]  ? __pfx_kthread+0x10/0x10
[   24.277679]  ret_from_fork_asm+0x1a/0x30
[   24.277724]  </TASK>
[   24.277741] 
[   24.297139] Allocated by task 282:
[   24.297949]  kasan_save_stack+0x45/0x70
[   24.298722]  kasan_save_track+0x18/0x40
[   24.299433]  kasan_save_alloc_info+0x3b/0x50
[   24.300310]  __kasan_kmalloc+0xb7/0xc0
[   24.301277]  __kmalloc_cache_noprof+0x189/0x420
[   24.302001]  kasan_atomics+0x95/0x310
[   24.302322]  kunit_try_run_case+0x1a5/0x480
[   24.302646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.303385]  kthread+0x337/0x6f0
[   24.304027]  ret_from_fork+0x116/0x1d0
[   24.304815]  ret_from_fork_asm+0x1a/0x30
[   24.305544] 
[   24.305934] The buggy address belongs to the object at ffff888102b73d80
[   24.305934]  which belongs to the cache kmalloc-64 of size 64
[   24.307309] The buggy address is located 0 bytes to the right of
[   24.307309]  allocated 48-byte region [ffff888102b73d80, ffff888102b73db0)
[   24.308427] 
[   24.308833] The buggy address belongs to the physical page:
[   24.309465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b73
[   24.310401] flags: 0x200000000000000(node=0|zone=2)
[   24.311209] page_type: f5(slab)
[   24.311596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.312247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.313377] page dumped because: kasan: bad access detected
[   24.313783] 
[   24.314040] Memory state around the buggy address:
[   24.314697]  ffff888102b73c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.315454]  ffff888102b73d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.316159] >ffff888102b73d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.316846]                                      ^
[   24.317298]  ffff888102b73e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.318188]  ffff888102b73e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.318888] ==================================================================

[   72.234069] ==================================================================
[   72.249053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5044/0x5ab0
[   72.256500] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   72.263153] 
[   72.264678] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   72.264678] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   72.264709] Hardware name: Generic DRA74X (Flattened Device Tree)
[   72.264709] Call trace: 
[   72.264709]  unwind_backtrace from show_stack+0x18/0x1c
[   72.264739]  show_stack from dump_stack_lvl+0x70/0x90
[   72.264770]  dump_stack_lvl from print_report+0x158/0x528
[   72.264801]  print_report from kasan_report+0xdc/0x118
[   72.264831]  kasan_report from kasan_atomics_helper+0x5044/0x5ab0
[   72.264831]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   72.264862]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   72.264892]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.264923]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   72.264953]  kthread from ret_from_fork+0x14/0x20
[   72.264984] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   72.264984] 3fa0:                                     00000000 00000000 00000000 00000000
[   72.265014] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   72.265014] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   72.265045] 
[   72.376892] Allocated by task 317:
[   72.380310]  kasan_save_track+0x30/0x5c
[   72.384185]  __kasan_kmalloc+0x8c/0x94
[   72.387969]  kasan_atomics+0xc0/0x33c
[   72.391662]  kunit_try_run_case+0x22c/0x5a8
[   72.395874]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.401428]  kthread+0x464/0x810
[   72.404663]  ret_from_fork+0x14/0x20
[   72.408264] 
[   72.409790] The buggy address belongs to the object at cc90f300
[   72.409790]  which belongs to the cache kmalloc-64 of size 64
[   72.421508] The buggy address is located 0 bytes to the right of
[   72.421508]  allocated 48-byte region [cc90f300, cc90f330)
[   72.433044] 
[   72.434539] The buggy address belongs to the physical page:
[   72.440155] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   72.447448] flags: 0x0(zone=0)
[   72.450531] page_type: f5(slab)
[   72.453674] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   72.461822] raw: 00000000
[   72.464477] page dumped because: kasan: bad access detected
[   72.470092] 
[   72.471588] Memory state around the buggy address:
[   72.476409]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.482971]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.489562] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.496124]                              ^
[   72.500244]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.506805]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.513397] ==================================================================
[   87.840515] ==================================================================
[   87.847808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x22c4/0x5ab0
[   87.855255] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   87.861999] 
[   87.863494] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   87.863525] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   87.863525] Hardware name: Generic DRA74X (Flattened Device Tree)
[   87.863555] Call trace: 
[   87.863555]  unwind_backtrace from show_stack+0x18/0x1c
[   87.863586]  show_stack from dump_stack_lvl+0x70/0x90
[   87.863616]  dump_stack_lvl from print_report+0x158/0x528
[   87.863616]  print_report from kasan_report+0xdc/0x118
[   87.863647]  kasan_report from kasan_check_range+0x14c/0x198
[   87.863677]  kasan_check_range from kasan_atomics_helper+0x22c4/0x5ab0
[   87.863708]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   87.863739]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   87.863769]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.863769]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   87.863800]  kthread from ret_from_fork+0x14/0x20
[   87.863830] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   87.863830] 3fa0:                                     00000000 00000000 00000000 00000000
[   87.863861] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   87.863891] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   87.863891] 
[   87.981872] Allocated by task 317:
[   87.985290]  kasan_save_track+0x30/0x5c
[   87.989166]  __kasan_kmalloc+0x8c/0x94
[   87.992950]  kasan_atomics+0xc0/0x33c
[   87.996643]  kunit_try_run_case+0x22c/0x5a8
[   88.000854]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.006378]  kthread+0x464/0x810
[   88.009643]  ret_from_fork+0x14/0x20
[   88.013244] 
[   88.014739] The buggy address belongs to the object at cc90f300
[   88.014739]  which belongs to the cache kmalloc-64 of size 64
[   88.026458] The buggy address is located 0 bytes to the right of
[   88.026458]  allocated 48-byte region [cc90f300, cc90f330)
[   88.038024] 
[   88.039520] The buggy address belongs to the physical page:
[   88.045135] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   88.052398] flags: 0x0(zone=0)
[   88.055480] page_type: f5(slab)
[   88.058654] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   88.066772] raw: 00000000
[   88.069427] page dumped because: kasan: bad access detected
[   88.075042] 
[   88.076538] Memory state around the buggy address:
[   88.081359]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.087921]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.094512] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   88.101074]                              ^
[   88.105194]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.111755]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.118316] ==================================================================
[   88.410766] ==================================================================
[   88.418029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9c/0x5ab0
[   88.425476] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   88.432159] 
[   88.433654] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   88.433685] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   88.433685] Hardware name: Generic DRA74X (Flattened Device Tree)
[   88.433715] Call trace: 
[   88.433715]  unwind_backtrace from show_stack+0x18/0x1c
[   88.433746]  show_stack from dump_stack_lvl+0x70/0x90
[   88.433776]  dump_stack_lvl from print_report+0x158/0x528
[   88.433776]  print_report from kasan_report+0xdc/0x118
[   88.433807]  kasan_report from kasan_atomics_helper+0x4f9c/0x5ab0
[   88.433837]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   88.433868]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   88.433898]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.433929]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   88.433929]  kthread from ret_from_fork+0x14/0x20
[   88.433959] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   88.433990] 3fa0:                                     00000000 00000000 00000000 00000000
[   88.433990] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   88.434020] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   88.434020] 
[   88.545867] Allocated by task 317:
[   88.549316]  kasan_save_track+0x30/0x5c
[   88.553161]  __kasan_kmalloc+0x8c/0x94
[   88.556945]  kasan_atomics+0xc0/0x33c
[   88.560638]  kunit_try_run_case+0x22c/0x5a8
[   88.564880]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.570404]  kthread+0x464/0x810
[   88.573638]  ret_from_fork+0x14/0x20
[   88.577239] 
[   88.578765] The buggy address belongs to the object at cc90f300
[   88.578765]  which belongs to the cache kmalloc-64 of size 64
[   88.590484] The buggy address is located 0 bytes to the right of
[   88.590484]  allocated 48-byte region [cc90f300, cc90f330)
[   88.602020] 
[   88.603546] The buggy address belongs to the physical page:
[   88.609130] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   88.616424] flags: 0x0(zone=0)
[   88.619476] page_type: f5(slab)
[   88.622650] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   88.630798] raw: 00000000
[   88.633453] page dumped because: kasan: bad access detected
[   88.639038] 
[   88.640533] Memory state around the buggy address:
[   88.645385]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.651947]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.658508] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   88.665069]                              ^
[   88.669219]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.675781]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.682342] ==================================================================
[   73.078826] ==================================================================
[   73.086090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x550c/0x5ab0
[   73.093566] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   73.100311] 
[   73.101806] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   73.101837] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   73.101837] Hardware name: Generic DRA74X (Flattened Device Tree)
[   73.101867] Call trace: 
[   73.101867]  unwind_backtrace from show_stack+0x18/0x1c
[   73.101898]  show_stack from dump_stack_lvl+0x70/0x90
[   73.101898]  dump_stack_lvl from print_report+0x158/0x528
[   73.101928]  print_report from kasan_report+0xdc/0x118
[   73.101959]  kasan_report from kasan_atomics_helper+0x550c/0x5ab0
[   73.101989]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   73.102020]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   73.102050]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.102081]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   73.102081]  kthread from ret_from_fork+0x14/0x20
[   73.102111] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   73.102142] 3fa0:                                     00000000 00000000 00000000 00000000
[   73.102142] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   73.102172] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   73.102172] 
[   73.214019] Allocated by task 317:
[   73.217468]  kasan_save_track+0x30/0x5c
[   73.221313]  __kasan_kmalloc+0x8c/0x94
[   73.225097]  kasan_atomics+0xc0/0x33c
[   73.228790]  kunit_try_run_case+0x22c/0x5a8
[   73.233032]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.238555]  kthread+0x464/0x810
[   73.241790]  ret_from_fork+0x14/0x20
[   73.245422] 
[   73.246917] The buggy address belongs to the object at cc90f300
[   73.246917]  which belongs to the cache kmalloc-64 of size 64
[   73.258636] The buggy address is located 0 bytes to the right of
[   73.258636]  allocated 48-byte region [cc90f300, cc90f330)
[   73.270202] 
[   73.271697] The buggy address belongs to the physical page:
[   73.277313] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   73.284576] flags: 0x0(zone=0)
[   73.287658] page_type: f5(slab)
[   73.290832] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   73.298980] raw: 00000000
[   73.301605] page dumped because: kasan: bad access detected
[   73.307220] 
[   73.308715] Memory state around the buggy address:
[   73.313537]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.320098]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.326690] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.333251]                              ^
[   73.337371]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.343933]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.350524] ==================================================================
[   72.799926] ==================================================================
[   72.807189] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5170/0x5ab0
[   72.814636] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   72.821289] 
[   72.822814] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   72.822814] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   72.822845] Hardware name: Generic DRA74X (Flattened Device Tree)
[   72.822845] Call trace: 
[   72.822845]  unwind_backtrace from show_stack+0x18/0x1c
[   72.822875]  show_stack from dump_stack_lvl+0x70/0x90
[   72.822906]  dump_stack_lvl from print_report+0x158/0x528
[   72.822937]  print_report from kasan_report+0xdc/0x118
[   72.822967]  kasan_report from kasan_atomics_helper+0x5170/0x5ab0
[   72.822967]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   72.822998]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   72.823028]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.823059]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   72.823089]  kthread from ret_from_fork+0x14/0x20
[   72.823120] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   72.823120] 3fa0:                                     00000000 00000000 00000000 00000000
[   72.823150] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   72.823150] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   72.823181] 
[   72.935028] Allocated by task 317:
[   72.938446]  kasan_save_track+0x30/0x5c
[   72.942321]  __kasan_kmalloc+0x8c/0x94
[   72.946105]  kasan_atomics+0xc0/0x33c
[   72.949798]  kunit_try_run_case+0x22c/0x5a8
[   72.954010]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.959533]  kthread+0x464/0x810
[   72.962799]  ret_from_fork+0x14/0x20
[   72.966400] 
[   72.967895] The buggy address belongs to the object at cc90f300
[   72.967895]  which belongs to the cache kmalloc-64 of size 64
[   72.979644] The buggy address is located 0 bytes to the right of
[   72.979644]  allocated 48-byte region [cc90f300, cc90f330)
[   72.991180] 
[   72.992675] The buggy address belongs to the physical page:
[   72.998291] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   73.005554] flags: 0x0(zone=0)
[   73.008636] page_type: f5(slab)
[   73.011810] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   73.019958] raw: 00000000
[   73.022613] page dumped because: kasan: bad access detected
[   73.028198] 
[   73.029724] Memory state around the buggy address:
[   73.034545]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.041107]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.047668] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.054260]                              ^
[   73.058380]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.064941]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.071502] ==================================================================
[   79.038940] ==================================================================
[   79.046203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1034/0x5ab0
[   79.053649] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   79.060394] 
[   79.061920] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   79.061950] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   79.061950] Hardware name: Generic DRA74X (Flattened Device Tree)
[   79.061950] Call trace: 
[   79.061981]  unwind_backtrace from show_stack+0x18/0x1c
[   79.061981]  show_stack from dump_stack_lvl+0x70/0x90
[   79.062011]  dump_stack_lvl from print_report+0x158/0x528
[   79.062042]  print_report from kasan_report+0xdc/0x118
[   79.062072]  kasan_report from kasan_check_range+0x14c/0x198
[   79.062072]  kasan_check_range from kasan_atomics_helper+0x1034/0x5ab0
[   79.062103]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   79.062133]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   79.062164]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.062194]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   79.062225]  kthread from ret_from_fork+0x14/0x20
[   79.062225] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   79.062255] 3fa0:                                     00000000 00000000 00000000 00000000
[   79.062286] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   79.062286] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   79.062286] 
[   79.180267] Allocated by task 317:
[   79.183685]  kasan_save_track+0x30/0x5c
[   79.187561]  __kasan_kmalloc+0x8c/0x94
[   79.191345]  kasan_atomics+0xc0/0x33c
[   79.195037]  kunit_try_run_case+0x22c/0x5a8
[   79.199249]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.204803]  kthread+0x464/0x810
[   79.208038]  ret_from_fork+0x14/0x20
[   79.211639] 
[   79.213165] The buggy address belongs to the object at cc90f300
[   79.213165]  which belongs to the cache kmalloc-64 of size 64
[   79.224884] The buggy address is located 0 bytes to the right of
[   79.224884]  allocated 48-byte region [cc90f300, cc90f330)
[   79.236419] 
[   79.237915] The buggy address belongs to the physical page:
[   79.243530] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   79.250793] flags: 0x0(zone=0)
[   79.253875] page_type: f5(slab)
[   79.257049] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   79.265197] raw: 00000000
[   79.267822] page dumped because: kasan: bad access detected
[   79.273437] 
[   79.274932] Memory state around the buggy address:
[   79.279754]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.286346]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.292907] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.299468]                              ^
[   79.303588]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.310180]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.316741] ==================================================================
[   73.921630] ==================================================================
[   73.928894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e0/0x5ab0
[   73.936279] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   73.943023] 
[   73.944519] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   73.944549] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   73.944549] Hardware name: Generic DRA74X (Flattened Device Tree)
[   73.944580] Call trace: 
[   73.944580]  unwind_backtrace from show_stack+0x18/0x1c
[   73.944610]  show_stack from dump_stack_lvl+0x70/0x90
[   73.944641]  dump_stack_lvl from print_report+0x158/0x528
[   73.944671]  print_report from kasan_report+0xdc/0x118
[   73.944671]  kasan_report from kasan_check_range+0x14c/0x198
[   73.944702]  kasan_check_range from kasan_atomics_helper+0x4e0/0x5ab0
[   73.944732]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   73.944763]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   73.944793]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.944824]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   73.944824]  kthread from ret_from_fork+0x14/0x20
[   73.944854] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   73.944885] 3fa0:                                     00000000 00000000 00000000 00000000
[   73.944885] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   73.944915] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   73.944915] 
[   74.062805] Allocated by task 317:
[   74.066223]  kasan_save_track+0x30/0x5c
[   74.070098]  __kasan_kmalloc+0x8c/0x94
[   74.073883]  kasan_atomics+0xc0/0x33c
[   74.077575]  kunit_try_run_case+0x22c/0x5a8
[   74.081787]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.087310]  kthread+0x464/0x810
[   74.090576]  ret_from_fork+0x14/0x20
[   74.094177] 
[   74.095672] The buggy address belongs to the object at cc90f300
[   74.095672]  which belongs to the cache kmalloc-64 of size 64
[   74.107421] The buggy address is located 0 bytes to the right of
[   74.107421]  allocated 48-byte region [cc90f300, cc90f330)
[   74.118957] 
[   74.120452] The buggy address belongs to the physical page:
[   74.126068] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   74.133331] flags: 0x0(zone=0)
[   74.136413] page_type: f5(slab)
[   74.139587] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   74.147735] raw: 00000000
[   74.150360] page dumped because: kasan: bad access detected
[   74.155975] 
[   74.157501] Memory state around the buggy address:
[   74.162322]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.168884]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.175445] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.182037]                              ^
[   74.186157]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.192718]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.199279] ==================================================================
[   85.850891] ==================================================================
[   85.858154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e5c/0x5ab0
[   85.865631] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   85.872375] 
[   85.873870] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   85.873901] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   85.873901] Hardware name: Generic DRA74X (Flattened Device Tree)
[   85.873931] Call trace: 
[   85.873931]  unwind_backtrace from show_stack+0x18/0x1c
[   85.873962]  show_stack from dump_stack_lvl+0x70/0x90
[   85.873992]  dump_stack_lvl from print_report+0x158/0x528
[   85.873992]  print_report from kasan_report+0xdc/0x118
[   85.874023]  kasan_report from kasan_check_range+0x14c/0x198
[   85.874053]  kasan_check_range from kasan_atomics_helper+0x1e5c/0x5ab0
[   85.874084]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   85.874114]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   85.874114]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.874145]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   85.874176]  kthread from ret_from_fork+0x14/0x20
[   85.874206] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   85.874206] 3fa0:                                     00000000 00000000 00000000 00000000
[   85.874237] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   85.874237] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   85.874267] 
[   85.992248] Allocated by task 317:
[   85.995666]  kasan_save_track+0x30/0x5c
[   85.999542]  __kasan_kmalloc+0x8c/0x94
[   86.003326]  kasan_atomics+0xc0/0x33c
[   86.007019]  kunit_try_run_case+0x22c/0x5a8
[   86.011230]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.016754]  kthread+0x464/0x810
[   86.020019]  ret_from_fork+0x14/0x20
[   86.023620] 
[   86.025115] The buggy address belongs to the object at cc90f300
[   86.025115]  which belongs to the cache kmalloc-64 of size 64
[   86.036834] The buggy address is located 0 bytes to the right of
[   86.036834]  allocated 48-byte region [cc90f300, cc90f330)
[   86.048400] 
[   86.049896] The buggy address belongs to the physical page:
[   86.055511] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   86.062774] flags: 0x0(zone=0)
[   86.065856] page_type: f5(slab)
[   86.069030] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   86.077178] raw: 00000000
[   86.079803] page dumped because: kasan: bad access detected
[   86.085418] 
[   86.086914] Memory state around the buggy address:
[   86.091735]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.098297]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.104888] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   86.111450]                              ^
[   86.115570]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.122131]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.128723] ==================================================================
[   87.270294] ==================================================================
[   87.277557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2154/0x5ab0
[   87.285034] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   87.291778] 
[   87.293273] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   87.293304] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   87.293304] Hardware name: Generic DRA74X (Flattened Device Tree)
[   87.293334] Call trace: 
[   87.293334]  unwind_backtrace from show_stack+0x18/0x1c
[   87.293365]  show_stack from dump_stack_lvl+0x70/0x90
[   87.293365]  dump_stack_lvl from print_report+0x158/0x528
[   87.293395]  print_report from kasan_report+0xdc/0x118
[   87.293426]  kasan_report from kasan_check_range+0x14c/0x198
[   87.293457]  kasan_check_range from kasan_atomics_helper+0x2154/0x5ab0
[   87.293487]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   87.293487]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   87.293518]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.293548]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   87.293579]  kthread from ret_from_fork+0x14/0x20
[   87.293609] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   87.293609] 3fa0:                                     00000000 00000000 00000000 00000000
[   87.293640] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   87.293640] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   87.293670] 
[   87.411651] Allocated by task 317:
[   87.415069]  kasan_save_track+0x30/0x5c
[   87.418914]  __kasan_kmalloc+0x8c/0x94
[   87.422698]  kasan_atomics+0xc0/0x33c
[   87.426391]  kunit_try_run_case+0x22c/0x5a8
[   87.430633]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.436157]  kthread+0x464/0x810
[   87.439392]  ret_from_fork+0x14/0x20
[   87.442993] 
[   87.444519] The buggy address belongs to the object at cc90f300
[   87.444519]  which belongs to the cache kmalloc-64 of size 64
[   87.456237] The buggy address is located 0 bytes to the right of
[   87.456237]  allocated 48-byte region [cc90f300, cc90f330)
[   87.467773] 
[   87.469299] The buggy address belongs to the physical page:
[   87.474884] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   87.482177] flags: 0x0(zone=0)
[   87.485229] page_type: f5(slab)
[   87.488403] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   87.496551] raw: 00000000
[   87.499206] page dumped because: kasan: bad access detected
[   87.504791] 
[   87.506317] Memory state around the buggy address:
[   87.511108]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.517700]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.524261] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   87.530822]                              ^
[   87.534973]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.541534]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.548095] ==================================================================
[   79.609191] ==================================================================
[   79.616455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11a4/0x5ab0
[   79.623901] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   79.630645] 
[   79.632171] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   79.632202] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   79.632202] Hardware name: Generic DRA74X (Flattened Device Tree)
[   79.632202] Call trace: 
[   79.632232]  unwind_backtrace from show_stack+0x18/0x1c
[   79.632263]  show_stack from dump_stack_lvl+0x70/0x90
[   79.632263]  dump_stack_lvl from print_report+0x158/0x528
[   79.632293]  print_report from kasan_report+0xdc/0x118
[   79.632324]  kasan_report from kasan_check_range+0x14c/0x198
[   79.632354]  kasan_check_range from kasan_atomics_helper+0x11a4/0x5ab0
[   79.632354]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   79.632385]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   79.632415]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.632446]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   79.632476]  kthread from ret_from_fork+0x14/0x20
[   79.632507] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   79.632507] 3fa0:                                     00000000 00000000 00000000 00000000
[   79.632537] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   79.632537] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   79.632568] 
[   79.750518] Allocated by task 317:
[   79.753967]  kasan_save_track+0x30/0x5c
[   79.757843]  __kasan_kmalloc+0x8c/0x94
[   79.761596]  kasan_atomics+0xc0/0x33c
[   79.765289]  kunit_try_run_case+0x22c/0x5a8
[   79.769531]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.775054]  kthread+0x464/0x810
[   79.778320]  ret_from_fork+0x14/0x20
[   79.781921] 
[   79.783416] The buggy address belongs to the object at cc90f300
[   79.783416]  which belongs to the cache kmalloc-64 of size 64
[   79.795135] The buggy address is located 0 bytes to the right of
[   79.795135]  allocated 48-byte region [cc90f300, cc90f330)
[   79.806701] 
[   79.808197] The buggy address belongs to the physical page:
[   79.813812] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   79.821075] flags: 0x0(zone=0)
[   79.824157] page_type: f5(slab)
[   79.827331] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   79.835449] raw: 00000000
[   79.838104] page dumped because: kasan: bad access detected
[   79.843719] 
[   79.845214] Memory state around the buggy address:
[   79.850036]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.856597]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.863189] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.869750]                              ^
[   79.873870]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.880432]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.886993] ==================================================================
[   75.340515] ==================================================================
[   75.347778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x790/0x5ab0
[   75.355133] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   75.361877] 
[   75.363403] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   75.363403] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   75.363433] Hardware name: Generic DRA74X (Flattened Device Tree)
[   75.363433] Call trace: 
[   75.363433]  unwind_backtrace from show_stack+0x18/0x1c
[   75.363464]  show_stack from dump_stack_lvl+0x70/0x90
[   75.363494]  dump_stack_lvl from print_report+0x158/0x528
[   75.363525]  print_report from kasan_report+0xdc/0x118
[   75.363555]  kasan_report from kasan_check_range+0x14c/0x198
[   75.363555]  kasan_check_range from kasan_atomics_helper+0x790/0x5ab0
[   75.363586]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   75.363616]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   75.363647]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.363677]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   75.363708]  kthread from ret_from_fork+0x14/0x20
[   75.363708] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   75.363739] 3fa0:                                     00000000 00000000 00000000 00000000
[   75.363739] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   75.363769] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   75.363769] 
[   75.481658] Allocated by task 317:
[   75.485107]  kasan_save_track+0x30/0x5c
[   75.488952]  __kasan_kmalloc+0x8c/0x94
[   75.492736]  kasan_atomics+0xc0/0x33c
[   75.496429]  kunit_try_run_case+0x22c/0x5a8
[   75.500640]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.506195]  kthread+0x464/0x810
[   75.509429]  ret_from_fork+0x14/0x20
[   75.513061] 
[   75.514556] The buggy address belongs to the object at cc90f300
[   75.514556]  which belongs to the cache kmalloc-64 of size 64
[   75.526275] The buggy address is located 0 bytes to the right of
[   75.526275]  allocated 48-byte region [cc90f300, cc90f330)
[   75.537811] 
[   75.539337] The buggy address belongs to the physical page:
[   75.544921] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   75.552215] flags: 0x0(zone=0)
[   75.555297] page_type: f5(slab)
[   75.558471] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   75.566589] raw: 00000000
[   75.569244] page dumped because: kasan: bad access detected
[   75.574859] 
[   75.576354] Memory state around the buggy address:
[   75.581176]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.587738]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.594329] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.600891]                              ^
[   75.605010]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.611602]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.618164] ==================================================================
[   75.625488] ==================================================================
[   75.632751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x834/0x5ab0
[   75.640106] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   75.646850] 
[   75.648376] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   75.648406] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   75.648406] Hardware name: Generic DRA74X (Flattened Device Tree)
[   75.648406] Call trace: 
[   75.648437]  unwind_backtrace from show_stack+0x18/0x1c
[   75.648437]  show_stack from dump_stack_lvl+0x70/0x90
[   75.648468]  dump_stack_lvl from print_report+0x158/0x528
[   75.648498]  print_report from kasan_report+0xdc/0x118
[   75.648529]  kasan_report from kasan_check_range+0x14c/0x198
[   75.648529]  kasan_check_range from kasan_atomics_helper+0x834/0x5ab0
[   75.648559]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   75.648590]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   75.648620]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.648651]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   75.648681]  kthread from ret_from_fork+0x14/0x20
[   75.648681] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   75.648712] 3fa0:                                     00000000 00000000 00000000 00000000
[   75.648742] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   75.648742] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   75.648742] 
[   75.766632] Allocated by task 317:
[   75.770080]  kasan_save_track+0x30/0x5c
[   75.773925]  __kasan_kmalloc+0x8c/0x94
[   75.777709]  kasan_atomics+0xc0/0x33c
[   75.781402]  kunit_try_run_case+0x22c/0x5a8
[   75.785644]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.791168]  kthread+0x464/0x810
[   75.794403]  ret_from_fork+0x14/0x20
[   75.798034] 
[   75.799530] The buggy address belongs to the object at cc90f300
[   75.799530]  which belongs to the cache kmalloc-64 of size 64
[   75.811248] The buggy address is located 0 bytes to the right of
[   75.811248]  allocated 48-byte region [cc90f300, cc90f330)
[   75.822784] 
[   75.824310] The buggy address belongs to the physical page:
[   75.829895] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   75.837188] flags: 0x0(zone=0)
[   75.840270] page_type: f5(slab)
[   75.843414] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   75.851562] raw: 00000000
[   75.854217] page dumped because: kasan: bad access detected
[   75.859832] 
[   75.861328] Memory state around the buggy address:
[   75.866149]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.872711]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.879302] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.885864]                              ^
[   75.889984]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.896545]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.903137] ==================================================================
[   83.569885] ==================================================================
[   83.577148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18bc/0x5ab0
[   83.584594] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   83.591339] 
[   83.592864] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   83.592895] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   83.592895] Hardware name: Generic DRA74X (Flattened Device Tree)
[   83.592895] Call trace: 
[   83.592926]  unwind_backtrace from show_stack+0x18/0x1c
[   83.592926]  show_stack from dump_stack_lvl+0x70/0x90
[   83.592956]  dump_stack_lvl from print_report+0x158/0x528
[   83.592987]  print_report from kasan_report+0xdc/0x118
[   83.593017]  kasan_report from kasan_check_range+0x14c/0x198
[   83.593048]  kasan_check_range from kasan_atomics_helper+0x18bc/0x5ab0
[   83.593048]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   83.593078]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   83.593109]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.593139]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   83.593170]  kthread from ret_from_fork+0x14/0x20
[   83.593200] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   83.593200] 3fa0:                                     00000000 00000000 00000000 00000000
[   83.593231] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   83.593231] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   83.593261] 
[   83.711212] Allocated by task 317:
[   83.714660]  kasan_save_track+0x30/0x5c
[   83.718505]  __kasan_kmalloc+0x8c/0x94
[   83.722290]  kasan_atomics+0xc0/0x33c
[   83.725982]  kunit_try_run_case+0x22c/0x5a8
[   83.730224]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.735748]  kthread+0x464/0x810
[   83.739013]  ret_from_fork+0x14/0x20
[   83.742614] 
[   83.744110] The buggy address belongs to the object at cc90f300
[   83.744110]  which belongs to the cache kmalloc-64 of size 64
[   83.755828] The buggy address is located 0 bytes to the right of
[   83.755828]  allocated 48-byte region [cc90f300, cc90f330)
[   83.767395] 
[   83.768890] The buggy address belongs to the physical page:
[   83.774505] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   83.781768] flags: 0x0(zone=0)
[   83.784851] page_type: f5(slab)
[   83.787994] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   83.796142] raw: 00000000
[   83.798797] page dumped because: kasan: bad access detected
[   83.804382] 
[   83.805908] Memory state around the buggy address:
[   83.810729]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.817291]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.823852] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   83.830444]                              ^
[   83.834564]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.841125]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.847686] ==================================================================
[   80.179443] ==================================================================
[   80.186737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5218/0x5ab0
[   80.194183] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   80.200836] 
[   80.202331] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   80.202362] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   80.202362] Hardware name: Generic DRA74X (Flattened Device Tree)
[   80.202392] Call trace: 
[   80.202392]  unwind_backtrace from show_stack+0x18/0x1c
[   80.202423]  show_stack from dump_stack_lvl+0x70/0x90
[   80.202453]  dump_stack_lvl from print_report+0x158/0x528
[   80.202484]  print_report from kasan_report+0xdc/0x118
[   80.202484]  kasan_report from kasan_atomics_helper+0x5218/0x5ab0
[   80.202514]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   80.202545]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   80.202575]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.202606]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   80.202636]  kthread from ret_from_fork+0x14/0x20
[   80.202636] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   80.202667] 3fa0:                                     00000000 00000000 00000000 00000000
[   80.202667] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   80.202697] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   80.202697] 
[   80.314575] Allocated by task 317:
[   80.317993]  kasan_save_track+0x30/0x5c
[   80.321868]  __kasan_kmalloc+0x8c/0x94
[   80.325653]  kasan_atomics+0xc0/0x33c
[   80.329345]  kunit_try_run_case+0x22c/0x5a8
[   80.333557]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.339080]  kthread+0x464/0x810
[   80.342346]  ret_from_fork+0x14/0x20
[   80.345947] 
[   80.347442] The buggy address belongs to the object at cc90f300
[   80.347442]  which belongs to the cache kmalloc-64 of size 64
[   80.359161] The buggy address is located 0 bytes to the right of
[   80.359161]  allocated 48-byte region [cc90f300, cc90f330)
[   80.370727] 
[   80.372222] The buggy address belongs to the physical page:
[   80.377838] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   80.385101] flags: 0x0(zone=0)
[   80.388183] page_type: f5(slab)
[   80.391357] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   80.399505] raw: 00000000
[   80.402130] page dumped because: kasan: bad access detected
[   80.407745] 
[   80.409240] Memory state around the buggy address:
[   80.414062]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.420623]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.427215] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.433776]                              ^
[   80.437896]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.444488]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.451049] ==================================================================
[   88.689666] ==================================================================
[   88.696929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2480/0x5ab0
[   88.704376] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   88.711120] 
[   88.712646] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   88.712677] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   88.712677] Hardware name: Generic DRA74X (Flattened Device Tree)
[   88.712677] Call trace: 
[   88.712677]  unwind_backtrace from show_stack+0x18/0x1c
[   88.712707]  show_stack from dump_stack_lvl+0x70/0x90
[   88.712738]  dump_stack_lvl from print_report+0x158/0x528
[   88.712768]  print_report from kasan_report+0xdc/0x118
[   88.712799]  kasan_report from kasan_check_range+0x14c/0x198
[   88.712799]  kasan_check_range from kasan_atomics_helper+0x2480/0x5ab0
[   88.712829]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   88.712860]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   88.712890]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.712921]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   88.712951]  kthread from ret_from_fork+0x14/0x20
[   88.712951] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   88.712982] 3fa0:                                     00000000 00000000 00000000 00000000
[   88.712982] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   88.713012] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   88.713012] 
[   88.830993] Allocated by task 317:
[   88.834411]  kasan_save_track+0x30/0x5c
[   88.838287]  __kasan_kmalloc+0x8c/0x94
[   88.842071]  kasan_atomics+0xc0/0x33c
[   88.845764]  kunit_try_run_case+0x22c/0x5a8
[   88.849975]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.855499]  kthread+0x464/0x810
[   88.858764]  ret_from_fork+0x14/0x20
[   88.862365] 
[   88.863861] The buggy address belongs to the object at cc90f300
[   88.863861]  which belongs to the cache kmalloc-64 of size 64
[   88.875610] The buggy address is located 0 bytes to the right of
[   88.875610]  allocated 48-byte region [cc90f300, cc90f330)
[   88.887145] 
[   88.888641] The buggy address belongs to the physical page:
[   88.894256] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   88.901519] flags: 0x0(zone=0)
[   88.904602] page_type: f5(slab)
[   88.907775] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   88.915924] raw: 00000000
[   88.918548] page dumped because: kasan: bad access detected
[   88.924163] 
[   88.925659] Memory state around the buggy address:
[   88.930480]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.937042]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.943634] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   88.950195]                              ^
[   88.954315]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.960906]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.967468] ==================================================================
[   72.520874] ==================================================================
[   72.528167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x514c/0x5ab0
[   72.535614] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   72.542358] 
[   72.543853] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   72.543884] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   72.543914] Hardware name: Generic DRA74X (Flattened Device Tree)
[   72.543914] Call trace: 
[   72.543914]  unwind_backtrace from show_stack+0x18/0x1c
[   72.543945]  show_stack from dump_stack_lvl+0x70/0x90
[   72.543975]  dump_stack_lvl from print_report+0x158/0x528
[   72.544006]  print_report from kasan_report+0xdc/0x118
[   72.544006]  kasan_report from kasan_atomics_helper+0x514c/0x5ab0
[   72.544036]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   72.544067]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   72.544097]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.544128]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   72.544158]  kthread from ret_from_fork+0x14/0x20
[   72.544158] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   72.544189] 3fa0:                                     00000000 00000000 00000000 00000000
[   72.544189] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   72.544219] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   72.544219] 
[   72.656097] Allocated by task 317:
[   72.659515]  kasan_save_track+0x30/0x5c
[   72.663391]  __kasan_kmalloc+0x8c/0x94
[   72.667175]  kasan_atomics+0xc0/0x33c
[   72.670867]  kunit_try_run_case+0x22c/0x5a8
[   72.675079]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   72.680603]  kthread+0x464/0x810
[   72.683868]  ret_from_fork+0x14/0x20
[   72.687469] 
[   72.688964] The buggy address belongs to the object at cc90f300
[   72.688964]  which belongs to the cache kmalloc-64 of size 64
[   72.700714] The buggy address is located 0 bytes to the right of
[   72.700714]  allocated 48-byte region [cc90f300, cc90f330)
[   72.712249] 
[   72.713775] The buggy address belongs to the physical page:
[   72.719360] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   72.726654] flags: 0x0(zone=0)
[   72.729705] page_type: f5(slab)
[   72.732879] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   72.741027] raw: 00000000
[   72.743682] page dumped because: kasan: bad access detected
[   72.749267] 
[   72.750793] Memory state around the buggy address:
[   72.755615]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.762176]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.768737] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   72.775329]                              ^
[   72.779449]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.786010]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   72.792602] ==================================================================
[   83.855010] ==================================================================
[   83.862274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1960/0x5ab0
[   83.869720] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   83.876464] 
[   83.877990] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   83.878021] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   83.878021] Hardware name: Generic DRA74X (Flattened Device Tree)
[   83.878021] Call trace: 
[   83.878051]  unwind_backtrace from show_stack+0x18/0x1c
[   83.878051]  show_stack from dump_stack_lvl+0x70/0x90
[   83.878082]  dump_stack_lvl from print_report+0x158/0x528
[   83.878112]  print_report from kasan_report+0xdc/0x118
[   83.878143]  kasan_report from kasan_check_range+0x14c/0x198
[   83.878173]  kasan_check_range from kasan_atomics_helper+0x1960/0x5ab0
[   83.878173]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   83.878204]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   83.878234]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.878265]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   83.878295]  kthread from ret_from_fork+0x14/0x20
[   83.878326] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   83.878326] 3fa0:                                     00000000 00000000 00000000 00000000
[   83.878356] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   83.878356] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   83.878387] 
[   83.996368] Allocated by task 317:
[   83.999786]  kasan_save_track+0x30/0x5c
[   84.003662]  __kasan_kmalloc+0x8c/0x94
[   84.007415]  kasan_atomics+0xc0/0x33c
[   84.011138]  kunit_try_run_case+0x22c/0x5a8
[   84.015350]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.020874]  kthread+0x464/0x810
[   84.024139]  ret_from_fork+0x14/0x20
[   84.027740] 
[   84.029235] The buggy address belongs to the object at cc90f300
[   84.029235]  which belongs to the cache kmalloc-64 of size 64
[   84.040954] The buggy address is located 0 bytes to the right of
[   84.040954]  allocated 48-byte region [cc90f300, cc90f330)
[   84.052520] 
[   84.054016] The buggy address belongs to the physical page:
[   84.059631] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   84.066894] flags: 0x0(zone=0)
[   84.069976] page_type: f5(slab)
[   84.073150] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   84.081298] raw: 00000000
[   84.083923] page dumped because: kasan: bad access detected
[   84.089538] 
[   84.091033] Memory state around the buggy address:
[   84.095855]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.102416]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.109008] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   84.115570]                              ^
[   84.119689]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.126251]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.132843] ==================================================================
[   85.280670] ==================================================================
[   85.287933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c9c/0x5ab0
[   85.295379] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   85.302124] 
[   85.303619] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   85.303649] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   85.303649] Hardware name: Generic DRA74X (Flattened Device Tree)
[   85.303680] Call trace: 
[   85.303680]  unwind_backtrace from show_stack+0x18/0x1c
[   85.303710]  show_stack from dump_stack_lvl+0x70/0x90
[   85.303741]  dump_stack_lvl from print_report+0x158/0x528
[   85.303771]  print_report from kasan_report+0xdc/0x118
[   85.303771]  kasan_report from kasan_check_range+0x14c/0x198
[   85.303802]  kasan_check_range from kasan_atomics_helper+0x1c9c/0x5ab0
[   85.303833]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   85.303863]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   85.303894]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.303924]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   85.303924]  kthread from ret_from_fork+0x14/0x20
[   85.303955] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   85.303955] 3fa0:                                     00000000 00000000 00000000 00000000
[   85.303985] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   85.304016] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   85.304016] 
[   85.421997] Allocated by task 317:
[   85.425415]  kasan_save_track+0x30/0x5c
[   85.429290]  __kasan_kmalloc+0x8c/0x94
[   85.433074]  kasan_atomics+0xc0/0x33c
[   85.436767]  kunit_try_run_case+0x22c/0x5a8
[   85.440979]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.446502]  kthread+0x464/0x810
[   85.449768]  ret_from_fork+0x14/0x20
[   85.453369] 
[   85.454864] The buggy address belongs to the object at cc90f300
[   85.454864]  which belongs to the cache kmalloc-64 of size 64
[   85.466583] The buggy address is located 0 bytes to the right of
[   85.466583]  allocated 48-byte region [cc90f300, cc90f330)
[   85.478149] 
[   85.479644] The buggy address belongs to the physical page:
[   85.485260] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   85.492523] flags: 0x0(zone=0)
[   85.495605] page_type: f5(slab)
[   85.498779] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   85.506896] raw: 00000000
[   85.509552] page dumped because: kasan: bad access detected
[   85.515167] 
[   85.516662] Memory state around the buggy address:
[   85.521484]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.528045]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.534637] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   85.541198]                              ^
[   85.545318]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.551879]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.558471] ==================================================================
[   81.022399] ==================================================================
[   81.029663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1458/0x5ab0
[   81.037109] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   81.043853] 
[   81.045349] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   81.045379] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   81.045379] Hardware name: Generic DRA74X (Flattened Device Tree)
[   81.045410] Call trace: 
[   81.045410]  unwind_backtrace from show_stack+0x18/0x1c
[   81.045440]  show_stack from dump_stack_lvl+0x70/0x90
[   81.045471]  dump_stack_lvl from print_report+0x158/0x528
[   81.045501]  print_report from kasan_report+0xdc/0x118
[   81.045501]  kasan_report from kasan_check_range+0x14c/0x198
[   81.045532]  kasan_check_range from kasan_atomics_helper+0x1458/0x5ab0
[   81.045562]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   81.045593]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   81.045623]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.045654]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   81.045654]  kthread from ret_from_fork+0x14/0x20
[   81.045684] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   81.045715] 3fa0:                                     00000000 00000000 00000000 00000000
[   81.045715] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   81.045745] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   81.045745] 
[   81.163726] Allocated by task 317:
[   81.167144]  kasan_save_track+0x30/0x5c
[   81.171020]  __kasan_kmalloc+0x8c/0x94
[   81.174804]  kasan_atomics+0xc0/0x33c
[   81.178497]  kunit_try_run_case+0x22c/0x5a8
[   81.182708]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.188232]  kthread+0x464/0x810
[   81.191497]  ret_from_fork+0x14/0x20
[   81.195098] 
[   81.196594] The buggy address belongs to the object at cc90f300
[   81.196594]  which belongs to the cache kmalloc-64 of size 64
[   81.208312] The buggy address is located 0 bytes to the right of
[   81.208312]  allocated 48-byte region [cc90f300, cc90f330)
[   81.219879] 
[   81.221374] The buggy address belongs to the physical page:
[   81.226989] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   81.234252] flags: 0x0(zone=0)
[   81.237335] page_type: f5(slab)
[   81.240509] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   81.248626] raw: 00000000
[   81.251281] page dumped because: kasan: bad access detected
[   81.256896] 
[   81.258392] Memory state around the buggy address:
[   81.263214]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.269775]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.276367] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   81.282928]                              ^
[   81.287048]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.293609]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.300201] ==================================================================
[   74.770568] ==================================================================
[   74.777832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x648/0x5ab0
[   74.785186] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   74.791961] 
[   74.793457] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   74.793487] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   74.793487] Hardware name: Generic DRA74X (Flattened Device Tree)
[   74.793487] Call trace: 
[   74.793518]  unwind_backtrace from show_stack+0x18/0x1c
[   74.793548]  show_stack from dump_stack_lvl+0x70/0x90
[   74.793548]  dump_stack_lvl from print_report+0x158/0x528
[   74.793579]  print_report from kasan_report+0xdc/0x118
[   74.793609]  kasan_report from kasan_check_range+0x14c/0x198
[   74.793640]  kasan_check_range from kasan_atomics_helper+0x648/0x5ab0
[   74.793640]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   74.793670]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   74.793701]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.793731]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   74.793762]  kthread from ret_from_fork+0x14/0x20
[   74.793792] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   74.793792] 3fa0:                                     00000000 00000000 00000000 00000000
[   74.793823] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   74.793823] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   74.793853] 
[   74.911743] Allocated by task 317:
[   74.915161]  kasan_save_track+0x30/0x5c
[   74.919036]  __kasan_kmalloc+0x8c/0x94
[   74.922790]  kasan_atomics+0xc0/0x33c
[   74.926513]  kunit_try_run_case+0x22c/0x5a8
[   74.930725]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.936248]  kthread+0x464/0x810
[   74.939514]  ret_from_fork+0x14/0x20
[   74.943115] 
[   74.944610] The buggy address belongs to the object at cc90f300
[   74.944610]  which belongs to the cache kmalloc-64 of size 64
[   74.956329] The buggy address is located 0 bytes to the right of
[   74.956329]  allocated 48-byte region [cc90f300, cc90f330)
[   74.967895] 
[   74.969390] The buggy address belongs to the physical page:
[   74.975006] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   74.982269] flags: 0x0(zone=0)
[   74.985351] page_type: f5(slab)
[   74.988525] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   74.996673] raw: 00000000
[   74.999298] page dumped because: kasan: bad access detected
[   75.004913] 
[   75.006408] Memory state around the buggy address:
[   75.011230]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.017822]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.024383] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.030944]                              ^
[   75.035064]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.041656]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.048217] ==================================================================
[   76.195404] ==================================================================
[   76.202667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x97c/0x5ab0
[   76.210021] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   76.216796] 
[   76.218292] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   76.218322] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   76.218322] Hardware name: Generic DRA74X (Flattened Device Tree)
[   76.218353] Call trace: 
[   76.218353]  unwind_backtrace from show_stack+0x18/0x1c
[   76.218383]  show_stack from dump_stack_lvl+0x70/0x90
[   76.218383]  dump_stack_lvl from print_report+0x158/0x528
[   76.218414]  print_report from kasan_report+0xdc/0x118
[   76.218444]  kasan_report from kasan_check_range+0x14c/0x198
[   76.218475]  kasan_check_range from kasan_atomics_helper+0x97c/0x5ab0
[   76.218505]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   76.218505]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   76.218536]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.218566]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   76.218597]  kthread from ret_from_fork+0x14/0x20
[   76.218627] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   76.218627] 3fa0:                                     00000000 00000000 00000000 00000000
[   76.218658] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   76.218658] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   76.218688] 
[   76.336578] Allocated by task 317:
[   76.339996]  kasan_save_track+0x30/0x5c
[   76.343872]  __kasan_kmalloc+0x8c/0x94
[   76.347656]  kasan_atomics+0xc0/0x33c
[   76.351348]  kunit_try_run_case+0x22c/0x5a8
[   76.355560]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.361083]  kthread+0x464/0x810
[   76.364349]  ret_from_fork+0x14/0x20
[   76.367950] 
[   76.369445] The buggy address belongs to the object at cc90f300
[   76.369445]  which belongs to the cache kmalloc-64 of size 64
[   76.381164] The buggy address is located 0 bytes to the right of
[   76.381164]  allocated 48-byte region [cc90f300, cc90f330)
[   76.392730] 
[   76.394226] The buggy address belongs to the physical page:
[   76.399841] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   76.407104] flags: 0x0(zone=0)
[   76.410186] page_type: f5(slab)
[   76.413360] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   76.421508] raw: 00000000
[   76.424133] page dumped because: kasan: bad access detected
[   76.429748] 
[   76.431243] Memory state around the buggy address:
[   76.436065]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.442657]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.449218] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.455780]                              ^
[   76.459899]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.466491]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.473052] ==================================================================
[   83.284759] ==================================================================
[   83.292022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5ab0
[   83.299468] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   83.306213] 
[   83.307739] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   83.307769] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   83.307769] Hardware name: Generic DRA74X (Flattened Device Tree)
[   83.307769] Call trace: 
[   83.307769]  unwind_backtrace from show_stack+0x18/0x1c
[   83.307800]  show_stack from dump_stack_lvl+0x70/0x90
[   83.307830]  dump_stack_lvl from print_report+0x158/0x528
[   83.307861]  print_report from kasan_report+0xdc/0x118
[   83.307891]  kasan_report from kasan_check_range+0x14c/0x198
[   83.307891]  kasan_check_range from kasan_atomics_helper+0x1818/0x5ab0
[   83.307922]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   83.307952]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   83.307983]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.308013]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   83.308044]  kthread from ret_from_fork+0x14/0x20
[   83.308044] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   83.308074] 3fa0:                                     00000000 00000000 00000000 00000000
[   83.308105] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   83.308105] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   83.308105] 
[   83.426086] Allocated by task 317:
[   83.429504]  kasan_save_track+0x30/0x5c
[   83.433380]  __kasan_kmalloc+0x8c/0x94
[   83.437164]  kasan_atomics+0xc0/0x33c
[   83.440856]  kunit_try_run_case+0x22c/0x5a8
[   83.445068]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.450622]  kthread+0x464/0x810
[   83.453857]  ret_from_fork+0x14/0x20
[   83.457458] 
[   83.458984] The buggy address belongs to the object at cc90f300
[   83.458984]  which belongs to the cache kmalloc-64 of size 64
[   83.470703] The buggy address is located 0 bytes to the right of
[   83.470703]  allocated 48-byte region [cc90f300, cc90f330)
[   83.482238] 
[   83.483764] The buggy address belongs to the physical page:
[   83.489349] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   83.496643] flags: 0x0(zone=0)
[   83.499694] page_type: f5(slab)
[   83.502868] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   83.511016] raw: 00000000
[   83.513671] page dumped because: kasan: bad access detected
[   83.519256] 
[   83.520782] Memory state around the buggy address:
[   83.525604]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.532165]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.538726] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   83.545318]                              ^
[   83.549438]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.555999]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.562561] ==================================================================
[   82.150360] ==================================================================
[   82.157623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x160c/0x5ab0
[   82.165069] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   82.171813] 
[   82.173339] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   82.173370] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   82.173370] Hardware name: Generic DRA74X (Flattened Device Tree)
[   82.173370] Call trace: 
[   82.173400]  unwind_backtrace from show_stack+0x18/0x1c
[   82.173400]  show_stack from dump_stack_lvl+0x70/0x90
[   82.173431]  dump_stack_lvl from print_report+0x158/0x528
[   82.173461]  print_report from kasan_report+0xdc/0x118
[   82.173492]  kasan_report from kasan_check_range+0x14c/0x198
[   82.173492]  kasan_check_range from kasan_atomics_helper+0x160c/0x5ab0
[   82.173522]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   82.173553]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   82.173583]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.173614]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   82.173645]  kthread from ret_from_fork+0x14/0x20
[   82.173645] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   82.173675] 3fa0:                                     00000000 00000000 00000000 00000000
[   82.173706] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   82.173706] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   82.173706] 
[   82.291687] Allocated by task 317:
[   82.295135]  kasan_save_track+0x30/0x5c
[   82.298980]  __kasan_kmalloc+0x8c/0x94
[   82.302764]  kasan_atomics+0xc0/0x33c
[   82.306457]  kunit_try_run_case+0x22c/0x5a8
[   82.310668]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.316223]  kthread+0x464/0x810
[   82.319458]  ret_from_fork+0x14/0x20
[   82.323059] 
[   82.324584] The buggy address belongs to the object at cc90f300
[   82.324584]  which belongs to the cache kmalloc-64 of size 64
[   82.336303] The buggy address is located 0 bytes to the right of
[   82.336303]  allocated 48-byte region [cc90f300, cc90f330)
[   82.347839] 
[   82.349365] The buggy address belongs to the physical page:
[   82.354949] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   82.362243] flags: 0x0(zone=0)
[   82.365295] page_type: f5(slab)
[   82.368469] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   82.376617] raw: 00000000
[   82.379272] page dumped because: kasan: bad access detected
[   82.384857] 
[   82.386383] Memory state around the buggy address:
[   82.391204]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.397766]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.404327] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   82.410888]                              ^
[   82.415039]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.421600]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.428161] ==================================================================
[   88.125640] ==================================================================
[   88.132904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2388/0x5ab0
[   88.140350] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   88.147125] 
[   88.148620] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   88.148651] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   88.148651] Hardware name: Generic DRA74X (Flattened Device Tree)
[   88.148681] Call trace: 
[   88.148681]  unwind_backtrace from show_stack+0x18/0x1c
[   88.148712]  show_stack from dump_stack_lvl+0x70/0x90
[   88.148712]  dump_stack_lvl from print_report+0x158/0x528
[   88.148742]  print_report from kasan_report+0xdc/0x118
[   88.148773]  kasan_report from kasan_check_range+0x14c/0x198
[   88.148803]  kasan_check_range from kasan_atomics_helper+0x2388/0x5ab0
[   88.148834]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   88.148834]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   88.148864]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.148895]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   88.148925]  kthread from ret_from_fork+0x14/0x20
[   88.148956] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   88.148956] 3fa0:                                     00000000 00000000 00000000 00000000
[   88.148986] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   88.148986] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   88.149017] 
[   88.266967] Allocated by task 317:
[   88.270416]  kasan_save_track+0x30/0x5c
[   88.274261]  __kasan_kmalloc+0x8c/0x94
[   88.278045]  kasan_atomics+0xc0/0x33c
[   88.281738]  kunit_try_run_case+0x22c/0x5a8
[   88.285980]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.291503]  kthread+0x464/0x810
[   88.294738]  ret_from_fork+0x14/0x20
[   88.298370] 
[   88.299865] The buggy address belongs to the object at cc90f300
[   88.299865]  which belongs to the cache kmalloc-64 of size 64
[   88.311584] The buggy address is located 0 bytes to the right of
[   88.311584]  allocated 48-byte region [cc90f300, cc90f330)
[   88.323150] 
[   88.324645] The buggy address belongs to the physical page:
[   88.330230] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   88.337524] flags: 0x0(zone=0)
[   88.340606] page_type: f5(slab)
[   88.343780] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   88.351898] raw: 00000000
[   88.354553] page dumped because: kasan: bad access detected
[   88.360168] 
[   88.361663] Memory state around the buggy address:
[   88.366485]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.373046]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.379608] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   88.386199]                              ^
[   88.390319]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.396881]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   88.403442] ==================================================================
[   75.055541] ==================================================================
[   75.062805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x5ab0
[   75.070159] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   75.076904] 
[   75.078430] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   75.078460] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   75.078460] Hardware name: Generic DRA74X (Flattened Device Tree)
[   75.078460] Call trace: 
[   75.078491]  unwind_backtrace from show_stack+0x18/0x1c
[   75.078491]  show_stack from dump_stack_lvl+0x70/0x90
[   75.078521]  dump_stack_lvl from print_report+0x158/0x528
[   75.078552]  print_report from kasan_report+0xdc/0x118
[   75.078582]  kasan_report from kasan_check_range+0x14c/0x198
[   75.078582]  kasan_check_range from kasan_atomics_helper+0x6ec/0x5ab0
[   75.078613]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   75.078643]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   75.078674]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.078704]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   75.078735]  kthread from ret_from_fork+0x14/0x20
[   75.078765] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   75.078765] 3fa0:                                     00000000 00000000 00000000 00000000
[   75.078796] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   75.078796] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   75.078826] 
[   75.196685] Allocated by task 317:
[   75.200134]  kasan_save_track+0x30/0x5c
[   75.203979]  __kasan_kmalloc+0x8c/0x94
[   75.207763]  kasan_atomics+0xc0/0x33c
[   75.211456]  kunit_try_run_case+0x22c/0x5a8
[   75.215698]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.221221]  kthread+0x464/0x810
[   75.224487]  ret_from_fork+0x14/0x20
[   75.228088] 
[   75.229583] The buggy address belongs to the object at cc90f300
[   75.229583]  which belongs to the cache kmalloc-64 of size 64
[   75.241302] The buggy address is located 0 bytes to the right of
[   75.241302]  allocated 48-byte region [cc90f300, cc90f330)
[   75.252868] 
[   75.254364] The buggy address belongs to the physical page:
[   75.259979] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   75.267242] flags: 0x0(zone=0)
[   75.270324] page_type: f5(slab)
[   75.273498] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   75.281616] raw: 00000000
[   75.284271] page dumped because: kasan: bad access detected
[   75.289886] 
[   75.291381] Memory state around the buggy address:
[   75.296203]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.302764]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.309356] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   75.315917]                              ^
[   75.320037]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.326629]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   75.333190] ==================================================================
[   84.710418] ==================================================================
[   84.717681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b4c/0x5ab0
[   84.725128] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   84.731872] 
[   84.733367] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   84.733398] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   84.733428] Hardware name: Generic DRA74X (Flattened Device Tree)
[   84.733428] Call trace: 
[   84.733428]  unwind_backtrace from show_stack+0x18/0x1c
[   84.733459]  show_stack from dump_stack_lvl+0x70/0x90
[   84.733489]  dump_stack_lvl from print_report+0x158/0x528
[   84.733520]  print_report from kasan_report+0xdc/0x118
[   84.733520]  kasan_report from kasan_check_range+0x14c/0x198
[   84.733551]  kasan_check_range from kasan_atomics_helper+0x1b4c/0x5ab0
[   84.733581]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   84.733612]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   84.733642]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.733673]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   84.733703]  kthread from ret_from_fork+0x14/0x20
[   84.733703] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   84.733734] 3fa0:                                     00000000 00000000 00000000 00000000
[   84.733734] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   84.733764] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   84.733764] 
[   84.851745] Allocated by task 317:
[   84.855163]  kasan_save_track+0x30/0x5c
[   84.859039]  __kasan_kmalloc+0x8c/0x94
[   84.862823]  kasan_atomics+0xc0/0x33c
[   84.866516]  kunit_try_run_case+0x22c/0x5a8
[   84.870727]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.876251]  kthread+0x464/0x810
[   84.879516]  ret_from_fork+0x14/0x20
[   84.883117] 
[   84.884613] The buggy address belongs to the object at cc90f300
[   84.884613]  which belongs to the cache kmalloc-64 of size 64
[   84.896362] The buggy address is located 0 bytes to the right of
[   84.896362]  allocated 48-byte region [cc90f300, cc90f330)
[   84.907897] 
[   84.909393] The buggy address belongs to the physical page:
[   84.915008] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   84.922271] flags: 0x0(zone=0)
[   84.925354] page_type: f5(slab)
[   84.928527] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   84.936676] raw: 00000000
[   84.939300] page dumped because: kasan: bad access detected
[   84.944915] 
[   84.946411] Memory state around the buggy address:
[   84.951232]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.957824]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.964385] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   84.970947]                              ^
[   84.975067]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.981658]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.988220] ==================================================================
[   86.414916] ==================================================================
[   86.422210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f50/0x5ab0
[   86.429656] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   86.436401] 
[   86.437896] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   86.437927] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   86.437927] Hardware name: Generic DRA74X (Flattened Device Tree)
[   86.437957] Call trace: 
[   86.437957]  unwind_backtrace from show_stack+0x18/0x1c
[   86.437988]  show_stack from dump_stack_lvl+0x70/0x90
[   86.438018]  dump_stack_lvl from print_report+0x158/0x528
[   86.438049]  print_report from kasan_report+0xdc/0x118
[   86.438049]  kasan_report from kasan_check_range+0x14c/0x198
[   86.438079]  kasan_check_range from kasan_atomics_helper+0x1f50/0x5ab0
[   86.438110]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   86.438140]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   86.438171]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.438171]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   86.438201]  kthread from ret_from_fork+0x14/0x20
[   86.438232] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   86.438232] 3fa0:                                     00000000 00000000 00000000 00000000
[   86.438262] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   86.438293] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   86.438293] 
[   86.556274] Allocated by task 317:
[   86.559692]  kasan_save_track+0x30/0x5c
[   86.563568]  __kasan_kmalloc+0x8c/0x94
[   86.567352]  kasan_atomics+0xc0/0x33c
[   86.571044]  kunit_try_run_case+0x22c/0x5a8
[   86.575256]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.580780]  kthread+0x464/0x810
[   86.584045]  ret_from_fork+0x14/0x20
[   86.587646] 
[   86.589141] The buggy address belongs to the object at cc90f300
[   86.589141]  which belongs to the cache kmalloc-64 of size 64
[   86.600860] The buggy address is located 0 bytes to the right of
[   86.600860]  allocated 48-byte region [cc90f300, cc90f330)
[   86.612426] 
[   86.613922] The buggy address belongs to the physical page:
[   86.619537] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   86.626800] flags: 0x0(zone=0)
[   86.629882] page_type: f5(slab)
[   86.633056] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   86.641204] raw: 00000000
[   86.643829] page dumped because: kasan: bad access detected
[   86.649444] 
[   86.650939] Memory state around the buggy address:
[   86.655761]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.662322]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.668914] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   86.675476]                              ^
[   86.679595]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.686157]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.692749] ==================================================================
[   89.253662] ==================================================================
[   89.260925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2578/0x5ab0
[   89.268371] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   89.275115] 
[   89.276611] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   89.276641] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   89.276672] Hardware name: Generic DRA74X (Flattened Device Tree)
[   89.276672] Call trace: 
[   89.276672]  unwind_backtrace from show_stack+0x18/0x1c
[   89.276702]  show_stack from dump_stack_lvl+0x70/0x90
[   89.276733]  dump_stack_lvl from print_report+0x158/0x528
[   89.276763]  print_report from kasan_report+0xdc/0x118
[   89.276763]  kasan_report from kasan_check_range+0x14c/0x198
[   89.276794]  kasan_check_range from kasan_atomics_helper+0x2578/0x5ab0
[   89.276824]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   89.276855]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   89.276885]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.276916]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   89.276947]  kthread from ret_from_fork+0x14/0x20
[   89.276947] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   89.276977] 3fa0:                                     00000000 00000000 00000000 00000000
[   89.276977] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   89.277008] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   89.277008] 
[   89.394989] Allocated by task 317:
[   89.398406]  kasan_save_track+0x30/0x5c
[   89.402282]  __kasan_kmalloc+0x8c/0x94
[   89.406066]  kasan_atomics+0xc0/0x33c
[   89.409759]  kunit_try_run_case+0x22c/0x5a8
[   89.413970]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.419494]  kthread+0x464/0x810
[   89.422760]  ret_from_fork+0x14/0x20
[   89.426361] 
[   89.427856] The buggy address belongs to the object at cc90f300
[   89.427856]  which belongs to the cache kmalloc-64 of size 64
[   89.439575] The buggy address is located 0 bytes to the right of
[   89.439575]  allocated 48-byte region [cc90f300, cc90f330)
[   89.451141] 
[   89.452636] The buggy address belongs to the physical page:
[   89.458251] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   89.465515] flags: 0x0(zone=0)
[   89.468597] page_type: f5(slab)
[   89.471771] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   89.479888] raw: 00000000
[   89.482543] page dumped because: kasan: bad access detected
[   89.488159] 
[   89.489654] Memory state around the buggy address:
[   89.494476]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.501037]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.507629] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   89.514190]                              ^
[   89.518310]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.524871]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.531433] ==================================================================
[   82.714477] ==================================================================
[   82.721740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x5ab0
[   82.729187] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   82.735931] 
[   82.737457] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   82.737487] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   82.737487] Hardware name: Generic DRA74X (Flattened Device Tree)
[   82.737487] Call trace: 
[   82.737518]  unwind_backtrace from show_stack+0x18/0x1c
[   82.737518]  show_stack from dump_stack_lvl+0x70/0x90
[   82.737548]  dump_stack_lvl from print_report+0x158/0x528
[   82.737579]  print_report from kasan_report+0xdc/0x118
[   82.737609]  kasan_report from kasan_check_range+0x14c/0x198
[   82.737640]  kasan_check_range from kasan_atomics_helper+0x16d0/0x5ab0
[   82.737640]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   82.737670]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   82.737701]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.737731]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   82.737762]  kthread from ret_from_fork+0x14/0x20
[   82.737792] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   82.737792] 3fa0:                                     00000000 00000000 00000000 00000000
[   82.737823] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   82.737823] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   82.737854] 
[   82.855804] Allocated by task 317:
[   82.859252]  kasan_save_track+0x30/0x5c
[   82.863098]  __kasan_kmalloc+0x8c/0x94
[   82.866882]  kasan_atomics+0xc0/0x33c
[   82.870574]  kunit_try_run_case+0x22c/0x5a8
[   82.874816]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.880340]  kthread+0x464/0x810
[   82.883605]  ret_from_fork+0x14/0x20
[   82.887207] 
[   82.888702] The buggy address belongs to the object at cc90f300
[   82.888702]  which belongs to the cache kmalloc-64 of size 64
[   82.900421] The buggy address is located 0 bytes to the right of
[   82.900421]  allocated 48-byte region [cc90f300, cc90f330)
[   82.911987] 
[   82.913482] The buggy address belongs to the physical page:
[   82.919097] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   82.926361] flags: 0x0(zone=0)
[   82.929443] page_type: f5(slab)
[   82.932617] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   82.940734] raw: 00000000
[   82.943389] page dumped because: kasan: bad access detected
[   82.949005] 
[   82.950500] Memory state around the buggy address:
[   82.955322]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.961883]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.968475] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   82.975036]                              ^
[   82.979156]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.985717]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.992309] ==================================================================
[   73.357849] ==================================================================
[   73.365112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x420/0x5ab0
[   73.372467] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   73.379119] 
[   73.380645] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   73.380676] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   73.380676] Hardware name: Generic DRA74X (Flattened Device Tree)
[   73.380676] Call trace: 
[   73.380706]  unwind_backtrace from show_stack+0x18/0x1c
[   73.380737]  show_stack from dump_stack_lvl+0x70/0x90
[   73.380737]  dump_stack_lvl from print_report+0x158/0x528
[   73.380767]  print_report from kasan_report+0xdc/0x118
[   73.380798]  kasan_report from kasan_check_range+0x14c/0x198
[   73.380828]  kasan_check_range from kasan_atomics_helper+0x420/0x5ab0
[   73.380828]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   73.380859]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   73.380889]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.380920]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   73.380950]  kthread from ret_from_fork+0x14/0x20
[   73.380981] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   73.380981] 3fa0:                                     00000000 00000000 00000000 00000000
[   73.381011] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   73.381011] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   73.381042] 
[   73.498931] Allocated by task 317:
[   73.502349]  kasan_save_track+0x30/0x5c
[   73.506225]  __kasan_kmalloc+0x8c/0x94
[   73.509979]  kasan_atomics+0xc0/0x33c
[   73.513702]  kunit_try_run_case+0x22c/0x5a8
[   73.517913]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.523437]  kthread+0x464/0x810
[   73.526702]  ret_from_fork+0x14/0x20
[   73.530303] 
[   73.531799] The buggy address belongs to the object at cc90f300
[   73.531799]  which belongs to the cache kmalloc-64 of size 64
[   73.543518] The buggy address is located 0 bytes to the right of
[   73.543518]  allocated 48-byte region [cc90f300, cc90f330)
[   73.555084] 
[   73.556579] The buggy address belongs to the physical page:
[   73.562194] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   73.569458] flags: 0x0(zone=0)
[   73.572540] page_type: f5(slab)
[   73.575714] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   73.583862] raw: 00000000
[   73.586486] page dumped because: kasan: bad access detected
[   73.592102] 
[   73.593597] Memory state around the buggy address:
[   73.598419]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.605010]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.611572] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.618133]                              ^
[   73.622253]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.628845]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.635406] ==================================================================
[   81.871459] ==================================================================
[   81.878723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52e4/0x5ab0
[   81.886169] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   81.892822] 
[   81.894348] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   81.894378] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   81.894378] Hardware name: Generic DRA74X (Flattened Device Tree)
[   81.894378] Call trace: 
[   81.894378]  unwind_backtrace from show_stack+0x18/0x1c
[   81.894409]  show_stack from dump_stack_lvl+0x70/0x90
[   81.894439]  dump_stack_lvl from print_report+0x158/0x528
[   81.894470]  print_report from kasan_report+0xdc/0x118
[   81.894500]  kasan_report from kasan_atomics_helper+0x52e4/0x5ab0
[   81.894500]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   81.894531]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   81.894561]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.894592]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   81.894622]  kthread from ret_from_fork+0x14/0x20
[   81.894653] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   81.894653] 3fa0:                                     00000000 00000000 00000000 00000000
[   81.894683] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   81.894683] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   81.894714] 
[   82.006561] Allocated by task 317:
[   82.009979]  kasan_save_track+0x30/0x5c
[   82.013854]  __kasan_kmalloc+0x8c/0x94
[   82.017639]  kasan_atomics+0xc0/0x33c
[   82.021331]  kunit_try_run_case+0x22c/0x5a8
[   82.025543]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.031066]  kthread+0x464/0x810
[   82.034332]  ret_from_fork+0x14/0x20
[   82.037933] 
[   82.039428] The buggy address belongs to the object at cc90f300
[   82.039428]  which belongs to the cache kmalloc-64 of size 64
[   82.051177] The buggy address is located 0 bytes to the right of
[   82.051177]  allocated 48-byte region [cc90f300, cc90f330)
[   82.062713] 
[   82.064208] The buggy address belongs to the physical page:
[   82.069824] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   82.077087] flags: 0x0(zone=0)
[   82.080169] page_type: f5(slab)
[   82.083343] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   82.091491] raw: 00000000
[   82.094116] page dumped because: kasan: bad access detected
[   82.099731] 
[   82.101226] Memory state around the buggy address:
[   82.106048]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.112640]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.119201] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   82.125762]                              ^
[   82.129882]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.136474]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.143035] ==================================================================
[   81.307525] ==================================================================
[   81.314788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52d8/0x5ab0
[   81.322235] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   81.328887] 
[   81.330413] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   81.330444] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   81.330444] Hardware name: Generic DRA74X (Flattened Device Tree)
[   81.330444] Call trace: 
[   81.330444]  unwind_backtrace from show_stack+0x18/0x1c
[   81.330474]  show_stack from dump_stack_lvl+0x70/0x90
[   81.330505]  dump_stack_lvl from print_report+0x158/0x528
[   81.330535]  print_report from kasan_report+0xdc/0x118
[   81.330566]  kasan_report from kasan_atomics_helper+0x52d8/0x5ab0
[   81.330596]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   81.330596]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   81.330627]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.330657]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   81.330688]  kthread from ret_from_fork+0x14/0x20
[   81.330718] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   81.330718] 3fa0:                                     00000000 00000000 00000000 00000000
[   81.330749] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   81.330749] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   81.330780] 
[   81.442626] Allocated by task 317:
[   81.446044]  kasan_save_track+0x30/0x5c
[   81.449920]  __kasan_kmalloc+0x8c/0x94
[   81.453704]  kasan_atomics+0xc0/0x33c
[   81.457397]  kunit_try_run_case+0x22c/0x5a8
[   81.461608]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.467132]  kthread+0x464/0x810
[   81.470397]  ret_from_fork+0x14/0x20
[   81.473999] 
[   81.475494] The buggy address belongs to the object at cc90f300
[   81.475494]  which belongs to the cache kmalloc-64 of size 64
[   81.487243] The buggy address is located 0 bytes to the right of
[   81.487243]  allocated 48-byte region [cc90f300, cc90f330)
[   81.498779] 
[   81.500274] The buggy address belongs to the physical page:
[   81.505889] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   81.513153] flags: 0x0(zone=0)
[   81.516235] page_type: f5(slab)
[   81.519409] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   81.527557] raw: 00000000
[   81.530181] page dumped because: kasan: bad access detected
[   81.535797] 
[   81.537292] Memory state around the buggy address:
[   81.542114]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.548706]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.555267] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   81.561828]                              ^
[   81.565948]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.572540]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.579101] ==================================================================
[   86.700042] ==================================================================
[   86.707305] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ffc/0x5ab0
[   86.714782] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   86.721527] 
[   86.723022] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   86.723052] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   86.723052] Hardware name: Generic DRA74X (Flattened Device Tree)
[   86.723083] Call trace: 
[   86.723083]  unwind_backtrace from show_stack+0x18/0x1c
[   86.723114]  show_stack from dump_stack_lvl+0x70/0x90
[   86.723114]  dump_stack_lvl from print_report+0x158/0x528
[   86.723144]  print_report from kasan_report+0xdc/0x118
[   86.723175]  kasan_report from kasan_check_range+0x14c/0x198
[   86.723205]  kasan_check_range from kasan_atomics_helper+0x1ffc/0x5ab0
[   86.723236]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   86.723236]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   86.723266]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.723297]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   86.723327]  kthread from ret_from_fork+0x14/0x20
[   86.723358] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   86.723358] 3fa0:                                     00000000 00000000 00000000 00000000
[   86.723388] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   86.723388] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   86.723419] 
[   86.841400] Allocated by task 317:
[   86.844818]  kasan_save_track+0x30/0x5c
[   86.848693]  __kasan_kmalloc+0x8c/0x94
[   86.852447]  kasan_atomics+0xc0/0x33c
[   86.856140]  kunit_try_run_case+0x22c/0x5a8
[   86.860382]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.865905]  kthread+0x464/0x810
[   86.869171]  ret_from_fork+0x14/0x20
[   86.872772] 
[   86.874267] The buggy address belongs to the object at cc90f300
[   86.874267]  which belongs to the cache kmalloc-64 of size 64
[   86.885986] The buggy address is located 0 bytes to the right of
[   86.885986]  allocated 48-byte region [cc90f300, cc90f330)
[   86.897552] 
[   86.899047] The buggy address belongs to the physical page:
[   86.904663] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   86.911926] flags: 0x0(zone=0)
[   86.915008] page_type: f5(slab)
[   86.918182] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   86.926300] raw: 00000000
[   86.928955] page dumped because: kasan: bad access detected
[   86.934570] 
[   86.936065] Memory state around the buggy address:
[   86.940887]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.947448]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.954010] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   86.960601]                              ^
[   86.964721]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.971282]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.977844] ==================================================================
[   78.469024] ==================================================================
[   78.476287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xedc/0x5ab0
[   78.483673] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   78.490417] 
[   78.491912] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   78.491943] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   78.491943] Hardware name: Generic DRA74X (Flattened Device Tree)
[   78.491973] Call trace: 
[   78.491973]  unwind_backtrace from show_stack+0x18/0x1c
[   78.492004]  show_stack from dump_stack_lvl+0x70/0x90
[   78.492004]  dump_stack_lvl from print_report+0x158/0x528
[   78.492034]  print_report from kasan_report+0xdc/0x118
[   78.492065]  kasan_report from kasan_check_range+0x14c/0x198
[   78.492095]  kasan_check_range from kasan_atomics_helper+0xedc/0x5ab0
[   78.492126]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   78.492126]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   78.492156]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.492187]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   78.492218]  kthread from ret_from_fork+0x14/0x20
[   78.492248] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   78.492248] 3fa0:                                     00000000 00000000 00000000 00000000
[   78.492279] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   78.492279] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   78.492309] 
[   78.610198] Allocated by task 317:
[   78.613616]  kasan_save_track+0x30/0x5c
[   78.617492]  __kasan_kmalloc+0x8c/0x94
[   78.621246]  kasan_atomics+0xc0/0x33c
[   78.624938]  kunit_try_run_case+0x22c/0x5a8
[   78.629180]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.634704]  kthread+0x464/0x810
[   78.637969]  ret_from_fork+0x14/0x20
[   78.641571] 
[   78.643066] The buggy address belongs to the object at cc90f300
[   78.643066]  which belongs to the cache kmalloc-64 of size 64
[   78.654785] The buggy address is located 0 bytes to the right of
[   78.654785]  allocated 48-byte region [cc90f300, cc90f330)
[   78.666351] 
[   78.667846] The buggy address belongs to the physical page:
[   78.673461] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   78.680725] flags: 0x0(zone=0)
[   78.683807] page_type: f5(slab)
[   78.686981] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   78.695098] raw: 00000000
[   78.697753] page dumped because: kasan: bad access detected
[   78.703369] 
[   78.704864] Memory state around the buggy address:
[   78.709686]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.716247]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.722839] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.729400]                              ^
[   78.733520]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.740081]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.746673] ==================================================================
[   78.753967] ==================================================================
[   78.761260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x5ab0
[   78.768615] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   78.775360] 
[   78.776855] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   78.776885] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   78.776916] Hardware name: Generic DRA74X (Flattened Device Tree)
[   78.776916] Call trace: 
[   78.776916]  unwind_backtrace from show_stack+0x18/0x1c
[   78.776947]  show_stack from dump_stack_lvl+0x70/0x90
[   78.776977]  dump_stack_lvl from print_report+0x158/0x528
[   78.777008]  print_report from kasan_report+0xdc/0x118
[   78.777008]  kasan_report from kasan_check_range+0x14c/0x198
[   78.777038]  kasan_check_range from kasan_atomics_helper+0xf88/0x5ab0
[   78.777069]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   78.777099]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   78.777130]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.777160]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   78.777160]  kthread from ret_from_fork+0x14/0x20
[   78.777191] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   78.777221] 3fa0:                                     00000000 00000000 00000000 00000000
[   78.777221] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   78.777252] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   78.777252] 
[   78.895141] Allocated by task 317:
[   78.898559]  kasan_save_track+0x30/0x5c
[   78.902435]  __kasan_kmalloc+0x8c/0x94
[   78.906219]  kasan_atomics+0xc0/0x33c
[   78.909912]  kunit_try_run_case+0x22c/0x5a8
[   78.914123]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.919647]  kthread+0x464/0x810
[   78.922912]  ret_from_fork+0x14/0x20
[   78.926513] 
[   78.928009] The buggy address belongs to the object at cc90f300
[   78.928009]  which belongs to the cache kmalloc-64 of size 64
[   78.939758] The buggy address is located 0 bytes to the right of
[   78.939758]  allocated 48-byte region [cc90f300, cc90f330)
[   78.951293] 
[   78.952789] The buggy address belongs to the physical page:
[   78.958404] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   78.965667] flags: 0x0(zone=0)
[   78.968749] page_type: f5(slab)
[   78.971923] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   78.980072] raw: 00000000
[   78.982696] page dumped because: kasan: bad access detected
[   78.988311] 
[   78.989807] Memory state around the buggy address:
[   78.994628]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.001220]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.007781] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.014343]                              ^
[   79.018493]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.025054]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.031616] ==================================================================
[   79.894317] ==================================================================
[   79.901580] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1268/0x5ab0
[   79.909027] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   79.915802] 
[   79.917297] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   79.917327] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   79.917327] Hardware name: Generic DRA74X (Flattened Device Tree)
[   79.917358] Call trace: 
[   79.917358]  unwind_backtrace from show_stack+0x18/0x1c
[   79.917388]  show_stack from dump_stack_lvl+0x70/0x90
[   79.917388]  dump_stack_lvl from print_report+0x158/0x528
[   79.917419]  print_report from kasan_report+0xdc/0x118
[   79.917449]  kasan_report from kasan_check_range+0x14c/0x198
[   79.917480]  kasan_check_range from kasan_atomics_helper+0x1268/0x5ab0
[   79.917480]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   79.917510]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   79.917541]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.917572]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   79.917602]  kthread from ret_from_fork+0x14/0x20
[   79.917633] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   79.917633] 3fa0:                                     00000000 00000000 00000000 00000000
[   79.917663] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   79.917663] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   79.917694] 
[   80.035675] Allocated by task 317:
[   80.039093]  kasan_save_track+0x30/0x5c
[   80.042968]  __kasan_kmalloc+0x8c/0x94
[   80.046722]  kasan_atomics+0xc0/0x33c
[   80.050445]  kunit_try_run_case+0x22c/0x5a8
[   80.054656]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.060180]  kthread+0x464/0x810
[   80.063446]  ret_from_fork+0x14/0x20
[   80.067047] 
[   80.068542] The buggy address belongs to the object at cc90f300
[   80.068542]  which belongs to the cache kmalloc-64 of size 64
[   80.080261] The buggy address is located 0 bytes to the right of
[   80.080261]  allocated 48-byte region [cc90f300, cc90f330)
[   80.091827] 
[   80.093322] The buggy address belongs to the physical page:
[   80.098937] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   80.106201] flags: 0x0(zone=0)
[   80.109283] page_type: f5(slab)
[   80.112457] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   80.120605] raw: 00000000
[   80.123229] page dumped because: kasan: bad access detected
[   80.128845] 
[   80.130340] Memory state around the buggy address:
[   80.135162]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.141723]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.148315] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.154876]                              ^
[   80.158996]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.165557]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.172149] ==================================================================
[   85.565765] ==================================================================
[   85.573028] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d50/0x5ab0
[   85.580474] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   85.587249] 
[   85.588745] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   85.588775] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   85.588775] Hardware name: Generic DRA74X (Flattened Device Tree)
[   85.588775] Call trace: 
[   85.588806]  unwind_backtrace from show_stack+0x18/0x1c
[   85.588836]  show_stack from dump_stack_lvl+0x70/0x90
[   85.588836]  dump_stack_lvl from print_report+0x158/0x528
[   85.588867]  print_report from kasan_report+0xdc/0x118
[   85.588897]  kasan_report from kasan_check_range+0x14c/0x198
[   85.588928]  kasan_check_range from kasan_atomics_helper+0x1d50/0x5ab0
[   85.588928]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   85.588958]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   85.588989]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.589019]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   85.589050]  kthread from ret_from_fork+0x14/0x20
[   85.589080] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   85.589080] 3fa0:                                     00000000 00000000 00000000 00000000
[   85.589111] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   85.589111] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   85.589141] 
[   85.707122] Allocated by task 317:
[   85.710540]  kasan_save_track+0x30/0x5c
[   85.714416]  __kasan_kmalloc+0x8c/0x94
[   85.718170]  kasan_atomics+0xc0/0x33c
[   85.721862]  kunit_try_run_case+0x22c/0x5a8
[   85.726104]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.731628]  kthread+0x464/0x810
[   85.734893]  ret_from_fork+0x14/0x20
[   85.738494] 
[   85.739990] The buggy address belongs to the object at cc90f300
[   85.739990]  which belongs to the cache kmalloc-64 of size 64
[   85.751708] The buggy address is located 0 bytes to the right of
[   85.751708]  allocated 48-byte region [cc90f300, cc90f330)
[   85.763275] 
[   85.764770] The buggy address belongs to the physical page:
[   85.770385] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   85.777648] flags: 0x0(zone=0)
[   85.780731] page_type: f5(slab)
[   85.783905] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   85.792022] raw: 00000000
[   85.794677] page dumped because: kasan: bad access detected
[   85.800292] 
[   85.801788] Memory state around the buggy address:
[   85.806610]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.813171]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.819763] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   85.826324]                              ^
[   85.830444]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.837005]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.843597] ==================================================================
[   87.555419] ==================================================================
[   87.562683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2200/0x5ab0
[   87.570129] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   87.576873] 
[   87.578369] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   87.578399] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   87.578430] Hardware name: Generic DRA74X (Flattened Device Tree)
[   87.578430] Call trace: 
[   87.578430]  unwind_backtrace from show_stack+0x18/0x1c
[   87.578460]  show_stack from dump_stack_lvl+0x70/0x90
[   87.578491]  dump_stack_lvl from print_report+0x158/0x528
[   87.578521]  print_report from kasan_report+0xdc/0x118
[   87.578552]  kasan_report from kasan_check_range+0x14c/0x198
[   87.578552]  kasan_check_range from kasan_atomics_helper+0x2200/0x5ab0
[   87.578582]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   87.578613]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   87.578643]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.578674]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   87.578704]  kthread from ret_from_fork+0x14/0x20
[   87.578704] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   87.578735] 3fa0:                                     00000000 00000000 00000000 00000000
[   87.578735] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   87.578765] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   87.578765] 
[   87.696746] Allocated by task 317:
[   87.700164]  kasan_save_track+0x30/0x5c
[   87.704040]  __kasan_kmalloc+0x8c/0x94
[   87.707824]  kasan_atomics+0xc0/0x33c
[   87.711517]  kunit_try_run_case+0x22c/0x5a8
[   87.715728]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.721252]  kthread+0x464/0x810
[   87.724517]  ret_from_fork+0x14/0x20
[   87.728118] 
[   87.729614] The buggy address belongs to the object at cc90f300
[   87.729614]  which belongs to the cache kmalloc-64 of size 64
[   87.741333] The buggy address is located 0 bytes to the right of
[   87.741333]  allocated 48-byte region [cc90f300, cc90f330)
[   87.752899] 
[   87.754394] The buggy address belongs to the physical page:
[   87.760009] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   87.767272] flags: 0x0(zone=0)
[   87.770355] page_type: f5(slab)
[   87.773529] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   87.781677] raw: 00000000
[   87.784301] page dumped because: kasan: bad access detected
[   87.789916] 
[   87.791412] Memory state around the buggy address:
[   87.796234]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.802795]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.809387] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   87.815948]                              ^
[   87.820068]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.826629]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.833221] ==================================================================
[   86.985168] ==================================================================
[   86.992431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20a8/0x5ab0
[   86.999908] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   87.006652] 
[   87.008148] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   87.008178] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   87.008178] Hardware name: Generic DRA74X (Flattened Device Tree)
[   87.008209] Call trace: 
[   87.008209]  unwind_backtrace from show_stack+0x18/0x1c
[   87.008239]  show_stack from dump_stack_lvl+0x70/0x90
[   87.008239]  dump_stack_lvl from print_report+0x158/0x528
[   87.008270]  print_report from kasan_report+0xdc/0x118
[   87.008300]  kasan_report from kasan_check_range+0x14c/0x198
[   87.008331]  kasan_check_range from kasan_atomics_helper+0x20a8/0x5ab0
[   87.008361]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   87.008361]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   87.008392]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.008422]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   87.008453]  kthread from ret_from_fork+0x14/0x20
[   87.008483] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   87.008483] 3fa0:                                     00000000 00000000 00000000 00000000
[   87.008514] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   87.008514] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   87.008544] 
[   87.126495] Allocated by task 317:
[   87.129943]  kasan_save_track+0x30/0x5c
[   87.133789]  __kasan_kmalloc+0x8c/0x94
[   87.137573]  kasan_atomics+0xc0/0x33c
[   87.141265]  kunit_try_run_case+0x22c/0x5a8
[   87.145507]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   87.151031]  kthread+0x464/0x810
[   87.154266]  ret_from_fork+0x14/0x20
[   87.157897] 
[   87.159393] The buggy address belongs to the object at cc90f300
[   87.159393]  which belongs to the cache kmalloc-64 of size 64
[   87.171112] The buggy address is located 0 bytes to the right of
[   87.171112]  allocated 48-byte region [cc90f300, cc90f330)
[   87.182647] 
[   87.184173] The buggy address belongs to the physical page:
[   87.189758] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   87.197052] flags: 0x0(zone=0)
[   87.200103] page_type: f5(slab)
[   87.203277] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   87.211425] raw: 00000000
[   87.214080] page dumped because: kasan: bad access detected
[   87.219665] 
[   87.221191] Memory state around the buggy address:
[   87.226013]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.232574]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.239135] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   87.245727]                              ^
[   87.249847]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.256408]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   87.262969] ==================================================================
[   84.140136] ==================================================================
[   84.147430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a04/0x5ab0
[   84.154876] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   84.161621] 
[   84.163116] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   84.163146] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   84.163146] Hardware name: Generic DRA74X (Flattened Device Tree)
[   84.163177] Call trace: 
[   84.163177]  unwind_backtrace from show_stack+0x18/0x1c
[   84.163208]  show_stack from dump_stack_lvl+0x70/0x90
[   84.163238]  dump_stack_lvl from print_report+0x158/0x528
[   84.163269]  print_report from kasan_report+0xdc/0x118
[   84.163269]  kasan_report from kasan_check_range+0x14c/0x198
[   84.163299]  kasan_check_range from kasan_atomics_helper+0x1a04/0x5ab0
[   84.163330]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   84.163360]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   84.163391]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.163391]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   84.163421]  kthread from ret_from_fork+0x14/0x20
[   84.163452] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   84.163452] 3fa0:                                     00000000 00000000 00000000 00000000
[   84.163482] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   84.163513] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   84.163513] 
[   84.281494] Allocated by task 317:
[   84.284912]  kasan_save_track+0x30/0x5c
[   84.288787]  __kasan_kmalloc+0x8c/0x94
[   84.292572]  kasan_atomics+0xc0/0x33c
[   84.296264]  kunit_try_run_case+0x22c/0x5a8
[   84.300476]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.305999]  kthread+0x464/0x810
[   84.309265]  ret_from_fork+0x14/0x20
[   84.312866] 
[   84.314361] The buggy address belongs to the object at cc90f300
[   84.314361]  which belongs to the cache kmalloc-64 of size 64
[   84.326080] The buggy address is located 0 bytes to the right of
[   84.326080]  allocated 48-byte region [cc90f300, cc90f330)
[   84.337646] 
[   84.339141] The buggy address belongs to the physical page:
[   84.344757] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   84.352020] flags: 0x0(zone=0)
[   84.355102] page_type: f5(slab)
[   84.358276] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   84.366424] raw: 00000000
[   84.369049] page dumped because: kasan: bad access detected
[   84.374664] 
[   84.376159] Memory state around the buggy address:
[   84.380981]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.387542]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.394134] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   84.400695]                              ^
[   84.404815]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.411407]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.417968] ==================================================================
[   86.136016] ==================================================================
[   86.143310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x544c/0x5ab0
[   86.150756] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   86.157409] 
[   86.158905] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   86.158935] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   86.158966] Hardware name: Generic DRA74X (Flattened Device Tree)
[   86.158966] Call trace: 
[   86.158966]  unwind_backtrace from show_stack+0x18/0x1c
[   86.158996]  show_stack from dump_stack_lvl+0x70/0x90
[   86.159027]  dump_stack_lvl from print_report+0x158/0x528
[   86.159057]  print_report from kasan_report+0xdc/0x118
[   86.159057]  kasan_report from kasan_atomics_helper+0x544c/0x5ab0
[   86.159088]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   86.159118]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   86.159149]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.159179]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   86.159210]  kthread from ret_from_fork+0x14/0x20
[   86.159210] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   86.159240] 3fa0:                                     00000000 00000000 00000000 00000000
[   86.159240] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   86.159271] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   86.159271] 
[   86.271148] Allocated by task 317:
[   86.274566]  kasan_save_track+0x30/0x5c
[   86.278442]  __kasan_kmalloc+0x8c/0x94
[   86.282226]  kasan_atomics+0xc0/0x33c
[   86.285919]  kunit_try_run_case+0x22c/0x5a8
[   86.290130]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   86.295654]  kthread+0x464/0x810
[   86.298919]  ret_from_fork+0x14/0x20
[   86.302520] 
[   86.304016] The buggy address belongs to the object at cc90f300
[   86.304016]  which belongs to the cache kmalloc-64 of size 64
[   86.315734] The buggy address is located 0 bytes to the right of
[   86.315734]  allocated 48-byte region [cc90f300, cc90f330)
[   86.327301] 
[   86.328796] The buggy address belongs to the physical page:
[   86.334411] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   86.341674] flags: 0x0(zone=0)
[   86.344757] page_type: f5(slab)
[   86.347930] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   86.356079] raw: 00000000
[   86.358703] page dumped because: kasan: bad access detected
[   86.364318] 
[   86.365814] Memory state around the buggy address:
[   86.370635]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.377197]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.383789] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   86.390350]                              ^
[   86.394470]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.401062]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   86.407623] ==================================================================
[   80.458343] ==================================================================
[   80.465637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1360/0x5ab0
[   80.473083] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   80.479827] 
[   80.481323] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   80.481353] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   80.481353] Hardware name: Generic DRA74X (Flattened Device Tree)
[   80.481384] Call trace: 
[   80.481384]  unwind_backtrace from show_stack+0x18/0x1c
[   80.481414]  show_stack from dump_stack_lvl+0x70/0x90
[   80.481445]  dump_stack_lvl from print_report+0x158/0x528
[   80.481475]  print_report from kasan_report+0xdc/0x118
[   80.481475]  kasan_report from kasan_check_range+0x14c/0x198
[   80.481506]  kasan_check_range from kasan_atomics_helper+0x1360/0x5ab0
[   80.481536]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   80.481567]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   80.481597]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.481597]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   80.481628]  kthread from ret_from_fork+0x14/0x20
[   80.481658] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   80.481658] 3fa0:                                     00000000 00000000 00000000 00000000
[   80.481689] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   80.481719] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   80.481719] 
[   80.599700] Allocated by task 317:
[   80.603118]  kasan_save_track+0x30/0x5c
[   80.606994]  __kasan_kmalloc+0x8c/0x94
[   80.610778]  kasan_atomics+0xc0/0x33c
[   80.614471]  kunit_try_run_case+0x22c/0x5a8
[   80.618682]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.624206]  kthread+0x464/0x810
[   80.627471]  ret_from_fork+0x14/0x20
[   80.631072] 
[   80.632568] The buggy address belongs to the object at cc90f300
[   80.632568]  which belongs to the cache kmalloc-64 of size 64
[   80.644287] The buggy address is located 0 bytes to the right of
[   80.644287]  allocated 48-byte region [cc90f300, cc90f330)
[   80.655853] 
[   80.657348] The buggy address belongs to the physical page:
[   80.662963] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   80.670227] flags: 0x0(zone=0)
[   80.673309] page_type: f5(slab)
[   80.676483] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   80.684631] raw: 00000000
[   80.687255] page dumped because: kasan: bad access detected
[   80.692871] 
[   80.694366] Memory state around the buggy address:
[   80.699188]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.705749]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.712341] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.718902]                              ^
[   80.723022]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.729583]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.736175] ==================================================================
[   81.586425] ==================================================================
[   81.593688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x5ab0
[   81.601135] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   81.607788] 
[   81.609283] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   81.609313] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   81.609344] Hardware name: Generic DRA74X (Flattened Device Tree)
[   81.609344] Call trace: 
[   81.609344]  unwind_backtrace from show_stack+0x18/0x1c
[   81.609374]  show_stack from dump_stack_lvl+0x70/0x90
[   81.609405]  dump_stack_lvl from print_report+0x158/0x528
[   81.609436]  print_report from kasan_report+0xdc/0x118
[   81.609466]  kasan_report from kasan_check_range+0x14c/0x198
[   81.609466]  kasan_check_range from kasan_atomics_helper+0x154c/0x5ab0
[   81.609497]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   81.609527]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   81.609558]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.609588]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   81.609619]  kthread from ret_from_fork+0x14/0x20
[   81.609619] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   81.609649] 3fa0:                                     00000000 00000000 00000000 00000000
[   81.609649] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   81.609680] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   81.609680] 
[   81.727661] Allocated by task 317:
[   81.731079]  kasan_save_track+0x30/0x5c
[   81.734954]  __kasan_kmalloc+0x8c/0x94
[   81.738739]  kasan_atomics+0xc0/0x33c
[   81.742431]  kunit_try_run_case+0x22c/0x5a8
[   81.746643]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   81.752166]  kthread+0x464/0x810
[   81.755432]  ret_from_fork+0x14/0x20
[   81.759033] 
[   81.760528] The buggy address belongs to the object at cc90f300
[   81.760528]  which belongs to the cache kmalloc-64 of size 64
[   81.772247] The buggy address is located 0 bytes to the right of
[   81.772247]  allocated 48-byte region [cc90f300, cc90f330)
[   81.783813] 
[   81.785308] The buggy address belongs to the physical page:
[   81.790924] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   81.798187] flags: 0x0(zone=0)
[   81.801269] page_type: f5(slab)
[   81.804443] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   81.812591] raw: 00000000
[   81.815216] page dumped because: kasan: bad access detected
[   81.820831] 
[   81.822326] Memory state around the buggy address:
[   81.827148]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.833740]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.840301] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   81.846862]                              ^
[   81.850982]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.857574]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.864135] ==================================================================
[   88.974761] ==================================================================
[   88.982025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54f4/0x5ab0
[   88.989501] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   88.996154] 
[   88.997650] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   88.997680] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   88.997680] Hardware name: Generic DRA74X (Flattened Device Tree)
[   88.997711] Call trace: 
[   88.997711]  unwind_backtrace from show_stack+0x18/0x1c
[   88.997741]  show_stack from dump_stack_lvl+0x70/0x90
[   88.997772]  dump_stack_lvl from print_report+0x158/0x528
[   88.997802]  print_report from kasan_report+0xdc/0x118
[   88.997802]  kasan_report from kasan_atomics_helper+0x54f4/0x5ab0
[   88.997833]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   88.997863]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   88.997894]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   88.997924]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   88.997955]  kthread from ret_from_fork+0x14/0x20
[   88.997955] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   88.997985] 3fa0:                                     00000000 00000000 00000000 00000000
[   88.997985] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   88.998016] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   88.998016] 
[   89.109893] Allocated by task 317:
[   89.113311]  kasan_save_track+0x30/0x5c
[   89.117187]  __kasan_kmalloc+0x8c/0x94
[   89.120941]  kasan_atomics+0xc0/0x33c
[   89.124664]  kunit_try_run_case+0x22c/0x5a8
[   89.128875]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.134399]  kthread+0x464/0x810
[   89.137664]  ret_from_fork+0x14/0x20
[   89.141265] 
[   89.142761] The buggy address belongs to the object at cc90f300
[   89.142761]  which belongs to the cache kmalloc-64 of size 64
[   89.154479] The buggy address is located 0 bytes to the right of
[   89.154479]  allocated 48-byte region [cc90f300, cc90f330)
[   89.166046] 
[   89.167541] The buggy address belongs to the physical page:
[   89.173126] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   89.180419] flags: 0x0(zone=0)
[   89.183471] page_type: f5(slab)
[   89.186645] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   89.194793] raw: 00000000
[   89.197448] page dumped because: kasan: bad access detected
[   89.203033] 
[   89.204528] Memory state around the buggy address:
[   89.209350]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.215942]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.222503] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   89.229064]                              ^
[   89.233184]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.239776]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.246337] ==================================================================
[   77.050292] ==================================================================
[   77.057556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x5ab0
[   77.064941] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   77.071685] 
[   77.073181] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   77.073211] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   77.073211] Hardware name: Generic DRA74X (Flattened Device Tree)
[   77.073242] Call trace: 
[   77.073242]  unwind_backtrace from show_stack+0x18/0x1c
[   77.073272]  show_stack from dump_stack_lvl+0x70/0x90
[   77.073303]  dump_stack_lvl from print_report+0x158/0x528
[   77.073303]  print_report from kasan_report+0xdc/0x118
[   77.073333]  kasan_report from kasan_check_range+0x14c/0x198
[   77.073364]  kasan_check_range from kasan_atomics_helper+0xb70/0x5ab0
[   77.073394]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   77.073425]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   77.073425]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.073455]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   77.073486]  kthread from ret_from_fork+0x14/0x20
[   77.073516] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   77.073516] 3fa0:                                     00000000 00000000 00000000 00000000
[   77.073547] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   77.073547] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   77.073577] 
[   77.191467] Allocated by task 317:
[   77.194885]  kasan_save_track+0x30/0x5c
[   77.198760]  __kasan_kmalloc+0x8c/0x94
[   77.202545]  kasan_atomics+0xc0/0x33c
[   77.206237]  kunit_try_run_case+0x22c/0x5a8
[   77.210449]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.215972]  kthread+0x464/0x810
[   77.219238]  ret_from_fork+0x14/0x20
[   77.222839] 
[   77.224334] The buggy address belongs to the object at cc90f300
[   77.224334]  which belongs to the cache kmalloc-64 of size 64
[   77.236053] The buggy address is located 0 bytes to the right of
[   77.236053]  allocated 48-byte region [cc90f300, cc90f330)
[   77.247619] 
[   77.249114] The buggy address belongs to the physical page:
[   77.254730] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   77.261993] flags: 0x0(zone=0)
[   77.265075] page_type: f5(slab)
[   77.268249] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   77.276397] raw: 00000000
[   77.279022] page dumped because: kasan: bad access detected
[   77.284637] 
[   77.286132] Memory state around the buggy address:
[   77.290954]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.297515]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.304107] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.310668]                              ^
[   77.314788]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.321380]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.327941] ==================================================================
[   77.905181] ==================================================================
[   77.912445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5404/0x5ab0
[   77.919891] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   77.926544] 
[   77.928070] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   77.928100] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   77.928100] Hardware name: Generic DRA74X (Flattened Device Tree)
[   77.928100] Call trace: 
[   77.928100]  unwind_backtrace from show_stack+0x18/0x1c
[   77.928131]  show_stack from dump_stack_lvl+0x70/0x90
[   77.928161]  dump_stack_lvl from print_report+0x158/0x528
[   77.928192]  print_report from kasan_report+0xdc/0x118
[   77.928222]  kasan_report from kasan_atomics_helper+0x5404/0x5ab0
[   77.928253]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   77.928253]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   77.928283]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.928314]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   77.928344]  kthread from ret_from_fork+0x14/0x20
[   77.928375] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   77.928375] 3fa0:                                     00000000 00000000 00000000 00000000
[   77.928405] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   77.928405] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   77.928436] 
[   78.040283] Allocated by task 317:
[   78.043701]  kasan_save_track+0x30/0x5c
[   78.047576]  __kasan_kmalloc+0x8c/0x94
[   78.051361]  kasan_atomics+0xc0/0x33c
[   78.055053]  kunit_try_run_case+0x22c/0x5a8
[   78.059265]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.064788]  kthread+0x464/0x810
[   78.068054]  ret_from_fork+0x14/0x20
[   78.071655] 
[   78.073150] The buggy address belongs to the object at cc90f300
[   78.073150]  which belongs to the cache kmalloc-64 of size 64
[   78.084899] The buggy address is located 0 bytes to the right of
[   78.084899]  allocated 48-byte region [cc90f300, cc90f330)
[   78.096435] 
[   78.097930] The buggy address belongs to the physical page:
[   78.103546] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   78.110809] flags: 0x0(zone=0)
[   78.113891] page_type: f5(slab)
[   78.117065] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   78.125213] raw: 00000000
[   78.127838] page dumped because: kasan: bad access detected
[   78.133453] 
[   78.134948] Memory state around the buggy address:
[   78.139770]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.146362]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.152923] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.159484]                              ^
[   78.163635]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.170196]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.176757] ==================================================================
[   84.425262] ==================================================================
[   84.432556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1aa8/0x5ab0
[   84.440002] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   84.446746] 
[   84.448242] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   84.448272] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   84.448303] Hardware name: Generic DRA74X (Flattened Device Tree)
[   84.448303] Call trace: 
[   84.448303]  unwind_backtrace from show_stack+0x18/0x1c
[   84.448333]  show_stack from dump_stack_lvl+0x70/0x90
[   84.448364]  dump_stack_lvl from print_report+0x158/0x528
[   84.448394]  print_report from kasan_report+0xdc/0x118
[   84.448394]  kasan_report from kasan_check_range+0x14c/0x198
[   84.448425]  kasan_check_range from kasan_atomics_helper+0x1aa8/0x5ab0
[   84.448455]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   84.448486]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   84.448516]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.448547]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   84.448577]  kthread from ret_from_fork+0x14/0x20
[   84.448577] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   84.448608] 3fa0:                                     00000000 00000000 00000000 00000000
[   84.448608] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   84.448638] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   84.448638] 
[   84.566619] Allocated by task 317:
[   84.570037]  kasan_save_track+0x30/0x5c
[   84.573913]  __kasan_kmalloc+0x8c/0x94
[   84.577697]  kasan_atomics+0xc0/0x33c
[   84.581390]  kunit_try_run_case+0x22c/0x5a8
[   84.585601]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   84.591125]  kthread+0x464/0x810
[   84.594390]  ret_from_fork+0x14/0x20
[   84.597991] 
[   84.599487] The buggy address belongs to the object at cc90f300
[   84.599487]  which belongs to the cache kmalloc-64 of size 64
[   84.611236] The buggy address is located 0 bytes to the right of
[   84.611236]  allocated 48-byte region [cc90f300, cc90f330)
[   84.622772] 
[   84.624267] The buggy address belongs to the physical page:
[   84.629882] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   84.637145] flags: 0x0(zone=0)
[   84.640228] page_type: f5(slab)
[   84.643402] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   84.651550] raw: 00000000
[   84.654174] page dumped because: kasan: bad access detected
[   84.659790] 
[   84.661285] Memory state around the buggy address:
[   84.666107]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.672698]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.679260] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   84.685821]                              ^
[   84.689941]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.696533]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   84.703094] ==================================================================
[   78.184082] ==================================================================
[   78.191345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe30/0x5ab0
[   78.198699] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   78.205444] 
[   78.206970] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   78.207000] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   78.207000] Hardware name: Generic DRA74X (Flattened Device Tree)
[   78.207000] Call trace: 
[   78.207031]  unwind_backtrace from show_stack+0x18/0x1c
[   78.207031]  show_stack from dump_stack_lvl+0x70/0x90
[   78.207061]  dump_stack_lvl from print_report+0x158/0x528
[   78.207092]  print_report from kasan_report+0xdc/0x118
[   78.207122]  kasan_report from kasan_check_range+0x14c/0x198
[   78.207122]  kasan_check_range from kasan_atomics_helper+0xe30/0x5ab0
[   78.207153]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   78.207183]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   78.207214]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.207244]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   78.207275]  kthread from ret_from_fork+0x14/0x20
[   78.207305] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   78.207305] 3fa0:                                     00000000 00000000 00000000 00000000
[   78.207336] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   78.207336] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   78.207366] 
[   78.325225] Allocated by task 317:
[   78.328674]  kasan_save_track+0x30/0x5c
[   78.332519]  __kasan_kmalloc+0x8c/0x94
[   78.336303]  kasan_atomics+0xc0/0x33c
[   78.339996]  kunit_try_run_case+0x22c/0x5a8
[   78.344207]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   78.349761]  kthread+0x464/0x810
[   78.352996]  ret_from_fork+0x14/0x20
[   78.356628] 
[   78.358123] The buggy address belongs to the object at cc90f300
[   78.358123]  which belongs to the cache kmalloc-64 of size 64
[   78.369842] The buggy address is located 0 bytes to the right of
[   78.369842]  allocated 48-byte region [cc90f300, cc90f330)
[   78.381378] 
[   78.382904] The buggy address belongs to the physical page:
[   78.388488] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   78.395782] flags: 0x0(zone=0)
[   78.398834] page_type: f5(slab)
[   78.402008] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   78.410156] raw: 00000000
[   78.412780] page dumped because: kasan: bad access detected
[   78.418395] 
[   78.419891] Memory state around the buggy address:
[   78.424713]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.431304]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.437866] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   78.444427]                              ^
[   78.448577]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.455139]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   78.461700] ==================================================================
[   84.995544] ==================================================================
[   85.002807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1bf0/0x5ab0
[   85.010253] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   85.016998] 
[   85.018493] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   85.018524] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   85.018554] Hardware name: Generic DRA74X (Flattened Device Tree)
[   85.018554] Call trace: 
[   85.018554]  unwind_backtrace from show_stack+0x18/0x1c
[   85.018585]  show_stack from dump_stack_lvl+0x70/0x90
[   85.018615]  dump_stack_lvl from print_report+0x158/0x528
[   85.018646]  print_report from kasan_report+0xdc/0x118
[   85.018646]  kasan_report from kasan_check_range+0x14c/0x198
[   85.018676]  kasan_check_range from kasan_atomics_helper+0x1bf0/0x5ab0
[   85.018707]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   85.018737]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   85.018768]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.018798]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   85.018829]  kthread from ret_from_fork+0x14/0x20
[   85.018829] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   85.018859] 3fa0:                                     00000000 00000000 00000000 00000000
[   85.018859] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   85.018890] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   85.018890] 
[   85.136871] Allocated by task 317:
[   85.140289]  kasan_save_track+0x30/0x5c
[   85.144165]  __kasan_kmalloc+0x8c/0x94
[   85.147949]  kasan_atomics+0xc0/0x33c
[   85.151641]  kunit_try_run_case+0x22c/0x5a8
[   85.155853]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   85.161376]  kthread+0x464/0x810
[   85.164642]  ret_from_fork+0x14/0x20
[   85.168243] 
[   85.169738] The buggy address belongs to the object at cc90f300
[   85.169738]  which belongs to the cache kmalloc-64 of size 64
[   85.181457] The buggy address is located 0 bytes to the right of
[   85.181457]  allocated 48-byte region [cc90f300, cc90f330)
[   85.193023] 
[   85.194519] The buggy address belongs to the physical page:
[   85.200134] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   85.207397] flags: 0x0(zone=0)
[   85.210479] page_type: f5(slab)
[   85.213653] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   85.221801] raw: 00000000
[   85.224426] page dumped because: kasan: bad access detected
[   85.230041] 
[   85.231536] Memory state around the buggy address:
[   85.236358]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.242919]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.249511] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   85.256072]                              ^
[   85.260192]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.266784]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   85.273345] ==================================================================
[   82.999603] ==================================================================
[   83.006866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1774/0x5ab0
[   83.014343] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   83.021087] 
[   83.022583] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   83.022613] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   83.022613] Hardware name: Generic DRA74X (Flattened Device Tree)
[   83.022644] Call trace: 
[   83.022644]  unwind_backtrace from show_stack+0x18/0x1c
[   83.022674]  show_stack from dump_stack_lvl+0x70/0x90
[   83.022705]  dump_stack_lvl from print_report+0x158/0x528
[   83.022705]  print_report from kasan_report+0xdc/0x118
[   83.022735]  kasan_report from kasan_check_range+0x14c/0x198
[   83.022766]  kasan_check_range from kasan_atomics_helper+0x1774/0x5ab0
[   83.022796]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   83.022827]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   83.022857]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.022857]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   83.022888]  kthread from ret_from_fork+0x14/0x20
[   83.022918] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   83.022918] 3fa0:                                     00000000 00000000 00000000 00000000
[   83.022949] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   83.022979] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   83.022979] 
[   83.140960] Allocated by task 317:
[   83.144378]  kasan_save_track+0x30/0x5c
[   83.148254]  __kasan_kmalloc+0x8c/0x94
[   83.152038]  kasan_atomics+0xc0/0x33c
[   83.155731]  kunit_try_run_case+0x22c/0x5a8
[   83.159942]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   83.165466]  kthread+0x464/0x810
[   83.168731]  ret_from_fork+0x14/0x20
[   83.172332] 
[   83.173828] The buggy address belongs to the object at cc90f300
[   83.173828]  which belongs to the cache kmalloc-64 of size 64
[   83.185577] The buggy address is located 0 bytes to the right of
[   83.185577]  allocated 48-byte region [cc90f300, cc90f330)
[   83.197113] 
[   83.198608] The buggy address belongs to the physical page:
[   83.204223] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   83.211486] flags: 0x0(zone=0)
[   83.214569] page_type: f5(slab)
[   83.217742] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   83.225891] raw: 00000000
[   83.228515] page dumped because: kasan: bad access detected
[   83.234130] 
[   83.235626] Memory state around the buggy address:
[   83.240447]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.247039]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.253601] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   83.260162]                              ^
[   83.264282]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.270874]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   83.277435] ==================================================================
[   89.538757] ==================================================================
[   89.546020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5500/0x5ab0
[   89.553497] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   89.560150] 
[   89.561645] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   89.561676] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   89.561676] Hardware name: Generic DRA74X (Flattened Device Tree)
[   89.561706] Call trace: 
[   89.561706]  unwind_backtrace from show_stack+0x18/0x1c
[   89.561737]  show_stack from dump_stack_lvl+0x70/0x90
[   89.561767]  dump_stack_lvl from print_report+0x158/0x528
[   89.561767]  print_report from kasan_report+0xdc/0x118
[   89.561798]  kasan_report from kasan_atomics_helper+0x5500/0x5ab0
[   89.561828]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   89.561859]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   89.561889]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.561920]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   89.561950]  kthread from ret_from_fork+0x14/0x20
[   89.561950] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   89.561981] 3fa0:                                     00000000 00000000 00000000 00000000
[   89.561981] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   89.562011] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   89.562011] 
[   89.673858] Allocated by task 317:
[   89.677307]  kasan_save_track+0x30/0x5c
[   89.681152]  __kasan_kmalloc+0x8c/0x94
[   89.684936]  kasan_atomics+0xc0/0x33c
[   89.688629]  kunit_try_run_case+0x22c/0x5a8
[   89.692840]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   89.698394]  kthread+0x464/0x810
[   89.701629]  ret_from_fork+0x14/0x20
[   89.705230] 
[   89.706756] The buggy address belongs to the object at cc90f300
[   89.706756]  which belongs to the cache kmalloc-64 of size 64
[   89.718475] The buggy address is located 0 bytes to the right of
[   89.718475]  allocated 48-byte region [cc90f300, cc90f330)
[   89.730010] 
[   89.731506] The buggy address belongs to the physical page:
[   89.737121] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   89.744384] flags: 0x0(zone=0)
[   89.747467] page_type: f5(slab)
[   89.750640] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   89.758789] raw: 00000000
[   89.761413] page dumped because: kasan: bad access detected
[   89.767028] 
[   89.768524] Memory state around the buggy address:
[   89.773345]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.779937]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.786499] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   89.793060]                              ^
[   89.797180]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.803771]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   89.810333] ==================================================================
[   74.485595] ==================================================================
[   74.492889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5a4/0x5ab0
[   74.500244] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   74.506988] 
[   74.508483] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   74.508514] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   74.508514] Hardware name: Generic DRA74X (Flattened Device Tree)
[   74.508544] Call trace: 
[   74.508544]  unwind_backtrace from show_stack+0x18/0x1c
[   74.508575]  show_stack from dump_stack_lvl+0x70/0x90
[   74.508605]  dump_stack_lvl from print_report+0x158/0x528
[   74.508636]  print_report from kasan_report+0xdc/0x118
[   74.508636]  kasan_report from kasan_check_range+0x14c/0x198
[   74.508666]  kasan_check_range from kasan_atomics_helper+0x5a4/0x5ab0
[   74.508697]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   74.508728]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   74.508758]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.508789]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   74.508789]  kthread from ret_from_fork+0x14/0x20
[   74.508819] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   74.508850] 3fa0:                                     00000000 00000000 00000000 00000000
[   74.508850] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   74.508880] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   74.508880] 
[   74.626770] Allocated by task 317:
[   74.630187]  kasan_save_track+0x30/0x5c
[   74.634063]  __kasan_kmalloc+0x8c/0x94
[   74.637847]  kasan_atomics+0xc0/0x33c
[   74.641540]  kunit_try_run_case+0x22c/0x5a8
[   74.645751]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.651306]  kthread+0x464/0x810
[   74.654541]  ret_from_fork+0x14/0x20
[   74.658142] 
[   74.659667] The buggy address belongs to the object at cc90f300
[   74.659667]  which belongs to the cache kmalloc-64 of size 64
[   74.671386] The buggy address is located 0 bytes to the right of
[   74.671386]  allocated 48-byte region [cc90f300, cc90f330)
[   74.682922] 
[   74.684417] The buggy address belongs to the physical page:
[   74.690032] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   74.697296] flags: 0x0(zone=0)
[   74.700378] page_type: f5(slab)
[   74.703552] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   74.711700] raw: 00000000
[   74.714355] page dumped because: kasan: bad access detected
[   74.719940] 
[   74.721466] Memory state around the buggy address:
[   74.726287]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.732849]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.739410] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.745971]                              ^
[   74.750122]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.756683]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.763244] ==================================================================
[   74.206604] ==================================================================
[   74.213867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50bc/0x5ab0
[   74.221313] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   74.228088] 
[   74.229583] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   74.229614] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   74.229614] Hardware name: Generic DRA74X (Flattened Device Tree)
[   74.229614] Call trace: 
[   74.229644]  unwind_backtrace from show_stack+0x18/0x1c
[   74.229675]  show_stack from dump_stack_lvl+0x70/0x90
[   74.229675]  dump_stack_lvl from print_report+0x158/0x528
[   74.229705]  print_report from kasan_report+0xdc/0x118
[   74.229736]  kasan_report from kasan_atomics_helper+0x50bc/0x5ab0
[   74.229766]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   74.229797]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   74.229827]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.229858]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   74.229858]  kthread from ret_from_fork+0x14/0x20
[   74.229888] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   74.229919] 3fa0:                                     00000000 00000000 00000000 00000000
[   74.229919] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   74.229949] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   74.229949] 
[   74.341796] Allocated by task 317:
[   74.345245]  kasan_save_track+0x30/0x5c
[   74.349090]  __kasan_kmalloc+0x8c/0x94
[   74.352874]  kasan_atomics+0xc0/0x33c
[   74.356567]  kunit_try_run_case+0x22c/0x5a8
[   74.360809]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   74.366333]  kthread+0x464/0x810
[   74.369567]  ret_from_fork+0x14/0x20
[   74.373199] 
[   74.374694] The buggy address belongs to the object at cc90f300
[   74.374694]  which belongs to the cache kmalloc-64 of size 64
[   74.386413] The buggy address is located 0 bytes to the right of
[   74.386413]  allocated 48-byte region [cc90f300, cc90f330)
[   74.397949] 
[   74.399475] The buggy address belongs to the physical page:
[   74.405059] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   74.412353] flags: 0x0(zone=0)
[   74.415435] page_type: f5(slab)
[   74.418609] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   74.426727] raw: 00000000
[   74.429382] page dumped because: kasan: bad access detected
[   74.434997] 
[   74.436492] Memory state around the buggy address:
[   74.441314]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.447875]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.454437] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   74.461029]                              ^
[   74.465148]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.471710]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   74.478302] ==================================================================
[   76.765319] ==================================================================
[   76.772583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac4/0x5ab0
[   76.779968] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   76.786712] 
[   76.788208] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   76.788238] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   76.788238] Hardware name: Generic DRA74X (Flattened Device Tree)
[   76.788269] Call trace: 
[   76.788269]  unwind_backtrace from show_stack+0x18/0x1c
[   76.788299]  show_stack from dump_stack_lvl+0x70/0x90
[   76.788330]  dump_stack_lvl from print_report+0x158/0x528
[   76.788360]  print_report from kasan_report+0xdc/0x118
[   76.788360]  kasan_report from kasan_check_range+0x14c/0x198
[   76.788391]  kasan_check_range from kasan_atomics_helper+0xac4/0x5ab0
[   76.788421]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   76.788452]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   76.788482]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.788513]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   76.788513]  kthread from ret_from_fork+0x14/0x20
[   76.788543] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   76.788574] 3fa0:                                     00000000 00000000 00000000 00000000
[   76.788574] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   76.788604] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   76.788604] 
[   76.906494] Allocated by task 317:
[   76.909912]  kasan_save_track+0x30/0x5c
[   76.913787]  __kasan_kmalloc+0x8c/0x94
[   76.917572]  kasan_atomics+0xc0/0x33c
[   76.921264]  kunit_try_run_case+0x22c/0x5a8
[   76.925476]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.930999]  kthread+0x464/0x810
[   76.934265]  ret_from_fork+0x14/0x20
[   76.937866] 
[   76.939361] The buggy address belongs to the object at cc90f300
[   76.939361]  which belongs to the cache kmalloc-64 of size 64
[   76.951110] The buggy address is located 0 bytes to the right of
[   76.951110]  allocated 48-byte region [cc90f300, cc90f330)
[   76.962646] 
[   76.964141] The buggy address belongs to the physical page:
[   76.969757] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   76.977020] flags: 0x0(zone=0)
[   76.980102] page_type: f5(slab)
[   76.983276] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   76.991424] raw: 00000000
[   76.994049] page dumped because: kasan: bad access detected
[   76.999664] 
[   77.001159] Memory state around the buggy address:
[   77.005981]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.012573]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.019134] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.025695]                              ^
[   77.029846]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.036407]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.042968] ==================================================================
[   77.335266] ==================================================================
[   77.342529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc24/0x5ab0
[   77.349884] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   77.356628] 
[   77.358154] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   77.358184] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   77.358184] Hardware name: Generic DRA74X (Flattened Device Tree)
[   77.358184] Call trace: 
[   77.358184]  unwind_backtrace from show_stack+0x18/0x1c
[   77.358215]  show_stack from dump_stack_lvl+0x70/0x90
[   77.358245]  dump_stack_lvl from print_report+0x158/0x528
[   77.358276]  print_report from kasan_report+0xdc/0x118
[   77.358306]  kasan_report from kasan_check_range+0x14c/0x198
[   77.358306]  kasan_check_range from kasan_atomics_helper+0xc24/0x5ab0
[   77.358337]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   77.358367]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   77.358398]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.358428]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   77.358459]  kthread from ret_from_fork+0x14/0x20
[   77.358459] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   77.358489] 3fa0:                                     00000000 00000000 00000000 00000000
[   77.358520] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   77.358520] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   77.358520] 
[   77.476409] Allocated by task 317:
[   77.479858]  kasan_save_track+0x30/0x5c
[   77.483703]  __kasan_kmalloc+0x8c/0x94
[   77.487487]  kasan_atomics+0xc0/0x33c
[   77.491180]  kunit_try_run_case+0x22c/0x5a8
[   77.495422]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.500946]  kthread+0x464/0x810
[   77.504180]  ret_from_fork+0x14/0x20
[   77.507812] 
[   77.509307] The buggy address belongs to the object at cc90f300
[   77.509307]  which belongs to the cache kmalloc-64 of size 64
[   77.521026] The buggy address is located 0 bytes to the right of
[   77.521026]  allocated 48-byte region [cc90f300, cc90f330)
[   77.532592] 
[   77.534088] The buggy address belongs to the physical page:
[   77.539672] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   77.546966] flags: 0x0(zone=0)
[   77.550048] page_type: f5(slab)
[   77.553222] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   77.561340] raw: 00000000
[   77.563995] page dumped because: kasan: bad access detected
[   77.569610] 
[   77.571105] Memory state around the buggy address:
[   77.575927]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.582489]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.589080] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.595642]                              ^
[   77.599761]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.606323]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.612884] ==================================================================
[   77.620208] ==================================================================
[   77.627471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x5ab0
[   77.634857] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   77.641601] 
[   77.643096] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   77.643127] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   77.643127] Hardware name: Generic DRA74X (Flattened Device Tree)
[   77.643157] Call trace: 
[   77.643157]  unwind_backtrace from show_stack+0x18/0x1c
[   77.643188]  show_stack from dump_stack_lvl+0x70/0x90
[   77.643218]  dump_stack_lvl from print_report+0x158/0x528
[   77.643218]  print_report from kasan_report+0xdc/0x118
[   77.643249]  kasan_report from kasan_check_range+0x14c/0x198
[   77.643280]  kasan_check_range from kasan_atomics_helper+0xd3c/0x5ab0
[   77.643310]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   77.643341]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   77.643371]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.643371]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   77.643402]  kthread from ret_from_fork+0x14/0x20
[   77.643432] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   77.643432] 3fa0:                                     00000000 00000000 00000000 00000000
[   77.643463] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   77.643493] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   77.643493] 
[   77.761383] Allocated by task 317:
[   77.764801]  kasan_save_track+0x30/0x5c
[   77.768676]  __kasan_kmalloc+0x8c/0x94
[   77.772460]  kasan_atomics+0xc0/0x33c
[   77.776153]  kunit_try_run_case+0x22c/0x5a8
[   77.780364]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   77.785888]  kthread+0x464/0x810
[   77.789154]  ret_from_fork+0x14/0x20
[   77.792755] 
[   77.794250] The buggy address belongs to the object at cc90f300
[   77.794250]  which belongs to the cache kmalloc-64 of size 64
[   77.805969] The buggy address is located 0 bytes to the right of
[   77.805969]  allocated 48-byte region [cc90f300, cc90f330)
[   77.817535] 
[   77.819030] The buggy address belongs to the physical page:
[   77.824645] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   77.831909] flags: 0x0(zone=0)
[   77.834991] page_type: f5(slab)
[   77.838165] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   77.846313] raw: 00000000
[   77.848937] page dumped because: kasan: bad access detected
[   77.854553] 
[   77.856048] Memory state around the buggy address:
[   77.860870]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.867462]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.874023] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   77.880584]                              ^
[   77.884704]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.891296]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   77.897857] ==================================================================
[   79.324066] ==================================================================
[   79.331329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10e0/0x5ab0
[   79.338775] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   79.345520] 
[   79.347045] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   79.347076] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   79.347076] Hardware name: Generic DRA74X (Flattened Device Tree)
[   79.347076] Call trace: 
[   79.347106]  unwind_backtrace from show_stack+0x18/0x1c
[   79.347106]  show_stack from dump_stack_lvl+0x70/0x90
[   79.347137]  dump_stack_lvl from print_report+0x158/0x528
[   79.347167]  print_report from kasan_report+0xdc/0x118
[   79.347198]  kasan_report from kasan_check_range+0x14c/0x198
[   79.347198]  kasan_check_range from kasan_atomics_helper+0x10e0/0x5ab0
[   79.347229]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   79.347259]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   79.347290]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.347320]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   79.347351]  kthread from ret_from_fork+0x14/0x20
[   79.347381] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   79.347381] 3fa0:                                     00000000 00000000 00000000 00000000
[   79.347412] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   79.347412] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   79.347442] 
[   79.465393] Allocated by task 317:
[   79.468841]  kasan_save_track+0x30/0x5c
[   79.472686]  __kasan_kmalloc+0x8c/0x94
[   79.476470]  kasan_atomics+0xc0/0x33c
[   79.480163]  kunit_try_run_case+0x22c/0x5a8
[   79.484374]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   79.489929]  kthread+0x464/0x810
[   79.493164]  ret_from_fork+0x14/0x20
[   79.496765] 
[   79.498291] The buggy address belongs to the object at cc90f300
[   79.498291]  which belongs to the cache kmalloc-64 of size 64
[   79.510009] The buggy address is located 0 bytes to the right of
[   79.510009]  allocated 48-byte region [cc90f300, cc90f330)
[   79.521545] 
[   79.523071] The buggy address belongs to the physical page:
[   79.528656] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   79.535949] flags: 0x0(zone=0)
[   79.539001] page_type: f5(slab)
[   79.542175] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   79.550323] raw: 00000000
[   79.552978] page dumped because: kasan: bad access detected
[   79.558563] 
[   79.560089] Memory state around the buggy address:
[   79.564910]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.571472]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.578033] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   79.584625]                              ^
[   79.588745]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.595306]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   79.601867] ==================================================================
[   76.480377] ==================================================================
[   76.487640] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa20/0x5ab0
[   76.494995] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   76.501739] 
[   76.503265] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   76.503265] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   76.503295] Hardware name: Generic DRA74X (Flattened Device Tree)
[   76.503295] Call trace: 
[   76.503295]  unwind_backtrace from show_stack+0x18/0x1c
[   76.503326]  show_stack from dump_stack_lvl+0x70/0x90
[   76.503356]  dump_stack_lvl from print_report+0x158/0x528
[   76.503387]  print_report from kasan_report+0xdc/0x118
[   76.503417]  kasan_report from kasan_check_range+0x14c/0x198
[   76.503417]  kasan_check_range from kasan_atomics_helper+0xa20/0x5ab0
[   76.503448]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   76.503479]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   76.503509]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.503540]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   76.503570]  kthread from ret_from_fork+0x14/0x20
[   76.503570] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   76.503601] 3fa0:                                     00000000 00000000 00000000 00000000
[   76.503601] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   76.503631] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   76.503631] 
[   76.621520] Allocated by task 317:
[   76.624969]  kasan_save_track+0x30/0x5c
[   76.628814]  __kasan_kmalloc+0x8c/0x94
[   76.632598]  kasan_atomics+0xc0/0x33c
[   76.636291]  kunit_try_run_case+0x22c/0x5a8
[   76.640502]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.646057]  kthread+0x464/0x810
[   76.649291]  ret_from_fork+0x14/0x20
[   76.652923] 
[   76.654418] The buggy address belongs to the object at cc90f300
[   76.654418]  which belongs to the cache kmalloc-64 of size 64
[   76.666137] The buggy address is located 0 bytes to the right of
[   76.666137]  allocated 48-byte region [cc90f300, cc90f330)
[   76.677673] 
[   76.679199] The buggy address belongs to the physical page:
[   76.684783] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   76.692077] flags: 0x0(zone=0)
[   76.695159] page_type: f5(slab)
[   76.698303] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   76.706451] raw: 00000000
[   76.709106] page dumped because: kasan: bad access detected
[   76.714721] 
[   76.716217] Memory state around the buggy address:
[   76.721038]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.727600]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.734161] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.740753]                              ^
[   76.744873]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.751434]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.758026] ==================================================================
[   73.642730] ==================================================================
[   73.649993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5200/0x5ab0
[   73.657440] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   73.664123] 
[   73.665618] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   73.665649] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   73.665649] Hardware name: Generic DRA74X (Flattened Device Tree)
[   73.665679] Call trace: 
[   73.665679]  unwind_backtrace from show_stack+0x18/0x1c
[   73.665710]  show_stack from dump_stack_lvl+0x70/0x90
[   73.665710]  dump_stack_lvl from print_report+0x158/0x528
[   73.665740]  print_report from kasan_report+0xdc/0x118
[   73.665771]  kasan_report from kasan_atomics_helper+0x5200/0x5ab0
[   73.665802]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   73.665832]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   73.665863]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.665893]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   73.665893]  kthread from ret_from_fork+0x14/0x20
[   73.665924] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   73.665954] 3fa0:                                     00000000 00000000 00000000 00000000
[   73.665954] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   73.665985] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   73.665985] 
[   73.777832] Allocated by task 317:
[   73.781280]  kasan_save_track+0x30/0x5c
[   73.785125]  __kasan_kmalloc+0x8c/0x94
[   73.788909]  kasan_atomics+0xc0/0x33c
[   73.792602]  kunit_try_run_case+0x22c/0x5a8
[   73.796813]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   73.802368]  kthread+0x464/0x810
[   73.805603]  ret_from_fork+0x14/0x20
[   73.809234] 
[   73.810729] The buggy address belongs to the object at cc90f300
[   73.810729]  which belongs to the cache kmalloc-64 of size 64
[   73.822448] The buggy address is located 0 bytes to the right of
[   73.822448]  allocated 48-byte region [cc90f300, cc90f330)
[   73.833984] 
[   73.835510] The buggy address belongs to the physical page:
[   73.841094] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   73.848388] flags: 0x0(zone=0)
[   73.851470] page_type: f5(slab)
[   73.854614] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   73.862762] raw: 00000000
[   73.865417] page dumped because: kasan: bad access detected
[   73.871002] 
[   73.872528] Memory state around the buggy address:
[   73.877349]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.883911]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.890472] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   73.897064]                              ^
[   73.901184]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.907745]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   73.914306] ==================================================================
[   82.435485] ==================================================================
[   82.442749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x52cc/0x5ab0
[   82.450195] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   82.456939] 
[   82.458465] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   82.458496] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   82.458496] Hardware name: Generic DRA74X (Flattened Device Tree)
[   82.458496] Call trace: 
[   82.458526]  unwind_backtrace from show_stack+0x18/0x1c
[   82.458526]  show_stack from dump_stack_lvl+0x70/0x90
[   82.458557]  dump_stack_lvl from print_report+0x158/0x528
[   82.458587]  print_report from kasan_report+0xdc/0x118
[   82.458618]  kasan_report from kasan_atomics_helper+0x52cc/0x5ab0
[   82.458648]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   82.458679]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   82.458679]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.458709]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   82.458740]  kthread from ret_from_fork+0x14/0x20
[   82.458770] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   82.458770] 3fa0:                                     00000000 00000000 00000000 00000000
[   82.458801] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   82.458801] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   82.458831] 
[   82.570678] Allocated by task 317:
[   82.574096]  kasan_save_track+0x30/0x5c
[   82.577972]  __kasan_kmalloc+0x8c/0x94
[   82.581756]  kasan_atomics+0xc0/0x33c
[   82.585449]  kunit_try_run_case+0x22c/0x5a8
[   82.589660]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   82.595214]  kthread+0x464/0x810
[   82.598449]  ret_from_fork+0x14/0x20
[   82.602050] 
[   82.603576] The buggy address belongs to the object at cc90f300
[   82.603576]  which belongs to the cache kmalloc-64 of size 64
[   82.615295] The buggy address is located 0 bytes to the right of
[   82.615295]  allocated 48-byte region [cc90f300, cc90f330)
[   82.626831] 
[   82.628326] The buggy address belongs to the physical page:
[   82.633941] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   82.641204] flags: 0x0(zone=0)
[   82.644287] page_type: f5(slab)
[   82.647460] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   82.655609] raw: 00000000
[   82.658233] page dumped because: kasan: bad access detected
[   82.663848] 
[   82.665344] Memory state around the buggy address:
[   82.670166]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.676757]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.683319] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   82.689880]                              ^
[   82.694030]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.700592]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   82.707153] ==================================================================
[   80.743469] ==================================================================
[   80.750762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x520c/0x5ab0
[   80.758209] Read of size 4 at addr cc90f330 by task kunit_try_catch/317
[   80.764862] 
[   80.766357] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   80.766387] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   80.766418] Hardware name: Generic DRA74X (Flattened Device Tree)
[   80.766418] Call trace: 
[   80.766418]  unwind_backtrace from show_stack+0x18/0x1c
[   80.766448]  show_stack from dump_stack_lvl+0x70/0x90
[   80.766479]  dump_stack_lvl from print_report+0x158/0x528
[   80.766510]  print_report from kasan_report+0xdc/0x118
[   80.766540]  kasan_report from kasan_atomics_helper+0x520c/0x5ab0
[   80.766540]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   80.766571]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   80.766601]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.766632]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   80.766662]  kthread from ret_from_fork+0x14/0x20
[   80.766693] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   80.766693] 3fa0:                                     00000000 00000000 00000000 00000000
[   80.766723] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   80.766723] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   80.766754] 
[   80.878601] Allocated by task 317:
[   80.882019]  kasan_save_track+0x30/0x5c
[   80.885894]  __kasan_kmalloc+0x8c/0x94
[   80.889678]  kasan_atomics+0xc0/0x33c
[   80.893371]  kunit_try_run_case+0x22c/0x5a8
[   80.897583]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   80.903106]  kthread+0x464/0x810
[   80.906372]  ret_from_fork+0x14/0x20
[   80.909973] 
[   80.911468] The buggy address belongs to the object at cc90f300
[   80.911468]  which belongs to the cache kmalloc-64 of size 64
[   80.923187] The buggy address is located 0 bytes to the right of
[   80.923187]  allocated 48-byte region [cc90f300, cc90f330)
[   80.934753] 
[   80.936248] The buggy address belongs to the physical page:
[   80.941864] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   80.949127] flags: 0x0(zone=0)
[   80.952209] page_type: f5(slab)
[   80.955383] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   80.963531] raw: 00000000
[   80.966156] page dumped because: kasan: bad access detected
[   80.971771] 
[   80.973266] Memory state around the buggy address:
[   80.978088]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.984680]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   80.991241] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   80.997802]                              ^
[   81.001922]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.008514]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   81.015075] ==================================================================
[   75.910430] ==================================================================
[   75.917694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x5ab0
[   75.925079] Write of size 4 at addr cc90f330 by task kunit_try_catch/317
[   75.931823] 
[   75.933319] CPU: 0 UID: 0 PID: 317 Comm: kunit_try_catch Tainted: G    B   W        N  6.15.0-next-20250530 #1 NONE 
[   75.933349] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST
[   75.933349] Hardware name: Generic DRA74X (Flattened Device Tree)
[   75.933380] Call trace: 
[   75.933380]  unwind_backtrace from show_stack+0x18/0x1c
[   75.933410]  show_stack from dump_stack_lvl+0x70/0x90
[   75.933441]  dump_stack_lvl from print_report+0x158/0x528
[   75.933471]  print_report from kasan_report+0xdc/0x118
[   75.933471]  kasan_report from kasan_check_range+0x14c/0x198
[   75.933502]  kasan_check_range from kasan_atomics_helper+0x8d8/0x5ab0
[   75.933532]  kasan_atomics_helper from kasan_atomics+0x238/0x33c
[   75.933563]  kasan_atomics from kunit_try_run_case+0x22c/0x5a8
[   75.933593]  kunit_try_run_case from kunit_generic_run_threadfn_adapter+0xc4/0x128
[   75.933624]  kunit_generic_run_threadfn_adapter from kthread+0x464/0x810
[   75.933624]  kthread from ret_from_fork+0x14/0x20
[   75.933654] Exception stack(0xf24e3fb0 to 0xf24e3ff8)
[   75.933685] 3fa0:                                     00000000 00000000 00000000 00000000
[   75.933685] 3fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
[   75.933715] 3fe0: 00000000 00000000 00000000 00000000 00000013 00000000
[   75.933715] 
[   76.051605] Allocated by task 317:
[   76.055023]  kasan_save_track+0x30/0x5c
[   76.058898]  __kasan_kmalloc+0x8c/0x94
[   76.062683]  kasan_atomics+0xc0/0x33c
[   76.066375]  kunit_try_run_case+0x22c/0x5a8
[   76.070587]  kunit_generic_run_threadfn_adapter+0xc4/0x128
[   76.076110]  kthread+0x464/0x810
[   76.079376]  ret_from_fork+0x14/0x20
[   76.082977] 
[   76.084472] The buggy address belongs to the object at cc90f300
[   76.084472]  which belongs to the cache kmalloc-64 of size 64
[   76.096221] The buggy address is located 0 bytes to the right of
[   76.096221]  allocated 48-byte region [cc90f300, cc90f330)
[   76.107757] 
[   76.109252] The buggy address belongs to the physical page:
[   76.114868] page: refcount:0 mapcount:0 mapping:00000000 index:0x0 pfn:0x8c90f
[   76.122131] flags: 0x0(zone=0)
[   76.125213] page_type: f5(slab)
[   76.128387] raw: 00000000 c7001300 00000122 00000000 00000000 80200020 f5000000 00000000
[   76.136535] raw: 00000000
[   76.139160] page dumped because: kasan: bad access detected
[   76.144775] 
[   76.146270] Memory state around the buggy address:
[   76.151092]  cc90f200: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.157684]  cc90f280: 00 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.164245] >cc90f300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   76.170806]                              ^
[   76.174957]  cc90f380: 04 fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.181518]  cc90f400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   76.188079] ==================================================================