Hay
Date
June 3, 2025, 7:38 a.m.

Environment
qemu-arm64
qemu-x86_64

[   21.365133] ==================================================================
[   21.365186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   21.365384] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.365468] 
[   21.365561] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.365651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.365680] Hardware name: linux,dummy-virt (DT)
[   21.365769] Call trace:
[   21.365808]  show_stack+0x20/0x38 (C)
[   21.365862]  dump_stack_lvl+0x8c/0xd0
[   21.365965]  print_report+0x118/0x608
[   21.366040]  kasan_report+0xdc/0x128
[   21.366108]  __asan_report_load8_noabort+0x20/0x30
[   21.366160]  kasan_atomics_helper+0x3df4/0x4858
[   21.366210]  kasan_atomics+0x198/0x2e0
[   21.366258]  kunit_try_run_case+0x170/0x3f0
[   21.366307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.366476]  kthread+0x328/0x630
[   21.366538]  ret_from_fork+0x10/0x20
[   21.366598] 
[   21.366627] Allocated by task 265:
[   21.366660]  kasan_save_stack+0x3c/0x68
[   21.366700]  kasan_save_track+0x20/0x40
[   21.366756]  kasan_save_alloc_info+0x40/0x58
[   21.366795]  __kasan_kmalloc+0xd4/0xd8
[   21.366835]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.366882]  kasan_atomics+0xb8/0x2e0
[   21.366920]  kunit_try_run_case+0x170/0x3f0
[   21.366960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.367016]  kthread+0x328/0x630
[   21.367060]  ret_from_fork+0x10/0x20
[   21.367110] 
[   21.367132] The buggy address belongs to the object at fff00000c58c1080
[   21.367132]  which belongs to the cache kmalloc-64 of size 64
[   21.367199] The buggy address is located 0 bytes to the right of
[   21.367199]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.367264] 
[   21.367287] The buggy address belongs to the physical page:
[   21.367320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.367604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.367662] page_type: f5(slab)
[   21.367702] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.367762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.367805] page dumped because: kasan: bad access detected
[   21.367840] 
[   21.367860] Memory state around the buggy address:
[   21.368066]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.368127]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.368172] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.368212]                                      ^
[   21.368248]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.368352]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.368437] ==================================================================
[   21.378183] ==================================================================
[   21.378234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   21.378298] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.378360] 
[   21.378393] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.378493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.379121] Hardware name: linux,dummy-virt (DT)
[   21.379200] Call trace:
[   21.379228]  show_stack+0x20/0x38 (C)
[   21.379296]  dump_stack_lvl+0x8c/0xd0
[   21.379676]  print_report+0x118/0x608
[   21.379782]  kasan_report+0xdc/0x128
[   21.379870]  kasan_check_range+0x100/0x1a8
[   21.380106]  __kasan_check_write+0x20/0x30
[   21.380315]  kasan_atomics_helper+0x175c/0x4858
[   21.380451]  kasan_atomics+0x198/0x2e0
[   21.380537]  kunit_try_run_case+0x170/0x3f0
[   21.380670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.380755]  kthread+0x328/0x630
[   21.380798]  ret_from_fork+0x10/0x20
[   21.380981] 
[   21.381002] Allocated by task 265:
[   21.381032]  kasan_save_stack+0x3c/0x68
[   21.381084]  kasan_save_track+0x20/0x40
[   21.381145]  kasan_save_alloc_info+0x40/0x58
[   21.381251]  __kasan_kmalloc+0xd4/0xd8
[   21.381329]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.381463]  kasan_atomics+0xb8/0x2e0
[   21.381551]  kunit_try_run_case+0x170/0x3f0
[   21.381767]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.382031]  kthread+0x328/0x630
[   21.382115]  ret_from_fork+0x10/0x20
[   21.382224] 
[   21.382272] The buggy address belongs to the object at fff00000c58c1080
[   21.382272]  which belongs to the cache kmalloc-64 of size 64
[   21.382551] The buggy address is located 0 bytes to the right of
[   21.382551]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.382702] 
[   21.382770] The buggy address belongs to the physical page:
[   21.382839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.382897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.382949] page_type: f5(slab)
[   21.383174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.383304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.383359] page dumped because: kasan: bad access detected
[   21.383588] 
[   21.383731] Memory state around the buggy address:
[   21.383800]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.383906]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.383993] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.384076]                                      ^
[   21.384114]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.384261]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.384383] ==================================================================
[   21.054656] ==================================================================
[   21.054944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   21.055060] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.055135] 
[   21.055170] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.055551] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.055607] Hardware name: linux,dummy-virt (DT)
[   21.055646] Call trace:
[   21.055670]  show_stack+0x20/0x38 (C)
[   21.055725]  dump_stack_lvl+0x8c/0xd0
[   21.055776]  print_report+0x118/0x608
[   21.055826]  kasan_report+0xdc/0x128
[   21.055874]  kasan_check_range+0x100/0x1a8
[   21.055924]  __kasan_check_write+0x20/0x30
[   21.055971]  kasan_atomics_helper+0xa04/0x4858
[   21.056022]  kasan_atomics+0x198/0x2e0
[   21.056067]  kunit_try_run_case+0x170/0x3f0
[   21.056117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.056449]  __kasan_kmalloc+0xd4/0xd8
[   21.056704]  kunit_try_run_case+0x170/0x3f0
[   21.057281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.057334]  kthread+0x328/0x630
[   21.057369]  ret_from_fork+0x10/0x20
[   21.057410] 
[   21.057446] The buggy address belongs to the object at fff00000c58c1080
[   21.057446]  which belongs to the cache kmalloc-64 of size 64
[   21.057504] The buggy address is located 0 bytes to the right of
[   21.057504]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.057569] 
[   21.059073] The buggy address belongs to the physical page:
[   21.059641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.059910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.060263] page_type: f5(slab)
[   21.060303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.060779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.061174] page dumped because: kasan: bad access detected
[   21.061490] 
[   21.061515] Memory state around the buggy address:
[   21.061897]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.062671]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.062725] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.063230]                                      ^
[   21.063530]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.063897]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.063940] ==================================================================
[   21.085344] ==================================================================
[   21.085409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   21.085482] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.085535] 
[   21.085570] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.087732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.088279] Hardware name: linux,dummy-virt (DT)
[   21.088325] Call trace:
[   21.088357]  show_stack+0x20/0x38 (C)
[   21.088413]  dump_stack_lvl+0x8c/0xd0
[   21.088952]  print_report+0x118/0x608
[   21.089078]  kasan_report+0xdc/0x128
[   21.089595]  kasan_check_range+0x100/0x1a8
[   21.090249]  __kasan_check_write+0x20/0x30
[   21.090631]  kasan_atomics_helper+0xad4/0x4858
[   21.090693]  kasan_atomics+0x198/0x2e0
[   21.090743]  kunit_try_run_case+0x170/0x3f0
[   21.090804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.091590]  kthread+0x328/0x630
[   21.092150]  ret_from_fork+0x10/0x20
[   21.092625] 
[   21.092654] Allocated by task 265:
[   21.092691]  kasan_save_stack+0x3c/0x68
[   21.095746] 
[   21.096114] The buggy address belongs to the object at fff00000c58c1080
[   21.096114]  which belongs to the cache kmalloc-64 of size 64
[   21.096656] The buggy address is located 0 bytes to the right of
[   21.096656]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.097150] 
[   21.097238] The buggy address belongs to the physical page:
[   21.097531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.098011] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.099065] page_type: f5(slab)
[   21.099174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.099629] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.099820] page dumped because: kasan: bad access detected
[   21.099857] 
[   21.100164] Memory state around the buggy address:
[   21.100556]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.100679]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.100741] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.100783]                                      ^
[   21.102251]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.102668]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.106224] ==================================================================
[   21.067298] ==================================================================
[   21.067649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   21.068157] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.068565] 
[   21.068605] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.068699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.068729] Hardware name: linux,dummy-virt (DT)
[   21.068763] Call trace:
[   21.069796]  show_stack+0x20/0x38 (C)
[   21.070171]  dump_stack_lvl+0x8c/0xd0
[   21.070259]  print_report+0x118/0x608
[   21.070310]  kasan_report+0xdc/0x128
[   21.071153]  kasan_check_range+0x100/0x1a8
[   21.071307]  __kasan_check_write+0x20/0x30
[   21.071361]  kasan_atomics_helper+0xa6c/0x4858
[   21.071412]  kasan_atomics+0x198/0x2e0
[   21.072051]  kunit_try_run_case+0x170/0x3f0
[   21.072117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.072218]  kthread+0x328/0x630
[   21.072262]  ret_from_fork+0x10/0x20
[   21.072866] 
[   21.072942] Allocated by task 265:
[   21.072976]  kasan_save_stack+0x3c/0x68
[   21.073418]  kasan_save_track+0x20/0x40
[   21.073828]  kasan_save_alloc_info+0x40/0x58
[   21.074407]  __kasan_kmalloc+0xd4/0xd8
[   21.074770]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.074876]  kasan_atomics+0xb8/0x2e0
[   21.074972]  kunit_try_run_case+0x170/0x3f0
[   21.075015]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.075061]  kthread+0x328/0x630
[   21.075095]  ret_from_fork+0x10/0x20
[   21.075919] 
[   21.076053] The buggy address belongs to the object at fff00000c58c1080
[   21.076053]  which belongs to the cache kmalloc-64 of size 64
[   21.076403] The buggy address is located 0 bytes to the right of
[   21.076403]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.076488] 
[   21.076514] The buggy address belongs to the physical page:
[   21.076547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.076604] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.078157] page_type: f5(slab)
[   21.078296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.079012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.079861] page dumped because: kasan: bad access detected
[   21.080054] 
[   21.080076] Memory state around the buggy address:
[   21.080156]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.080220]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.080265] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.080305]                                      ^
[   21.081373]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.081579]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.081880] ==================================================================
[   21.227320] ==================================================================
[   21.227418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   21.227785] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.228419] 
[   21.228781] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.228955] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.229067] Hardware name: linux,dummy-virt (DT)
[   21.229218] Call trace:
[   21.229310]  show_stack+0x20/0x38 (C)
[   21.229643]  dump_stack_lvl+0x8c/0xd0
[   21.229991]  print_report+0x118/0x608
[   21.230165]  kasan_report+0xdc/0x128
[   21.230251]  kasan_check_range+0x100/0x1a8
[   21.230440]  __kasan_check_write+0x20/0x30
[   21.230740]  kasan_atomics_helper+0xeb8/0x4858
[   21.230968]  kasan_atomics+0x198/0x2e0
[   21.231217]  kunit_try_run_case+0x170/0x3f0
[   21.231525]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.231722]  kthread+0x328/0x630
[   21.231830]  ret_from_fork+0x10/0x20
[   21.232150] 
[   21.232269] Allocated by task 265:
[   21.232345]  kasan_save_stack+0x3c/0x68
[   21.232768]  kasan_save_track+0x20/0x40
[   21.233028]  kasan_save_alloc_info+0x40/0x58
[   21.233401]  __kasan_kmalloc+0xd4/0xd8
[   21.233613]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.233945]  kasan_atomics+0xb8/0x2e0
[   21.234073]  kunit_try_run_case+0x170/0x3f0
[   21.234214]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.234269]  kthread+0x328/0x630
[   21.234306]  ret_from_fork+0x10/0x20
[   21.234349] 
[   21.234377] The buggy address belongs to the object at fff00000c58c1080
[   21.234377]  which belongs to the cache kmalloc-64 of size 64
[   21.234450] The buggy address is located 0 bytes to the right of
[   21.234450]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.234541] 
[   21.234563] The buggy address belongs to the physical page:
[   21.234606] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.234659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.234710] page_type: f5(slab)
[   21.234751] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.234803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.234846] page dumped because: kasan: bad access detected
[   21.234878] 
[   21.234898] Memory state around the buggy address:
[   21.234946]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.235006]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.235059] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.235106]                                      ^
[   21.235139]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.235199]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.235240] ==================================================================
[   21.207150] ==================================================================
[   21.207377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   21.207868] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.208036] 
[   21.208106] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.208221] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.208250] Hardware name: linux,dummy-virt (DT)
[   21.208665] Call trace:
[   21.208804]  show_stack+0x20/0x38 (C)
[   21.209129]  dump_stack_lvl+0x8c/0xd0
[   21.209247]  print_report+0x118/0x608
[   21.209335]  kasan_report+0xdc/0x128
[   21.209475]  kasan_check_range+0x100/0x1a8
[   21.209525]  __kasan_check_write+0x20/0x30
[   21.209908]  kasan_atomics_helper+0xe44/0x4858
[   21.210350]  kasan_atomics+0x198/0x2e0
[   21.210498]  kunit_try_run_case+0x170/0x3f0
[   21.210607]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.210687]  kthread+0x328/0x630
[   21.210922]  ret_from_fork+0x10/0x20
[   21.211167] 
[   21.211365] Allocated by task 265:
[   21.211464]  kasan_save_stack+0x3c/0x68
[   21.211618]  kasan_save_track+0x20/0x40
[   21.211969]  kasan_save_alloc_info+0x40/0x58
[   21.212207]  __kasan_kmalloc+0xd4/0xd8
[   21.212436]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.212681]  kasan_atomics+0xb8/0x2e0
[   21.212844]  kunit_try_run_case+0x170/0x3f0
[   21.213037]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.213633]  kthread+0x328/0x630
[   21.213821]  ret_from_fork+0x10/0x20
[   21.214002] 
[   21.214060] The buggy address belongs to the object at fff00000c58c1080
[   21.214060]  which belongs to the cache kmalloc-64 of size 64
[   21.214266] The buggy address is located 0 bytes to the right of
[   21.214266]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.214348] 
[   21.214388] The buggy address belongs to the physical page:
[   21.214421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.214483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.214578] page_type: f5(slab)
[   21.214621] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.214673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.214730] page dumped because: kasan: bad access detected
[   21.214783] 
[   21.214805] Memory state around the buggy address:
[   21.214839]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.214885]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.214937] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.214993]                                      ^
[   21.215043]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.215096]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.215137] ==================================================================
[   21.236878] ==================================================================
[   21.237328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   21.237398] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.237632] 
[   21.237677] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.238068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.238270] Hardware name: linux,dummy-virt (DT)
[   21.238311] Call trace:
[   21.238571]  show_stack+0x20/0x38 (C)
[   21.238641]  dump_stack_lvl+0x8c/0xd0
[   21.238853]  print_report+0x118/0x608
[   21.239035]  kasan_report+0xdc/0x128
[   21.239272]  kasan_check_range+0x100/0x1a8
[   21.239347]  __kasan_check_write+0x20/0x30
[   21.239547]  kasan_atomics_helper+0xf20/0x4858
[   21.239597]  kasan_atomics+0x198/0x2e0
[   21.239646]  kunit_try_run_case+0x170/0x3f0
[   21.240191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.240523]  kthread+0x328/0x630
[   21.240715]  ret_from_fork+0x10/0x20
[   21.240821] 
[   21.240955] Allocated by task 265:
[   21.241060]  kasan_save_stack+0x3c/0x68
[   21.241260]  kasan_save_track+0x20/0x40
[   21.241331]  kasan_save_alloc_info+0x40/0x58
[   21.241448]  __kasan_kmalloc+0xd4/0xd8
[   21.241502]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.241546]  kasan_atomics+0xb8/0x2e0
[   21.241935]  kunit_try_run_case+0x170/0x3f0
[   21.242282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.242439]  kthread+0x328/0x630
[   21.242686]  ret_from_fork+0x10/0x20
[   21.242853] 
[   21.243040] The buggy address belongs to the object at fff00000c58c1080
[   21.243040]  which belongs to the cache kmalloc-64 of size 64
[   21.243239] The buggy address is located 0 bytes to the right of
[   21.243239]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.243311] 
[   21.243334] The buggy address belongs to the physical page:
[   21.243615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.243796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.244025] page_type: f5(slab)
[   21.244241] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.244301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.244555] page dumped because: kasan: bad access detected
[   21.244751] 
[   21.244828] Memory state around the buggy address:
[   21.244890]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.245095]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.245533] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.245954]                                      ^
[   21.246085]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.246215]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.246382] ==================================================================
[   21.216773] ==================================================================
[   21.216832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   21.217281] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.217365] 
[   21.217400] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.217590] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.217662] Hardware name: linux,dummy-virt (DT)
[   21.217696] Call trace:
[   21.217721]  show_stack+0x20/0x38 (C)
[   21.217773]  dump_stack_lvl+0x8c/0xd0
[   21.218336]  print_report+0x118/0x608
[   21.218495]  kasan_report+0xdc/0x128
[   21.218558]  __asan_report_store8_noabort+0x20/0x30
[   21.218726]  kasan_atomics_helper+0x3e5c/0x4858
[   21.218787]  kasan_atomics+0x198/0x2e0
[   21.218834]  kunit_try_run_case+0x170/0x3f0
[   21.218901]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.218956]  kthread+0x328/0x630
[   21.219395]  ret_from_fork+0x10/0x20
[   21.219479] 
[   21.219925] Allocated by task 265:
[   21.220118]  kasan_save_stack+0x3c/0x68
[   21.220363]  kasan_save_track+0x20/0x40
[   21.220436]  kasan_save_alloc_info+0x40/0x58
[   21.220477]  __kasan_kmalloc+0xd4/0xd8
[   21.220538]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.220905]  kasan_atomics+0xb8/0x2e0
[   21.221157]  kunit_try_run_case+0x170/0x3f0
[   21.221323]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.221450]  kthread+0x328/0x630
[   21.221700]  ret_from_fork+0x10/0x20
[   21.221951] 
[   21.222172] The buggy address belongs to the object at fff00000c58c1080
[   21.222172]  which belongs to the cache kmalloc-64 of size 64
[   21.222561] The buggy address is located 0 bytes to the right of
[   21.222561]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.222929] 
[   21.222958] The buggy address belongs to the physical page:
[   21.223077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.223339] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.223793] page_type: f5(slab)
[   21.223856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.224054] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.224234] page dumped because: kasan: bad access detected
[   21.224359] 
[   21.224621] Memory state around the buggy address:
[   21.224846]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.224917]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.225123] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.225454]                                      ^
[   21.225542]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.225643]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.225825] ==================================================================
[   21.249245] ==================================================================
[   21.249358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   21.249450] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.249796] 
[   21.249941] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.250236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.250440] Hardware name: linux,dummy-virt (DT)
[   21.250498] Call trace:
[   21.250601]  show_stack+0x20/0x38 (C)
[   21.250666]  dump_stack_lvl+0x8c/0xd0
[   21.250718]  print_report+0x118/0x608
[   21.250774]  kasan_report+0xdc/0x128
[   21.250821]  kasan_check_range+0x100/0x1a8
[   21.251055]  __kasan_check_write+0x20/0x30
[   21.251119]  kasan_atomics_helper+0xf88/0x4858
[   21.251172]  kasan_atomics+0x198/0x2e0
[   21.251219]  kunit_try_run_case+0x170/0x3f0
[   21.251658]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.251739]  kthread+0x328/0x630
[   21.251786]  ret_from_fork+0x10/0x20
[   21.251943] 
[   21.252229] Allocated by task 265:
[   21.252268]  kasan_save_stack+0x3c/0x68
[   21.252314]  kasan_save_track+0x20/0x40
[   21.252354]  kasan_save_alloc_info+0x40/0x58
[   21.252394]  __kasan_kmalloc+0xd4/0xd8
[   21.252444]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.252486]  kasan_atomics+0xb8/0x2e0
[   21.252535]  kunit_try_run_case+0x170/0x3f0
[   21.252586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.252632]  kthread+0x328/0x630
[   21.252665]  ret_from_fork+0x10/0x20
[   21.252704] 
[   21.252725] The buggy address belongs to the object at fff00000c58c1080
[   21.252725]  which belongs to the cache kmalloc-64 of size 64
[   21.252785] The buggy address is located 0 bytes to the right of
[   21.252785]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.252869] 
[   21.252911] The buggy address belongs to the physical page:
[   21.252953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.253006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.253067] page_type: f5(slab)
[   21.253108] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.253167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.253211] page dumped because: kasan: bad access detected
[   21.253243] 
[   21.253279] Memory state around the buggy address:
[   21.253313]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.253368]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.253414] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.253464]                                      ^
[   21.253499]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.253552]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.253592] ==================================================================
[   21.033271] ==================================================================
[   21.033322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   21.033374] Read of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.033461] 
[   21.033497] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.033582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.033611] Hardware name: linux,dummy-virt (DT)
[   21.033644] Call trace:
[   21.033668]  show_stack+0x20/0x38 (C)
[   21.033717]  dump_stack_lvl+0x8c/0xd0
[   21.033768]  print_report+0x118/0x608
[   21.033815]  kasan_report+0xdc/0x128
[   21.033863]  __asan_report_load4_noabort+0x20/0x30
[   21.033913]  kasan_atomics_helper+0x42d8/0x4858
[   21.033962]  kasan_atomics+0x198/0x2e0
[   21.034009]  kunit_try_run_case+0x170/0x3f0
[   21.034059]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.034113]  kthread+0x328/0x630
[   21.034155]  ret_from_fork+0x10/0x20
[   21.034203] 
[   21.034223] Allocated by task 265:
[   21.034253]  kasan_save_stack+0x3c/0x68
[   21.034371]  __kasan_kmalloc+0xd4/0xd8
[   21.038304] The buggy address belongs to the object at fff00000c58c1080
[   21.038304]  which belongs to the cache kmalloc-64 of size 64
[   21.038470] The buggy address is located 0 bytes to the right of
[   21.038470]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.039861]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.040166]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.042398] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.043286]  __kasan_check_write+0x20/0x30
[   21.043511]  kunit_try_run_case+0x170/0x3f0
[   21.043602]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.043723]  kthread+0x328/0x630
[   21.043769]  ret_from_fork+0x10/0x20
[   21.044064] 
[   21.044179] Allocated by task 265:
[   21.044237]  kasan_save_stack+0x3c/0x68
[   21.044343]  kasan_save_track+0x20/0x40
[   21.044386]  kasan_save_alloc_info+0x40/0x58
[   21.044435]  __kasan_kmalloc+0xd4/0xd8
[   21.044491]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.044533]  kasan_atomics+0xb8/0x2e0
[   21.044570]  kunit_try_run_case+0x170/0x3f0
[   21.044611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.044670]  kthread+0x328/0x630
[   21.044705]  ret_from_fork+0x10/0x20
[   21.044743] 
[   21.044775] The buggy address belongs to the object at fff00000c58c1080
[   21.044775]  which belongs to the cache kmalloc-64 of size 64
[   21.044854] The buggy address is located 0 bytes to the right of
[   21.044854]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.044918] 
[   21.044946] The buggy address belongs to the physical page:
[   21.044995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.045059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.045110] page_type: f5(slab)
[   21.045178] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.045247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.045289] page dumped because: kasan: bad access detected
[   21.045322] 
[   21.045343] Memory state around the buggy address:
[   21.045384]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.045453]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.045499] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.045540]                                      ^
[   21.045591]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.045644]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.045693] ==================================================================
[   21.369077] ==================================================================
[   21.369169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   21.369224] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.369278] 
[   21.369375] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.369480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.369524] Hardware name: linux,dummy-virt (DT)
[   21.369785] Call trace:
[   21.369842]  show_stack+0x20/0x38 (C)
[   21.369913]  dump_stack_lvl+0x8c/0xd0
[   21.369980]  print_report+0x118/0x608
[   21.370046]  kasan_report+0xdc/0x128
[   21.370269]  kasan_check_range+0x100/0x1a8
[   21.370339]  __kasan_check_write+0x20/0x30
[   21.370461]  kasan_atomics_helper+0x16d0/0x4858
[   21.370515]  kasan_atomics+0x198/0x2e0
[   21.370569]  kunit_try_run_case+0x170/0x3f0
[   21.370672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.370749]  kthread+0x328/0x630
[   21.370794]  ret_from_fork+0x10/0x20
[   21.370889] 
[   21.370919] Allocated by task 265:
[   21.370951]  kasan_save_stack+0x3c/0x68
[   21.371000]  kasan_save_track+0x20/0x40
[   21.371234]  kasan_save_alloc_info+0x40/0x58
[   21.371339]  __kasan_kmalloc+0xd4/0xd8
[   21.371442]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.371543]  kasan_atomics+0xb8/0x2e0
[   21.371633]  kunit_try_run_case+0x170/0x3f0
[   21.371906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.371998]  kthread+0x328/0x630
[   21.372125]  ret_from_fork+0x10/0x20
[   21.372192] 
[   21.372304] The buggy address belongs to the object at fff00000c58c1080
[   21.372304]  which belongs to the cache kmalloc-64 of size 64
[   21.372373] The buggy address is located 0 bytes to the right of
[   21.372373]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.372452] 
[   21.372476] The buggy address belongs to the physical page:
[   21.372509] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.372648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.372729] page_type: f5(slab)
[   21.372859] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.373130] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.373241] page dumped because: kasan: bad access detected
[   21.373322] 
[   21.373441] Memory state around the buggy address:
[   21.373515]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.373565]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.373794] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.373912]                                      ^
[   21.373969]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.374083]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.374172] ==================================================================
[   21.344405] ==================================================================
[   21.344486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   21.344541] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.344609] 
[   21.344805] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.344906] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.345131] Hardware name: linux,dummy-virt (DT)
[   21.345170] Call trace:
[   21.345321]  show_stack+0x20/0x38 (C)
[   21.345391]  dump_stack_lvl+0x8c/0xd0
[   21.345465]  print_report+0x118/0x608
[   21.345793]  kasan_report+0xdc/0x128
[   21.345875]  kasan_check_range+0x100/0x1a8
[   21.345927]  __kasan_check_write+0x20/0x30
[   21.346076]  kasan_atomics_helper+0x15b4/0x4858
[   21.346128]  kasan_atomics+0x198/0x2e0
[   21.346178]  kunit_try_run_case+0x170/0x3f0
[   21.346225]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.346281]  kthread+0x328/0x630
[   21.346324]  ret_from_fork+0x10/0x20
[   21.346589] 
[   21.346866] Allocated by task 265:
[   21.346908]  kasan_save_stack+0x3c/0x68
[   21.346963]  kasan_save_track+0x20/0x40
[   21.347013]  kasan_save_alloc_info+0x40/0x58
[   21.347061]  __kasan_kmalloc+0xd4/0xd8
[   21.347199]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.347243]  kasan_atomics+0xb8/0x2e0
[   21.347322]  kunit_try_run_case+0x170/0x3f0
[   21.347372]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.347562]  kthread+0x328/0x630
[   21.347651]  ret_from_fork+0x10/0x20
[   21.347701] 
[   21.347729] The buggy address belongs to the object at fff00000c58c1080
[   21.347729]  which belongs to the cache kmalloc-64 of size 64
[   21.347789] The buggy address is located 0 bytes to the right of
[   21.347789]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.347855] 
[   21.347876] The buggy address belongs to the physical page:
[   21.347908] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.347961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.348010] page_type: f5(slab)
[   21.348050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.348515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.348600] page dumped because: kasan: bad access detected
[   21.348891] 
[   21.349033] Memory state around the buggy address:
[   21.349118]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.349171]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.349399] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.349620]                                      ^
[   21.349693]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.349889]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.349936] ==================================================================
[   21.177274] ==================================================================
[   21.177329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   21.177380] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.177660] 
[   21.177751] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.177857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.177940] Hardware name: linux,dummy-virt (DT)
[   21.177974] Call trace:
[   21.178014]  show_stack+0x20/0x38 (C)
[   21.178075]  dump_stack_lvl+0x8c/0xd0
[   21.178123]  print_report+0x118/0x608
[   21.178335]  kasan_report+0xdc/0x128
[   21.178501]  kasan_check_range+0x100/0x1a8
[   21.178563]  __kasan_check_write+0x20/0x30
[   21.178612]  kasan_atomics_helper+0xd3c/0x4858
[   21.178679]  kasan_atomics+0x198/0x2e0
[   21.178793]  kunit_try_run_case+0x170/0x3f0
[   21.178872]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.178930]  kthread+0x328/0x630
[   21.179131]  ret_from_fork+0x10/0x20
[   21.179194] 
[   21.179234] Allocated by task 265:
[   21.179274]  kasan_save_stack+0x3c/0x68
[   21.179319]  kasan_save_track+0x20/0x40
[   21.179371]  kasan_save_alloc_info+0x40/0x58
[   21.179497]  __kasan_kmalloc+0xd4/0xd8
[   21.179849]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.179952]  kasan_atomics+0xb8/0x2e0
[   21.180022]  kunit_try_run_case+0x170/0x3f0
[   21.180193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.180376]  kthread+0x328/0x630
[   21.180453]  ret_from_fork+0x10/0x20
[   21.180515] 
[   21.180635] The buggy address belongs to the object at fff00000c58c1080
[   21.180635]  which belongs to the cache kmalloc-64 of size 64
[   21.180740] The buggy address is located 0 bytes to the right of
[   21.180740]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.181124] 
[   21.181176] The buggy address belongs to the physical page:
[   21.181252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.181307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.181528] page_type: f5(slab)
[   21.181631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.181773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.181852] page dumped because: kasan: bad access detected
[   21.182084] 
[   21.182196] Memory state around the buggy address:
[   21.182233]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.182515]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.182685] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.182782]                                      ^
[   21.183077]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.183217]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.183260] ==================================================================
[   21.360014] ==================================================================
[   21.360123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   21.360199] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.360321] 
[   21.360378] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.360481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.360583] Hardware name: linux,dummy-virt (DT)
[   21.360643] Call trace:
[   21.360670]  show_stack+0x20/0x38 (C)
[   21.360721]  dump_stack_lvl+0x8c/0xd0
[   21.360963]  print_report+0x118/0x608
[   21.361057]  kasan_report+0xdc/0x128
[   21.361117]  kasan_check_range+0x100/0x1a8
[   21.361182]  __kasan_check_write+0x20/0x30
[   21.361247]  kasan_atomics_helper+0x1644/0x4858
[   21.361299]  kasan_atomics+0x198/0x2e0
[   21.361552]  kunit_try_run_case+0x170/0x3f0
[   21.361642]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.361745]  kthread+0x328/0x630
[   21.361791]  ret_from_fork+0x10/0x20
[   21.361847] 
[   21.361929] Allocated by task 265:
[   21.361969]  kasan_save_stack+0x3c/0x68
[   21.362013]  kasan_save_track+0x20/0x40
[   21.362060]  kasan_save_alloc_info+0x40/0x58
[   21.362117]  __kasan_kmalloc+0xd4/0xd8
[   21.362159]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.362201]  kasan_atomics+0xb8/0x2e0
[   21.362240]  kunit_try_run_case+0x170/0x3f0
[   21.362407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.362504]  kthread+0x328/0x630
[   21.362587]  ret_from_fork+0x10/0x20
[   21.362645] 
[   21.362696] The buggy address belongs to the object at fff00000c58c1080
[   21.362696]  which belongs to the cache kmalloc-64 of size 64
[   21.362899] The buggy address is located 0 bytes to the right of
[   21.362899]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.363013] 
[   21.363141] The buggy address belongs to the physical page:
[   21.363197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.363279] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.363331] page_type: f5(slab)
[   21.363371] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.363434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.363643] page dumped because: kasan: bad access detected
[   21.363800] 
[   21.363860] Memory state around the buggy address:
[   21.363906]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.364251]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.364340] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.364497]                                      ^
[   21.364538]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.364583]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.364624] ==================================================================
[   21.321295] ==================================================================
[   21.321347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   21.321397] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.321464] 
[   21.321495] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.321580] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.321608] Hardware name: linux,dummy-virt (DT)
[   21.321640] Call trace:
[   21.321664]  show_stack+0x20/0x38 (C)
[   21.321712]  dump_stack_lvl+0x8c/0xd0
[   21.321763]  print_report+0x118/0x608
[   21.321810]  kasan_report+0xdc/0x128
[   21.321858]  __asan_report_load8_noabort+0x20/0x30
[   21.321907]  kasan_atomics_helper+0x3f04/0x4858
[   21.321957]  kasan_atomics+0x198/0x2e0
[   21.322004]  kunit_try_run_case+0x170/0x3f0
[   21.322055]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.322120]  kthread+0x328/0x630
[   21.322168]  ret_from_fork+0x10/0x20
[   21.322218] 
[   21.322239] Allocated by task 265:
[   21.322278]  kasan_save_stack+0x3c/0x68
[   21.322320]  kasan_save_track+0x20/0x40
[   21.322367]  kasan_save_alloc_info+0x40/0x58
[   21.322406]  __kasan_kmalloc+0xd4/0xd8
[   21.322455]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.322496]  kasan_atomics+0xb8/0x2e0
[   21.322533]  kunit_try_run_case+0x170/0x3f0
[   21.322573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.322618]  kthread+0x328/0x630
[   21.322651]  ret_from_fork+0x10/0x20
[   21.322689] 
[   21.322710] The buggy address belongs to the object at fff00000c58c1080
[   21.322710]  which belongs to the cache kmalloc-64 of size 64
[   21.322768] The buggy address is located 0 bytes to the right of
[   21.322768]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.322834] 
[   21.322855] The buggy address belongs to the physical page:
[   21.322887] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.322939] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.322995] page_type: f5(slab)
[   21.323051] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.323104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.323210] page dumped because: kasan: bad access detected
[   21.323261] 
[   21.323300] Memory state around the buggy address:
[   21.323437]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.323504]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.323547] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.323588]                                      ^
[   21.323622]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.323666]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.323707] ==================================================================
[   21.285214] ==================================================================
[   21.285269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   21.285321] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.285841] 
[   21.285894] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.285986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.286014] Hardware name: linux,dummy-virt (DT)
[   21.286048] Call trace:
[   21.286124]  show_stack+0x20/0x38 (C)
[   21.286178]  dump_stack_lvl+0x8c/0xd0
[   21.286514]  print_report+0x118/0x608
[   21.286611]  kasan_report+0xdc/0x128
[   21.286666]  kasan_check_range+0x100/0x1a8
[   21.287052]  __kasan_check_write+0x20/0x30
[   21.287858]  kasan_atomics_helper+0x1128/0x4858
[   21.289469]  kasan_atomics+0x198/0x2e0
[   21.289530]  kunit_try_run_case+0x170/0x3f0
[   21.289583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.289639]  kthread+0x328/0x630
[   21.289682]  ret_from_fork+0x10/0x20
[   21.289733] 
[   21.289754] Allocated by task 265:
[   21.289783]  kasan_save_stack+0x3c/0x68
[   21.289828]  kasan_save_track+0x20/0x40
[   21.289866]  kasan_save_alloc_info+0x40/0x58
[   21.289903]  __kasan_kmalloc+0xd4/0xd8
[   21.289945]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.289988]  kasan_atomics+0xb8/0x2e0
[   21.290026]  kunit_try_run_case+0x170/0x3f0
[   21.290066]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.290112]  kthread+0x328/0x630
[   21.290147]  ret_from_fork+0x10/0x20
[   21.290185] 
[   21.290206] The buggy address belongs to the object at fff00000c58c1080
[   21.290206]  which belongs to the cache kmalloc-64 of size 64
[   21.290266] The buggy address is located 0 bytes to the right of
[   21.290266]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.290330] 
[   21.290354] The buggy address belongs to the physical page:
[   21.290388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.290455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.290506] page_type: f5(slab)
[   21.290548] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.290603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.290645] page dumped because: kasan: bad access detected
[   21.290680] 
[   21.290699] Memory state around the buggy address:
[   21.290734]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.290777]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.290822] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.290861]                                      ^
[   21.290895]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.290939]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.290979] ==================================================================
[   21.323904] ==================================================================
[   21.323949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   21.323998] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.324050] 
[   21.324079] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.324195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.324232] Hardware name: linux,dummy-virt (DT)
[   21.324281] Call trace:
[   21.324330]  show_stack+0x20/0x38 (C)
[   21.324379]  dump_stack_lvl+0x8c/0xd0
[   21.324475]  print_report+0x118/0x608
[   21.324541]  kasan_report+0xdc/0x128
[   21.324605]  kasan_check_range+0x100/0x1a8
[   21.324656]  __kasan_check_write+0x20/0x30
[   21.324702]  kasan_atomics_helper+0x1414/0x4858
[   21.325007]  kasan_atomics+0x198/0x2e0
[   21.325072]  kunit_try_run_case+0x170/0x3f0
[   21.325139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.325212]  kthread+0x328/0x630
[   21.325271]  ret_from_fork+0x10/0x20
[   21.325349] 
[   21.325469] Allocated by task 265:
[   21.325507]  kasan_save_stack+0x3c/0x68
[   21.325565]  kasan_save_track+0x20/0x40
[   21.325608]  kasan_save_alloc_info+0x40/0x58
[   21.325685]  __kasan_kmalloc+0xd4/0xd8
[   21.325783]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.325859]  kasan_atomics+0xb8/0x2e0
[   21.325898]  kunit_try_run_case+0x170/0x3f0
[   21.325938]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.326150]  kthread+0x328/0x630
[   21.326317]  ret_from_fork+0x10/0x20
[   21.326356] 
[   21.326378] The buggy address belongs to the object at fff00000c58c1080
[   21.326378]  which belongs to the cache kmalloc-64 of size 64
[   21.326469] The buggy address is located 0 bytes to the right of
[   21.326469]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.326554] 
[   21.326594] The buggy address belongs to the physical page:
[   21.326798] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.326882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.326963] page_type: f5(slab)
[   21.327037] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.327110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.327154] page dumped because: kasan: bad access detected
[   21.327204] 
[   21.327244] Memory state around the buggy address:
[   21.327277]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.327369]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.327460] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.327501]                                      ^
[   21.327533]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.327800]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.327841] ==================================================================
[   21.183571] ==================================================================
[   21.183622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   21.183672] Read of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.183991] 
[   21.184086] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.184374] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.184442] Hardware name: linux,dummy-virt (DT)
[   21.184486] Call trace:
[   21.184510]  show_stack+0x20/0x38 (C)
[   21.184570]  dump_stack_lvl+0x8c/0xd0
[   21.184675]  print_report+0x118/0x608
[   21.184727]  kasan_report+0xdc/0x128
[   21.184776]  __asan_report_load4_noabort+0x20/0x30
[   21.184838]  kasan_atomics_helper+0x3e04/0x4858
[   21.184890]  kasan_atomics+0x198/0x2e0
[   21.184942]  kunit_try_run_case+0x170/0x3f0
[   21.184993]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.185053]  kthread+0x328/0x630
[   21.185097]  ret_from_fork+0x10/0x20
[   21.185156] 
[   21.185177] Allocated by task 265:
[   21.185208]  kasan_save_stack+0x3c/0x68
[   21.185251]  kasan_save_track+0x20/0x40
[   21.185300]  kasan_save_alloc_info+0x40/0x58
[   21.185339]  __kasan_kmalloc+0xd4/0xd8
[   21.185386]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.185561]  kasan_atomics+0xb8/0x2e0
[   21.185862]  kunit_try_run_case+0x170/0x3f0
[   21.185933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.185989]  kthread+0x328/0x630
[   21.186073]  ret_from_fork+0x10/0x20
[   21.186144] 
[   21.186183] The buggy address belongs to the object at fff00000c58c1080
[   21.186183]  which belongs to the cache kmalloc-64 of size 64
[   21.186530] The buggy address is located 0 bytes to the right of
[   21.186530]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.186611] 
[   21.186632] The buggy address belongs to the physical page:
[   21.186664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.186717] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.186768] page_type: f5(slab)
[   21.186809] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.186861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.186903] page dumped because: kasan: bad access detected
[   21.186935] 
[   21.186956] Memory state around the buggy address:
[   21.186988]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.187032]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.187076] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.187117]                                      ^
[   21.187150]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.187194]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.187235] ==================================================================
[   21.171686] ==================================================================
[   21.171827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   21.171883] Read of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.171935] 
[   21.171965] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.172307] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.172357] Hardware name: linux,dummy-virt (DT)
[   21.172454] Call trace:
[   21.172501]  show_stack+0x20/0x38 (C)
[   21.172587]  dump_stack_lvl+0x8c/0xd0
[   21.172857]  print_report+0x118/0x608
[   21.172974]  kasan_report+0xdc/0x128
[   21.173044]  __asan_report_load4_noabort+0x20/0x30
[   21.173097]  kasan_atomics_helper+0x3dd8/0x4858
[   21.173153]  kasan_atomics+0x198/0x2e0
[   21.173265]  kunit_try_run_case+0x170/0x3f0
[   21.173319]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.173535]  kthread+0x328/0x630
[   21.173597]  ret_from_fork+0x10/0x20
[   21.173768] 
[   21.173796] Allocated by task 265:
[   21.173849]  kasan_save_stack+0x3c/0x68
[   21.173902]  kasan_save_track+0x20/0x40
[   21.174132]  kasan_save_alloc_info+0x40/0x58
[   21.174206]  __kasan_kmalloc+0xd4/0xd8
[   21.174301]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.174347]  kasan_atomics+0xb8/0x2e0
[   21.174383]  kunit_try_run_case+0x170/0x3f0
[   21.174437]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.174484]  kthread+0x328/0x630
[   21.174517]  ret_from_fork+0x10/0x20
[   21.174786] 
[   21.174901] The buggy address belongs to the object at fff00000c58c1080
[   21.174901]  which belongs to the cache kmalloc-64 of size 64
[   21.174984] The buggy address is located 0 bytes to the right of
[   21.174984]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.175269] 
[   21.175304] The buggy address belongs to the physical page:
[   21.175337] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.175393] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.175604] page_type: f5(slab)
[   21.175738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.175833] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.175913] page dumped because: kasan: bad access detected
[   21.176105] 
[   21.176145] Memory state around the buggy address:
[   21.176181]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.176244]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.176308] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.176489]                                      ^
[   21.176531]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.176578]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.176628] ==================================================================
[   21.195040] ==================================================================
[   21.195096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   21.195438] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.195680] 
[   21.195736] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.196440] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.196641] Hardware name: linux,dummy-virt (DT)
[   21.196701] Call trace:
[   21.196797]  show_stack+0x20/0x38 (C)
[   21.196892]  dump_stack_lvl+0x8c/0xd0
[   21.196978]  print_report+0x118/0x608
[   21.198088]  kasan_report+0xdc/0x128
[   21.198212]  __asan_report_load8_noabort+0x20/0x30
[   21.198314]  kasan_atomics_helper+0x3f58/0x4858
[   21.198405]  kasan_atomics+0x198/0x2e0
[   21.198743]  kunit_try_run_case+0x170/0x3f0
[   21.199396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.199606]  kthread+0x328/0x630
[   21.199824]  ret_from_fork+0x10/0x20
[   21.200037] 
[   21.200106] Allocated by task 265:
[   21.200215]  kasan_save_stack+0x3c/0x68
[   21.200265]  kasan_save_track+0x20/0x40
[   21.200471]  kasan_save_alloc_info+0x40/0x58
[   21.200706]  __kasan_kmalloc+0xd4/0xd8
[   21.200770]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.201082]  kasan_atomics+0xb8/0x2e0
[   21.201136]  kunit_try_run_case+0x170/0x3f0
[   21.201600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.201891]  kthread+0x328/0x630
[   21.201959]  ret_from_fork+0x10/0x20
[   21.202023] 
[   21.202160] The buggy address belongs to the object at fff00000c58c1080
[   21.202160]  which belongs to the cache kmalloc-64 of size 64
[   21.202639] The buggy address is located 0 bytes to the right of
[   21.202639]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.202816] 
[   21.202977] The buggy address belongs to the physical page:
[   21.203351] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.203650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.203854] page_type: f5(slab)
[   21.203904] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.204019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.204193] page dumped because: kasan: bad access detected
[   21.204590] 
[   21.204646] Memory state around the buggy address:
[   21.204697]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.204855]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.205143] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.205371]                                      ^
[   21.205417]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.205677]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.205817] ==================================================================
[   21.309991] ==================================================================
[   21.310044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   21.310101] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.310602] 
[   21.310634] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.310730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.310779] Hardware name: linux,dummy-virt (DT)
[   21.310829] Call trace:
[   21.310854]  show_stack+0x20/0x38 (C)
[   21.310939]  dump_stack_lvl+0x8c/0xd0
[   21.311005]  print_report+0x118/0x608
[   21.311072]  kasan_report+0xdc/0x128
[   21.311119]  kasan_check_range+0x100/0x1a8
[   21.311196]  __kasan_check_write+0x20/0x30
[   21.311262]  kasan_atomics_helper+0x12d8/0x4858
[   21.311608]  kasan_atomics+0x198/0x2e0
[   21.311694]  kunit_try_run_case+0x170/0x3f0
[   21.311827]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.311915]  kthread+0x328/0x630
[   21.311989]  ret_from_fork+0x10/0x20
[   21.312158] 
[   21.312229] Allocated by task 265:
[   21.312258]  kasan_save_stack+0x3c/0x68
[   21.312309]  kasan_save_track+0x20/0x40
[   21.312350]  kasan_save_alloc_info+0x40/0x58
[   21.312388]  __kasan_kmalloc+0xd4/0xd8
[   21.312437]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.312730]  kasan_atomics+0xb8/0x2e0
[   21.312768]  kunit_try_run_case+0x170/0x3f0
[   21.312809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.312945]  kthread+0x328/0x630
[   21.313021]  ret_from_fork+0x10/0x20
[   21.313060] 
[   21.313082] The buggy address belongs to the object at fff00000c58c1080
[   21.313082]  which belongs to the cache kmalloc-64 of size 64
[   21.313180] The buggy address is located 0 bytes to the right of
[   21.313180]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.313256] 
[   21.313278] The buggy address belongs to the physical page:
[   21.313348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.313443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.313662] page_type: f5(slab)
[   21.313840] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.313958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.314035] page dumped because: kasan: bad access detected
[   21.314166] 
[   21.314189] Memory state around the buggy address:
[   21.314220]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.314264]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.314365] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.314571]                                      ^
[   21.314772]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.314827]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.314867] ==================================================================
[   21.328274] ==================================================================
[   21.328402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   21.328474] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.328525] 
[   21.328573] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.328780] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.328845] Hardware name: linux,dummy-virt (DT)
[   21.328885] Call trace:
[   21.328924]  show_stack+0x20/0x38 (C)
[   21.329016]  dump_stack_lvl+0x8c/0xd0
[   21.329093]  print_report+0x118/0x608
[   21.329160]  kasan_report+0xdc/0x128
[   21.329216]  kasan_check_range+0x100/0x1a8
[   21.329344]  __kasan_check_write+0x20/0x30
[   21.329411]  kasan_atomics_helper+0x147c/0x4858
[   21.329471]  kasan_atomics+0x198/0x2e0
[   21.329518]  kunit_try_run_case+0x170/0x3f0
[   21.329720]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.329785]  kthread+0x328/0x630
[   21.329866]  ret_from_fork+0x10/0x20
[   21.329947] 
[   21.329986] Allocated by task 265:
[   21.330022]  kasan_save_stack+0x3c/0x68
[   21.330082]  kasan_save_track+0x20/0x40
[   21.330130]  kasan_save_alloc_info+0x40/0x58
[   21.330169]  __kasan_kmalloc+0xd4/0xd8
[   21.330447]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.330489]  kasan_atomics+0xb8/0x2e0
[   21.330527]  kunit_try_run_case+0x170/0x3f0
[   21.330574]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.330647]  kthread+0x328/0x630
[   21.330698]  ret_from_fork+0x10/0x20
[   21.330827] 
[   21.330876] The buggy address belongs to the object at fff00000c58c1080
[   21.330876]  which belongs to the cache kmalloc-64 of size 64
[   21.330951] The buggy address is located 0 bytes to the right of
[   21.330951]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.331017] 
[   21.331038] The buggy address belongs to the physical page:
[   21.331151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.331204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.331280] page_type: f5(slab)
[   21.331336] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.331481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.331575] page dumped because: kasan: bad access detected
[   21.331610] 
[   21.331630] Memory state around the buggy address:
[   21.331661]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.331705]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.331749] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.331789]                                      ^
[   21.331822]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.332337]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.332412] ==================================================================
[   21.350736] ==================================================================
[   21.350789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   21.350841] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.351108] 
[   21.351164] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.351445] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.351648] Hardware name: linux,dummy-virt (DT)
[   21.351727] Call trace:
[   21.351788]  show_stack+0x20/0x38 (C)
[   21.352065]  dump_stack_lvl+0x8c/0xd0
[   21.352282]  print_report+0x118/0x608
[   21.352383]  kasan_report+0xdc/0x128
[   21.353015]  __asan_report_load8_noabort+0x20/0x30
[   21.353259]  kasan_atomics_helper+0x3db0/0x4858
[   21.353340]  kasan_atomics+0x198/0x2e0
[   21.353717]  kunit_try_run_case+0x170/0x3f0
[   21.353820]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.353965]  kthread+0x328/0x630
[   21.354075]  ret_from_fork+0x10/0x20
[   21.354289] 
[   21.354350] Allocated by task 265:
[   21.354406]  kasan_save_stack+0x3c/0x68
[   21.354749]  kasan_save_track+0x20/0x40
[   21.354837]  kasan_save_alloc_info+0x40/0x58
[   21.355343]  __kasan_kmalloc+0xd4/0xd8
[   21.355587]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.355694]  kasan_atomics+0xb8/0x2e0
[   21.355761]  kunit_try_run_case+0x170/0x3f0
[   21.356170]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.356301]  kthread+0x328/0x630
[   21.356383]  ret_from_fork+0x10/0x20
[   21.356505] 
[   21.356558] The buggy address belongs to the object at fff00000c58c1080
[   21.356558]  which belongs to the cache kmalloc-64 of size 64
[   21.356859] The buggy address is located 0 bytes to the right of
[   21.356859]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.357027] 
[   21.357097] The buggy address belongs to the physical page:
[   21.357132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.357391] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.357528] page_type: f5(slab)
[   21.357571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.357624] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.357695] page dumped because: kasan: bad access detected
[   21.357755] 
[   21.357776] Memory state around the buggy address:
[   21.357823]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.357868]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.357913] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.357969]                                      ^
[   21.358006]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.358060]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.358109] ==================================================================
[   21.374753] ==================================================================
[   21.374831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   21.374926] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.375005] 
[   21.375042] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.375273] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.375331] Hardware name: linux,dummy-virt (DT)
[   21.375366] Call trace:
[   21.375412]  show_stack+0x20/0x38 (C)
[   21.375546]  dump_stack_lvl+0x8c/0xd0
[   21.375643]  print_report+0x118/0x608
[   21.375781]  kasan_report+0xdc/0x128
[   21.375942]  __asan_report_load8_noabort+0x20/0x30
[   21.376001]  kasan_atomics_helper+0x3e10/0x4858
[   21.376053]  kasan_atomics+0x198/0x2e0
[   21.376108]  kunit_try_run_case+0x170/0x3f0
[   21.376158]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.376294]  kthread+0x328/0x630
[   21.376383]  ret_from_fork+0x10/0x20
[   21.376519] 
[   21.376541] Allocated by task 265:
[   21.376581]  kasan_save_stack+0x3c/0x68
[   21.376665]  kasan_save_track+0x20/0x40
[   21.376713]  kasan_save_alloc_info+0x40/0x58
[   21.376750]  __kasan_kmalloc+0xd4/0xd8
[   21.376798]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.376847]  kasan_atomics+0xb8/0x2e0
[   21.376884]  kunit_try_run_case+0x170/0x3f0
[   21.376932]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.376982]  kthread+0x328/0x630
[   21.377018]  ret_from_fork+0x10/0x20
[   21.377064] 
[   21.377085] The buggy address belongs to the object at fff00000c58c1080
[   21.377085]  which belongs to the cache kmalloc-64 of size 64
[   21.377144] The buggy address is located 0 bytes to the right of
[   21.377144]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.377218] 
[   21.377239] The buggy address belongs to the physical page:
[   21.377273] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.377328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.377379] page_type: f5(slab)
[   21.377444] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.377497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.377540] page dumped because: kasan: bad access detected
[   21.377590] 
[   21.377610] Memory state around the buggy address:
[   21.377643]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.377698]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.377751] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.377790]                                      ^
[   21.377833]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.377878]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.377918] ==================================================================
[   21.187982] ==================================================================
[   21.188036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   21.188086] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.188138] 
[   21.188752] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.189033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.189200] Hardware name: linux,dummy-virt (DT)
[   21.189268] Call trace:
[   21.189318]  show_stack+0x20/0x38 (C)
[   21.189473]  dump_stack_lvl+0x8c/0xd0
[   21.190125]  print_report+0x118/0x608
[   21.190347]  kasan_report+0xdc/0x128
[   21.190503]  kasan_check_range+0x100/0x1a8
[   21.190633]  __kasan_check_read+0x20/0x30
[   21.190811]  kasan_atomics_helper+0xdd4/0x4858
[   21.190865]  kasan_atomics+0x198/0x2e0
[   21.191143]  kunit_try_run_case+0x170/0x3f0
[   21.191482]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.191764]  kthread+0x328/0x630
[   21.191810]  ret_from_fork+0x10/0x20
[   21.191862] 
[   21.191883] Allocated by task 265:
[   21.192282]  kasan_save_stack+0x3c/0x68
[   21.192355]  kasan_save_track+0x20/0x40
[   21.192396]  kasan_save_alloc_info+0x40/0x58
[   21.192443]  __kasan_kmalloc+0xd4/0xd8
[   21.192483]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.192524]  kasan_atomics+0xb8/0x2e0
[   21.192561]  kunit_try_run_case+0x170/0x3f0
[   21.192609]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.192655]  kthread+0x328/0x630
[   21.192701]  ret_from_fork+0x10/0x20
[   21.192739] 
[   21.192762] The buggy address belongs to the object at fff00000c58c1080
[   21.192762]  which belongs to the cache kmalloc-64 of size 64
[   21.192829] The buggy address is located 0 bytes to the right of
[   21.192829]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.192909] 
[   21.192932] The buggy address belongs to the physical page:
[   21.192964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.193025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.193076] page_type: f5(slab)
[   21.193116] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.193174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.193216] page dumped because: kasan: bad access detected
[   21.193250] 
[   21.193272] Memory state around the buggy address:
[   21.193306]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.193365]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.193410] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.193460]                                      ^
[   21.193504]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.193561]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.193611] ==================================================================
[   21.297340] ==================================================================
[   21.297512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   21.297578] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.297632] 
[   21.297667] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.297755] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.297782] Hardware name: linux,dummy-virt (DT)
[   21.297816] Call trace:
[   21.297839]  show_stack+0x20/0x38 (C)
[   21.297891]  dump_stack_lvl+0x8c/0xd0
[   21.297942]  print_report+0x118/0x608
[   21.297989]  kasan_report+0xdc/0x128
[   21.298094]  kasan_check_range+0x100/0x1a8
[   21.298153]  __kasan_check_write+0x20/0x30
[   21.298238]  kasan_atomics_helper+0x1190/0x4858
[   21.298288]  kasan_atomics+0x198/0x2e0
[   21.298335]  kunit_try_run_case+0x170/0x3f0
[   21.298384]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.298462]  kthread+0x328/0x630
[   21.298507]  ret_from_fork+0x10/0x20
[   21.298556] 
[   21.298576] Allocated by task 265:
[   21.298608]  kasan_save_stack+0x3c/0x68
[   21.298650]  kasan_save_track+0x20/0x40
[   21.298688]  kasan_save_alloc_info+0x40/0x58
[   21.298728]  __kasan_kmalloc+0xd4/0xd8
[   21.298767]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.298808]  kasan_atomics+0xb8/0x2e0
[   21.298846]  kunit_try_run_case+0x170/0x3f0
[   21.298896]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.298943]  kthread+0x328/0x630
[   21.298978]  ret_from_fork+0x10/0x20
[   21.299015] 
[   21.299038] The buggy address belongs to the object at fff00000c58c1080
[   21.299038]  which belongs to the cache kmalloc-64 of size 64
[   21.299105] The buggy address is located 0 bytes to the right of
[   21.299105]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.299171] 
[   21.299193] The buggy address belongs to the physical page:
[   21.299233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.299286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.299347] page_type: f5(slab)
[   21.299396] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.299473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.299516] page dumped because: kasan: bad access detected
[   21.299552] 
[   21.299574] Memory state around the buggy address:
[   21.299608]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.299653]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.299696] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.299736]                                      ^
[   21.299771]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.299815]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.299855] ==================================================================
[   21.047040] ==================================================================
[   21.047250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   21.047353] Write of size 4 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.047673] 
[   21.047732] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.047870] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.047912] Hardware name: linux,dummy-virt (DT)
[   21.047945] Call trace:
[   21.047971]  show_stack+0x20/0x38 (C)
[   21.048031]  dump_stack_lvl+0x8c/0xd0
[   21.048324]  print_report+0x118/0x608
[   21.048478]  kasan_report+0xdc/0x128
[   21.048623]  kasan_check_range+0x100/0x1a8
[   21.048732]  __kasan_check_write+0x20/0x30
[   21.049017]  kasan_atomics_helper+0x99c/0x4858
[   21.049151]  kasan_atomics+0x198/0x2e0
[   21.049248]  kunit_try_run_case+0x170/0x3f0
[   21.049380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.049490]  kthread+0x328/0x630
[   21.049666]  ret_from_fork+0x10/0x20
[   21.049724] 
[   21.049777] Allocated by task 265:
[   21.049849]  kasan_save_stack+0x3c/0x68
[   21.050005]  kasan_save_track+0x20/0x40
[   21.050070]  kasan_save_alloc_info+0x40/0x58
[   21.050133]  __kasan_kmalloc+0xd4/0xd8
[   21.050401]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.050520]  kasan_atomics+0xb8/0x2e0
[   21.050634]  kunit_try_run_case+0x170/0x3f0
[   21.050758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.050805]  kthread+0x328/0x630
[   21.051066]  ret_from_fork+0x10/0x20
[   21.051188] 
[   21.051237] The buggy address belongs to the object at fff00000c58c1080
[   21.051237]  which belongs to the cache kmalloc-64 of size 64
[   21.051366] The buggy address is located 0 bytes to the right of
[   21.051366]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.051468] 
[   21.051712] The buggy address belongs to the physical page:
[   21.051845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.051930] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.052048] page_type: f5(slab)
[   21.052133] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.052233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.052445] page dumped because: kasan: bad access detected
[   21.052615] 
[   21.052664] Memory state around the buggy address:
[   21.052755]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.052875]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.052941] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.053176]                                      ^
[   21.053264]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.053442]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.053601] ==================================================================
[   21.254806] ==================================================================
[   21.254861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   21.254913] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.255227] 
[   21.255273] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.255371] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.255574] Hardware name: linux,dummy-virt (DT)
[   21.255705] Call trace:
[   21.255739]  show_stack+0x20/0x38 (C)
[   21.256131]  dump_stack_lvl+0x8c/0xd0
[   21.256310]  print_report+0x118/0x608
[   21.256631]  kasan_report+0xdc/0x128
[   21.256778]  kasan_check_range+0x100/0x1a8
[   21.257002]  __kasan_check_write+0x20/0x30
[   21.257054]  kasan_atomics_helper+0xff0/0x4858
[   21.257511]  kasan_atomics+0x198/0x2e0
[   21.258078]  kunit_try_run_case+0x170/0x3f0
[   21.258431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.258578]  kthread+0x328/0x630
[   21.258663]  ret_from_fork+0x10/0x20
[   21.259107] 
[   21.259173] Allocated by task 265:
[   21.259721]  kasan_save_stack+0x3c/0x68
[   21.259906]  kasan_save_track+0x20/0x40
[   21.259955]  kasan_save_alloc_info+0x40/0x58
[   21.260150]  __kasan_kmalloc+0xd4/0xd8
[   21.260389]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.260849]  kasan_atomics+0xb8/0x2e0
[   21.260905]  kunit_try_run_case+0x170/0x3f0
[   21.260973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.261320]  kthread+0x328/0x630
[   21.261391]  ret_from_fork+0x10/0x20
[   21.261588] 
[   21.261700] The buggy address belongs to the object at fff00000c58c1080
[   21.261700]  which belongs to the cache kmalloc-64 of size 64
[   21.261765] The buggy address is located 0 bytes to the right of
[   21.261765]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.262384] 
[   21.262455] The buggy address belongs to the physical page:
[   21.262506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.262777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.263129] page_type: f5(slab)
[   21.263204] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.263420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.263483] page dumped because: kasan: bad access detected
[   21.263519] 
[   21.263539] Memory state around the buggy address:
[   21.264083]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.264408]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.264574] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.264651]                                      ^
[   21.264884]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.265212]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.265309] ==================================================================
[   21.303376] ==================================================================
[   21.303568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   21.303648] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.303753] 
[   21.303886] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.304014] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.304334] Hardware name: linux,dummy-virt (DT)
[   21.304402] Call trace:
[   21.304490]  show_stack+0x20/0x38 (C)
[   21.304590]  dump_stack_lvl+0x8c/0xd0
[   21.304726]  print_report+0x118/0x608
[   21.304838]  kasan_report+0xdc/0x128
[   21.304986]  kasan_check_range+0x100/0x1a8
[   21.305096]  __kasan_check_write+0x20/0x30
[   21.305180]  kasan_atomics_helper+0x126c/0x4858
[   21.305291]  kasan_atomics+0x198/0x2e0
[   21.305366]  kunit_try_run_case+0x170/0x3f0
[   21.305417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.305741]  kthread+0x328/0x630
[   21.305784]  ret_from_fork+0x10/0x20
[   21.305834] 
[   21.305934] Allocated by task 265:
[   21.305997]  kasan_save_stack+0x3c/0x68
[   21.306159]  kasan_save_track+0x20/0x40
[   21.306229]  kasan_save_alloc_info+0x40/0x58
[   21.306343]  __kasan_kmalloc+0xd4/0xd8
[   21.306663]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.306740]  kasan_atomics+0xb8/0x2e0
[   21.306808]  kunit_try_run_case+0x170/0x3f0
[   21.306851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.307160]  kthread+0x328/0x630
[   21.307208]  ret_from_fork+0x10/0x20
[   21.307278] 
[   21.307405] The buggy address belongs to the object at fff00000c58c1080
[   21.307405]  which belongs to the cache kmalloc-64 of size 64
[   21.307496] The buggy address is located 0 bytes to the right of
[   21.307496]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.307599] 
[   21.307866] The buggy address belongs to the physical page:
[   21.307960] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.308073] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.308170] page_type: f5(slab)
[   21.308232] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.308332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.308374] page dumped because: kasan: bad access detected
[   21.308409] 
[   21.308752] Memory state around the buggy address:
[   21.308784]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.308833]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.308875] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.308915]                                      ^
[   21.308974]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.309054]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.309226] ==================================================================
[   21.338959] ==================================================================
[   21.339218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   21.339418] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.339530] 
[   21.339600] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.339770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.339798] Hardware name: linux,dummy-virt (DT)
[   21.339918] Call trace:
[   21.339958]  show_stack+0x20/0x38 (C)
[   21.340159]  dump_stack_lvl+0x8c/0xd0
[   21.340240]  print_report+0x118/0x608
[   21.340411]  kasan_report+0xdc/0x128
[   21.340498]  kasan_check_range+0x100/0x1a8
[   21.340601]  __kasan_check_write+0x20/0x30
[   21.340840]  kasan_atomics_helper+0x154c/0x4858
[   21.341056]  kasan_atomics+0x198/0x2e0
[   21.341143]  kunit_try_run_case+0x170/0x3f0
[   21.341364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.341445]  kthread+0x328/0x630
[   21.341687]  ret_from_fork+0x10/0x20
[   21.341907] 
[   21.341939] Allocated by task 265:
[   21.341978]  kasan_save_stack+0x3c/0x68
[   21.342023]  kasan_save_track+0x20/0x40
[   21.342064]  kasan_save_alloc_info+0x40/0x58
[   21.342105]  __kasan_kmalloc+0xd4/0xd8
[   21.342151]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.342192]  kasan_atomics+0xb8/0x2e0
[   21.342241]  kunit_try_run_case+0x170/0x3f0
[   21.342283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.342330]  kthread+0x328/0x630
[   21.342363]  ret_from_fork+0x10/0x20
[   21.342401] 
[   21.342434] The buggy address belongs to the object at fff00000c58c1080
[   21.342434]  which belongs to the cache kmalloc-64 of size 64
[   21.342494] The buggy address is located 0 bytes to the right of
[   21.342494]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.342570] 
[   21.342596] The buggy address belongs to the physical page:
[   21.342642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.342694] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.342752] page_type: f5(slab)
[   21.342800] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.342853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.342895] page dumped because: kasan: bad access detected
[   21.342929] 
[   21.342949] Memory state around the buggy address:
[   21.342981]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.343034]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.343078] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.343126]                                      ^
[   21.343159]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.343203]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.343249] ==================================================================
[   21.300051] ==================================================================
[   21.300098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   21.300146] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.300249] 
[   21.300291] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.300375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.300404] Hardware name: linux,dummy-virt (DT)
[   21.300473] Call trace:
[   21.300499]  show_stack+0x20/0x38 (C)
[   21.300548]  dump_stack_lvl+0x8c/0xd0
[   21.300596]  print_report+0x118/0x608
[   21.300644]  kasan_report+0xdc/0x128
[   21.300691]  kasan_check_range+0x100/0x1a8
[   21.300741]  __kasan_check_write+0x20/0x30
[   21.300786]  kasan_atomics_helper+0x11f8/0x4858
[   21.300842]  kasan_atomics+0x198/0x2e0
[   21.300887]  kunit_try_run_case+0x170/0x3f0
[   21.300936]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.300990]  kthread+0x328/0x630
[   21.301032]  ret_from_fork+0x10/0x20
[   21.301087] 
[   21.301119] Allocated by task 265:
[   21.301168]  kasan_save_stack+0x3c/0x68
[   21.301215]  kasan_save_track+0x20/0x40
[   21.301291]  kasan_save_alloc_info+0x40/0x58
[   21.301348]  __kasan_kmalloc+0xd4/0xd8
[   21.301395]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.301447]  kasan_atomics+0xb8/0x2e0
[   21.301488]  kunit_try_run_case+0x170/0x3f0
[   21.301536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.301601]  kthread+0x328/0x630
[   21.301645]  ret_from_fork+0x10/0x20
[   21.301903] 
[   21.301932] The buggy address belongs to the object at fff00000c58c1080
[   21.301932]  which belongs to the cache kmalloc-64 of size 64
[   21.301990] The buggy address is located 0 bytes to the right of
[   21.301990]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.302057] 
[   21.302303] The buggy address belongs to the physical page:
[   21.302365] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.302417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.302477] page_type: f5(slab)
[   21.302531] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.302603] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.302662] page dumped because: kasan: bad access detected
[   21.302697] 
[   21.302735] Memory state around the buggy address:
[   21.302767]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.302810]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.303079] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.303137]                                      ^
[   21.303172]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.303216]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.303256] ==================================================================
[   21.333082] ==================================================================
[   21.333189] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   21.333264] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.333505] 
[   21.333541] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.333630] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.333658] Hardware name: linux,dummy-virt (DT)
[   21.333690] Call trace:
[   21.333715]  show_stack+0x20/0x38 (C)
[   21.333779]  dump_stack_lvl+0x8c/0xd0
[   21.333831]  print_report+0x118/0x608
[   21.333878]  kasan_report+0xdc/0x128
[   21.333926]  kasan_check_range+0x100/0x1a8
[   21.333975]  __kasan_check_write+0x20/0x30
[   21.334022]  kasan_atomics_helper+0x14e4/0x4858
[   21.334071]  kasan_atomics+0x198/0x2e0
[   21.334118]  kunit_try_run_case+0x170/0x3f0
[   21.334165]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.334219]  kthread+0x328/0x630
[   21.334263]  ret_from_fork+0x10/0x20
[   21.334324] 
[   21.334352] Allocated by task 265:
[   21.334381]  kasan_save_stack+0x3c/0x68
[   21.334435]  kasan_save_track+0x20/0x40
[   21.334862]  kasan_save_alloc_info+0x40/0x58
[   21.334909]  __kasan_kmalloc+0xd4/0xd8
[   21.334957]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.335015]  kasan_atomics+0xb8/0x2e0
[   21.335124]  kunit_try_run_case+0x170/0x3f0
[   21.335173]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.335240]  kthread+0x328/0x630
[   21.335291]  ret_from_fork+0x10/0x20
[   21.335437] 
[   21.335493] The buggy address belongs to the object at fff00000c58c1080
[   21.335493]  which belongs to the cache kmalloc-64 of size 64
[   21.335586] The buggy address is located 0 bytes to the right of
[   21.335586]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.335655] 
[   21.335676] The buggy address belongs to the physical page:
[   21.335709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.335762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.335810] page_type: f5(slab)
[   21.335850] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.335902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.336384] page dumped because: kasan: bad access detected
[   21.336464] 
[   21.336535] Memory state around the buggy address:
[   21.336855]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.337017]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.337064] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.337164]                                      ^
[   21.337590]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.337679]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.337761] ==================================================================
[   21.315126] ==================================================================
[   21.315176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   21.315224] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.315275] 
[   21.315306] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.315883] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.315996] Hardware name: linux,dummy-virt (DT)
[   21.316065] Call trace:
[   21.316101]  show_stack+0x20/0x38 (C)
[   21.316170]  dump_stack_lvl+0x8c/0xd0
[   21.316257]  print_report+0x118/0x608
[   21.316307]  kasan_report+0xdc/0x128
[   21.316363]  kasan_check_range+0x100/0x1a8
[   21.316489]  __kasan_check_write+0x20/0x30
[   21.316575]  kasan_atomics_helper+0x1384/0x4858
[   21.316691]  kasan_atomics+0x198/0x2e0
[   21.316737]  kunit_try_run_case+0x170/0x3f0
[   21.316787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.316847]  kthread+0x328/0x630
[   21.317093]  ret_from_fork+0x10/0x20
[   21.317261] 
[   21.317341] Allocated by task 265:
[   21.317445]  kasan_save_stack+0x3c/0x68
[   21.317594]  kasan_save_track+0x20/0x40
[   21.317699]  kasan_save_alloc_info+0x40/0x58
[   21.317991]  __kasan_kmalloc+0xd4/0xd8
[   21.318114]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.318155]  kasan_atomics+0xb8/0x2e0
[   21.318415]  kunit_try_run_case+0x170/0x3f0
[   21.318491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.318588]  kthread+0x328/0x630
[   21.318646]  ret_from_fork+0x10/0x20
[   21.318814] 
[   21.318883] The buggy address belongs to the object at fff00000c58c1080
[   21.318883]  which belongs to the cache kmalloc-64 of size 64
[   21.318987] The buggy address is located 0 bytes to the right of
[   21.318987]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.319269] 
[   21.319390] The buggy address belongs to the physical page:
[   21.319453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.319556] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.319640] page_type: f5(slab)
[   21.319750] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.319802] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.319844] page dumped because: kasan: bad access detected
[   21.319878] 
[   21.319898] Memory state around the buggy address:
[   21.319929]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.320130]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.320320] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.320442]                                      ^
[   21.320533]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.320660]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.320750] ==================================================================
[   21.384869] ==================================================================
[   21.385083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   21.385254] Read of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.385319] 
[   21.385376] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.385560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.385609] Hardware name: linux,dummy-virt (DT)
[   21.385668] Call trace:
[   21.385836]  show_stack+0x20/0x38 (C)
[   21.385904]  dump_stack_lvl+0x8c/0xd0
[   21.385993]  print_report+0x118/0x608
[   21.386075]  kasan_report+0xdc/0x128
[   21.386141]  __asan_report_load8_noabort+0x20/0x30
[   21.386339]  kasan_atomics_helper+0x3e20/0x4858
[   21.386405]  kasan_atomics+0x198/0x2e0
[   21.386543]  kunit_try_run_case+0x170/0x3f0
[   21.386596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.386726]  kthread+0x328/0x630
[   21.386804]  ret_from_fork+0x10/0x20
[   21.386871] 
[   21.386909] Allocated by task 265:
[   21.387087]  kasan_save_stack+0x3c/0x68
[   21.387144]  kasan_save_track+0x20/0x40
[   21.387233]  kasan_save_alloc_info+0x40/0x58
[   21.387291]  __kasan_kmalloc+0xd4/0xd8
[   21.387338]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.387443]  kasan_atomics+0xb8/0x2e0
[   21.387534]  kunit_try_run_case+0x170/0x3f0
[   21.387753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.387816]  kthread+0x328/0x630
[   21.387851]  ret_from_fork+0x10/0x20
[   21.387889] 
[   21.387917] The buggy address belongs to the object at fff00000c58c1080
[   21.387917]  which belongs to the cache kmalloc-64 of size 64
[   21.387979] The buggy address is located 0 bytes to the right of
[   21.387979]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.388045] 
[   21.388167] The buggy address belongs to the physical page:
[   21.388231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.388361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.388524] page_type: f5(slab)
[   21.388614] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.388886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.388992] page dumped because: kasan: bad access detected
[   21.389071] 
[   21.389092] Memory state around the buggy address:
[   21.389127]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.389486]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.389583] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.389798]                                      ^
[   21.389903]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.389970]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.390107] ==================================================================
[   21.390822] ==================================================================
[   21.390875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   21.390973] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.391028] 
[   21.391076] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.391227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.391275] Hardware name: linux,dummy-virt (DT)
[   21.391310] Call trace:
[   21.391349]  show_stack+0x20/0x38 (C)
[   21.391563]  dump_stack_lvl+0x8c/0xd0
[   21.391631]  print_report+0x118/0x608
[   21.391680]  kasan_report+0xdc/0x128
[   21.391728]  kasan_check_range+0x100/0x1a8
[   21.391777]  __kasan_check_write+0x20/0x30
[   21.391960]  kasan_atomics_helper+0x17ec/0x4858
[   21.392018]  kasan_atomics+0x198/0x2e0
[   21.392076]  kunit_try_run_case+0x170/0x3f0
[   21.392124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.392190]  kthread+0x328/0x630
[   21.392244]  ret_from_fork+0x10/0x20
[   21.392298] 
[   21.392329] Allocated by task 265:
[   21.392368]  kasan_save_stack+0x3c/0x68
[   21.392410]  kasan_save_track+0x20/0x40
[   21.392611]  kasan_save_alloc_info+0x40/0x58
[   21.392651]  __kasan_kmalloc+0xd4/0xd8
[   21.392689]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.392738]  kasan_atomics+0xb8/0x2e0
[   21.392886]  kunit_try_run_case+0x170/0x3f0
[   21.392964]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.393147]  kthread+0x328/0x630
[   21.393234]  ret_from_fork+0x10/0x20
[   21.393410] 
[   21.393445] The buggy address belongs to the object at fff00000c58c1080
[   21.393445]  which belongs to the cache kmalloc-64 of size 64
[   21.393610] The buggy address is located 0 bytes to the right of
[   21.393610]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.393732] 
[   21.393866] The buggy address belongs to the physical page:
[   21.393901] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.393955] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.394255] page_type: f5(slab)
[   21.394330] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.394453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.394534] page dumped because: kasan: bad access detected
[   21.394813] 
[   21.394880] Memory state around the buggy address:
[   21.394985]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.395046]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.395089] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.395371]                                      ^
[   21.395502]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.395589]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.395862] ==================================================================
[   21.276737] ==================================================================
[   21.277177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   21.277249] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.277301] 
[   21.277442] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.277877] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.278119] Hardware name: linux,dummy-virt (DT)
[   21.278167] Call trace:
[   21.278211]  show_stack+0x20/0x38 (C)
[   21.278405]  dump_stack_lvl+0x8c/0xd0
[   21.278495]  print_report+0x118/0x608
[   21.278912]  kasan_report+0xdc/0x128
[   21.279061]  kasan_check_range+0x100/0x1a8
[   21.279116]  __kasan_check_write+0x20/0x30
[   21.279193]  kasan_atomics_helper+0x10c0/0x4858
[   21.279316]  kasan_atomics+0x198/0x2e0
[   21.279520]  kunit_try_run_case+0x170/0x3f0
[   21.279719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.280054]  kthread+0x328/0x630
[   21.280219]  ret_from_fork+0x10/0x20
[   21.280474] 
[   21.280542] Allocated by task 265:
[   21.280686]  kasan_save_stack+0x3c/0x68
[   21.280781]  kasan_save_track+0x20/0x40
[   21.280825]  kasan_save_alloc_info+0x40/0x58
[   21.280898]  __kasan_kmalloc+0xd4/0xd8
[   21.281274]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.281353]  kasan_atomics+0xb8/0x2e0
[   21.281581]  kunit_try_run_case+0x170/0x3f0
[   21.281634]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.281680]  kthread+0x328/0x630
[   21.281870]  ret_from_fork+0x10/0x20
[   21.281924] 
[   21.281964] The buggy address belongs to the object at fff00000c58c1080
[   21.281964]  which belongs to the cache kmalloc-64 of size 64
[   21.282031] The buggy address is located 0 bytes to the right of
[   21.282031]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.282098] 
[   21.282123] The buggy address belongs to the physical page:
[   21.282157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.282230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.282281] page_type: f5(slab)
[   21.282322] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.282384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.282436] page dumped because: kasan: bad access detected
[   21.282496] 
[   21.282544] Memory state around the buggy address:
[   21.282844]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.283255]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.283322] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.283445]                                      ^
[   21.283625]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.284166]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.284334] ==================================================================
[   21.266858] ==================================================================
[   21.267120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   21.267214] Write of size 8 at addr fff00000c58c10b0 by task kunit_try_catch/265
[   21.267276] 
[   21.267380] CPU: 1 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT 
[   21.267493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.267869] Hardware name: linux,dummy-virt (DT)
[   21.268001] Call trace:
[   21.268195]  show_stack+0x20/0x38 (C)
[   21.268300]  dump_stack_lvl+0x8c/0xd0
[   21.268400]  print_report+0x118/0x608
[   21.268568]  kasan_report+0xdc/0x128
[   21.268623]  kasan_check_range+0x100/0x1a8
[   21.268696]  __kasan_check_write+0x20/0x30
[   21.268744]  kasan_atomics_helper+0x1058/0x4858
[   21.268968]  kasan_atomics+0x198/0x2e0
[   21.269298]  kunit_try_run_case+0x170/0x3f0
[   21.269572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.269714]  kthread+0x328/0x630
[   21.269811]  ret_from_fork+0x10/0x20
[   21.269964] 
[   21.270080] Allocated by task 265:
[   21.270125]  kasan_save_stack+0x3c/0x68
[   21.270170]  kasan_save_track+0x20/0x40
[   21.270390]  kasan_save_alloc_info+0x40/0x58
[   21.270583]  __kasan_kmalloc+0xd4/0xd8
[   21.270911]  __kmalloc_cache_noprof+0x16c/0x3c0
[   21.271026]  kasan_atomics+0xb8/0x2e0
[   21.271087]  kunit_try_run_case+0x170/0x3f0
[   21.271174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   21.271463]  kthread+0x328/0x630
[   21.271632]  ret_from_fork+0x10/0x20
[   21.271819] 
[   21.271889] The buggy address belongs to the object at fff00000c58c1080
[   21.271889]  which belongs to the cache kmalloc-64 of size 64
[   21.272157] The buggy address is located 0 bytes to the right of
[   21.272157]  allocated 48-byte region [fff00000c58c1080, fff00000c58c10b0)
[   21.272379] 
[   21.272504] The buggy address belongs to the physical page:
[   21.272776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058c1
[   21.273135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   21.273482] page_type: f5(slab)
[   21.273759] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   21.273827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.273872] page dumped because: kasan: bad access detected
[   21.273909] 
[   21.273964] Memory state around the buggy address:
[   21.274009]  fff00000c58c0f80: fb fb fb fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.274065]  fff00000c58c1000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.274110] >fff00000c58c1080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.274151]                                      ^
[   21.274185]  fff00000c58c1100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.274238]  fff00000c58c1180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.274288] ==================================================================


[   18.629415] ==================================================================
[   18.629961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   18.630385] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.630622] 
[   18.630760] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.630846] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.630871] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.630915] Call Trace:
[   18.630958]  <TASK>
[   18.630995]  dump_stack_lvl+0x73/0xb0
[   18.631056]  print_report+0xd1/0x650
[   18.631107]  ? __virt_addr_valid+0x1db/0x2d0
[   18.631155]  ? kasan_atomics_helper+0x4a02/0x5450
[   18.631199]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.631247]  ? kasan_atomics_helper+0x4a02/0x5450
[   18.631295]  kasan_report+0x141/0x180
[   18.631350]  ? kasan_atomics_helper+0x4a02/0x5450
[   18.631407]  __asan_report_load4_noabort+0x18/0x20
[   18.631466]  kasan_atomics_helper+0x4a02/0x5450
[   18.631522]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.631570]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.631616]  ? kasan_atomics+0x152/0x310
[   18.631673]  kasan_atomics+0x1dc/0x310
[   18.631724]  ? __pfx_kasan_atomics+0x10/0x10
[   18.631778]  ? __pfx_read_tsc+0x10/0x10
[   18.631823]  ? ktime_get_ts64+0x86/0x230
[   18.631879]  kunit_try_run_case+0x1a5/0x480
[   18.631927]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.631973]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.632030]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.632085]  ? __kthread_parkme+0x82/0x180
[   18.632127]  ? preempt_count_sub+0x50/0x80
[   18.632175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.632220]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.632274]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.632325]  kthread+0x337/0x6f0
[   18.632370]  ? trace_preempt_on+0x20/0xc0
[   18.632422]  ? __pfx_kthread+0x10/0x10
[   18.632516]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.632573]  ? calculate_sigpending+0x7b/0xa0
[   18.632629]  ? __pfx_kthread+0x10/0x10
[   18.632677]  ret_from_fork+0x116/0x1d0
[   18.632718]  ? __pfx_kthread+0x10/0x10
[   18.632766]  ret_from_fork_asm+0x1a/0x30
[   18.632838]  </TASK>
[   18.632866] 
[   18.643315] Allocated by task 282:
[   18.643722]  kasan_save_stack+0x45/0x70
[   18.644119]  kasan_save_track+0x18/0x40
[   18.644448]  kasan_save_alloc_info+0x3b/0x50
[   18.644707]  __kasan_kmalloc+0xb7/0xc0
[   18.645030]  __kmalloc_cache_noprof+0x189/0x420
[   18.645429]  kasan_atomics+0x95/0x310
[   18.645666]  kunit_try_run_case+0x1a5/0x480
[   18.646033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.646333]  kthread+0x337/0x6f0
[   18.646594]  ret_from_fork+0x116/0x1d0
[   18.646903]  ret_from_fork_asm+0x1a/0x30
[   18.647286] 
[   18.647480] The buggy address belongs to the object at ffff8881033ecb00
[   18.647480]  which belongs to the cache kmalloc-64 of size 64
[   18.647939] The buggy address is located 0 bytes to the right of
[   18.647939]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.648430] 
[   18.648635] The buggy address belongs to the physical page:
[   18.649082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.649722] flags: 0x200000000000000(node=0|zone=2)
[   18.650142] page_type: f5(slab)
[   18.650476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.651045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.651391] page dumped because: kasan: bad access detected
[   18.653617] 
[   18.653705] Memory state around the buggy address:
[   18.653828]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.653980]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.654123] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.654507]                                      ^
[   18.655026]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.655658]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.656250] ==================================================================
[   18.360905] ==================================================================
[   18.361403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   18.361744] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.362388] 
[   18.362849] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.362971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.363003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.363051] Call Trace:
[   18.363101]  <TASK>
[   18.363147]  dump_stack_lvl+0x73/0xb0
[   18.363533]  print_report+0xd1/0x650
[   18.363612]  ? __virt_addr_valid+0x1db/0x2d0
[   18.363673]  ? kasan_atomics_helper+0xde0/0x5450
[   18.363728]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.363787]  ? kasan_atomics_helper+0xde0/0x5450
[   18.363840]  kasan_report+0x141/0x180
[   18.363897]  ? kasan_atomics_helper+0xde0/0x5450
[   18.363960]  kasan_check_range+0x10c/0x1c0
[   18.364010]  __kasan_check_write+0x18/0x20
[   18.364050]  kasan_atomics_helper+0xde0/0x5450
[   18.364093]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.364131]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.364175]  ? kasan_atomics+0x152/0x310
[   18.364246]  kasan_atomics+0x1dc/0x310
[   18.364304]  ? __pfx_kasan_atomics+0x10/0x10
[   18.364354]  ? __pfx_read_tsc+0x10/0x10
[   18.364422]  ? ktime_get_ts64+0x86/0x230
[   18.364493]  kunit_try_run_case+0x1a5/0x480
[   18.364545]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.364591]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.364642]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.364694]  ? __kthread_parkme+0x82/0x180
[   18.364741]  ? preempt_count_sub+0x50/0x80
[   18.364796]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.364841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.364886]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.364931]  kthread+0x337/0x6f0
[   18.364974]  ? trace_preempt_on+0x20/0xc0
[   18.365025]  ? __pfx_kthread+0x10/0x10
[   18.365073]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.365119]  ? calculate_sigpending+0x7b/0xa0
[   18.365189]  ? __pfx_kthread+0x10/0x10
[   18.365276]  ret_from_fork+0x116/0x1d0
[   18.365324]  ? __pfx_kthread+0x10/0x10
[   18.365374]  ret_from_fork_asm+0x1a/0x30
[   18.365449]  </TASK>
[   18.365490] 
[   18.376424] Allocated by task 282:
[   18.376845]  kasan_save_stack+0x45/0x70
[   18.377160]  kasan_save_track+0x18/0x40
[   18.377534]  kasan_save_alloc_info+0x3b/0x50
[   18.377757]  __kasan_kmalloc+0xb7/0xc0
[   18.377952]  __kmalloc_cache_noprof+0x189/0x420
[   18.378176]  kasan_atomics+0x95/0x310
[   18.378566]  kunit_try_run_case+0x1a5/0x480
[   18.378947]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.379409]  kthread+0x337/0x6f0
[   18.379747]  ret_from_fork+0x116/0x1d0
[   18.380117]  ret_from_fork_asm+0x1a/0x30
[   18.380565] 
[   18.380714] The buggy address belongs to the object at ffff8881033ecb00
[   18.380714]  which belongs to the cache kmalloc-64 of size 64
[   18.381212] The buggy address is located 0 bytes to the right of
[   18.381212]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.381669] 
[   18.381804] The buggy address belongs to the physical page:
[   18.382048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.382367] flags: 0x200000000000000(node=0|zone=2)
[   18.382874] page_type: f5(slab)
[   18.383284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.383926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.384609] page dumped because: kasan: bad access detected
[   18.385043] 
[   18.385205] Memory state around the buggy address:
[   18.385499]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.385964]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.386269] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.386827]                                      ^
[   18.387299]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.387649]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.387934] ==================================================================
[   18.490344] ==================================================================
[   18.491037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   18.491768] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.492418] 
[   18.492682] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.492801] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.492832] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.492884] Call Trace:
[   18.492955]  <TASK>
[   18.493003]  dump_stack_lvl+0x73/0xb0
[   18.493076]  print_report+0xd1/0x650
[   18.493126]  ? __virt_addr_valid+0x1db/0x2d0
[   18.493178]  ? kasan_atomics_helper+0x4a36/0x5450
[   18.493267]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.493346]  ? kasan_atomics_helper+0x4a36/0x5450
[   18.493396]  kasan_report+0x141/0x180
[   18.493451]  ? kasan_atomics_helper+0x4a36/0x5450
[   18.493525]  __asan_report_load4_noabort+0x18/0x20
[   18.493569]  kasan_atomics_helper+0x4a36/0x5450
[   18.493617]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.493669]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.493720]  ? kasan_atomics+0x152/0x310
[   18.493779]  kasan_atomics+0x1dc/0x310
[   18.493826]  ? __pfx_kasan_atomics+0x10/0x10
[   18.493901]  ? __pfx_read_tsc+0x10/0x10
[   18.493947]  ? ktime_get_ts64+0x86/0x230
[   18.494008]  kunit_try_run_case+0x1a5/0x480
[   18.494063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.494110]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.494148]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.494176]  ? __kthread_parkme+0x82/0x180
[   18.494245]  ? preempt_count_sub+0x50/0x80
[   18.494279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.494304]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.494333]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.494363]  kthread+0x337/0x6f0
[   18.494386]  ? trace_preempt_on+0x20/0xc0
[   18.494414]  ? __pfx_kthread+0x10/0x10
[   18.494438]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.494486]  ? calculate_sigpending+0x7b/0xa0
[   18.494517]  ? __pfx_kthread+0x10/0x10
[   18.494543]  ret_from_fork+0x116/0x1d0
[   18.494565]  ? __pfx_kthread+0x10/0x10
[   18.494590]  ret_from_fork_asm+0x1a/0x30
[   18.494626]  </TASK>
[   18.494641] 
[   18.510039] Allocated by task 282:
[   18.510578]  kasan_save_stack+0x45/0x70
[   18.511160]  kasan_save_track+0x18/0x40
[   18.511750]  kasan_save_alloc_info+0x3b/0x50
[   18.512033]  __kasan_kmalloc+0xb7/0xc0
[   18.512991]  __kmalloc_cache_noprof+0x189/0x420
[   18.513627]  kasan_atomics+0x95/0x310
[   18.513931]  kunit_try_run_case+0x1a5/0x480
[   18.514312]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.514782]  kthread+0x337/0x6f0
[   18.515015]  ret_from_fork+0x116/0x1d0
[   18.515385]  ret_from_fork_asm+0x1a/0x30
[   18.515794] 
[   18.516004] The buggy address belongs to the object at ffff8881033ecb00
[   18.516004]  which belongs to the cache kmalloc-64 of size 64
[   18.516611] The buggy address is located 0 bytes to the right of
[   18.516611]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.517597] 
[   18.517741] The buggy address belongs to the physical page:
[   18.518349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.519035] flags: 0x200000000000000(node=0|zone=2)
[   18.519508] page_type: f5(slab)
[   18.519889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.520243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.520880] page dumped because: kasan: bad access detected
[   18.521180] 
[   18.521371] Memory state around the buggy address:
[   18.521714]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.522038]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.522470] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.523067]                                      ^
[   18.523536]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.524105]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.524634] ==================================================================
[   18.763625] ==================================================================
[   18.763894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   18.764161] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.766156] 
[   18.766541] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.766660] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.766687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.766725] Call Trace:
[   18.766757]  <TASK>
[   18.766784]  dump_stack_lvl+0x73/0xb0
[   18.766850]  print_report+0xd1/0x650
[   18.766884]  ? __virt_addr_valid+0x1db/0x2d0
[   18.766914]  ? kasan_atomics_helper+0x49ce/0x5450
[   18.766941]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.766969]  ? kasan_atomics_helper+0x49ce/0x5450
[   18.766995]  kasan_report+0x141/0x180
[   18.767022]  ? kasan_atomics_helper+0x49ce/0x5450
[   18.767054]  __asan_report_load4_noabort+0x18/0x20
[   18.767079]  kasan_atomics_helper+0x49ce/0x5450
[   18.767106]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.767132]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.767158]  ? kasan_atomics+0x152/0x310
[   18.767191]  kasan_atomics+0x1dc/0x310
[   18.767271]  ? __pfx_kasan_atomics+0x10/0x10
[   18.767335]  ? __pfx_read_tsc+0x10/0x10
[   18.767409]  ? ktime_get_ts64+0x86/0x230
[   18.767483]  kunit_try_run_case+0x1a5/0x480
[   18.767532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.767557]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.767589]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.767618]  ? __kthread_parkme+0x82/0x180
[   18.767643]  ? preempt_count_sub+0x50/0x80
[   18.767673]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.767698]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.767726]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.767754]  kthread+0x337/0x6f0
[   18.767778]  ? trace_preempt_on+0x20/0xc0
[   18.767805]  ? __pfx_kthread+0x10/0x10
[   18.767829]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.767855]  ? calculate_sigpending+0x7b/0xa0
[   18.767884]  ? __pfx_kthread+0x10/0x10
[   18.767908]  ret_from_fork+0x116/0x1d0
[   18.767931]  ? __pfx_kthread+0x10/0x10
[   18.767954]  ret_from_fork_asm+0x1a/0x30
[   18.767991]  </TASK>
[   18.768005] 
[   18.783062] Allocated by task 282:
[   18.783362]  kasan_save_stack+0x45/0x70
[   18.783864]  kasan_save_track+0x18/0x40
[   18.784447]  kasan_save_alloc_info+0x3b/0x50
[   18.784690]  __kasan_kmalloc+0xb7/0xc0
[   18.785196]  __kmalloc_cache_noprof+0x189/0x420
[   18.785654]  kasan_atomics+0x95/0x310
[   18.785873]  kunit_try_run_case+0x1a5/0x480
[   18.786113]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.786639]  kthread+0x337/0x6f0
[   18.787006]  ret_from_fork+0x116/0x1d0
[   18.787255]  ret_from_fork_asm+0x1a/0x30
[   18.787485] 
[   18.787610] The buggy address belongs to the object at ffff8881033ecb00
[   18.787610]  which belongs to the cache kmalloc-64 of size 64
[   18.788506] The buggy address is located 0 bytes to the right of
[   18.788506]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.789260] 
[   18.789426] The buggy address belongs to the physical page:
[   18.789939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.790441] flags: 0x200000000000000(node=0|zone=2)
[   18.790849] page_type: f5(slab)
[   18.791051] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.791373] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.792015] page dumped because: kasan: bad access detected
[   18.792486] 
[   18.792708] Memory state around the buggy address:
[   18.793070]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.793768]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.794057] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.794612]                                      ^
[   18.795074]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.795588]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.795979] ==================================================================
[   18.111607] ==================================================================
[   18.112732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   18.113193] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.114235] 
[   18.114606] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.114717] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.114737] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.114764] Call Trace:
[   18.114790]  <TASK>
[   18.114815]  dump_stack_lvl+0x73/0xb0
[   18.114856]  print_report+0xd1/0x650
[   18.114885]  ? __virt_addr_valid+0x1db/0x2d0
[   18.114912]  ? kasan_atomics_helper+0x8f9/0x5450
[   18.114937]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.114963]  ? kasan_atomics_helper+0x8f9/0x5450
[   18.114988]  kasan_report+0x141/0x180
[   18.115013]  ? kasan_atomics_helper+0x8f9/0x5450
[   18.115043]  kasan_check_range+0x10c/0x1c0
[   18.115070]  __kasan_check_write+0x18/0x20
[   18.115094]  kasan_atomics_helper+0x8f9/0x5450
[   18.115120]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.115145]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.115171]  ? kasan_atomics+0x152/0x310
[   18.115211]  kasan_atomics+0x1dc/0x310
[   18.115272]  ? __pfx_kasan_atomics+0x10/0x10
[   18.115302]  ? __pfx_read_tsc+0x10/0x10
[   18.115328]  ? ktime_get_ts64+0x86/0x230
[   18.115373]  kunit_try_run_case+0x1a5/0x480
[   18.115401]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.115424]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.115473]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.115508]  ? __kthread_parkme+0x82/0x180
[   18.115535]  ? preempt_count_sub+0x50/0x80
[   18.115564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.115589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.115619]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.115648]  kthread+0x337/0x6f0
[   18.115672]  ? trace_preempt_on+0x20/0xc0
[   18.115700]  ? __pfx_kthread+0x10/0x10
[   18.115723]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.115749]  ? calculate_sigpending+0x7b/0xa0
[   18.115778]  ? __pfx_kthread+0x10/0x10
[   18.115803]  ret_from_fork+0x116/0x1d0
[   18.115825]  ? __pfx_kthread+0x10/0x10
[   18.115849]  ret_from_fork_asm+0x1a/0x30
[   18.115885]  </TASK>
[   18.115899] 
[   18.128229] Allocated by task 282:
[   18.128687]  kasan_save_stack+0x45/0x70
[   18.129157]  kasan_save_track+0x18/0x40
[   18.129590]  kasan_save_alloc_info+0x3b/0x50
[   18.129992]  __kasan_kmalloc+0xb7/0xc0
[   18.130409]  __kmalloc_cache_noprof+0x189/0x420
[   18.130785]  kasan_atomics+0x95/0x310
[   18.130954]  kunit_try_run_case+0x1a5/0x480
[   18.131332]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.131662]  kthread+0x337/0x6f0
[   18.131997]  ret_from_fork+0x116/0x1d0
[   18.132349]  ret_from_fork_asm+0x1a/0x30
[   18.132604] 
[   18.132814] The buggy address belongs to the object at ffff8881033ecb00
[   18.132814]  which belongs to the cache kmalloc-64 of size 64
[   18.133615] The buggy address is located 0 bytes to the right of
[   18.133615]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.134357] 
[   18.134535] The buggy address belongs to the physical page:
[   18.134936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.135422] flags: 0x200000000000000(node=0|zone=2)
[   18.135810] page_type: f5(slab)
[   18.136136] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.136623] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.137071] page dumped because: kasan: bad access detected
[   18.137521] 
[   18.137643] Memory state around the buggy address:
[   18.138054]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.138513]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.138998] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.139494]                                      ^
[   18.139854]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.140357]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.140786] ==================================================================
[   18.028049] ==================================================================
[   18.028388] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   18.028662] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.030075] 
[   18.030635] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.030770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.030794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.030824] Call Trace:
[   18.030851]  <TASK>
[   18.030878]  dump_stack_lvl+0x73/0xb0
[   18.030924]  print_report+0xd1/0x650
[   18.030952]  ? __virt_addr_valid+0x1db/0x2d0
[   18.030981]  ? kasan_atomics_helper+0x72f/0x5450
[   18.031006]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.031032]  ? kasan_atomics_helper+0x72f/0x5450
[   18.031059]  kasan_report+0x141/0x180
[   18.031085]  ? kasan_atomics_helper+0x72f/0x5450
[   18.031114]  kasan_check_range+0x10c/0x1c0
[   18.031141]  __kasan_check_write+0x18/0x20
[   18.031164]  kasan_atomics_helper+0x72f/0x5450
[   18.031206]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.031268]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.031311]  ? kasan_atomics+0x152/0x310
[   18.031362]  kasan_atomics+0x1dc/0x310
[   18.031395]  ? __pfx_kasan_atomics+0x10/0x10
[   18.031425]  ? __pfx_read_tsc+0x10/0x10
[   18.031452]  ? ktime_get_ts64+0x86/0x230
[   18.031505]  kunit_try_run_case+0x1a5/0x480
[   18.031532]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.031556]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.031587]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.031615]  ? __kthread_parkme+0x82/0x180
[   18.031641]  ? preempt_count_sub+0x50/0x80
[   18.031670]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.031695]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.031723]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.031752]  kthread+0x337/0x6f0
[   18.031777]  ? trace_preempt_on+0x20/0xc0
[   18.031804]  ? __pfx_kthread+0x10/0x10
[   18.031829]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.031855]  ? calculate_sigpending+0x7b/0xa0
[   18.031884]  ? __pfx_kthread+0x10/0x10
[   18.031910]  ret_from_fork+0x116/0x1d0
[   18.031933]  ? __pfx_kthread+0x10/0x10
[   18.031958]  ret_from_fork_asm+0x1a/0x30
[   18.031994]  </TASK>
[   18.032009] 
[   18.040721] Allocated by task 282:
[   18.041046]  kasan_save_stack+0x45/0x70
[   18.041434]  kasan_save_track+0x18/0x40
[   18.041758]  kasan_save_alloc_info+0x3b/0x50
[   18.042088]  __kasan_kmalloc+0xb7/0xc0
[   18.042435]  __kmalloc_cache_noprof+0x189/0x420
[   18.042814]  kasan_atomics+0x95/0x310
[   18.043123]  kunit_try_run_case+0x1a5/0x480
[   18.043520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.043946]  kthread+0x337/0x6f0
[   18.044291]  ret_from_fork+0x116/0x1d0
[   18.044641]  ret_from_fork_asm+0x1a/0x30
[   18.044957] 
[   18.045137] The buggy address belongs to the object at ffff8881033ecb00
[   18.045137]  which belongs to the cache kmalloc-64 of size 64
[   18.045874] The buggy address is located 0 bytes to the right of
[   18.045874]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.046560] 
[   18.046755] The buggy address belongs to the physical page:
[   18.047072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.047552] flags: 0x200000000000000(node=0|zone=2)
[   18.047796] page_type: f5(slab)
[   18.047995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.048341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.048866] page dumped because: kasan: bad access detected
[   18.049362] 
[   18.049552] Memory state around the buggy address:
[   18.049945]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.050495]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.051027] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.051579]                                      ^
[   18.051815]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.052339]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.052854] ==================================================================
[   19.083913] ==================================================================
[   19.085114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   19.085810] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.086497] 
[   19.086751] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.086866] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.086900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.086950] Call Trace:
[   19.086999]  <TASK>
[   19.087058]  dump_stack_lvl+0x73/0xb0
[   19.087139]  print_report+0xd1/0x650
[   19.087195]  ? __virt_addr_valid+0x1db/0x2d0
[   19.087266]  ? kasan_atomics_helper+0x1818/0x5450
[   19.087362]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.087472]  ? kasan_atomics_helper+0x1818/0x5450
[   19.087526]  kasan_report+0x141/0x180
[   19.087586]  ? kasan_atomics_helper+0x1818/0x5450
[   19.087639]  kasan_check_range+0x10c/0x1c0
[   19.087694]  __kasan_check_write+0x18/0x20
[   19.087744]  kasan_atomics_helper+0x1818/0x5450
[   19.087800]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.087853]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.087903]  ? kasan_atomics+0x152/0x310
[   19.087963]  kasan_atomics+0x1dc/0x310
[   19.088015]  ? __pfx_kasan_atomics+0x10/0x10
[   19.088068]  ? __pfx_read_tsc+0x10/0x10
[   19.088099]  ? ktime_get_ts64+0x86/0x230
[   19.088131]  kunit_try_run_case+0x1a5/0x480
[   19.088157]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.088181]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.088424]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.088514]  ? __kthread_parkme+0x82/0x180
[   19.088558]  ? preempt_count_sub+0x50/0x80
[   19.088588]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.088613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.088642]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.088669]  kthread+0x337/0x6f0
[   19.088692]  ? trace_preempt_on+0x20/0xc0
[   19.088718]  ? __pfx_kthread+0x10/0x10
[   19.088740]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.088765]  ? calculate_sigpending+0x7b/0xa0
[   19.088793]  ? __pfx_kthread+0x10/0x10
[   19.088815]  ret_from_fork+0x116/0x1d0
[   19.088839]  ? __pfx_kthread+0x10/0x10
[   19.088863]  ret_from_fork_asm+0x1a/0x30
[   19.088897]  </TASK>
[   19.088912] 
[   19.099798] Allocated by task 282:
[   19.100208]  kasan_save_stack+0x45/0x70
[   19.100660]  kasan_save_track+0x18/0x40
[   19.100909]  kasan_save_alloc_info+0x3b/0x50
[   19.101151]  __kasan_kmalloc+0xb7/0xc0
[   19.101530]  __kmalloc_cache_noprof+0x189/0x420
[   19.101949]  kasan_atomics+0x95/0x310
[   19.102185]  kunit_try_run_case+0x1a5/0x480
[   19.102527]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.102813]  kthread+0x337/0x6f0
[   19.103104]  ret_from_fork+0x116/0x1d0
[   19.103545]  ret_from_fork_asm+0x1a/0x30
[   19.103894] 
[   19.104052] The buggy address belongs to the object at ffff8881033ecb00
[   19.104052]  which belongs to the cache kmalloc-64 of size 64
[   19.104782] The buggy address is located 0 bytes to the right of
[   19.104782]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.105298] 
[   19.105450] The buggy address belongs to the physical page:
[   19.105724] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.106098] flags: 0x200000000000000(node=0|zone=2)
[   19.106418] page_type: f5(slab)
[   19.106747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.107380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.108054] page dumped because: kasan: bad access detected
[   19.108498] 
[   19.108744] Memory state around the buggy address:
[   19.109156]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.109722]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.110074] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.110838]                                      ^
[   19.111100]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.111729]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.112095] ==================================================================
[   19.234483] ==================================================================
[   19.235133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   19.235898] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.236726] 
[   19.237033] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.237146] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.237180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.237282] Call Trace:
[   19.237342]  <TASK>
[   19.237388]  dump_stack_lvl+0x73/0xb0
[   19.237506]  print_report+0xd1/0x650
[   19.237559]  ? __virt_addr_valid+0x1db/0x2d0
[   19.237594]  ? kasan_atomics_helper+0x1b22/0x5450
[   19.237620]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.237645]  ? kasan_atomics_helper+0x1b22/0x5450
[   19.237668]  kasan_report+0x141/0x180
[   19.237692]  ? kasan_atomics_helper+0x1b22/0x5450
[   19.237738]  kasan_check_range+0x10c/0x1c0
[   19.237776]  __kasan_check_write+0x18/0x20
[   19.237799]  kasan_atomics_helper+0x1b22/0x5450
[   19.237825]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.237852]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.237876]  ? kasan_atomics+0x152/0x310
[   19.237904]  kasan_atomics+0x1dc/0x310
[   19.237930]  ? __pfx_kasan_atomics+0x10/0x10
[   19.237955]  ? __pfx_read_tsc+0x10/0x10
[   19.237980]  ? ktime_get_ts64+0x86/0x230
[   19.238011]  kunit_try_run_case+0x1a5/0x480
[   19.238036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.238058]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.238085]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.238111]  ? __kthread_parkme+0x82/0x180
[   19.238135]  ? preempt_count_sub+0x50/0x80
[   19.238163]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.238186]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.238261]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.238290]  kthread+0x337/0x6f0
[   19.238313]  ? trace_preempt_on+0x20/0xc0
[   19.238339]  ? __pfx_kthread+0x10/0x10
[   19.238362]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.238386]  ? calculate_sigpending+0x7b/0xa0
[   19.238413]  ? __pfx_kthread+0x10/0x10
[   19.238436]  ret_from_fork+0x116/0x1d0
[   19.238475]  ? __pfx_kthread+0x10/0x10
[   19.238501]  ret_from_fork_asm+0x1a/0x30
[   19.238537]  </TASK>
[   19.238550] 
[   19.251874] Allocated by task 282:
[   19.252423]  kasan_save_stack+0x45/0x70
[   19.252881]  kasan_save_track+0x18/0x40
[   19.253160]  kasan_save_alloc_info+0x3b/0x50
[   19.254274]  __kasan_kmalloc+0xb7/0xc0
[   19.254708]  __kmalloc_cache_noprof+0x189/0x420
[   19.255071]  kasan_atomics+0x95/0x310
[   19.256555]  kunit_try_run_case+0x1a5/0x480
[   19.256784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.257252]  kthread+0x337/0x6f0
[   19.257443]  ret_from_fork+0x116/0x1d0
[   19.257836]  ret_from_fork_asm+0x1a/0x30
[   19.258023] 
[   19.258169] The buggy address belongs to the object at ffff8881033ecb00
[   19.258169]  which belongs to the cache kmalloc-64 of size 64
[   19.258667] The buggy address is located 0 bytes to the right of
[   19.258667]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.259212] 
[   19.259396] The buggy address belongs to the physical page:
[   19.259817] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.260407] flags: 0x200000000000000(node=0|zone=2)
[   19.260772] page_type: f5(slab)
[   19.261093] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.262646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.263060] page dumped because: kasan: bad access detected
[   19.263402] 
[   19.263581] Memory state around the buggy address:
[   19.263836]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.264502]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.265070] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.265703]                                      ^
[   19.266144]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.266780]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.267120] ==================================================================
[   17.873113] ==================================================================
[   17.874007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   17.874385] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.875044] 
[   17.875476] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.875606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.875642] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.875698] Call Trace:
[   17.875742]  <TASK>
[   17.875782]  dump_stack_lvl+0x73/0xb0
[   17.875852]  print_report+0xd1/0x650
[   17.876263]  ? __virt_addr_valid+0x1db/0x2d0
[   17.876321]  ? kasan_atomics_helper+0x4b3a/0x5450
[   17.876365]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.876406]  ? kasan_atomics_helper+0x4b3a/0x5450
[   17.876439]  kasan_report+0x141/0x180
[   17.876491]  ? kasan_atomics_helper+0x4b3a/0x5450
[   17.876533]  __asan_report_store4_noabort+0x1b/0x30
[   17.876567]  kasan_atomics_helper+0x4b3a/0x5450
[   17.876604]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.876638]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.876671]  ? kasan_atomics+0x152/0x310
[   17.876737]  kasan_atomics+0x1dc/0x310
[   17.876776]  ? __pfx_kasan_atomics+0x10/0x10
[   17.876817]  ? __pfx_read_tsc+0x10/0x10
[   17.876856]  ? ktime_get_ts64+0x86/0x230
[   17.876903]  kunit_try_run_case+0x1a5/0x480
[   17.876944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.876973]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.877004]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.877033]  ? __kthread_parkme+0x82/0x180
[   17.877057]  ? preempt_count_sub+0x50/0x80
[   17.877086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.877109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.877139]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.877168]  kthread+0x337/0x6f0
[   17.877192]  ? trace_preempt_on+0x20/0xc0
[   17.877259]  ? __pfx_kthread+0x10/0x10
[   17.877287]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.877313]  ? calculate_sigpending+0x7b/0xa0
[   17.877342]  ? __pfx_kthread+0x10/0x10
[   17.877368]  ret_from_fork+0x116/0x1d0
[   17.877391]  ? __pfx_kthread+0x10/0x10
[   17.877415]  ret_from_fork_asm+0x1a/0x30
[   17.877467]  </TASK>
[   17.877487] 
[   17.893421] Allocated by task 282:
[   17.893915]  kasan_save_stack+0x45/0x70
[   17.895070]  kasan_save_track+0x18/0x40
[   17.895364]  kasan_save_alloc_info+0x3b/0x50
[   17.895800]  __kasan_kmalloc+0xb7/0xc0
[   17.896108]  __kmalloc_cache_noprof+0x189/0x420
[   17.896909]  kasan_atomics+0x95/0x310
[   17.897219]  kunit_try_run_case+0x1a5/0x480
[   17.897439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.898032]  kthread+0x337/0x6f0
[   17.898769]  ret_from_fork+0x116/0x1d0
[   17.899148]  ret_from_fork_asm+0x1a/0x30
[   17.899825] 
[   17.900034] The buggy address belongs to the object at ffff8881033ecb00
[   17.900034]  which belongs to the cache kmalloc-64 of size 64
[   17.900808] The buggy address is located 0 bytes to the right of
[   17.900808]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.901818] 
[   17.901963] The buggy address belongs to the physical page:
[   17.902709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.903766] flags: 0x200000000000000(node=0|zone=2)
[   17.904053] page_type: f5(slab)
[   17.904257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.904908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.906530] page dumped because: kasan: bad access detected
[   17.907088] 
[   17.907504] Memory state around the buggy address:
[   17.908508]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.909136]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.909627] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.910671]                                      ^
[   17.911328]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.911632]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.912552] ==================================================================
[   18.458935] ==================================================================
[   18.459887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   18.460231] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.460525] 
[   18.460702] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.460822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.460863] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.460915] Call Trace:
[   18.461321]  <TASK>
[   18.461387]  dump_stack_lvl+0x73/0xb0
[   18.461468]  print_report+0xd1/0x650
[   18.461513]  ? __virt_addr_valid+0x1db/0x2d0
[   18.461608]  ? kasan_atomics_helper+0xfa9/0x5450
[   18.461653]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.461696]  ? kasan_atomics_helper+0xfa9/0x5450
[   18.461742]  kasan_report+0x141/0x180
[   18.461793]  ? kasan_atomics_helper+0xfa9/0x5450
[   18.461850]  kasan_check_range+0x10c/0x1c0
[   18.461907]  __kasan_check_write+0x18/0x20
[   18.461953]  kasan_atomics_helper+0xfa9/0x5450
[   18.462007]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.462060]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.462109]  ? kasan_atomics+0x152/0x310
[   18.462166]  kasan_atomics+0x1dc/0x310
[   18.462218]  ? __pfx_kasan_atomics+0x10/0x10
[   18.462273]  ? __pfx_read_tsc+0x10/0x10
[   18.462321]  ? ktime_get_ts64+0x86/0x230
[   18.462373]  kunit_try_run_case+0x1a5/0x480
[   18.462418]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.462472]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.462526]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.462575]  ? __kthread_parkme+0x82/0x180
[   18.462618]  ? preempt_count_sub+0x50/0x80
[   18.462666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.462709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.462755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.462802]  kthread+0x337/0x6f0
[   18.462845]  ? trace_preempt_on+0x20/0xc0
[   18.462894]  ? __pfx_kthread+0x10/0x10
[   18.462937]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.462984]  ? calculate_sigpending+0x7b/0xa0
[   18.463034]  ? __pfx_kthread+0x10/0x10
[   18.463080]  ret_from_fork+0x116/0x1d0
[   18.463120]  ? __pfx_kthread+0x10/0x10
[   18.463160]  ret_from_fork_asm+0x1a/0x30
[   18.463226]  </TASK>
[   18.463252] 
[   18.475950] Allocated by task 282:
[   18.476308]  kasan_save_stack+0x45/0x70
[   18.476660]  kasan_save_track+0x18/0x40
[   18.476983]  kasan_save_alloc_info+0x3b/0x50
[   18.477258]  __kasan_kmalloc+0xb7/0xc0
[   18.477670]  __kmalloc_cache_noprof+0x189/0x420
[   18.477919]  kasan_atomics+0x95/0x310
[   18.478132]  kunit_try_run_case+0x1a5/0x480
[   18.478395]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.478656]  kthread+0x337/0x6f0
[   18.478866]  ret_from_fork+0x116/0x1d0
[   18.479080]  ret_from_fork_asm+0x1a/0x30
[   18.479333] 
[   18.479539] The buggy address belongs to the object at ffff8881033ecb00
[   18.479539]  which belongs to the cache kmalloc-64 of size 64
[   18.480543] The buggy address is located 0 bytes to the right of
[   18.480543]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.481601] 
[   18.481814] The buggy address belongs to the physical page:
[   18.482312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.482975] flags: 0x200000000000000(node=0|zone=2)
[   18.483494] page_type: f5(slab)
[   18.483827] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.484488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.485111] page dumped because: kasan: bad access detected
[   18.485564] 
[   18.485696] Memory state around the buggy address:
[   18.485936]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.486268]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.486656] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.487271]                                      ^
[   18.487727]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.488360]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.488885] ==================================================================
[   18.201635] ==================================================================
[   18.202339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   18.203213] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.203784] 
[   18.203932] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.204022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.204045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.204083] Call Trace:
[   18.204148]  <TASK>
[   18.204213]  dump_stack_lvl+0x73/0xb0
[   18.204341]  print_report+0xd1/0x650
[   18.204417]  ? __virt_addr_valid+0x1db/0x2d0
[   18.204497]  ? kasan_atomics_helper+0xac7/0x5450
[   18.204563]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.204629]  ? kasan_atomics_helper+0xac7/0x5450
[   18.204694]  kasan_report+0x141/0x180
[   18.204759]  ? kasan_atomics_helper+0xac7/0x5450
[   18.204821]  kasan_check_range+0x10c/0x1c0
[   18.204889]  __kasan_check_write+0x18/0x20
[   18.204948]  kasan_atomics_helper+0xac7/0x5450
[   18.205011]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.205074]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.205131]  ? kasan_atomics+0x152/0x310
[   18.205227]  kasan_atomics+0x1dc/0x310
[   18.205282]  ? __pfx_kasan_atomics+0x10/0x10
[   18.205340]  ? __pfx_read_tsc+0x10/0x10
[   18.205395]  ? ktime_get_ts64+0x86/0x230
[   18.205463]  kunit_try_run_case+0x1a5/0x480
[   18.205508]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.205552]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.205612]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.205670]  ? __kthread_parkme+0x82/0x180
[   18.205723]  ? preempt_count_sub+0x50/0x80
[   18.205781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.205831]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.205890]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.205946]  kthread+0x337/0x6f0
[   18.205996]  ? trace_preempt_on+0x20/0xc0
[   18.206056]  ? __pfx_kthread+0x10/0x10
[   18.206108]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.206163]  ? calculate_sigpending+0x7b/0xa0
[   18.206250]  ? __pfx_kthread+0x10/0x10
[   18.206303]  ret_from_fork+0x116/0x1d0
[   18.206351]  ? __pfx_kthread+0x10/0x10
[   18.206402]  ret_from_fork_asm+0x1a/0x30
[   18.206482]  </TASK>
[   18.206506] 
[   18.218414] Allocated by task 282:
[   18.218665]  kasan_save_stack+0x45/0x70
[   18.218919]  kasan_save_track+0x18/0x40
[   18.219110]  kasan_save_alloc_info+0x3b/0x50
[   18.219316]  __kasan_kmalloc+0xb7/0xc0
[   18.219700]  __kmalloc_cache_noprof+0x189/0x420
[   18.220138]  kasan_atomics+0x95/0x310
[   18.220544]  kunit_try_run_case+0x1a5/0x480
[   18.220976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.221645]  kthread+0x337/0x6f0
[   18.222039]  ret_from_fork+0x116/0x1d0
[   18.222425]  ret_from_fork_asm+0x1a/0x30
[   18.222847] 
[   18.223054] The buggy address belongs to the object at ffff8881033ecb00
[   18.223054]  which belongs to the cache kmalloc-64 of size 64
[   18.224090] The buggy address is located 0 bytes to the right of
[   18.224090]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.225266] 
[   18.225529] The buggy address belongs to the physical page:
[   18.226030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.226787] flags: 0x200000000000000(node=0|zone=2)
[   18.227291] page_type: f5(slab)
[   18.227636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.228430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.229177] page dumped because: kasan: bad access detected
[   18.229720] 
[   18.229845] Memory state around the buggy address:
[   18.230058]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.230793]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.231175] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.231686]                                      ^
[   18.232091]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.232866]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.233574] ==================================================================
[   18.987414] ==================================================================
[   18.988074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   18.988724] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.989358] 
[   18.989594] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.989697] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.989724] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.989774] Call Trace:
[   18.990288]  <TASK>
[   18.990338]  dump_stack_lvl+0x73/0xb0
[   18.990409]  print_report+0xd1/0x650
[   18.990469]  ? __virt_addr_valid+0x1db/0x2d0
[   18.990522]  ? kasan_atomics_helper+0x164f/0x5450
[   18.990569]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.990615]  ? kasan_atomics_helper+0x164f/0x5450
[   18.990660]  kasan_report+0x141/0x180
[   18.990706]  ? kasan_atomics_helper+0x164f/0x5450
[   18.990762]  kasan_check_range+0x10c/0x1c0
[   18.990809]  __kasan_check_write+0x18/0x20
[   18.990849]  kasan_atomics_helper+0x164f/0x5450
[   18.990898]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.990945]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.990990]  ? kasan_atomics+0x152/0x310
[   18.991044]  kasan_atomics+0x1dc/0x310
[   18.991090]  ? __pfx_kasan_atomics+0x10/0x10
[   18.991138]  ? __pfx_read_tsc+0x10/0x10
[   18.991181]  ? ktime_get_ts64+0x86/0x230
[   18.991268]  kunit_try_run_case+0x1a5/0x480
[   18.991317]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.991370]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.991424]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.991493]  ? __kthread_parkme+0x82/0x180
[   18.991534]  ? preempt_count_sub+0x50/0x80
[   18.991579]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.991621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.991669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.991722]  kthread+0x337/0x6f0
[   18.991763]  ? trace_preempt_on+0x20/0xc0
[   18.991813]  ? __pfx_kthread+0x10/0x10
[   18.991862]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.991910]  ? calculate_sigpending+0x7b/0xa0
[   18.991954]  ? __pfx_kthread+0x10/0x10
[   18.991994]  ret_from_fork+0x116/0x1d0
[   18.992035]  ? __pfx_kthread+0x10/0x10
[   18.992072]  ret_from_fork_asm+0x1a/0x30
[   18.992131]  </TASK>
[   18.992155] 
[   19.005850] Allocated by task 282:
[   19.006249]  kasan_save_stack+0x45/0x70
[   19.006632]  kasan_save_track+0x18/0x40
[   19.006907]  kasan_save_alloc_info+0x3b/0x50
[   19.007335]  __kasan_kmalloc+0xb7/0xc0
[   19.007637]  __kmalloc_cache_noprof+0x189/0x420
[   19.008002]  kasan_atomics+0x95/0x310
[   19.008273]  kunit_try_run_case+0x1a5/0x480
[   19.008508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.008972]  kthread+0x337/0x6f0
[   19.009339]  ret_from_fork+0x116/0x1d0
[   19.009696]  ret_from_fork_asm+0x1a/0x30
[   19.009969] 
[   19.010159] The buggy address belongs to the object at ffff8881033ecb00
[   19.010159]  which belongs to the cache kmalloc-64 of size 64
[   19.010733] The buggy address is located 0 bytes to the right of
[   19.010733]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.011718] 
[   19.011944] The buggy address belongs to the physical page:
[   19.012376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.012813] flags: 0x200000000000000(node=0|zone=2)
[   19.013300] page_type: f5(slab)
[   19.013833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.014789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.015237] page dumped because: kasan: bad access detected
[   19.016118] 
[   19.016271] Memory state around the buggy address:
[   19.016575]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.017142]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.017735] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.018249]                                      ^
[   19.018742]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.019137]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.019637] ==================================================================
[   18.143077] ==================================================================
[   18.144177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   18.144708] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.145288] 
[   18.145508] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.145621] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.145663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.145733] Call Trace:
[   18.145786]  <TASK>
[   18.145830]  dump_stack_lvl+0x73/0xb0
[   18.145912]  print_report+0xd1/0x650
[   18.145982]  ? __virt_addr_valid+0x1db/0x2d0
[   18.146041]  ? kasan_atomics_helper+0x992/0x5450
[   18.146084]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.146113]  ? kasan_atomics_helper+0x992/0x5450
[   18.146139]  kasan_report+0x141/0x180
[   18.146167]  ? kasan_atomics_helper+0x992/0x5450
[   18.146220]  kasan_check_range+0x10c/0x1c0
[   18.146289]  __kasan_check_write+0x18/0x20
[   18.146333]  kasan_atomics_helper+0x992/0x5450
[   18.146385]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.146437]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.146502]  ? kasan_atomics+0x152/0x310
[   18.146567]  kasan_atomics+0x1dc/0x310
[   18.146615]  ? __pfx_kasan_atomics+0x10/0x10
[   18.146668]  ? __pfx_read_tsc+0x10/0x10
[   18.146716]  ? ktime_get_ts64+0x86/0x230
[   18.146789]  kunit_try_run_case+0x1a5/0x480
[   18.146860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.146903]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.146952]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.146990]  ? __kthread_parkme+0x82/0x180
[   18.147016]  ? preempt_count_sub+0x50/0x80
[   18.147046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.147072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.147103]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.147133]  kthread+0x337/0x6f0
[   18.147157]  ? trace_preempt_on+0x20/0xc0
[   18.147186]  ? __pfx_kthread+0x10/0x10
[   18.147247]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.147278]  ? calculate_sigpending+0x7b/0xa0
[   18.147308]  ? __pfx_kthread+0x10/0x10
[   18.147334]  ret_from_fork+0x116/0x1d0
[   18.147372]  ? __pfx_kthread+0x10/0x10
[   18.147400]  ret_from_fork_asm+0x1a/0x30
[   18.147439]  </TASK>
[   18.147488] 
[   18.158032] Allocated by task 282:
[   18.158465]  kasan_save_stack+0x45/0x70
[   18.158732]  kasan_save_track+0x18/0x40
[   18.158937]  kasan_save_alloc_info+0x3b/0x50
[   18.159151]  __kasan_kmalloc+0xb7/0xc0
[   18.159437]  __kmalloc_cache_noprof+0x189/0x420
[   18.159876]  kasan_atomics+0x95/0x310
[   18.160229]  kunit_try_run_case+0x1a5/0x480
[   18.160659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.161112]  kthread+0x337/0x6f0
[   18.161405]  ret_from_fork+0x116/0x1d0
[   18.161894]  ret_from_fork_asm+0x1a/0x30
[   18.162203] 
[   18.162404] The buggy address belongs to the object at ffff8881033ecb00
[   18.162404]  which belongs to the cache kmalloc-64 of size 64
[   18.163106] The buggy address is located 0 bytes to the right of
[   18.163106]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.163820] 
[   18.163967] The buggy address belongs to the physical page:
[   18.164210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.164870] flags: 0x200000000000000(node=0|zone=2)
[   18.165406] page_type: f5(slab)
[   18.165757] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.166304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.166710] page dumped because: kasan: bad access detected
[   18.167108] 
[   18.167321] Memory state around the buggy address:
[   18.167612]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.167913]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.168375] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.168935]                                      ^
[   18.169416]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.169917]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.170333] ==================================================================
[   19.473076] ==================================================================
[   19.473570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   19.473903] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.474417] 
[   19.474692] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.474802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.474836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.474891] Call Trace:
[   19.474939]  <TASK>
[   19.474987]  dump_stack_lvl+0x73/0xb0
[   19.475048]  print_report+0xd1/0x650
[   19.475100]  ? __virt_addr_valid+0x1db/0x2d0
[   19.475152]  ? kasan_atomics_helper+0x4f71/0x5450
[   19.475249]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.475329]  ? kasan_atomics_helper+0x4f71/0x5450
[   19.475409]  kasan_report+0x141/0x180
[   19.475483]  ? kasan_atomics_helper+0x4f71/0x5450
[   19.475544]  __asan_report_load8_noabort+0x18/0x20
[   19.475598]  kasan_atomics_helper+0x4f71/0x5450
[   19.475657]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.475718]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.475775]  ? kasan_atomics+0x152/0x310
[   19.475835]  kasan_atomics+0x1dc/0x310
[   19.475889]  ? __pfx_kasan_atomics+0x10/0x10
[   19.475954]  ? __pfx_read_tsc+0x10/0x10
[   19.476018]  ? ktime_get_ts64+0x86/0x230
[   19.476082]  kunit_try_run_case+0x1a5/0x480
[   19.476128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.476169]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.476263]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.476331]  ? __kthread_parkme+0x82/0x180
[   19.476399]  ? preempt_count_sub+0x50/0x80
[   19.476462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.476516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.476581]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.476657]  kthread+0x337/0x6f0
[   19.476708]  ? trace_preempt_on+0x20/0xc0
[   19.476755]  ? __pfx_kthread+0x10/0x10
[   19.476794]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.476824]  ? calculate_sigpending+0x7b/0xa0
[   19.476854]  ? __pfx_kthread+0x10/0x10
[   19.476880]  ret_from_fork+0x116/0x1d0
[   19.476905]  ? __pfx_kthread+0x10/0x10
[   19.476929]  ret_from_fork_asm+0x1a/0x30
[   19.476967]  </TASK>
[   19.476982] 
[   19.487148] Allocated by task 282:
[   19.487595]  kasan_save_stack+0x45/0x70
[   19.488014]  kasan_save_track+0x18/0x40
[   19.488481]  kasan_save_alloc_info+0x3b/0x50
[   19.488866]  __kasan_kmalloc+0xb7/0xc0
[   19.489191]  __kmalloc_cache_noprof+0x189/0x420
[   19.489606]  kasan_atomics+0x95/0x310
[   19.489968]  kunit_try_run_case+0x1a5/0x480
[   19.490402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.490715]  kthread+0x337/0x6f0
[   19.490947]  ret_from_fork+0x116/0x1d0
[   19.491141]  ret_from_fork_asm+0x1a/0x30
[   19.491535] 
[   19.491687] The buggy address belongs to the object at ffff8881033ecb00
[   19.491687]  which belongs to the cache kmalloc-64 of size 64
[   19.493145] The buggy address is located 0 bytes to the right of
[   19.493145]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.494106] 
[   19.495447] The buggy address belongs to the physical page:
[   19.495919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.496716] flags: 0x200000000000000(node=0|zone=2)
[   19.497395] page_type: f5(slab)
[   19.497552] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.497735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.497923] page dumped because: kasan: bad access detected
[   19.498067] 
[   19.498138] Memory state around the buggy address:
[   19.498438]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.498928]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.499320] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.500047]                                      ^
[   19.500408]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.500764]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.501240] ==================================================================
[   17.603376] ==================================================================
[   17.604397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   17.605029] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.605353] 
[   17.605587] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.605692] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.605723] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.605770] Call Trace:
[   17.605801]  <TASK>
[   17.605839]  dump_stack_lvl+0x73/0xb0
[   17.605901]  print_report+0xd1/0x650
[   17.605947]  ? __virt_addr_valid+0x1db/0x2d0
[   17.605994]  ? kasan_atomics_helper+0x4bbc/0x5450
[   17.606037]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.606089]  ? kasan_atomics_helper+0x4bbc/0x5450
[   17.606141]  kasan_report+0x141/0x180
[   17.606192]  ? kasan_atomics_helper+0x4bbc/0x5450
[   17.606256]  __asan_report_load4_noabort+0x18/0x20
[   17.606306]  kasan_atomics_helper+0x4bbc/0x5450
[   17.606350]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.606394]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.606439]  ? kasan_atomics+0x152/0x310
[   17.606565]  kasan_atomics+0x1dc/0x310
[   17.606642]  ? __pfx_kasan_atomics+0x10/0x10
[   17.606706]  ? __pfx_read_tsc+0x10/0x10
[   17.606751]  ? ktime_get_ts64+0x86/0x230
[   17.606795]  kunit_try_run_case+0x1a5/0x480
[   17.606846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.606881]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.606928]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.606978]  ? __kthread_parkme+0x82/0x180
[   17.607032]  ? preempt_count_sub+0x50/0x80
[   17.607091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.607136]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.607167]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.607217]  kthread+0x337/0x6f0
[   17.607253]  ? trace_preempt_on+0x20/0xc0
[   17.607281]  ? __pfx_kthread+0x10/0x10
[   17.607305]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.607331]  ? calculate_sigpending+0x7b/0xa0
[   17.607374]  ? __pfx_kthread+0x10/0x10
[   17.607399]  ret_from_fork+0x116/0x1d0
[   17.607422]  ? __pfx_kthread+0x10/0x10
[   17.607445]  ret_from_fork_asm+0x1a/0x30
[   17.607504]  </TASK>
[   17.607519] 
[   17.621796] Allocated by task 282:
[   17.622601]  kasan_save_stack+0x45/0x70
[   17.623037]  kasan_save_track+0x18/0x40
[   17.623596]  kasan_save_alloc_info+0x3b/0x50
[   17.624109]  __kasan_kmalloc+0xb7/0xc0
[   17.624316]  __kmalloc_cache_noprof+0x189/0x420
[   17.624619]  kasan_atomics+0x95/0x310
[   17.625188]  kunit_try_run_case+0x1a5/0x480
[   17.625604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.626384]  kthread+0x337/0x6f0
[   17.626866]  ret_from_fork+0x116/0x1d0
[   17.627154]  ret_from_fork_asm+0x1a/0x30
[   17.627621] 
[   17.628033] The buggy address belongs to the object at ffff8881033ecb00
[   17.628033]  which belongs to the cache kmalloc-64 of size 64
[   17.628895] The buggy address is located 0 bytes to the right of
[   17.628895]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.630362] 
[   17.630587] The buggy address belongs to the physical page:
[   17.631391] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.632161] flags: 0x200000000000000(node=0|zone=2)
[   17.632489] page_type: f5(slab)
[   17.632932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.633541] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.634514] page dumped because: kasan: bad access detected
[   17.634814] 
[   17.635123] Memory state around the buggy address:
[   17.635612]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.636132]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.636723] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.637243]                                      ^
[   17.637586]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.638547]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.639197] ==================================================================
[   19.113806] ==================================================================
[   19.114447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   19.114855] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.115227] 
[   19.115463] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.115550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.115569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.115596] Call Trace:
[   19.115622]  <TASK>
[   19.115653]  dump_stack_lvl+0x73/0xb0
[   19.115713]  print_report+0xd1/0x650
[   19.115757]  ? __virt_addr_valid+0x1db/0x2d0
[   19.115802]  ? kasan_atomics_helper+0x18b1/0x5450
[   19.115851]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.115931]  ? kasan_atomics_helper+0x18b1/0x5450
[   19.115980]  kasan_report+0x141/0x180
[   19.116029]  ? kasan_atomics_helper+0x18b1/0x5450
[   19.116091]  kasan_check_range+0x10c/0x1c0
[   19.116149]  __kasan_check_write+0x18/0x20
[   19.116195]  kasan_atomics_helper+0x18b1/0x5450
[   19.116288]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.116343]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.116395]  ? kasan_atomics+0x152/0x310
[   19.116452]  kasan_atomics+0x1dc/0x310
[   19.116519]  ? __pfx_kasan_atomics+0x10/0x10
[   19.116592]  ? __pfx_read_tsc+0x10/0x10
[   19.116644]  ? ktime_get_ts64+0x86/0x230
[   19.116706]  kunit_try_run_case+0x1a5/0x480
[   19.116778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.116839]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.116912]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.116980]  ? __kthread_parkme+0x82/0x180
[   19.117032]  ? preempt_count_sub+0x50/0x80
[   19.117103]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.117166]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.117252]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.117308]  kthread+0x337/0x6f0
[   19.117352]  ? trace_preempt_on+0x20/0xc0
[   19.117405]  ? __pfx_kthread+0x10/0x10
[   19.117465]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.117524]  ? calculate_sigpending+0x7b/0xa0
[   19.117586]  ? __pfx_kthread+0x10/0x10
[   19.117642]  ret_from_fork+0x116/0x1d0
[   19.117693]  ? __pfx_kthread+0x10/0x10
[   19.117745]  ret_from_fork_asm+0x1a/0x30
[   19.117823]  </TASK>
[   19.117855] 
[   19.128849] Allocated by task 282:
[   19.129142]  kasan_save_stack+0x45/0x70
[   19.129437]  kasan_save_track+0x18/0x40
[   19.129832]  kasan_save_alloc_info+0x3b/0x50
[   19.130194]  __kasan_kmalloc+0xb7/0xc0
[   19.130652]  __kmalloc_cache_noprof+0x189/0x420
[   19.131058]  kasan_atomics+0x95/0x310
[   19.131501]  kunit_try_run_case+0x1a5/0x480
[   19.131874]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.132399]  kthread+0x337/0x6f0
[   19.132751]  ret_from_fork+0x116/0x1d0
[   19.133108]  ret_from_fork_asm+0x1a/0x30
[   19.133583] 
[   19.133774] The buggy address belongs to the object at ffff8881033ecb00
[   19.133774]  which belongs to the cache kmalloc-64 of size 64
[   19.134631] The buggy address is located 0 bytes to the right of
[   19.134631]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.135086] 
[   19.135215] The buggy address belongs to the physical page:
[   19.135711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.136528] flags: 0x200000000000000(node=0|zone=2)
[   19.137012] page_type: f5(slab)
[   19.137360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.137731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.138014] page dumped because: kasan: bad access detected
[   19.138252] 
[   19.138470] Memory state around the buggy address:
[   19.138968]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.139591]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.140169] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.140606]                                      ^
[   19.140844]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.141121]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.141658] ==================================================================
[   18.389290] ==================================================================
[   18.391160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   18.391855] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.392551] 
[   18.392800] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.392940] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.392974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.393031] Call Trace:
[   18.393092]  <TASK>
[   18.393139]  dump_stack_lvl+0x73/0xb0
[   18.393208]  print_report+0xd1/0x650
[   18.393258]  ? __virt_addr_valid+0x1db/0x2d0
[   18.393324]  ? kasan_atomics_helper+0xe78/0x5450
[   18.393390]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.393441]  ? kasan_atomics_helper+0xe78/0x5450
[   18.393500]  kasan_report+0x141/0x180
[   18.393530]  ? kasan_atomics_helper+0xe78/0x5450
[   18.393559]  kasan_check_range+0x10c/0x1c0
[   18.393597]  __kasan_check_write+0x18/0x20
[   18.393638]  kasan_atomics_helper+0xe78/0x5450
[   18.393681]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.393728]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.393776]  ? kasan_atomics+0x152/0x310
[   18.393833]  kasan_atomics+0x1dc/0x310
[   18.393894]  ? __pfx_kasan_atomics+0x10/0x10
[   18.393968]  ? __pfx_read_tsc+0x10/0x10
[   18.394020]  ? ktime_get_ts64+0x86/0x230
[   18.394080]  kunit_try_run_case+0x1a5/0x480
[   18.394130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.394170]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.394228]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.394272]  ? __kthread_parkme+0x82/0x180
[   18.394314]  ? preempt_count_sub+0x50/0x80
[   18.394366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.394421]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.394494]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.394554]  kthread+0x337/0x6f0
[   18.394605]  ? trace_preempt_on+0x20/0xc0
[   18.394664]  ? __pfx_kthread+0x10/0x10
[   18.394711]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.394760]  ? calculate_sigpending+0x7b/0xa0
[   18.394822]  ? __pfx_kthread+0x10/0x10
[   18.394873]  ret_from_fork+0x116/0x1d0
[   18.394941]  ? __pfx_kthread+0x10/0x10
[   18.394992]  ret_from_fork_asm+0x1a/0x30
[   18.395087]  </TASK>
[   18.395120] 
[   18.407274] Allocated by task 282:
[   18.407656]  kasan_save_stack+0x45/0x70
[   18.408102]  kasan_save_track+0x18/0x40
[   18.408539]  kasan_save_alloc_info+0x3b/0x50
[   18.408833]  __kasan_kmalloc+0xb7/0xc0
[   18.409049]  __kmalloc_cache_noprof+0x189/0x420
[   18.409265]  kasan_atomics+0x95/0x310
[   18.409502]  kunit_try_run_case+0x1a5/0x480
[   18.409894]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.410393]  kthread+0x337/0x6f0
[   18.410928]  ret_from_fork+0x116/0x1d0
[   18.411441]  ret_from_fork_asm+0x1a/0x30
[   18.411905] 
[   18.412109] The buggy address belongs to the object at ffff8881033ecb00
[   18.412109]  which belongs to the cache kmalloc-64 of size 64
[   18.412896] The buggy address is located 0 bytes to the right of
[   18.412896]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.413677] 
[   18.413904] The buggy address belongs to the physical page:
[   18.414238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.414725] flags: 0x200000000000000(node=0|zone=2)
[   18.415129] page_type: f5(slab)
[   18.415569] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.416117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.416650] page dumped because: kasan: bad access detected
[   18.417068] 
[   18.417311] Memory state around the buggy address:
[   18.417694]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.418000]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.418293] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.418782]                                      ^
[   18.419331]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.420305]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.420914] ==================================================================
[   19.410285] ==================================================================
[   19.411008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   19.411581] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.412134] 
[   19.412439] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.412598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.412629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.412682] Call Trace:
[   19.412768]  <TASK>
[   19.412816]  dump_stack_lvl+0x73/0xb0
[   19.412884]  print_report+0xd1/0x650
[   19.412934]  ? __virt_addr_valid+0x1db/0x2d0
[   19.412978]  ? kasan_atomics_helper+0x1eaa/0x5450
[   19.413021]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.413067]  ? kasan_atomics_helper+0x1eaa/0x5450
[   19.413118]  kasan_report+0x141/0x180
[   19.413249]  ? kasan_atomics_helper+0x1eaa/0x5450
[   19.413314]  kasan_check_range+0x10c/0x1c0
[   19.413367]  __kasan_check_write+0x18/0x20
[   19.413447]  kasan_atomics_helper+0x1eaa/0x5450
[   19.413515]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.413566]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.413652]  ? kasan_atomics+0x152/0x310
[   19.413717]  kasan_atomics+0x1dc/0x310
[   19.413772]  ? __pfx_kasan_atomics+0x10/0x10
[   19.413828]  ? __pfx_read_tsc+0x10/0x10
[   19.413897]  ? ktime_get_ts64+0x86/0x230
[   19.413954]  kunit_try_run_case+0x1a5/0x480
[   19.414028]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.414092]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.414144]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.414230]  ? __kthread_parkme+0x82/0x180
[   19.414285]  ? preempt_count_sub+0x50/0x80
[   19.414347]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.414399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.414451]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.414508]  kthread+0x337/0x6f0
[   19.414533]  ? trace_preempt_on+0x20/0xc0
[   19.414561]  ? __pfx_kthread+0x10/0x10
[   19.414584]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.414611]  ? calculate_sigpending+0x7b/0xa0
[   19.414640]  ? __pfx_kthread+0x10/0x10
[   19.414664]  ret_from_fork+0x116/0x1d0
[   19.414687]  ? __pfx_kthread+0x10/0x10
[   19.414710]  ret_from_fork_asm+0x1a/0x30
[   19.414747]  </TASK>
[   19.414761] 
[   19.428019] Allocated by task 282:
[   19.428174]  kasan_save_stack+0x45/0x70
[   19.428593]  kasan_save_track+0x18/0x40
[   19.429235]  kasan_save_alloc_info+0x3b/0x50
[   19.429684]  __kasan_kmalloc+0xb7/0xc0
[   19.430033]  __kmalloc_cache_noprof+0x189/0x420
[   19.430442]  kasan_atomics+0x95/0x310
[   19.430880]  kunit_try_run_case+0x1a5/0x480
[   19.431366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.431880]  kthread+0x337/0x6f0
[   19.432100]  ret_from_fork+0x116/0x1d0
[   19.432631]  ret_from_fork_asm+0x1a/0x30
[   19.433092] 
[   19.433329] The buggy address belongs to the object at ffff8881033ecb00
[   19.433329]  which belongs to the cache kmalloc-64 of size 64
[   19.434132] The buggy address is located 0 bytes to the right of
[   19.434132]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.435056] 
[   19.435416] The buggy address belongs to the physical page:
[   19.435965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.436590] flags: 0x200000000000000(node=0|zone=2)
[   19.437067] page_type: f5(slab)
[   19.437314] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.437843] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.438201] page dumped because: kasan: bad access detected
[   19.438673] 
[   19.438851] Memory state around the buggy address:
[   19.439119]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.439611]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.439909] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.440431]                                      ^
[   19.440874]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.441384]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.441679] ==================================================================
[   18.331619] ==================================================================
[   18.332114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   18.332758] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.333238] 
[   18.333404] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.333506] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.333534] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.333581] Call Trace:
[   18.333624]  <TASK>
[   18.333692]  dump_stack_lvl+0x73/0xb0
[   18.333757]  print_report+0xd1/0x650
[   18.333808]  ? __virt_addr_valid+0x1db/0x2d0
[   18.333857]  ? kasan_atomics_helper+0xd47/0x5450
[   18.333901]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.333967]  ? kasan_atomics_helper+0xd47/0x5450
[   18.334015]  kasan_report+0x141/0x180
[   18.334065]  ? kasan_atomics_helper+0xd47/0x5450
[   18.334121]  kasan_check_range+0x10c/0x1c0
[   18.334189]  __kasan_check_write+0x18/0x20
[   18.334237]  kasan_atomics_helper+0xd47/0x5450
[   18.334299]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.334348]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.334383]  ? kasan_atomics+0x152/0x310
[   18.334415]  kasan_atomics+0x1dc/0x310
[   18.334440]  ? __pfx_kasan_atomics+0x10/0x10
[   18.334488]  ? __pfx_read_tsc+0x10/0x10
[   18.334524]  ? ktime_get_ts64+0x86/0x230
[   18.334567]  kunit_try_run_case+0x1a5/0x480
[   18.334615]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.334652]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.334725]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.334776]  ? __kthread_parkme+0x82/0x180
[   18.334820]  ? preempt_count_sub+0x50/0x80
[   18.334871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.334934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.334991]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.335039]  kthread+0x337/0x6f0
[   18.335082]  ? trace_preempt_on+0x20/0xc0
[   18.335131]  ? __pfx_kthread+0x10/0x10
[   18.335164]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.335196]  ? calculate_sigpending+0x7b/0xa0
[   18.335252]  ? __pfx_kthread+0x10/0x10
[   18.335280]  ret_from_fork+0x116/0x1d0
[   18.335305]  ? __pfx_kthread+0x10/0x10
[   18.335330]  ret_from_fork_asm+0x1a/0x30
[   18.335380]  </TASK>
[   18.335396] 
[   18.347325] Allocated by task 282:
[   18.347756]  kasan_save_stack+0x45/0x70
[   18.348262]  kasan_save_track+0x18/0x40
[   18.348614]  kasan_save_alloc_info+0x3b/0x50
[   18.348921]  __kasan_kmalloc+0xb7/0xc0
[   18.349155]  __kmalloc_cache_noprof+0x189/0x420
[   18.349677]  kasan_atomics+0x95/0x310
[   18.349939]  kunit_try_run_case+0x1a5/0x480
[   18.350350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.350657]  kthread+0x337/0x6f0
[   18.350993]  ret_from_fork+0x116/0x1d0
[   18.351262]  ret_from_fork_asm+0x1a/0x30
[   18.351673] 
[   18.351796] The buggy address belongs to the object at ffff8881033ecb00
[   18.351796]  which belongs to the cache kmalloc-64 of size 64
[   18.352230] The buggy address is located 0 bytes to the right of
[   18.352230]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.353031] 
[   18.353222] The buggy address belongs to the physical page:
[   18.353813] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.354479] flags: 0x200000000000000(node=0|zone=2)
[   18.354718] page_type: f5(slab)
[   18.354923] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.355579] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.356007] page dumped because: kasan: bad access detected
[   18.356352] 
[   18.356555] Memory state around the buggy address:
[   18.356910]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.357516]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.357901] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.358319]                                      ^
[   18.358724]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.359274]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.359760] ==================================================================
[   17.721990] ==================================================================
[   17.722378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   17.722794] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.723508] 
[   17.723749] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.723858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.723886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.723936] Call Trace:
[   17.723980]  <TASK>
[   17.724020]  dump_stack_lvl+0x73/0xb0
[   17.724086]  print_report+0xd1/0x650
[   17.724138]  ? __virt_addr_valid+0x1db/0x2d0
[   17.724228]  ? kasan_atomics_helper+0x4b6e/0x5450
[   17.724284]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.724328]  ? kasan_atomics_helper+0x4b6e/0x5450
[   17.724366]  kasan_report+0x141/0x180
[   17.724428]  ? kasan_atomics_helper+0x4b6e/0x5450
[   17.724486]  __asan_report_store4_noabort+0x1b/0x30
[   17.724522]  kasan_atomics_helper+0x4b6e/0x5450
[   17.724560]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.724596]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.724629]  ? kasan_atomics+0x152/0x310
[   17.724674]  kasan_atomics+0x1dc/0x310
[   17.724722]  ? __pfx_kasan_atomics+0x10/0x10
[   17.724761]  ? __pfx_read_tsc+0x10/0x10
[   17.724843]  ? ktime_get_ts64+0x86/0x230
[   17.724897]  kunit_try_run_case+0x1a5/0x480
[   17.724942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.724984]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.725043]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.725100]  ? __kthread_parkme+0x82/0x180
[   17.725151]  ? preempt_count_sub+0x50/0x80
[   17.725237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.725291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.725349]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.725406]  kthread+0x337/0x6f0
[   17.725463]  ? trace_preempt_on+0x20/0xc0
[   17.725521]  ? __pfx_kthread+0x10/0x10
[   17.725572]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.725625]  ? calculate_sigpending+0x7b/0xa0
[   17.725671]  ? __pfx_kthread+0x10/0x10
[   17.725711]  ret_from_fork+0x116/0x1d0
[   17.725750]  ? __pfx_kthread+0x10/0x10
[   17.725792]  ret_from_fork_asm+0x1a/0x30
[   17.725883]  </TASK>
[   17.726105] 
[   17.742928] Allocated by task 282:
[   17.743640]  kasan_save_stack+0x45/0x70
[   17.743889]  kasan_save_track+0x18/0x40
[   17.744246]  kasan_save_alloc_info+0x3b/0x50
[   17.744515]  __kasan_kmalloc+0xb7/0xc0
[   17.744824]  __kmalloc_cache_noprof+0x189/0x420
[   17.745085]  kasan_atomics+0x95/0x310
[   17.745407]  kunit_try_run_case+0x1a5/0x480
[   17.746562]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.747042]  kthread+0x337/0x6f0
[   17.747709]  ret_from_fork+0x116/0x1d0
[   17.747969]  ret_from_fork_asm+0x1a/0x30
[   17.748875] 
[   17.749096] The buggy address belongs to the object at ffff8881033ecb00
[   17.749096]  which belongs to the cache kmalloc-64 of size 64
[   17.750335] The buggy address is located 0 bytes to the right of
[   17.750335]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.751339] 
[   17.751644] The buggy address belongs to the physical page:
[   17.752182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.753286] flags: 0x200000000000000(node=0|zone=2)
[   17.753921] page_type: f5(slab)
[   17.754122] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.754616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.755801] page dumped because: kasan: bad access detected
[   17.756104] 
[   17.756286] Memory state around the buggy address:
[   17.756592]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.757144]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.757592] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.758590]                                      ^
[   17.759154]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.759523]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.760693] ==================================================================
[   19.326283] ==================================================================
[   19.327093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   19.327755] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.328116] 
[   19.328374] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.328485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.328518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.328567] Call Trace:
[   19.328613]  <TASK>
[   19.328659]  dump_stack_lvl+0x73/0xb0
[   19.328730]  print_report+0xd1/0x650
[   19.328785]  ? __virt_addr_valid+0x1db/0x2d0
[   19.328836]  ? kasan_atomics_helper+0x1ce1/0x5450
[   19.328884]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.328937]  ? kasan_atomics_helper+0x1ce1/0x5450
[   19.328991]  kasan_report+0x141/0x180
[   19.329047]  ? kasan_atomics_helper+0x1ce1/0x5450
[   19.329105]  kasan_check_range+0x10c/0x1c0
[   19.329158]  __kasan_check_write+0x18/0x20
[   19.329242]  kasan_atomics_helper+0x1ce1/0x5450
[   19.329297]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.329342]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.329393]  ? kasan_atomics+0x152/0x310
[   19.329462]  kasan_atomics+0x1dc/0x310
[   19.329520]  ? __pfx_kasan_atomics+0x10/0x10
[   19.329579]  ? __pfx_read_tsc+0x10/0x10
[   19.329630]  ? ktime_get_ts64+0x86/0x230
[   19.329694]  kunit_try_run_case+0x1a5/0x480
[   19.329751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.329799]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.329857]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.329915]  ? __kthread_parkme+0x82/0x180
[   19.329967]  ? preempt_count_sub+0x50/0x80
[   19.330021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.330064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.330117]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.330165]  kthread+0x337/0x6f0
[   19.330240]  ? trace_preempt_on+0x20/0xc0
[   19.330294]  ? __pfx_kthread+0x10/0x10
[   19.330339]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.330384]  ? calculate_sigpending+0x7b/0xa0
[   19.330432]  ? __pfx_kthread+0x10/0x10
[   19.330490]  ret_from_fork+0x116/0x1d0
[   19.330538]  ? __pfx_kthread+0x10/0x10
[   19.330589]  ret_from_fork_asm+0x1a/0x30
[   19.330656]  </TASK>
[   19.330676] 
[   19.340285] Allocated by task 282:
[   19.340668]  kasan_save_stack+0x45/0x70
[   19.341068]  kasan_save_track+0x18/0x40
[   19.341447]  kasan_save_alloc_info+0x3b/0x50
[   19.341825]  __kasan_kmalloc+0xb7/0xc0
[   19.342135]  __kmalloc_cache_noprof+0x189/0x420
[   19.342553]  kasan_atomics+0x95/0x310
[   19.342851]  kunit_try_run_case+0x1a5/0x480
[   19.343097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.343514]  kthread+0x337/0x6f0
[   19.343716]  ret_from_fork+0x116/0x1d0
[   19.344042]  ret_from_fork_asm+0x1a/0x30
[   19.344417] 
[   19.344616] The buggy address belongs to the object at ffff8881033ecb00
[   19.344616]  which belongs to the cache kmalloc-64 of size 64
[   19.345291] The buggy address is located 0 bytes to the right of
[   19.345291]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.345939] 
[   19.346117] The buggy address belongs to the physical page:
[   19.346429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.346929] flags: 0x200000000000000(node=0|zone=2)
[   19.347360] page_type: f5(slab)
[   19.347615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.348069] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.348410] page dumped because: kasan: bad access detected
[   19.348818] 
[   19.348994] Memory state around the buggy address:
[   19.349421]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.349990]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.350365] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.350661]                                      ^
[   19.350886]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.351166]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.351462] ==================================================================
[   18.526832] ==================================================================
[   18.527469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   18.527765] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.528950] 
[   18.529145] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.529228] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.529247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.529277] Call Trace:
[   18.529305]  <TASK>
[   18.529332]  dump_stack_lvl+0x73/0xb0
[   18.529378]  print_report+0xd1/0x650
[   18.529407]  ? __virt_addr_valid+0x1db/0x2d0
[   18.529435]  ? kasan_atomics_helper+0x1079/0x5450
[   18.529479]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.529510]  ? kasan_atomics_helper+0x1079/0x5450
[   18.529536]  kasan_report+0x141/0x180
[   18.529563]  ? kasan_atomics_helper+0x1079/0x5450
[   18.529594]  kasan_check_range+0x10c/0x1c0
[   18.529622]  __kasan_check_write+0x18/0x20
[   18.529644]  kasan_atomics_helper+0x1079/0x5450
[   18.529672]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.529699]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.529725]  ? kasan_atomics+0x152/0x310
[   18.529755]  kasan_atomics+0x1dc/0x310
[   18.529782]  ? __pfx_kasan_atomics+0x10/0x10
[   18.529810]  ? __pfx_read_tsc+0x10/0x10
[   18.529837]  ? ktime_get_ts64+0x86/0x230
[   18.529867]  kunit_try_run_case+0x1a5/0x480
[   18.529893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.529916]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.529945]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.529974]  ? __kthread_parkme+0x82/0x180
[   18.529999]  ? preempt_count_sub+0x50/0x80
[   18.530026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.530051]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.530079]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.530107]  kthread+0x337/0x6f0
[   18.530131]  ? trace_preempt_on+0x20/0xc0
[   18.530159]  ? __pfx_kthread+0x10/0x10
[   18.530184]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.530257]  ? calculate_sigpending+0x7b/0xa0
[   18.530320]  ? __pfx_kthread+0x10/0x10
[   18.530371]  ret_from_fork+0x116/0x1d0
[   18.530413]  ? __pfx_kthread+0x10/0x10
[   18.530476]  ret_from_fork_asm+0x1a/0x30
[   18.530551]  </TASK>
[   18.530602] 
[   18.546693] Allocated by task 282:
[   18.547361]  kasan_save_stack+0x45/0x70
[   18.547681]  kasan_save_track+0x18/0x40
[   18.548013]  kasan_save_alloc_info+0x3b/0x50
[   18.548726]  __kasan_kmalloc+0xb7/0xc0
[   18.549029]  __kmalloc_cache_noprof+0x189/0x420
[   18.549265]  kasan_atomics+0x95/0x310
[   18.549727]  kunit_try_run_case+0x1a5/0x480
[   18.550243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.550767]  kthread+0x337/0x6f0
[   18.551022]  ret_from_fork+0x116/0x1d0
[   18.551523]  ret_from_fork_asm+0x1a/0x30
[   18.551807] 
[   18.551981] The buggy address belongs to the object at ffff8881033ecb00
[   18.551981]  which belongs to the cache kmalloc-64 of size 64
[   18.552786] The buggy address is located 0 bytes to the right of
[   18.552786]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.553908] 
[   18.554072] The buggy address belongs to the physical page:
[   18.554744] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.555243] flags: 0x200000000000000(node=0|zone=2)
[   18.555891] page_type: f5(slab)
[   18.556221] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.556973] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.557542] page dumped because: kasan: bad access detected
[   18.558108] 
[   18.558277] Memory state around the buggy address:
[   18.558578]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.559006]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.559854] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.560477]                                      ^
[   18.561065]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.561851]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.562604] ==================================================================
[   19.594428] ==================================================================
[   19.595004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   19.595538] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.595917] 
[   19.596067] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.596124] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.596140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.596185] Call Trace:
[   19.596228]  <TASK>
[   19.596250]  dump_stack_lvl+0x73/0xb0
[   19.596282]  print_report+0xd1/0x650
[   19.596309]  ? __virt_addr_valid+0x1db/0x2d0
[   19.596356]  ? kasan_atomics_helper+0x218a/0x5450
[   19.596383]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.596410]  ? kasan_atomics_helper+0x218a/0x5450
[   19.596437]  kasan_report+0x141/0x180
[   19.596475]  ? kasan_atomics_helper+0x218a/0x5450
[   19.596526]  kasan_check_range+0x10c/0x1c0
[   19.596559]  __kasan_check_write+0x18/0x20
[   19.596583]  kasan_atomics_helper+0x218a/0x5450
[   19.596610]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.596636]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.596680]  ? kasan_atomics+0x152/0x310
[   19.596713]  kasan_atomics+0x1dc/0x310
[   19.596740]  ? __pfx_kasan_atomics+0x10/0x10
[   19.596769]  ? __pfx_read_tsc+0x10/0x10
[   19.596795]  ? ktime_get_ts64+0x86/0x230
[   19.596825]  kunit_try_run_case+0x1a5/0x480
[   19.596872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.596895]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.596925]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.596954]  ? __kthread_parkme+0x82/0x180
[   19.596979]  ? preempt_count_sub+0x50/0x80
[   19.597022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.597057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.597086]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.597115]  kthread+0x337/0x6f0
[   19.597136]  ? trace_preempt_on+0x20/0xc0
[   19.597163]  ? __pfx_kthread+0x10/0x10
[   19.597205]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.597239]  ? calculate_sigpending+0x7b/0xa0
[   19.597267]  ? __pfx_kthread+0x10/0x10
[   19.597293]  ret_from_fork+0x116/0x1d0
[   19.597316]  ? __pfx_kthread+0x10/0x10
[   19.597340]  ret_from_fork_asm+0x1a/0x30
[   19.597396]  </TASK>
[   19.597413] 
[   19.605016] Allocated by task 282:
[   19.605284]  kasan_save_stack+0x45/0x70
[   19.605429]  kasan_save_track+0x18/0x40
[   19.605639]  kasan_save_alloc_info+0x3b/0x50
[   19.605791]  __kasan_kmalloc+0xb7/0xc0
[   19.605924]  __kmalloc_cache_noprof+0x189/0x420
[   19.606261]  kasan_atomics+0x95/0x310
[   19.606551]  kunit_try_run_case+0x1a5/0x480
[   19.606662]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.606790]  kthread+0x337/0x6f0
[   19.607057]  ret_from_fork+0x116/0x1d0
[   19.607345]  ret_from_fork_asm+0x1a/0x30
[   19.607639] 
[   19.607754] The buggy address belongs to the object at ffff8881033ecb00
[   19.607754]  which belongs to the cache kmalloc-64 of size 64
[   19.608098] The buggy address is located 0 bytes to the right of
[   19.608098]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.608676] 
[   19.608802] The buggy address belongs to the physical page:
[   19.609093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.609411] flags: 0x200000000000000(node=0|zone=2)
[   19.609766] page_type: f5(slab)
[   19.609945] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.610152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.610657] page dumped because: kasan: bad access detected
[   19.611013] 
[   19.611145] Memory state around the buggy address:
[   19.611419]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.611790]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.612098] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.612306]                                      ^
[   19.612607]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.613032]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.613366] ==================================================================
[   19.550634] ==================================================================
[   19.551122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   19.551939] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.552285] 
[   19.552443] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.552515] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.552531] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.552558] Call Trace:
[   19.552583]  <TASK>
[   19.552609]  dump_stack_lvl+0x73/0xb0
[   19.552645]  print_report+0xd1/0x650
[   19.552672]  ? __virt_addr_valid+0x1db/0x2d0
[   19.552700]  ? kasan_atomics_helper+0x20c8/0x5450
[   19.552756]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.552786]  ? kasan_atomics_helper+0x20c8/0x5450
[   19.552849]  kasan_report+0x141/0x180
[   19.552878]  ? kasan_atomics_helper+0x20c8/0x5450
[   19.552922]  kasan_check_range+0x10c/0x1c0
[   19.552952]  __kasan_check_write+0x18/0x20
[   19.552975]  kasan_atomics_helper+0x20c8/0x5450
[   19.553002]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.553030]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.553056]  ? kasan_atomics+0x152/0x310
[   19.553089]  kasan_atomics+0x1dc/0x310
[   19.553118]  ? __pfx_kasan_atomics+0x10/0x10
[   19.553147]  ? __pfx_read_tsc+0x10/0x10
[   19.553174]  ? ktime_get_ts64+0x86/0x230
[   19.553219]  kunit_try_run_case+0x1a5/0x480
[   19.553251]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.553274]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.553302]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.553331]  ? __kthread_parkme+0x82/0x180
[   19.553356]  ? preempt_count_sub+0x50/0x80
[   19.553385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.553530]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.553561]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.553588]  kthread+0x337/0x6f0
[   19.553611]  ? trace_preempt_on+0x20/0xc0
[   19.553637]  ? __pfx_kthread+0x10/0x10
[   19.553662]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.553687]  ? calculate_sigpending+0x7b/0xa0
[   19.553714]  ? __pfx_kthread+0x10/0x10
[   19.553740]  ret_from_fork+0x116/0x1d0
[   19.553766]  ? __pfx_kthread+0x10/0x10
[   19.553791]  ret_from_fork_asm+0x1a/0x30
[   19.553828]  </TASK>
[   19.553843] 
[   19.564142] Allocated by task 282:
[   19.564603]  kasan_save_stack+0x45/0x70
[   19.564951]  kasan_save_track+0x18/0x40
[   19.565155]  kasan_save_alloc_info+0x3b/0x50
[   19.565521]  __kasan_kmalloc+0xb7/0xc0
[   19.565865]  __kmalloc_cache_noprof+0x189/0x420
[   19.566044]  kasan_atomics+0x95/0x310
[   19.566223]  kunit_try_run_case+0x1a5/0x480
[   19.566374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.566579]  kthread+0x337/0x6f0
[   19.566744]  ret_from_fork+0x116/0x1d0
[   19.566921]  ret_from_fork_asm+0x1a/0x30
[   19.567117] 
[   19.567753] The buggy address belongs to the object at ffff8881033ecb00
[   19.567753]  which belongs to the cache kmalloc-64 of size 64
[   19.568193] The buggy address is located 0 bytes to the right of
[   19.568193]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.568912] 
[   19.568998] The buggy address belongs to the physical page:
[   19.569174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.569871] flags: 0x200000000000000(node=0|zone=2)
[   19.570219] page_type: f5(slab)
[   19.570485] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.570739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.571164] page dumped because: kasan: bad access detected
[   19.571419] 
[   19.571677] Memory state around the buggy address:
[   19.572044]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.572267]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.572812] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.573436]                                      ^
[   19.573645]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.574171]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.574495] ==================================================================
[   17.686155] ==================================================================
[   17.686521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   17.687491] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.688528] 
[   17.689351] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.689438] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.689472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.689502] Call Trace:
[   17.689526]  <TASK>
[   17.689554]  dump_stack_lvl+0x73/0xb0
[   17.689602]  print_report+0xd1/0x650
[   17.689630]  ? __virt_addr_valid+0x1db/0x2d0
[   17.689658]  ? kasan_atomics_helper+0x4b88/0x5450
[   17.689683]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.689708]  ? kasan_atomics_helper+0x4b88/0x5450
[   17.689733]  kasan_report+0x141/0x180
[   17.689757]  ? kasan_atomics_helper+0x4b88/0x5450
[   17.689787]  __asan_report_load4_noabort+0x18/0x20
[   17.689814]  kasan_atomics_helper+0x4b88/0x5450
[   17.689889]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.689929]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.689970]  ? kasan_atomics+0x152/0x310
[   17.690003]  kasan_atomics+0x1dc/0x310
[   17.690031]  ? __pfx_kasan_atomics+0x10/0x10
[   17.690058]  ? __pfx_read_tsc+0x10/0x10
[   17.690083]  ? ktime_get_ts64+0x86/0x230
[   17.690113]  kunit_try_run_case+0x1a5/0x480
[   17.690138]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.690160]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.690188]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.690231]  ? __kthread_parkme+0x82/0x180
[   17.690257]  ? preempt_count_sub+0x50/0x80
[   17.690284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.690308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.690337]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.690366]  kthread+0x337/0x6f0
[   17.690388]  ? trace_preempt_on+0x20/0xc0
[   17.690414]  ? __pfx_kthread+0x10/0x10
[   17.690438]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.690483]  ? calculate_sigpending+0x7b/0xa0
[   17.690514]  ? __pfx_kthread+0x10/0x10
[   17.690539]  ret_from_fork+0x116/0x1d0
[   17.690561]  ? __pfx_kthread+0x10/0x10
[   17.690584]  ret_from_fork_asm+0x1a/0x30
[   17.690620]  </TASK>
[   17.690633] 
[   17.705909] Allocated by task 282:
[   17.706111]  kasan_save_stack+0x45/0x70
[   17.706312]  kasan_save_track+0x18/0x40
[   17.706487]  kasan_save_alloc_info+0x3b/0x50
[   17.706668]  __kasan_kmalloc+0xb7/0xc0
[   17.706966]  __kmalloc_cache_noprof+0x189/0x420
[   17.707225]  kasan_atomics+0x95/0x310
[   17.707431]  kunit_try_run_case+0x1a5/0x480
[   17.708560]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.709340]  kthread+0x337/0x6f0
[   17.709887]  ret_from_fork+0x116/0x1d0
[   17.710299]  ret_from_fork_asm+0x1a/0x30
[   17.710635] 
[   17.710998] The buggy address belongs to the object at ffff8881033ecb00
[   17.710998]  which belongs to the cache kmalloc-64 of size 64
[   17.712323] The buggy address is located 0 bytes to the right of
[   17.712323]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.713023] 
[   17.713535] The buggy address belongs to the physical page:
[   17.714019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.714673] flags: 0x200000000000000(node=0|zone=2)
[   17.715217] page_type: f5(slab)
[   17.715434] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.716244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.717158] page dumped because: kasan: bad access detected
[   17.717524] 
[   17.717747] Memory state around the buggy address:
[   17.718077]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.718596]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.719206] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.719908]                                      ^
[   17.720092]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.720403]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.720982] ==================================================================
[   19.201168] ==================================================================
[   19.201801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   19.202581] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.203142] 
[   19.203420] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.203538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.203567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.203614] Call Trace:
[   19.203659]  <TASK>
[   19.203704]  dump_stack_lvl+0x73/0xb0
[   19.203781]  print_report+0xd1/0x650
[   19.203840]  ? __virt_addr_valid+0x1db/0x2d0
[   19.203897]  ? kasan_atomics_helper+0x1a7f/0x5450
[   19.203954]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.204009]  ? kasan_atomics_helper+0x1a7f/0x5450
[   19.204066]  kasan_report+0x141/0x180
[   19.204122]  ? kasan_atomics_helper+0x1a7f/0x5450
[   19.204188]  kasan_check_range+0x10c/0x1c0
[   19.204242]  __kasan_check_write+0x18/0x20
[   19.204294]  kasan_atomics_helper+0x1a7f/0x5450
[   19.204347]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.204395]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.204445]  ? kasan_atomics+0x152/0x310
[   19.204514]  kasan_atomics+0x1dc/0x310
[   19.204561]  ? __pfx_kasan_atomics+0x10/0x10
[   19.204611]  ? __pfx_read_tsc+0x10/0x10
[   19.204659]  ? ktime_get_ts64+0x86/0x230
[   19.204717]  kunit_try_run_case+0x1a5/0x480
[   19.204766]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.204812]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.204870]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.204925]  ? __kthread_parkme+0x82/0x180
[   19.204974]  ? preempt_count_sub+0x50/0x80
[   19.205032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.205082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.205146]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.205190]  kthread+0x337/0x6f0
[   19.205253]  ? trace_preempt_on+0x20/0xc0
[   19.205298]  ? __pfx_kthread+0x10/0x10
[   19.205336]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.205379]  ? calculate_sigpending+0x7b/0xa0
[   19.205430]  ? __pfx_kthread+0x10/0x10
[   19.205484]  ret_from_fork+0x116/0x1d0
[   19.205527]  ? __pfx_kthread+0x10/0x10
[   19.205567]  ret_from_fork_asm+0x1a/0x30
[   19.205635]  </TASK>
[   19.205663] 
[   19.219955] Allocated by task 282:
[   19.220328]  kasan_save_stack+0x45/0x70
[   19.220854]  kasan_save_track+0x18/0x40
[   19.221355]  kasan_save_alloc_info+0x3b/0x50
[   19.221804]  __kasan_kmalloc+0xb7/0xc0
[   19.222214]  __kmalloc_cache_noprof+0x189/0x420
[   19.222553]  kasan_atomics+0x95/0x310
[   19.222673]  kunit_try_run_case+0x1a5/0x480
[   19.222780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.222901]  kthread+0x337/0x6f0
[   19.222996]  ret_from_fork+0x116/0x1d0
[   19.223091]  ret_from_fork_asm+0x1a/0x30
[   19.223193] 
[   19.223392] The buggy address belongs to the object at ffff8881033ecb00
[   19.223392]  which belongs to the cache kmalloc-64 of size 64
[   19.224472] The buggy address is located 0 bytes to the right of
[   19.224472]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.225539] 
[   19.225775] The buggy address belongs to the physical page:
[   19.226283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.226940] flags: 0x200000000000000(node=0|zone=2)
[   19.227156] page_type: f5(slab)
[   19.227935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.228592] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.229526] page dumped because: kasan: bad access detected
[   19.229859] 
[   19.229997] Memory state around the buggy address:
[   19.230610]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.231059]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.231416] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.231898]                                      ^
[   19.232296]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.232621]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.233494] ==================================================================
[   17.834581] ==================================================================
[   17.835104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   17.835930] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.836367] 
[   17.836638] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.836990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.837030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.837079] Call Trace:
[   17.837130]  <TASK>
[   17.837190]  dump_stack_lvl+0x73/0xb0
[   17.837295]  print_report+0xd1/0x650
[   17.837343]  ? __virt_addr_valid+0x1db/0x2d0
[   17.837395]  ? kasan_atomics_helper+0x4a0/0x5450
[   17.837474]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.837528]  ? kasan_atomics_helper+0x4a0/0x5450
[   17.837589]  kasan_report+0x141/0x180
[   17.837634]  ? kasan_atomics_helper+0x4a0/0x5450
[   17.837694]  kasan_check_range+0x10c/0x1c0
[   17.837759]  __kasan_check_write+0x18/0x20
[   17.837807]  kasan_atomics_helper+0x4a0/0x5450
[   17.837863]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.837918]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.837973]  ? kasan_atomics+0x152/0x310
[   17.838014]  kasan_atomics+0x1dc/0x310
[   17.838043]  ? __pfx_kasan_atomics+0x10/0x10
[   17.838072]  ? __pfx_read_tsc+0x10/0x10
[   17.838100]  ? ktime_get_ts64+0x86/0x230
[   17.838132]  kunit_try_run_case+0x1a5/0x480
[   17.838159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.838182]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.838223]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.838260]  ? __kthread_parkme+0x82/0x180
[   17.838286]  ? preempt_count_sub+0x50/0x80
[   17.838314]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.838338]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.838368]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.838397]  kthread+0x337/0x6f0
[   17.838421]  ? trace_preempt_on+0x20/0xc0
[   17.838450]  ? __pfx_kthread+0x10/0x10
[   17.838508]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.838548]  ? calculate_sigpending+0x7b/0xa0
[   17.838591]  ? __pfx_kthread+0x10/0x10
[   17.838628]  ret_from_fork+0x116/0x1d0
[   17.838661]  ? __pfx_kthread+0x10/0x10
[   17.838696]  ret_from_fork_asm+0x1a/0x30
[   17.838744]  </TASK>
[   17.838767] 
[   17.853604] Allocated by task 282:
[   17.853944]  kasan_save_stack+0x45/0x70
[   17.854629]  kasan_save_track+0x18/0x40
[   17.855570]  kasan_save_alloc_info+0x3b/0x50
[   17.856058]  __kasan_kmalloc+0xb7/0xc0
[   17.856492]  __kmalloc_cache_noprof+0x189/0x420
[   17.856982]  kasan_atomics+0x95/0x310
[   17.857263]  kunit_try_run_case+0x1a5/0x480
[   17.857652]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.858268]  kthread+0x337/0x6f0
[   17.858589]  ret_from_fork+0x116/0x1d0
[   17.858925]  ret_from_fork_asm+0x1a/0x30
[   17.859914] 
[   17.860057] The buggy address belongs to the object at ffff8881033ecb00
[   17.860057]  which belongs to the cache kmalloc-64 of size 64
[   17.860815] The buggy address is located 0 bytes to the right of
[   17.860815]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.862620] 
[   17.863440] The buggy address belongs to the physical page:
[   17.864031] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.864622] flags: 0x200000000000000(node=0|zone=2)
[   17.865243] page_type: f5(slab)
[   17.865526] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.866022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.866726] page dumped because: kasan: bad access detected
[   17.867418] 
[   17.867648] Memory state around the buggy address:
[   17.868359]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.868746]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.869314] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.869949]                                      ^
[   17.870405]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.870925]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.871578] ==================================================================
[   19.380959] ==================================================================
[   19.381712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   19.381993] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.382274] 
[   19.382398] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.383308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.383365] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.383417] Call Trace:
[   19.383478]  <TASK>
[   19.383522]  dump_stack_lvl+0x73/0xb0
[   19.383601]  print_report+0xd1/0x650
[   19.383661]  ? __virt_addr_valid+0x1db/0x2d0
[   19.383714]  ? kasan_atomics_helper+0x1e12/0x5450
[   19.383786]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.383848]  ? kasan_atomics_helper+0x1e12/0x5450
[   19.383906]  kasan_report+0x141/0x180
[   19.383965]  ? kasan_atomics_helper+0x1e12/0x5450
[   19.384033]  kasan_check_range+0x10c/0x1c0
[   19.384094]  __kasan_check_write+0x18/0x20
[   19.384139]  kasan_atomics_helper+0x1e12/0x5450
[   19.384191]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.384235]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.384279]  ? kasan_atomics+0x152/0x310
[   19.384336]  kasan_atomics+0x1dc/0x310
[   19.384386]  ? __pfx_kasan_atomics+0x10/0x10
[   19.384443]  ? __pfx_read_tsc+0x10/0x10
[   19.384506]  ? ktime_get_ts64+0x86/0x230
[   19.384569]  kunit_try_run_case+0x1a5/0x480
[   19.384628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.384679]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.384740]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.384799]  ? __kthread_parkme+0x82/0x180
[   19.384850]  ? preempt_count_sub+0x50/0x80
[   19.384923]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.384968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.385018]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.385076]  kthread+0x337/0x6f0
[   19.385126]  ? trace_preempt_on+0x20/0xc0
[   19.385182]  ? __pfx_kthread+0x10/0x10
[   19.385228]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.385282]  ? calculate_sigpending+0x7b/0xa0
[   19.385339]  ? __pfx_kthread+0x10/0x10
[   19.385393]  ret_from_fork+0x116/0x1d0
[   19.385438]  ? __pfx_kthread+0x10/0x10
[   19.385501]  ret_from_fork_asm+0x1a/0x30
[   19.385579]  </TASK>
[   19.385608] 
[   19.395919] Allocated by task 282:
[   19.396177]  kasan_save_stack+0x45/0x70
[   19.396464]  kasan_save_track+0x18/0x40
[   19.396840]  kasan_save_alloc_info+0x3b/0x50
[   19.397330]  __kasan_kmalloc+0xb7/0xc0
[   19.397727]  __kmalloc_cache_noprof+0x189/0x420
[   19.398132]  kasan_atomics+0x95/0x310
[   19.398549]  kunit_try_run_case+0x1a5/0x480
[   19.398958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.399481]  kthread+0x337/0x6f0
[   19.399845]  ret_from_fork+0x116/0x1d0
[   19.400246]  ret_from_fork_asm+0x1a/0x30
[   19.400653] 
[   19.400846] The buggy address belongs to the object at ffff8881033ecb00
[   19.400846]  which belongs to the cache kmalloc-64 of size 64
[   19.401479] The buggy address is located 0 bytes to the right of
[   19.401479]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.401932] 
[   19.402061] The buggy address belongs to the physical page:
[   19.402318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.402922] flags: 0x200000000000000(node=0|zone=2)
[   19.403462] page_type: f5(slab)
[   19.403862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.404525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.405096] page dumped because: kasan: bad access detected
[   19.405534] 
[   19.405655] Memory state around the buggy address:
[   19.405882]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.406171]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.406641] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.407294]                                      ^
[   19.407749]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.408373]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.408951] ==================================================================
[   17.762034] ==================================================================
[   17.762958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   17.763970] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.764717] 
[   17.764864] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.764957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.764981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.765020] Call Trace:
[   17.765061]  <TASK>
[   17.765100]  dump_stack_lvl+0x73/0xb0
[   17.765153]  print_report+0xd1/0x650
[   17.765249]  ? __virt_addr_valid+0x1db/0x2d0
[   17.765334]  ? kasan_atomics_helper+0x3df/0x5450
[   17.765384]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.765469]  ? kasan_atomics_helper+0x3df/0x5450
[   17.765525]  kasan_report+0x141/0x180
[   17.765581]  ? kasan_atomics_helper+0x3df/0x5450
[   17.765638]  kasan_check_range+0x10c/0x1c0
[   17.765688]  __kasan_check_read+0x15/0x20
[   17.765968]  kasan_atomics_helper+0x3df/0x5450
[   17.766143]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.766209]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.766258]  ? kasan_atomics+0x152/0x310
[   17.766323]  kasan_atomics+0x1dc/0x310
[   17.766382]  ? __pfx_kasan_atomics+0x10/0x10
[   17.766441]  ? __pfx_read_tsc+0x10/0x10
[   17.766516]  ? ktime_get_ts64+0x86/0x230
[   17.766552]  kunit_try_run_case+0x1a5/0x480
[   17.766581]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.766605]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.766638]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.766667]  ? __kthread_parkme+0x82/0x180
[   17.766700]  ? preempt_count_sub+0x50/0x80
[   17.766747]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.766772]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.766802]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.766832]  kthread+0x337/0x6f0
[   17.766857]  ? trace_preempt_on+0x20/0xc0
[   17.766885]  ? __pfx_kthread+0x10/0x10
[   17.766909]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.766936]  ? calculate_sigpending+0x7b/0xa0
[   17.766965]  ? __pfx_kthread+0x10/0x10
[   17.766990]  ret_from_fork+0x116/0x1d0
[   17.767013]  ? __pfx_kthread+0x10/0x10
[   17.767038]  ret_from_fork_asm+0x1a/0x30
[   17.767075]  </TASK>
[   17.767090] 
[   17.778020] Allocated by task 282:
[   17.778440]  kasan_save_stack+0x45/0x70
[   17.778954]  kasan_save_track+0x18/0x40
[   17.779312]  kasan_save_alloc_info+0x3b/0x50
[   17.779560]  __kasan_kmalloc+0xb7/0xc0
[   17.779768]  __kmalloc_cache_noprof+0x189/0x420
[   17.779991]  kasan_atomics+0x95/0x310
[   17.780228]  kunit_try_run_case+0x1a5/0x480
[   17.780445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.780914]  kthread+0x337/0x6f0
[   17.781208]  ret_from_fork+0x116/0x1d0
[   17.781536]  ret_from_fork_asm+0x1a/0x30
[   17.781877] 
[   17.782369] The buggy address belongs to the object at ffff8881033ecb00
[   17.782369]  which belongs to the cache kmalloc-64 of size 64
[   17.783444] The buggy address is located 0 bytes to the right of
[   17.783444]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.784133] 
[   17.784268] The buggy address belongs to the physical page:
[   17.784521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.785105] flags: 0x200000000000000(node=0|zone=2)
[   17.785757] page_type: f5(slab)
[   17.786057] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.786760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.787444] page dumped because: kasan: bad access detected
[   17.787913] 
[   17.788102] Memory state around the buggy address:
[   17.788608]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.789307]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.789841] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.790483]                                      ^
[   17.790682]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.790931]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.791600] ==================================================================
[   18.054375] ==================================================================
[   18.054936] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   18.055544] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.056029] 
[   18.056296] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.056410] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.056443] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.056503] Call Trace:
[   18.056549]  <TASK>
[   18.056589]  dump_stack_lvl+0x73/0xb0
[   18.056660]  print_report+0xd1/0x650
[   18.056716]  ? __virt_addr_valid+0x1db/0x2d0
[   18.056769]  ? kasan_atomics_helper+0x7c7/0x5450
[   18.056820]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.056868]  ? kasan_atomics_helper+0x7c7/0x5450
[   18.056916]  kasan_report+0x141/0x180
[   18.056964]  ? kasan_atomics_helper+0x7c7/0x5450
[   18.057024]  kasan_check_range+0x10c/0x1c0
[   18.057080]  __kasan_check_write+0x18/0x20
[   18.057129]  kasan_atomics_helper+0x7c7/0x5450
[   18.057184]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.057280]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.057336]  ? kasan_atomics+0x152/0x310
[   18.057402]  kasan_atomics+0x1dc/0x310
[   18.057467]  ? __pfx_kasan_atomics+0x10/0x10
[   18.057525]  ? __pfx_read_tsc+0x10/0x10
[   18.057572]  ? ktime_get_ts64+0x86/0x230
[   18.057628]  kunit_try_run_case+0x1a5/0x480
[   18.057679]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.057726]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.057789]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.057848]  ? __kthread_parkme+0x82/0x180
[   18.057900]  ? preempt_count_sub+0x50/0x80
[   18.057959]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.058012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.058061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.058116]  kthread+0x337/0x6f0
[   18.058164]  ? trace_preempt_on+0x20/0xc0
[   18.058256]  ? __pfx_kthread+0x10/0x10
[   18.058301]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.058348]  ? calculate_sigpending+0x7b/0xa0
[   18.058398]  ? __pfx_kthread+0x10/0x10
[   18.058438]  ret_from_fork+0x116/0x1d0
[   18.058490]  ? __pfx_kthread+0x10/0x10
[   18.058534]  ret_from_fork_asm+0x1a/0x30
[   18.058597]  </TASK>
[   18.058624] 
[   18.069559] Allocated by task 282:
[   18.069917]  kasan_save_stack+0x45/0x70
[   18.070226]  kasan_save_track+0x18/0x40
[   18.070510]  kasan_save_alloc_info+0x3b/0x50
[   18.070812]  __kasan_kmalloc+0xb7/0xc0
[   18.071077]  __kmalloc_cache_noprof+0x189/0x420
[   18.071330]  kasan_atomics+0x95/0x310
[   18.071621]  kunit_try_run_case+0x1a5/0x480
[   18.071993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.072462]  kthread+0x337/0x6f0
[   18.072751]  ret_from_fork+0x116/0x1d0
[   18.073071]  ret_from_fork_asm+0x1a/0x30
[   18.073322] 
[   18.073512] The buggy address belongs to the object at ffff8881033ecb00
[   18.073512]  which belongs to the cache kmalloc-64 of size 64
[   18.074084] The buggy address is located 0 bytes to the right of
[   18.074084]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.074748] 
[   18.074877] The buggy address belongs to the physical page:
[   18.075094] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.075444] flags: 0x200000000000000(node=0|zone=2)
[   18.075686] page_type: f5(slab)
[   18.075864] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.076144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.076444] page dumped because: kasan: bad access detected
[   18.076878] 
[   18.077066] Memory state around the buggy address:
[   18.077490]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.078006]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.078589] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.079095]                                      ^
[   18.079527]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.080070]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.080630] ==================================================================
[   18.797056] ==================================================================
[   18.798303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   18.798991] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.799733] 
[   18.799918] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.800037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.800073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.800164] Call Trace:
[   18.800229]  <TASK>
[   18.800303]  dump_stack_lvl+0x73/0xb0
[   18.800397]  print_report+0xd1/0x650
[   18.800465]  ? __virt_addr_valid+0x1db/0x2d0
[   18.800523]  ? kasan_atomics_helper+0x13b5/0x5450
[   18.800575]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.800661]  ? kasan_atomics_helper+0x13b5/0x5450
[   18.800736]  kasan_report+0x141/0x180
[   18.800794]  ? kasan_atomics_helper+0x13b5/0x5450
[   18.800856]  kasan_check_range+0x10c/0x1c0
[   18.800914]  __kasan_check_read+0x15/0x20
[   18.800995]  kasan_atomics_helper+0x13b5/0x5450
[   18.801064]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.801120]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.801163]  ? kasan_atomics+0x152/0x310
[   18.801204]  kasan_atomics+0x1dc/0x310
[   18.801273]  ? __pfx_kasan_atomics+0x10/0x10
[   18.801303]  ? __pfx_read_tsc+0x10/0x10
[   18.801331]  ? ktime_get_ts64+0x86/0x230
[   18.801363]  kunit_try_run_case+0x1a5/0x480
[   18.801390]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.801413]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.801444]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.801498]  ? __kthread_parkme+0x82/0x180
[   18.801524]  ? preempt_count_sub+0x50/0x80
[   18.801552]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.801577]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.801608]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.801636]  kthread+0x337/0x6f0
[   18.801660]  ? trace_preempt_on+0x20/0xc0
[   18.801687]  ? __pfx_kthread+0x10/0x10
[   18.801711]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.801736]  ? calculate_sigpending+0x7b/0xa0
[   18.801765]  ? __pfx_kthread+0x10/0x10
[   18.801788]  ret_from_fork+0x116/0x1d0
[   18.801810]  ? __pfx_kthread+0x10/0x10
[   18.801835]  ret_from_fork_asm+0x1a/0x30
[   18.801871]  </TASK>
[   18.801886] 
[   18.816589] Allocated by task 282:
[   18.816927]  kasan_save_stack+0x45/0x70
[   18.817939]  kasan_save_track+0x18/0x40
[   18.818205]  kasan_save_alloc_info+0x3b/0x50
[   18.818893]  __kasan_kmalloc+0xb7/0xc0
[   18.819090]  __kmalloc_cache_noprof+0x189/0x420
[   18.819750]  kasan_atomics+0x95/0x310
[   18.820041]  kunit_try_run_case+0x1a5/0x480
[   18.820539]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.820839]  kthread+0x337/0x6f0
[   18.821352]  ret_from_fork+0x116/0x1d0
[   18.821601]  ret_from_fork_asm+0x1a/0x30
[   18.821915] 
[   18.822048] The buggy address belongs to the object at ffff8881033ecb00
[   18.822048]  which belongs to the cache kmalloc-64 of size 64
[   18.823256] The buggy address is located 0 bytes to the right of
[   18.823256]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.823782] 
[   18.824290] The buggy address belongs to the physical page:
[   18.824811] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.825330] flags: 0x200000000000000(node=0|zone=2)
[   18.825859] page_type: f5(slab)
[   18.826091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.826726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.827084] page dumped because: kasan: bad access detected
[   18.827581] 
[   18.828048] Memory state around the buggy address:
[   18.828332]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.829115]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.829635] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.829988]                                      ^
[   18.830700]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.831082]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.831850] ==================================================================
[   19.575176] ==================================================================
[   19.575910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   19.576398] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.576711] 
[   19.576868] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.576932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.576948] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.576977] Call Trace:
[   19.577004]  <TASK>
[   19.577030]  dump_stack_lvl+0x73/0xb0
[   19.577067]  print_report+0xd1/0x650
[   19.577095]  ? __virt_addr_valid+0x1db/0x2d0
[   19.577124]  ? kasan_atomics_helper+0x4fb2/0x5450
[   19.577150]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.577178]  ? kasan_atomics_helper+0x4fb2/0x5450
[   19.577252]  kasan_report+0x141/0x180
[   19.577298]  ? kasan_atomics_helper+0x4fb2/0x5450
[   19.577346]  __asan_report_load8_noabort+0x18/0x20
[   19.577371]  kasan_atomics_helper+0x4fb2/0x5450
[   19.577399]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.577427]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.577462]  ? kasan_atomics+0x152/0x310
[   19.577500]  kasan_atomics+0x1dc/0x310
[   19.577529]  ? __pfx_kasan_atomics+0x10/0x10
[   19.577559]  ? __pfx_read_tsc+0x10/0x10
[   19.577586]  ? ktime_get_ts64+0x86/0x230
[   19.577616]  kunit_try_run_case+0x1a5/0x480
[   19.577644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.577668]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.577698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.577729]  ? __kthread_parkme+0x82/0x180
[   19.577755]  ? preempt_count_sub+0x50/0x80
[   19.577784]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.577809]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.577839]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.577868]  kthread+0x337/0x6f0
[   19.577892]  ? trace_preempt_on+0x20/0xc0
[   19.577919]  ? __pfx_kthread+0x10/0x10
[   19.577946]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.577973]  ? calculate_sigpending+0x7b/0xa0
[   19.578003]  ? __pfx_kthread+0x10/0x10
[   19.578030]  ret_from_fork+0x116/0x1d0
[   19.578053]  ? __pfx_kthread+0x10/0x10
[   19.578077]  ret_from_fork_asm+0x1a/0x30
[   19.578116]  </TASK>
[   19.578130] 
[   19.585582] Allocated by task 282:
[   19.585821]  kasan_save_stack+0x45/0x70
[   19.585936]  kasan_save_track+0x18/0x40
[   19.586037]  kasan_save_alloc_info+0x3b/0x50
[   19.586142]  __kasan_kmalloc+0xb7/0xc0
[   19.586330]  __kmalloc_cache_noprof+0x189/0x420
[   19.586508]  kasan_atomics+0x95/0x310
[   19.586656]  kunit_try_run_case+0x1a5/0x480
[   19.586799]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.586965]  kthread+0x337/0x6f0
[   19.587080]  ret_from_fork+0x116/0x1d0
[   19.587372]  ret_from_fork_asm+0x1a/0x30
[   19.587678] 
[   19.587817] The buggy address belongs to the object at ffff8881033ecb00
[   19.587817]  which belongs to the cache kmalloc-64 of size 64
[   19.588557] The buggy address is located 0 bytes to the right of
[   19.588557]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.589088] 
[   19.589156] The buggy address belongs to the physical page:
[   19.589304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.589484] flags: 0x200000000000000(node=0|zone=2)
[   19.589823] page_type: f5(slab)
[   19.590030] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.590526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.590995] page dumped because: kasan: bad access detected
[   19.591236] 
[   19.591369] Memory state around the buggy address:
[   19.591501]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.591651]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.591795] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.592271]                                      ^
[   19.592613]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.593072]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.593377] ==================================================================
[   19.636035] ==================================================================
[   19.636611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   19.637140] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.637477] 
[   19.637638] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.637839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.637888] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.637919] Call Trace:
[   19.637949]  <TASK>
[   19.637977]  dump_stack_lvl+0x73/0xb0
[   19.638033]  print_report+0xd1/0x650
[   19.638063]  ? __virt_addr_valid+0x1db/0x2d0
[   19.638093]  ? kasan_atomics_helper+0x224c/0x5450
[   19.638121]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.638149]  ? kasan_atomics_helper+0x224c/0x5450
[   19.638176]  kasan_report+0x141/0x180
[   19.638218]  ? kasan_atomics_helper+0x224c/0x5450
[   19.638252]  kasan_check_range+0x10c/0x1c0
[   19.638281]  __kasan_check_write+0x18/0x20
[   19.638306]  kasan_atomics_helper+0x224c/0x5450
[   19.638333]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.638361]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.638387]  ? kasan_atomics+0x152/0x310
[   19.638420]  kasan_atomics+0x1dc/0x310
[   19.638448]  ? __pfx_kasan_atomics+0x10/0x10
[   19.638500]  ? __pfx_read_tsc+0x10/0x10
[   19.638529]  ? ktime_get_ts64+0x86/0x230
[   19.638560]  kunit_try_run_case+0x1a5/0x480
[   19.638589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.638614]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.638645]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.638677]  ? __kthread_parkme+0x82/0x180
[   19.638705]  ? preempt_count_sub+0x50/0x80
[   19.638735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.638762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.638793]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.638826]  kthread+0x337/0x6f0
[   19.638853]  ? trace_preempt_on+0x20/0xc0
[   19.638883]  ? __pfx_kthread+0x10/0x10
[   19.638910]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.638940]  ? calculate_sigpending+0x7b/0xa0
[   19.638974]  ? __pfx_kthread+0x10/0x10
[   19.639003]  ret_from_fork+0x116/0x1d0
[   19.639029]  ? __pfx_kthread+0x10/0x10
[   19.639057]  ret_from_fork_asm+0x1a/0x30
[   19.639098]  </TASK>
[   19.639114] 
[   19.647954] Allocated by task 282:
[   19.648254]  kasan_save_stack+0x45/0x70
[   19.648514]  kasan_save_track+0x18/0x40
[   19.648667]  kasan_save_alloc_info+0x3b/0x50
[   19.648814]  __kasan_kmalloc+0xb7/0xc0
[   19.648953]  __kmalloc_cache_noprof+0x189/0x420
[   19.649289]  kasan_atomics+0x95/0x310
[   19.649591]  kunit_try_run_case+0x1a5/0x480
[   19.649918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.650338]  kthread+0x337/0x6f0
[   19.650609]  ret_from_fork+0x116/0x1d0
[   19.650869]  ret_from_fork_asm+0x1a/0x30
[   19.651146] 
[   19.651335] The buggy address belongs to the object at ffff8881033ecb00
[   19.651335]  which belongs to the cache kmalloc-64 of size 64
[   19.651843] The buggy address is located 0 bytes to the right of
[   19.651843]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.652402] 
[   19.652515] The buggy address belongs to the physical page:
[   19.653370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.653610] flags: 0x200000000000000(node=0|zone=2)
[   19.653749] page_type: f5(slab)
[   19.653889] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.654436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.655482] page dumped because: kasan: bad access detected
[   19.655871] 
[   19.655985] Memory state around the buggy address:
[   19.656234]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.656562]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.656727] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.657148]                                      ^
[   19.657502]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.657843]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.658234] ==================================================================
[   18.267042] ==================================================================
[   18.267520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   18.268284] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.269073] 
[   18.269649] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.269725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.269743] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.269772] Call Trace:
[   18.269798]  <TASK>
[   18.269828]  dump_stack_lvl+0x73/0xb0
[   18.269873]  print_report+0xd1/0x650
[   18.269901]  ? __virt_addr_valid+0x1db/0x2d0
[   18.269930]  ? kasan_atomics_helper+0xc70/0x5450
[   18.269955]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.269982]  ? kasan_atomics_helper+0xc70/0x5450
[   18.270007]  kasan_report+0x141/0x180
[   18.270032]  ? kasan_atomics_helper+0xc70/0x5450
[   18.270063]  kasan_check_range+0x10c/0x1c0
[   18.270089]  __kasan_check_write+0x18/0x20
[   18.270111]  kasan_atomics_helper+0xc70/0x5450
[   18.270135]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.270159]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.270184]  ? kasan_atomics+0x152/0x310
[   18.270246]  kasan_atomics+0x1dc/0x310
[   18.270277]  ? __pfx_kasan_atomics+0x10/0x10
[   18.270306]  ? __pfx_read_tsc+0x10/0x10
[   18.270332]  ? ktime_get_ts64+0x86/0x230
[   18.270360]  kunit_try_run_case+0x1a5/0x480
[   18.270386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.270408]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.270437]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.270486]  ? __kthread_parkme+0x82/0x180
[   18.270514]  ? preempt_count_sub+0x50/0x80
[   18.270545]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.270568]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.270598]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.270626]  kthread+0x337/0x6f0
[   18.270650]  ? trace_preempt_on+0x20/0xc0
[   18.270677]  ? __pfx_kthread+0x10/0x10
[   18.270701]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.270726]  ? calculate_sigpending+0x7b/0xa0
[   18.270756]  ? __pfx_kthread+0x10/0x10
[   18.270780]  ret_from_fork+0x116/0x1d0
[   18.270803]  ? __pfx_kthread+0x10/0x10
[   18.270826]  ret_from_fork_asm+0x1a/0x30
[   18.270861]  </TASK>
[   18.270875] 
[   18.284791] Allocated by task 282:
[   18.285035]  kasan_save_stack+0x45/0x70
[   18.285320]  kasan_save_track+0x18/0x40
[   18.286009]  kasan_save_alloc_info+0x3b/0x50
[   18.286192]  __kasan_kmalloc+0xb7/0xc0
[   18.286772]  __kmalloc_cache_noprof+0x189/0x420
[   18.287225]  kasan_atomics+0x95/0x310
[   18.287618]  kunit_try_run_case+0x1a5/0x480
[   18.288032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.288858]  kthread+0x337/0x6f0
[   18.289104]  ret_from_fork+0x116/0x1d0
[   18.289296]  ret_from_fork_asm+0x1a/0x30
[   18.289797] 
[   18.290006] The buggy address belongs to the object at ffff8881033ecb00
[   18.290006]  which belongs to the cache kmalloc-64 of size 64
[   18.291179] The buggy address is located 0 bytes to the right of
[   18.291179]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.291784] 
[   18.292165] The buggy address belongs to the physical page:
[   18.292533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.293066] flags: 0x200000000000000(node=0|zone=2)
[   18.293477] page_type: f5(slab)
[   18.293833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.294239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.294724] page dumped because: kasan: bad access detected
[   18.295133] 
[   18.295267] Memory state around the buggy address:
[   18.295528]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.296106]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.296470] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.297017]                                      ^
[   18.297428]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.297742]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.298300] ==================================================================
[   18.563835] ==================================================================
[   18.564830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   18.565440] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.565761] 
[   18.565972] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.566078] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.566110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.566163] Call Trace:
[   18.566206]  <TASK>
[   18.566537]  dump_stack_lvl+0x73/0xb0
[   18.566627]  print_report+0xd1/0x650
[   18.566687]  ? __virt_addr_valid+0x1db/0x2d0
[   18.566747]  ? kasan_atomics_helper+0x4a1c/0x5450
[   18.566788]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.566817]  ? kasan_atomics_helper+0x4a1c/0x5450
[   18.566845]  kasan_report+0x141/0x180
[   18.566871]  ? kasan_atomics_helper+0x4a1c/0x5450
[   18.566902]  __asan_report_load4_noabort+0x18/0x20
[   18.566926]  kasan_atomics_helper+0x4a1c/0x5450
[   18.566953]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.566980]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.567006]  ? kasan_atomics+0x152/0x310
[   18.567037]  kasan_atomics+0x1dc/0x310
[   18.567065]  ? __pfx_kasan_atomics+0x10/0x10
[   18.567093]  ? __pfx_read_tsc+0x10/0x10
[   18.567119]  ? ktime_get_ts64+0x86/0x230
[   18.567147]  kunit_try_run_case+0x1a5/0x480
[   18.567174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.567219]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.567259]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.567291]  ? __kthread_parkme+0x82/0x180
[   18.567316]  ? preempt_count_sub+0x50/0x80
[   18.567385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.567416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.567447]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.567498]  kthread+0x337/0x6f0
[   18.567523]  ? trace_preempt_on+0x20/0xc0
[   18.567552]  ? __pfx_kthread+0x10/0x10
[   18.567577]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.567604]  ? calculate_sigpending+0x7b/0xa0
[   18.567633]  ? __pfx_kthread+0x10/0x10
[   18.567659]  ret_from_fork+0x116/0x1d0
[   18.567682]  ? __pfx_kthread+0x10/0x10
[   18.567706]  ret_from_fork_asm+0x1a/0x30
[   18.567744]  </TASK>
[   18.567759] 
[   18.581790] Allocated by task 282:
[   18.582574]  kasan_save_stack+0x45/0x70
[   18.582903]  kasan_save_track+0x18/0x40
[   18.583190]  kasan_save_alloc_info+0x3b/0x50
[   18.583799]  __kasan_kmalloc+0xb7/0xc0
[   18.584067]  __kmalloc_cache_noprof+0x189/0x420
[   18.584703]  kasan_atomics+0x95/0x310
[   18.584958]  kunit_try_run_case+0x1a5/0x480
[   18.585152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.585736]  kthread+0x337/0x6f0
[   18.585959]  ret_from_fork+0x116/0x1d0
[   18.586174]  ret_from_fork_asm+0x1a/0x30
[   18.587107] 
[   18.587239] The buggy address belongs to the object at ffff8881033ecb00
[   18.587239]  which belongs to the cache kmalloc-64 of size 64
[   18.588450] The buggy address is located 0 bytes to the right of
[   18.588450]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.589551] 
[   18.589809] The buggy address belongs to the physical page:
[   18.590033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.590672] flags: 0x200000000000000(node=0|zone=2)
[   18.591286] page_type: f5(slab)
[   18.591842] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.592299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.592898] page dumped because: kasan: bad access detected
[   18.593225] 
[   18.593817] Memory state around the buggy address:
[   18.594128]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.594695]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.595173] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.595970]                                      ^
[   18.596478]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.596875]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.597525] ==================================================================
[   17.913775] ==================================================================
[   17.914856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   17.916402] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.917849] 
[   17.918036] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.918145] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.918177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.918224] Call Trace:
[   17.918268]  <TASK>
[   17.918310]  dump_stack_lvl+0x73/0xb0
[   17.918386]  print_report+0xd1/0x650
[   17.918435]  ? __virt_addr_valid+0x1db/0x2d0
[   17.918498]  ? kasan_atomics_helper+0x565/0x5450
[   17.918571]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.918618]  ? kasan_atomics_helper+0x565/0x5450
[   17.918667]  kasan_report+0x141/0x180
[   17.918716]  ? kasan_atomics_helper+0x565/0x5450
[   17.918773]  kasan_check_range+0x10c/0x1c0
[   17.918825]  __kasan_check_write+0x18/0x20
[   17.918868]  kasan_atomics_helper+0x565/0x5450
[   17.918917]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.918965]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.919005]  ? kasan_atomics+0x152/0x310
[   17.919053]  kasan_atomics+0x1dc/0x310
[   17.919095]  ? __pfx_kasan_atomics+0x10/0x10
[   17.919139]  ? __pfx_read_tsc+0x10/0x10
[   17.919194]  ? ktime_get_ts64+0x86/0x230
[   17.919241]  kunit_try_run_case+0x1a5/0x480
[   17.919284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.919324]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.919385]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.919430]  ? __kthread_parkme+0x82/0x180
[   17.921094]  ? preempt_count_sub+0x50/0x80
[   17.921177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.921265]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.921323]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.921371]  kthread+0x337/0x6f0
[   17.921412]  ? trace_preempt_on+0x20/0xc0
[   17.921478]  ? __pfx_kthread+0x10/0x10
[   17.921521]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.921568]  ? calculate_sigpending+0x7b/0xa0
[   17.921618]  ? __pfx_kthread+0x10/0x10
[   17.921662]  ret_from_fork+0x116/0x1d0
[   17.921949]  ? __pfx_kthread+0x10/0x10
[   17.922005]  ret_from_fork_asm+0x1a/0x30
[   17.922072]  </TASK>
[   17.922098] 
[   17.941360] Allocated by task 282:
[   17.942813]  kasan_save_stack+0x45/0x70
[   17.943053]  kasan_save_track+0x18/0x40
[   17.943196]  kasan_save_alloc_info+0x3b/0x50
[   17.943865]  __kasan_kmalloc+0xb7/0xc0
[   17.944544]  __kmalloc_cache_noprof+0x189/0x420
[   17.944758]  kasan_atomics+0x95/0x310
[   17.945452]  kunit_try_run_case+0x1a5/0x480
[   17.945969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.946423]  kthread+0x337/0x6f0
[   17.946616]  ret_from_fork+0x116/0x1d0
[   17.946919]  ret_from_fork_asm+0x1a/0x30
[   17.947273] 
[   17.947412] The buggy address belongs to the object at ffff8881033ecb00
[   17.947412]  which belongs to the cache kmalloc-64 of size 64
[   17.948533] The buggy address is located 0 bytes to the right of
[   17.948533]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.949023] 
[   17.949240] The buggy address belongs to the physical page:
[   17.949850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.950523] flags: 0x200000000000000(node=0|zone=2)
[   17.950971] page_type: f5(slab)
[   17.952285] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.952683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.953306] page dumped because: kasan: bad access detected
[   17.953926] 
[   17.954101] Memory state around the buggy address:
[   17.954518]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.955734]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.956258] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.956909]                                      ^
[   17.957545]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.958169]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.958730] ==================================================================
[   17.996533] ==================================================================
[   17.997207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   17.997844] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.998617] 
[   17.998865] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.998965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.998990] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.999031] Call Trace:
[   17.999071]  <TASK>
[   17.999112]  dump_stack_lvl+0x73/0xb0
[   17.999175]  print_report+0xd1/0x650
[   17.999253]  ? __virt_addr_valid+0x1db/0x2d0
[   17.999295]  ? kasan_atomics_helper+0x697/0x5450
[   17.999332]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.999385]  ? kasan_atomics_helper+0x697/0x5450
[   17.999428]  kasan_report+0x141/0x180
[   17.999491]  ? kasan_atomics_helper+0x697/0x5450
[   17.999545]  kasan_check_range+0x10c/0x1c0
[   17.999596]  __kasan_check_write+0x18/0x20
[   17.999643]  kasan_atomics_helper+0x697/0x5450
[   17.999724]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.999784]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.999834]  ? kasan_atomics+0x152/0x310
[   17.999899]  kasan_atomics+0x1dc/0x310
[   17.999963]  ? __pfx_kasan_atomics+0x10/0x10
[   18.000019]  ? __pfx_read_tsc+0x10/0x10
[   18.000073]  ? ktime_get_ts64+0x86/0x230
[   18.000137]  kunit_try_run_case+0x1a5/0x480
[   18.000222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.000275]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.000332]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.000379]  ? __kthread_parkme+0x82/0x180
[   18.000424]  ? preempt_count_sub+0x50/0x80
[   18.000490]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.000549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.000622]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.000677]  kthread+0x337/0x6f0
[   18.000725]  ? trace_preempt_on+0x20/0xc0
[   18.000774]  ? __pfx_kthread+0x10/0x10
[   18.000834]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.000903]  ? calculate_sigpending+0x7b/0xa0
[   18.000955]  ? __pfx_kthread+0x10/0x10
[   18.000994]  ret_from_fork+0x116/0x1d0
[   18.001030]  ? __pfx_kthread+0x10/0x10
[   18.001054]  ret_from_fork_asm+0x1a/0x30
[   18.001091]  </TASK>
[   18.001107] 
[   18.012114] Allocated by task 282:
[   18.012568]  kasan_save_stack+0x45/0x70
[   18.013115]  kasan_save_track+0x18/0x40
[   18.013555]  kasan_save_alloc_info+0x3b/0x50
[   18.013980]  __kasan_kmalloc+0xb7/0xc0
[   18.014332]  __kmalloc_cache_noprof+0x189/0x420
[   18.014789]  kasan_atomics+0x95/0x310
[   18.015270]  kunit_try_run_case+0x1a5/0x480
[   18.015837]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.016410]  kthread+0x337/0x6f0
[   18.016816]  ret_from_fork+0x116/0x1d0
[   18.017237]  ret_from_fork_asm+0x1a/0x30
[   18.017535] 
[   18.017735] The buggy address belongs to the object at ffff8881033ecb00
[   18.017735]  which belongs to the cache kmalloc-64 of size 64
[   18.018687] The buggy address is located 0 bytes to the right of
[   18.018687]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.019716] 
[   18.019874] The buggy address belongs to the physical page:
[   18.020308] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.020780] flags: 0x200000000000000(node=0|zone=2)
[   18.021265] page_type: f5(slab)
[   18.021510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.022013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.022506] page dumped because: kasan: bad access detected
[   18.022892] 
[   18.023084] Memory state around the buggy address:
[   18.023573]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.024131]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.024741] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.025080]                                      ^
[   18.025531]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.025990]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.026544] ==================================================================
[   18.171675] ==================================================================
[   18.172504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   18.173092] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.173470] 
[   18.173637] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.173744] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.173776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.173829] Call Trace:
[   18.173877]  <TASK>
[   18.173921]  dump_stack_lvl+0x73/0xb0
[   18.173959]  print_report+0xd1/0x650
[   18.173987]  ? __virt_addr_valid+0x1db/0x2d0
[   18.174015]  ? kasan_atomics_helper+0xa2b/0x5450
[   18.174045]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.174089]  ? kasan_atomics_helper+0xa2b/0x5450
[   18.174131]  kasan_report+0x141/0x180
[   18.174175]  ? kasan_atomics_helper+0xa2b/0x5450
[   18.174232]  kasan_check_range+0x10c/0x1c0
[   18.174288]  __kasan_check_write+0x18/0x20
[   18.174335]  kasan_atomics_helper+0xa2b/0x5450
[   18.174390]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.174443]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.174565]  ? kasan_atomics+0x152/0x310
[   18.174621]  kasan_atomics+0x1dc/0x310
[   18.174669]  ? __pfx_kasan_atomics+0x10/0x10
[   18.174723]  ? __pfx_read_tsc+0x10/0x10
[   18.174775]  ? ktime_get_ts64+0x86/0x230
[   18.174837]  kunit_try_run_case+0x1a5/0x480
[   18.174890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.174938]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.175000]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.175060]  ? __kthread_parkme+0x82/0x180
[   18.175114]  ? preempt_count_sub+0x50/0x80
[   18.175175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.175274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.175365]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.175427]  kthread+0x337/0x6f0
[   18.175480]  ? trace_preempt_on+0x20/0xc0
[   18.175537]  ? __pfx_kthread+0x10/0x10
[   18.175590]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.175648]  ? calculate_sigpending+0x7b/0xa0
[   18.175711]  ? __pfx_kthread+0x10/0x10
[   18.175766]  ret_from_fork+0x116/0x1d0
[   18.175815]  ? __pfx_kthread+0x10/0x10
[   18.175867]  ret_from_fork_asm+0x1a/0x30
[   18.175947]  </TASK>
[   18.175978] 
[   18.189363] Allocated by task 282:
[   18.189751]  kasan_save_stack+0x45/0x70
[   18.190142]  kasan_save_track+0x18/0x40
[   18.190515]  kasan_save_alloc_info+0x3b/0x50
[   18.190859]  __kasan_kmalloc+0xb7/0xc0
[   18.191215]  __kmalloc_cache_noprof+0x189/0x420
[   18.191544]  kasan_atomics+0x95/0x310
[   18.191732]  kunit_try_run_case+0x1a5/0x480
[   18.191912]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.192116]  kthread+0x337/0x6f0
[   18.192396]  ret_from_fork+0x116/0x1d0
[   18.192632]  ret_from_fork_asm+0x1a/0x30
[   18.192937] 
[   18.193104] The buggy address belongs to the object at ffff8881033ecb00
[   18.193104]  which belongs to the cache kmalloc-64 of size 64
[   18.193886] The buggy address is located 0 bytes to the right of
[   18.193886]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.194350] 
[   18.194480] The buggy address belongs to the physical page:
[   18.194709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.195044] flags: 0x200000000000000(node=0|zone=2)
[   18.195528] page_type: f5(slab)
[   18.195727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.196032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.196367] page dumped because: kasan: bad access detected
[   18.196777] 
[   18.196994] Memory state around the buggy address:
[   18.197506]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.198059]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.198742] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.199041]                                      ^
[   18.199308]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.199645]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.200034] ==================================================================
[   18.729234] ==================================================================
[   18.731298] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   18.732347] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.733014] 
[   18.733247] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.733563] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.733612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.733666] Call Trace:
[   18.733725]  <TASK>
[   18.733763]  dump_stack_lvl+0x73/0xb0
[   18.733816]  print_report+0xd1/0x650
[   18.733845]  ? __virt_addr_valid+0x1db/0x2d0
[   18.733874]  ? kasan_atomics_helper+0x12e6/0x5450
[   18.733900]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.733926]  ? kasan_atomics_helper+0x12e6/0x5450
[   18.733952]  kasan_report+0x141/0x180
[   18.733977]  ? kasan_atomics_helper+0x12e6/0x5450
[   18.734007]  kasan_check_range+0x10c/0x1c0
[   18.734035]  __kasan_check_write+0x18/0x20
[   18.734057]  kasan_atomics_helper+0x12e6/0x5450
[   18.734084]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.734110]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.734135]  ? kasan_atomics+0x152/0x310
[   18.734166]  kasan_atomics+0x1dc/0x310
[   18.734194]  ? __pfx_kasan_atomics+0x10/0x10
[   18.734252]  ? __pfx_read_tsc+0x10/0x10
[   18.734280]  ? ktime_get_ts64+0x86/0x230
[   18.734309]  kunit_try_run_case+0x1a5/0x480
[   18.734337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.734360]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.734389]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.734416]  ? __kthread_parkme+0x82/0x180
[   18.734440]  ? preempt_count_sub+0x50/0x80
[   18.734491]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.734520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.734549]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.734578]  kthread+0x337/0x6f0
[   18.734601]  ? trace_preempt_on+0x20/0xc0
[   18.734629]  ? __pfx_kthread+0x10/0x10
[   18.734654]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.734680]  ? calculate_sigpending+0x7b/0xa0
[   18.734708]  ? __pfx_kthread+0x10/0x10
[   18.734732]  ret_from_fork+0x116/0x1d0
[   18.734754]  ? __pfx_kthread+0x10/0x10
[   18.734779]  ret_from_fork_asm+0x1a/0x30
[   18.734815]  </TASK>
[   18.734829] 
[   18.747718] Allocated by task 282:
[   18.747953]  kasan_save_stack+0x45/0x70
[   18.748161]  kasan_save_track+0x18/0x40
[   18.748964]  kasan_save_alloc_info+0x3b/0x50
[   18.749675]  __kasan_kmalloc+0xb7/0xc0
[   18.750186]  __kmalloc_cache_noprof+0x189/0x420
[   18.750789]  kasan_atomics+0x95/0x310
[   18.751116]  kunit_try_run_case+0x1a5/0x480
[   18.751426]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.751906]  kthread+0x337/0x6f0
[   18.752118]  ret_from_fork+0x116/0x1d0
[   18.752637]  ret_from_fork_asm+0x1a/0x30
[   18.752882] 
[   18.753004] The buggy address belongs to the object at ffff8881033ecb00
[   18.753004]  which belongs to the cache kmalloc-64 of size 64
[   18.754099] The buggy address is located 0 bytes to the right of
[   18.754099]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.754594] 
[   18.755220] The buggy address belongs to the physical page:
[   18.755674] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.756221] flags: 0x200000000000000(node=0|zone=2)
[   18.756563] page_type: f5(slab)
[   18.756850] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.757336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.757844] page dumped because: kasan: bad access detected
[   18.758105] 
[   18.758231] Memory state around the buggy address:
[   18.758644]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.759387]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.759899] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.760978]                                      ^
[   18.761652]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.762015]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.762625] ==================================================================
[   18.925261] ==================================================================
[   18.925940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   18.926637] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.927097] 
[   18.927471] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.927594] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.927626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.927675] Call Trace:
[   18.927723]  <TASK>
[   18.927771]  dump_stack_lvl+0x73/0xb0
[   18.927831]  print_report+0xd1/0x650
[   18.927861]  ? __virt_addr_valid+0x1db/0x2d0
[   18.927889]  ? kasan_atomics_helper+0x151d/0x5450
[   18.927915]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.927944]  ? kasan_atomics_helper+0x151d/0x5450
[   18.927984]  kasan_report+0x141/0x180
[   18.928031]  ? kasan_atomics_helper+0x151d/0x5450
[   18.928091]  kasan_check_range+0x10c/0x1c0
[   18.928146]  __kasan_check_write+0x18/0x20
[   18.928205]  kasan_atomics_helper+0x151d/0x5450
[   18.928250]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.928277]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.928303]  ? kasan_atomics+0x152/0x310
[   18.928334]  kasan_atomics+0x1dc/0x310
[   18.928361]  ? __pfx_kasan_atomics+0x10/0x10
[   18.928389]  ? __pfx_read_tsc+0x10/0x10
[   18.928416]  ? ktime_get_ts64+0x86/0x230
[   18.928444]  kunit_try_run_case+0x1a5/0x480
[   18.928500]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.928535]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.928565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.928593]  ? __kthread_parkme+0x82/0x180
[   18.928619]  ? preempt_count_sub+0x50/0x80
[   18.928647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.928672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.928700]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.928731]  kthread+0x337/0x6f0
[   18.928753]  ? trace_preempt_on+0x20/0xc0
[   18.928779]  ? __pfx_kthread+0x10/0x10
[   18.928803]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.928829]  ? calculate_sigpending+0x7b/0xa0
[   18.928858]  ? __pfx_kthread+0x10/0x10
[   18.928883]  ret_from_fork+0x116/0x1d0
[   18.928906]  ? __pfx_kthread+0x10/0x10
[   18.928929]  ret_from_fork_asm+0x1a/0x30
[   18.928966]  </TASK>
[   18.928981] 
[   18.940302] Allocated by task 282:
[   18.940635]  kasan_save_stack+0x45/0x70
[   18.941038]  kasan_save_track+0x18/0x40
[   18.941427]  kasan_save_alloc_info+0x3b/0x50
[   18.941774]  __kasan_kmalloc+0xb7/0xc0
[   18.942051]  __kmalloc_cache_noprof+0x189/0x420
[   18.942256]  kasan_atomics+0x95/0x310
[   18.942433]  kunit_try_run_case+0x1a5/0x480
[   18.942638]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.943018]  kthread+0x337/0x6f0
[   18.943387]  ret_from_fork+0x116/0x1d0
[   18.943745]  ret_from_fork_asm+0x1a/0x30
[   18.944081] 
[   18.944246] The buggy address belongs to the object at ffff8881033ecb00
[   18.944246]  which belongs to the cache kmalloc-64 of size 64
[   18.945486] The buggy address is located 0 bytes to the right of
[   18.945486]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.945948] 
[   18.946120] The buggy address belongs to the physical page:
[   18.946676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.947336] flags: 0x200000000000000(node=0|zone=2)
[   18.947631] page_type: f5(slab)
[   18.947837] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.948147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.948736] page dumped because: kasan: bad access detected
[   18.949190] 
[   18.949415] Memory state around the buggy address:
[   18.949815]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.950339]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.950628] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.950906]                                      ^
[   18.951126]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.951674]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.952227] ==================================================================
[   19.143484] ==================================================================
[   19.145286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   19.146099] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.146852] 
[   19.147082] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.147201] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.147247] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.147299] Call Trace:
[   19.147380]  <TASK>
[   19.147424]  dump_stack_lvl+0x73/0xb0
[   19.147511]  print_report+0xd1/0x650
[   19.147566]  ? __virt_addr_valid+0x1db/0x2d0
[   19.147624]  ? kasan_atomics_helper+0x194a/0x5450
[   19.147682]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.147740]  ? kasan_atomics_helper+0x194a/0x5450
[   19.147794]  kasan_report+0x141/0x180
[   19.147849]  ? kasan_atomics_helper+0x194a/0x5450
[   19.147917]  kasan_check_range+0x10c/0x1c0
[   19.147977]  __kasan_check_write+0x18/0x20
[   19.148030]  kasan_atomics_helper+0x194a/0x5450
[   19.148087]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.148145]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.148199]  ? kasan_atomics+0x152/0x310
[   19.148263]  kasan_atomics+0x1dc/0x310
[   19.148321]  ? __pfx_kasan_atomics+0x10/0x10
[   19.148380]  ? __pfx_read_tsc+0x10/0x10
[   19.148435]  ? ktime_get_ts64+0x86/0x230
[   19.148502]  kunit_try_run_case+0x1a5/0x480
[   19.148572]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.148615]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.148672]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.148744]  ? __kthread_parkme+0x82/0x180
[   19.148808]  ? preempt_count_sub+0x50/0x80
[   19.148866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.148944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.148998]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.149052]  kthread+0x337/0x6f0
[   19.149097]  ? trace_preempt_on+0x20/0xc0
[   19.149167]  ? __pfx_kthread+0x10/0x10
[   19.149230]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.149296]  ? calculate_sigpending+0x7b/0xa0
[   19.149345]  ? __pfx_kthread+0x10/0x10
[   19.149389]  ret_from_fork+0x116/0x1d0
[   19.149434]  ? __pfx_kthread+0x10/0x10
[   19.149495]  ret_from_fork_asm+0x1a/0x30
[   19.149570]  </TASK>
[   19.149600] 
[   19.163225] Allocated by task 282:
[   19.163604]  kasan_save_stack+0x45/0x70
[   19.163885]  kasan_save_track+0x18/0x40
[   19.164086]  kasan_save_alloc_info+0x3b/0x50
[   19.164710]  __kasan_kmalloc+0xb7/0xc0
[   19.165276]  __kmalloc_cache_noprof+0x189/0x420
[   19.165488]  kasan_atomics+0x95/0x310
[   19.165717]  kunit_try_run_case+0x1a5/0x480
[   19.165908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.166106]  kthread+0x337/0x6f0
[   19.166245]  ret_from_fork+0x116/0x1d0
[   19.166421]  ret_from_fork_asm+0x1a/0x30
[   19.166633] 
[   19.166740] The buggy address belongs to the object at ffff8881033ecb00
[   19.166740]  which belongs to the cache kmalloc-64 of size 64
[   19.167136] The buggy address is located 0 bytes to the right of
[   19.167136]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.168056] 
[   19.168193] The buggy address belongs to the physical page:
[   19.168421] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.168703] flags: 0x200000000000000(node=0|zone=2)
[   19.169103] page_type: f5(slab)
[   19.169342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.169676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.170240] page dumped because: kasan: bad access detected
[   19.170697] 
[   19.170850] Memory state around the buggy address:
[   19.171189]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.171819]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.172112] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.172963]                                      ^
[   19.173410]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.173743]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.174134] ==================================================================
[   19.352951] ==================================================================
[   19.354129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   19.354771] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.355044] 
[   19.355169] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.355258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.355277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.355307] Call Trace:
[   19.355334]  <TASK>
[   19.355372]  dump_stack_lvl+0x73/0xb0
[   19.355410]  print_report+0xd1/0x650
[   19.355438]  ? __virt_addr_valid+0x1db/0x2d0
[   19.355522]  ? kasan_atomics_helper+0x1d7a/0x5450
[   19.355571]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.355615]  ? kasan_atomics_helper+0x1d7a/0x5450
[   19.355663]  kasan_report+0x141/0x180
[   19.355715]  ? kasan_atomics_helper+0x1d7a/0x5450
[   19.356071]  kasan_check_range+0x10c/0x1c0
[   19.356565]  __kasan_check_write+0x18/0x20
[   19.356633]  kasan_atomics_helper+0x1d7a/0x5450
[   19.356691]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.356748]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.356802]  ? kasan_atomics+0x152/0x310
[   19.356867]  kasan_atomics+0x1dc/0x310
[   19.356923]  ? __pfx_kasan_atomics+0x10/0x10
[   19.356986]  ? __pfx_read_tsc+0x10/0x10
[   19.357040]  ? ktime_get_ts64+0x86/0x230
[   19.357104]  kunit_try_run_case+0x1a5/0x480
[   19.357158]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.357200]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.357251]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.357294]  ? __kthread_parkme+0x82/0x180
[   19.357333]  ? preempt_count_sub+0x50/0x80
[   19.357385]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.357431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.357509]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.357562]  kthread+0x337/0x6f0
[   19.357611]  ? trace_preempt_on+0x20/0xc0
[   19.357664]  ? __pfx_kthread+0x10/0x10
[   19.357713]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.357761]  ? calculate_sigpending+0x7b/0xa0
[   19.357821]  ? __pfx_kthread+0x10/0x10
[   19.357874]  ret_from_fork+0x116/0x1d0
[   19.357919]  ? __pfx_kthread+0x10/0x10
[   19.357964]  ret_from_fork_asm+0x1a/0x30
[   19.358026]  </TASK>
[   19.358053] 
[   19.368002] Allocated by task 282:
[   19.368393]  kasan_save_stack+0x45/0x70
[   19.368818]  kasan_save_track+0x18/0x40
[   19.369138]  kasan_save_alloc_info+0x3b/0x50
[   19.369433]  __kasan_kmalloc+0xb7/0xc0
[   19.369707]  __kmalloc_cache_noprof+0x189/0x420
[   19.369920]  kasan_atomics+0x95/0x310
[   19.370119]  kunit_try_run_case+0x1a5/0x480
[   19.370369]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.370809]  kthread+0x337/0x6f0
[   19.371136]  ret_from_fork+0x116/0x1d0
[   19.371526]  ret_from_fork_asm+0x1a/0x30
[   19.371880] 
[   19.372066] The buggy address belongs to the object at ffff8881033ecb00
[   19.372066]  which belongs to the cache kmalloc-64 of size 64
[   19.372879] The buggy address is located 0 bytes to the right of
[   19.372879]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.373365] 
[   19.373506] The buggy address belongs to the physical page:
[   19.373940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.374569] flags: 0x200000000000000(node=0|zone=2)
[   19.374969] page_type: f5(slab)
[   19.375292] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.375860] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.376281] page dumped because: kasan: bad access detected
[   19.376635] 
[   19.376760] Memory state around the buggy address:
[   19.376981]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.377307]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.377610] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.378063]                                      ^
[   19.378484]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.379026]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.379543] ==================================================================
[   18.299679] ==================================================================
[   18.300373] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   18.300846] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.301525] 
[   18.301736] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.301847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.301904] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.301955] Call Trace:
[   18.302006]  <TASK>
[   18.302052]  dump_stack_lvl+0x73/0xb0
[   18.302126]  print_report+0xd1/0x650
[   18.302180]  ? __virt_addr_valid+0x1db/0x2d0
[   18.302257]  ? kasan_atomics_helper+0x4a84/0x5450
[   18.302307]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.302359]  ? kasan_atomics_helper+0x4a84/0x5450
[   18.302435]  kasan_report+0x141/0x180
[   18.302502]  ? kasan_atomics_helper+0x4a84/0x5450
[   18.302586]  __asan_report_load4_noabort+0x18/0x20
[   18.302637]  kasan_atomics_helper+0x4a84/0x5450
[   18.302693]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.302745]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.302817]  ? kasan_atomics+0x152/0x310
[   18.302881]  kasan_atomics+0x1dc/0x310
[   18.302936]  ? __pfx_kasan_atomics+0x10/0x10
[   18.302993]  ? __pfx_read_tsc+0x10/0x10
[   18.303041]  ? ktime_get_ts64+0x86/0x230
[   18.303125]  kunit_try_run_case+0x1a5/0x480
[   18.303179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.303223]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.303274]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.303334]  ? __kthread_parkme+0x82/0x180
[   18.303396]  ? preempt_count_sub+0x50/0x80
[   18.303462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.303512]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.303603]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.303659]  kthread+0x337/0x6f0
[   18.303708]  ? trace_preempt_on+0x20/0xc0
[   18.303766]  ? __pfx_kthread+0x10/0x10
[   18.303818]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.303869]  ? calculate_sigpending+0x7b/0xa0
[   18.303901]  ? __pfx_kthread+0x10/0x10
[   18.303927]  ret_from_fork+0x116/0x1d0
[   18.303950]  ? __pfx_kthread+0x10/0x10
[   18.303975]  ret_from_fork_asm+0x1a/0x30
[   18.304013]  </TASK>
[   18.304027] 
[   18.315525] Allocated by task 282:
[   18.315787]  kasan_save_stack+0x45/0x70
[   18.316036]  kasan_save_track+0x18/0x40
[   18.316917]  kasan_save_alloc_info+0x3b/0x50
[   18.317712]  __kasan_kmalloc+0xb7/0xc0
[   18.318178]  __kmalloc_cache_noprof+0x189/0x420
[   18.318774]  kasan_atomics+0x95/0x310
[   18.319003]  kunit_try_run_case+0x1a5/0x480
[   18.319623]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.319933]  kthread+0x337/0x6f0
[   18.320152]  ret_from_fork+0x116/0x1d0
[   18.320798]  ret_from_fork_asm+0x1a/0x30
[   18.321449] 
[   18.321718] The buggy address belongs to the object at ffff8881033ecb00
[   18.321718]  which belongs to the cache kmalloc-64 of size 64
[   18.322262] The buggy address is located 0 bytes to the right of
[   18.322262]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.322960] 
[   18.323150] The buggy address belongs to the physical page:
[   18.323663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.324248] flags: 0x200000000000000(node=0|zone=2)
[   18.324649] page_type: f5(slab)
[   18.324852] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.325558] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.325998] page dumped because: kasan: bad access detected
[   18.326531] 
[   18.326721] Memory state around the buggy address:
[   18.327064]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.327374]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.327955] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.328641]                                      ^
[   18.328910]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.329291]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.329675] ==================================================================
[   18.598846] ==================================================================
[   18.600335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   18.600806] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.601197] 
[   18.601440] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.601570] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.601604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.601682] Call Trace:
[   18.601730]  <TASK>
[   18.601776]  dump_stack_lvl+0x73/0xb0
[   18.601865]  print_report+0xd1/0x650
[   18.601919]  ? __virt_addr_valid+0x1db/0x2d0
[   18.601974]  ? kasan_atomics_helper+0x1148/0x5450
[   18.602022]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.602078]  ? kasan_atomics_helper+0x1148/0x5450
[   18.602125]  kasan_report+0x141/0x180
[   18.602176]  ? kasan_atomics_helper+0x1148/0x5450
[   18.602493]  kasan_check_range+0x10c/0x1c0
[   18.602580]  __kasan_check_write+0x18/0x20
[   18.602632]  kasan_atomics_helper+0x1148/0x5450
[   18.602663]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.602691]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.602716]  ? kasan_atomics+0x152/0x310
[   18.602749]  kasan_atomics+0x1dc/0x310
[   18.602776]  ? __pfx_kasan_atomics+0x10/0x10
[   18.602804]  ? __pfx_read_tsc+0x10/0x10
[   18.602830]  ? ktime_get_ts64+0x86/0x230
[   18.602859]  kunit_try_run_case+0x1a5/0x480
[   18.602885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.602907]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.602936]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.602965]  ? __kthread_parkme+0x82/0x180
[   18.602990]  ? preempt_count_sub+0x50/0x80
[   18.603018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.603043]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.603071]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.603100]  kthread+0x337/0x6f0
[   18.603123]  ? trace_preempt_on+0x20/0xc0
[   18.603150]  ? __pfx_kthread+0x10/0x10
[   18.603175]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.603209]  ? calculate_sigpending+0x7b/0xa0
[   18.603269]  ? __pfx_kthread+0x10/0x10
[   18.603296]  ret_from_fork+0x116/0x1d0
[   18.603319]  ? __pfx_kthread+0x10/0x10
[   18.603354]  ret_from_fork_asm+0x1a/0x30
[   18.603398]  </TASK>
[   18.603414] 
[   18.615401] Allocated by task 282:
[   18.615880]  kasan_save_stack+0x45/0x70
[   18.616577]  kasan_save_track+0x18/0x40
[   18.616808]  kasan_save_alloc_info+0x3b/0x50
[   18.617159]  __kasan_kmalloc+0xb7/0xc0
[   18.617783]  __kmalloc_cache_noprof+0x189/0x420
[   18.618058]  kasan_atomics+0x95/0x310
[   18.618687]  kunit_try_run_case+0x1a5/0x480
[   18.618968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.619199]  kthread+0x337/0x6f0
[   18.619847]  ret_from_fork+0x116/0x1d0
[   18.620069]  ret_from_fork_asm+0x1a/0x30
[   18.620529] 
[   18.620663] The buggy address belongs to the object at ffff8881033ecb00
[   18.620663]  which belongs to the cache kmalloc-64 of size 64
[   18.621125] The buggy address is located 0 bytes to the right of
[   18.621125]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.621964] 
[   18.622103] The buggy address belongs to the physical page:
[   18.622442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.622997] flags: 0x200000000000000(node=0|zone=2)
[   18.623489] page_type: f5(slab)
[   18.623712] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.624101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.624703] page dumped because: kasan: bad access detected
[   18.625141] 
[   18.625338] Memory state around the buggy address:
[   18.625576]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.626078]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.626506] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.627043]                                      ^
[   18.627358]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.627658]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.628217] ==================================================================
[   17.792436] ==================================================================
[   17.793420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   17.794344] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.795828] 
[   17.796024] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.796140] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.796172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.796391] Call Trace:
[   17.796445]  <TASK>
[   17.796499]  dump_stack_lvl+0x73/0xb0
[   17.796574]  print_report+0xd1/0x650
[   17.796619]  ? __virt_addr_valid+0x1db/0x2d0
[   17.796669]  ? kasan_atomics_helper+0x4b54/0x5450
[   17.797130]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.797279]  ? kasan_atomics_helper+0x4b54/0x5450
[   17.797344]  kasan_report+0x141/0x180
[   17.797404]  ? kasan_atomics_helper+0x4b54/0x5450
[   17.797480]  __asan_report_load4_noabort+0x18/0x20
[   17.797538]  kasan_atomics_helper+0x4b54/0x5450
[   17.797597]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.797656]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.797866]  ? kasan_atomics+0x152/0x310
[   17.797936]  kasan_atomics+0x1dc/0x310
[   17.797996]  ? __pfx_kasan_atomics+0x10/0x10
[   17.798055]  ? __pfx_read_tsc+0x10/0x10
[   17.798108]  ? ktime_get_ts64+0x86/0x230
[   17.798172]  kunit_try_run_case+0x1a5/0x480
[   17.798255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.798309]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.798365]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.798425]  ? __kthread_parkme+0x82/0x180
[   17.798489]  ? preempt_count_sub+0x50/0x80
[   17.798550]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.798604]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.798666]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.799433]  kthread+0x337/0x6f0
[   17.799545]  ? trace_preempt_on+0x20/0xc0
[   17.799617]  ? __pfx_kthread+0x10/0x10
[   17.799668]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.799892]  ? calculate_sigpending+0x7b/0xa0
[   17.799957]  ? __pfx_kthread+0x10/0x10
[   17.800015]  ret_from_fork+0x116/0x1d0
[   17.800065]  ? __pfx_kthread+0x10/0x10
[   17.800105]  ret_from_fork_asm+0x1a/0x30
[   17.800145]  </TASK>
[   17.800161] 
[   17.815264] Allocated by task 282:
[   17.815722]  kasan_save_stack+0x45/0x70
[   17.816386]  kasan_save_track+0x18/0x40
[   17.816828]  kasan_save_alloc_info+0x3b/0x50
[   17.817112]  __kasan_kmalloc+0xb7/0xc0
[   17.817559]  __kmalloc_cache_noprof+0x189/0x420
[   17.818046]  kasan_atomics+0x95/0x310
[   17.818608]  kunit_try_run_case+0x1a5/0x480
[   17.819018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.819717]  kthread+0x337/0x6f0
[   17.820397]  ret_from_fork+0x116/0x1d0
[   17.821049]  ret_from_fork_asm+0x1a/0x30
[   17.821288] 
[   17.821451] The buggy address belongs to the object at ffff8881033ecb00
[   17.821451]  which belongs to the cache kmalloc-64 of size 64
[   17.822792] The buggy address is located 0 bytes to the right of
[   17.822792]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.823387] 
[   17.823657] The buggy address belongs to the physical page:
[   17.824096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.824733] flags: 0x200000000000000(node=0|zone=2)
[   17.825787] page_type: f5(slab)
[   17.826034] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.826918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.827513] page dumped because: kasan: bad access detected
[   17.828021] 
[   17.828253] Memory state around the buggy address:
[   17.828828]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.829812]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.830507] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.831020]                                      ^
[   17.831608]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.832080]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.832908] ==================================================================
[   17.640602] ==================================================================
[   17.641382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   17.642065] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.643110] 
[   17.643840] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.643967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.643999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.644045] Call Trace:
[   17.644086]  <TASK>
[   17.644113]  dump_stack_lvl+0x73/0xb0
[   17.644159]  print_report+0xd1/0x650
[   17.644187]  ? __virt_addr_valid+0x1db/0x2d0
[   17.644254]  ? kasan_atomics_helper+0x4ba2/0x5450
[   17.644293]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.644329]  ? kasan_atomics_helper+0x4ba2/0x5450
[   17.644363]  kasan_report+0x141/0x180
[   17.644402]  ? kasan_atomics_helper+0x4ba2/0x5450
[   17.644448]  __asan_report_store4_noabort+0x1b/0x30
[   17.644500]  kasan_atomics_helper+0x4ba2/0x5450
[   17.644537]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.644573]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.644613]  ? kasan_atomics+0x152/0x310
[   17.644661]  kasan_atomics+0x1dc/0x310
[   17.644698]  ? __pfx_kasan_atomics+0x10/0x10
[   17.644741]  ? __pfx_read_tsc+0x10/0x10
[   17.644780]  ? ktime_get_ts64+0x86/0x230
[   17.644827]  kunit_try_run_case+0x1a5/0x480
[   17.644861]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.644884]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.644914]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.644942]  ? __kthread_parkme+0x82/0x180
[   17.644967]  ? preempt_count_sub+0x50/0x80
[   17.644995]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.645019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.645047]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.645075]  kthread+0x337/0x6f0
[   17.645097]  ? trace_preempt_on+0x20/0xc0
[   17.645124]  ? __pfx_kthread+0x10/0x10
[   17.645148]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.645174]  ? calculate_sigpending+0x7b/0xa0
[   17.645210]  ? __pfx_kthread+0x10/0x10
[   17.645242]  ret_from_fork+0x116/0x1d0
[   17.645263]  ? __pfx_kthread+0x10/0x10
[   17.645286]  ret_from_fork_asm+0x1a/0x30
[   17.645320]  </TASK>
[   17.645335] 
[   17.665235] Allocated by task 282:
[   17.665666]  kasan_save_stack+0x45/0x70
[   17.666566]  kasan_save_track+0x18/0x40
[   17.666866]  kasan_save_alloc_info+0x3b/0x50
[   17.667274]  __kasan_kmalloc+0xb7/0xc0
[   17.667519]  __kmalloc_cache_noprof+0x189/0x420
[   17.668315]  kasan_atomics+0x95/0x310
[   17.668652]  kunit_try_run_case+0x1a5/0x480
[   17.669585]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.670241]  kthread+0x337/0x6f0
[   17.670887]  ret_from_fork+0x116/0x1d0
[   17.671177]  ret_from_fork_asm+0x1a/0x30
[   17.671431] 
[   17.671898] The buggy address belongs to the object at ffff8881033ecb00
[   17.671898]  which belongs to the cache kmalloc-64 of size 64
[   17.672610] The buggy address is located 0 bytes to the right of
[   17.672610]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.674307] 
[   17.674565] The buggy address belongs to the physical page:
[   17.674895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.675671] flags: 0x200000000000000(node=0|zone=2)
[   17.675940] page_type: f5(slab)
[   17.676149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.677273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.677729] page dumped because: kasan: bad access detected
[   17.678271] 
[   17.678655] Memory state around the buggy address:
[   17.679504]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.680523]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.681042] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.681672]                                      ^
[   17.682469]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.683321]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.684092] ==================================================================
[   19.269506] ==================================================================
[   19.269949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   19.270636] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.271198] 
[   19.271442] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.271643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.271673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.271728] Call Trace:
[   19.271777]  <TASK>
[   19.271825]  dump_stack_lvl+0x73/0xb0
[   19.271898]  print_report+0xd1/0x650
[   19.271959]  ? __virt_addr_valid+0x1db/0x2d0
[   19.272020]  ? kasan_atomics_helper+0x1c18/0x5450
[   19.272071]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.272108]  ? kasan_atomics_helper+0x1c18/0x5450
[   19.272133]  kasan_report+0x141/0x180
[   19.272160]  ? kasan_atomics_helper+0x1c18/0x5450
[   19.272206]  kasan_check_range+0x10c/0x1c0
[   19.272286]  __kasan_check_write+0x18/0x20
[   19.272336]  kasan_atomics_helper+0x1c18/0x5450
[   19.272392]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.272480]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.272534]  ? kasan_atomics+0x152/0x310
[   19.272609]  kasan_atomics+0x1dc/0x310
[   19.272657]  ? __pfx_kasan_atomics+0x10/0x10
[   19.272705]  ? __pfx_read_tsc+0x10/0x10
[   19.272751]  ? ktime_get_ts64+0x86/0x230
[   19.272812]  kunit_try_run_case+0x1a5/0x480
[   19.272866]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.272915]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.272956]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.272984]  ? __kthread_parkme+0x82/0x180
[   19.273011]  ? preempt_count_sub+0x50/0x80
[   19.273110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.273159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.273216]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.273256]  kthread+0x337/0x6f0
[   19.273319]  ? trace_preempt_on+0x20/0xc0
[   19.273349]  ? __pfx_kthread+0x10/0x10
[   19.273375]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.273402]  ? calculate_sigpending+0x7b/0xa0
[   19.273430]  ? __pfx_kthread+0x10/0x10
[   19.273473]  ret_from_fork+0x116/0x1d0
[   19.273501]  ? __pfx_kthread+0x10/0x10
[   19.273524]  ret_from_fork_asm+0x1a/0x30
[   19.273563]  </TASK>
[   19.273577] 
[   19.284331] Allocated by task 282:
[   19.284609]  kasan_save_stack+0x45/0x70
[   19.285009]  kasan_save_track+0x18/0x40
[   19.285400]  kasan_save_alloc_info+0x3b/0x50
[   19.285789]  __kasan_kmalloc+0xb7/0xc0
[   19.286135]  __kmalloc_cache_noprof+0x189/0x420
[   19.286533]  kasan_atomics+0x95/0x310
[   19.286735]  kunit_try_run_case+0x1a5/0x480
[   19.286961]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.287407]  kthread+0x337/0x6f0
[   19.287765]  ret_from_fork+0x116/0x1d0
[   19.288114]  ret_from_fork_asm+0x1a/0x30
[   19.288504] 
[   19.288636] The buggy address belongs to the object at ffff8881033ecb00
[   19.288636]  which belongs to the cache kmalloc-64 of size 64
[   19.289071] The buggy address is located 0 bytes to the right of
[   19.289071]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.290044] 
[   19.290278] The buggy address belongs to the physical page:
[   19.290741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.291322] flags: 0x200000000000000(node=0|zone=2)
[   19.291598] page_type: f5(slab)
[   19.291945] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.292582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.293005] page dumped because: kasan: bad access detected
[   19.293268] 
[   19.293393] Memory state around the buggy address:
[   19.293847]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.294448]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.294991] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.295513]                                      ^
[   19.295776]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.296073]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.296688] ==================================================================
[   18.863422] ==================================================================
[   18.864038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   18.864377] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.865069] 
[   18.865357] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.865492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.865526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.865574] Call Trace:
[   18.865620]  <TASK>
[   18.865664]  dump_stack_lvl+0x73/0xb0
[   18.865740]  print_report+0xd1/0x650
[   18.865797]  ? __virt_addr_valid+0x1db/0x2d0
[   18.865858]  ? kasan_atomics_helper+0x1467/0x5450
[   18.865907]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.865968]  ? kasan_atomics_helper+0x1467/0x5450
[   18.866037]  kasan_report+0x141/0x180
[   18.866092]  ? kasan_atomics_helper+0x1467/0x5450
[   18.866160]  kasan_check_range+0x10c/0x1c0
[   18.866249]  __kasan_check_write+0x18/0x20
[   18.866304]  kasan_atomics_helper+0x1467/0x5450
[   18.866361]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.866418]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.866485]  ? kasan_atomics+0x152/0x310
[   18.866553]  kasan_atomics+0x1dc/0x310
[   18.866598]  ? __pfx_kasan_atomics+0x10/0x10
[   18.866649]  ? __pfx_read_tsc+0x10/0x10
[   18.866699]  ? ktime_get_ts64+0x86/0x230
[   18.866757]  kunit_try_run_case+0x1a5/0x480
[   18.866808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.866850]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.866915]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.866992]  ? __kthread_parkme+0x82/0x180
[   18.867064]  ? preempt_count_sub+0x50/0x80
[   18.867130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.867173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.867260]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.867295]  kthread+0x337/0x6f0
[   18.867320]  ? trace_preempt_on+0x20/0xc0
[   18.867364]  ? __pfx_kthread+0x10/0x10
[   18.867392]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.867421]  ? calculate_sigpending+0x7b/0xa0
[   18.867451]  ? __pfx_kthread+0x10/0x10
[   18.867501]  ret_from_fork+0x116/0x1d0
[   18.867528]  ? __pfx_kthread+0x10/0x10
[   18.867554]  ret_from_fork_asm+0x1a/0x30
[   18.867592]  </TASK>
[   18.867608] 
[   18.877766] Allocated by task 282:
[   18.878146]  kasan_save_stack+0x45/0x70
[   18.878569]  kasan_save_track+0x18/0x40
[   18.878852]  kasan_save_alloc_info+0x3b/0x50
[   18.879125]  __kasan_kmalloc+0xb7/0xc0
[   18.879406]  __kmalloc_cache_noprof+0x189/0x420
[   18.881482]  kasan_atomics+0x95/0x310
[   18.881854]  kunit_try_run_case+0x1a5/0x480
[   18.882502]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.883090]  kthread+0x337/0x6f0
[   18.883683]  ret_from_fork+0x116/0x1d0
[   18.883929]  ret_from_fork_asm+0x1a/0x30
[   18.884166] 
[   18.884654] The buggy address belongs to the object at ffff8881033ecb00
[   18.884654]  which belongs to the cache kmalloc-64 of size 64
[   18.885622] The buggy address is located 0 bytes to the right of
[   18.885622]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.886521] 
[   18.886655] The buggy address belongs to the physical page:
[   18.887116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.887633] flags: 0x200000000000000(node=0|zone=2)
[   18.888069] page_type: f5(slab)
[   18.888503] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.888938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.889446] page dumped because: kasan: bad access detected
[   18.889836] 
[   18.890023] Memory state around the buggy address:
[   18.890353]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.890939]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.891238] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.891974]                                      ^
[   18.892198]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.892699]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.893164] ==================================================================
[   19.175545] ==================================================================
[   19.175926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   19.176526] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.176811] 
[   19.176939] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.177004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.177021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.177049] Call Trace:
[   19.177075]  <TASK>
[   19.177103]  dump_stack_lvl+0x73/0xb0
[   19.177139]  print_report+0xd1/0x650
[   19.177165]  ? __virt_addr_valid+0x1db/0x2d0
[   19.177194]  ? kasan_atomics_helper+0x19e3/0x5450
[   19.177218]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.177246]  ? kasan_atomics_helper+0x19e3/0x5450
[   19.177271]  kasan_report+0x141/0x180
[   19.177297]  ? kasan_atomics_helper+0x19e3/0x5450
[   19.177327]  kasan_check_range+0x10c/0x1c0
[   19.177354]  __kasan_check_write+0x18/0x20
[   19.177377]  kasan_atomics_helper+0x19e3/0x5450
[   19.177403]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.177429]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.177681]  ? kasan_atomics+0x152/0x310
[   19.177757]  kasan_atomics+0x1dc/0x310
[   19.177819]  ? __pfx_kasan_atomics+0x10/0x10
[   19.177879]  ? __pfx_read_tsc+0x10/0x10
[   19.177926]  ? ktime_get_ts64+0x86/0x230
[   19.177975]  kunit_try_run_case+0x1a5/0x480
[   19.178014]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.178053]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.178101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.178155]  ? __kthread_parkme+0x82/0x180
[   19.178213]  ? preempt_count_sub+0x50/0x80
[   19.178273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.178323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.178379]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.178447]  kthread+0x337/0x6f0
[   19.178500]  ? trace_preempt_on+0x20/0xc0
[   19.178547]  ? __pfx_kthread+0x10/0x10
[   19.178589]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.178637]  ? calculate_sigpending+0x7b/0xa0
[   19.178689]  ? __pfx_kthread+0x10/0x10
[   19.178731]  ret_from_fork+0x116/0x1d0
[   19.178767]  ? __pfx_kthread+0x10/0x10
[   19.178803]  ret_from_fork_asm+0x1a/0x30
[   19.178864]  </TASK>
[   19.178890] 
[   19.188486] Allocated by task 282:
[   19.188853]  kasan_save_stack+0x45/0x70
[   19.189228]  kasan_save_track+0x18/0x40
[   19.189579]  kasan_save_alloc_info+0x3b/0x50
[   19.189948]  __kasan_kmalloc+0xb7/0xc0
[   19.190309]  __kmalloc_cache_noprof+0x189/0x420
[   19.190588]  kasan_atomics+0x95/0x310
[   19.190900]  kunit_try_run_case+0x1a5/0x480
[   19.191137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.191472]  kthread+0x337/0x6f0
[   19.191769]  ret_from_fork+0x116/0x1d0
[   19.191975]  ret_from_fork_asm+0x1a/0x30
[   19.192185] 
[   19.192391] The buggy address belongs to the object at ffff8881033ecb00
[   19.192391]  which belongs to the cache kmalloc-64 of size 64
[   19.193183] The buggy address is located 0 bytes to the right of
[   19.193183]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.193851] 
[   19.194020] The buggy address belongs to the physical page:
[   19.194412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.194785] flags: 0x200000000000000(node=0|zone=2)
[   19.195026] page_type: f5(slab)
[   19.195219] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.195902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.196482] page dumped because: kasan: bad access detected
[   19.196880] 
[   19.197010] Memory state around the buggy address:
[   19.197229]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.197568]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.198089] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.198827]                                      ^
[   19.199206]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.199549]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.199837] ==================================================================
[   19.658945] ==================================================================
[   19.659431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   19.660025] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.660401] 
[   19.660572] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.660633] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.660650] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.660677] Call Trace:
[   19.660721]  <TASK>
[   19.660750]  dump_stack_lvl+0x73/0xb0
[   19.660785]  print_report+0xd1/0x650
[   19.660813]  ? __virt_addr_valid+0x1db/0x2d0
[   19.660843]  ? kasan_atomics_helper+0x5115/0x5450
[   19.660892]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.660921]  ? kasan_atomics_helper+0x5115/0x5450
[   19.660948]  kasan_report+0x141/0x180
[   19.660975]  ? kasan_atomics_helper+0x5115/0x5450
[   19.661006]  __asan_report_load8_noabort+0x18/0x20
[   19.661031]  kasan_atomics_helper+0x5115/0x5450
[   19.661058]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.661085]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.661133]  ? kasan_atomics+0x152/0x310
[   19.661168]  kasan_atomics+0x1dc/0x310
[   19.661218]  ? __pfx_kasan_atomics+0x10/0x10
[   19.661251]  ? __pfx_read_tsc+0x10/0x10
[   19.661298]  ? ktime_get_ts64+0x86/0x230
[   19.661331]  kunit_try_run_case+0x1a5/0x480
[   19.661359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.661382]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.661412]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.661442]  ? __kthread_parkme+0x82/0x180
[   19.661486]  ? preempt_count_sub+0x50/0x80
[   19.661516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.661541]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.661571]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.661600]  kthread+0x337/0x6f0
[   19.661625]  ? trace_preempt_on+0x20/0xc0
[   19.661653]  ? __pfx_kthread+0x10/0x10
[   19.661678]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.661705]  ? calculate_sigpending+0x7b/0xa0
[   19.661734]  ? __pfx_kthread+0x10/0x10
[   19.661760]  ret_from_fork+0x116/0x1d0
[   19.661785]  ? __pfx_kthread+0x10/0x10
[   19.661809]  ret_from_fork_asm+0x1a/0x30
[   19.661847]  </TASK>
[   19.661861] 
[   19.669802] Allocated by task 282:
[   19.670054]  kasan_save_stack+0x45/0x70
[   19.670308]  kasan_save_track+0x18/0x40
[   19.670549]  kasan_save_alloc_info+0x3b/0x50
[   19.670808]  __kasan_kmalloc+0xb7/0xc0
[   19.671062]  __kmalloc_cache_noprof+0x189/0x420
[   19.671244]  kasan_atomics+0x95/0x310
[   19.671460]  kunit_try_run_case+0x1a5/0x480
[   19.671712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.671937]  kthread+0x337/0x6f0
[   19.672170]  ret_from_fork+0x116/0x1d0
[   19.672332]  ret_from_fork_asm+0x1a/0x30
[   19.672636] 
[   19.672792] The buggy address belongs to the object at ffff8881033ecb00
[   19.672792]  which belongs to the cache kmalloc-64 of size 64
[   19.673314] The buggy address is located 0 bytes to the right of
[   19.673314]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.673873] 
[   19.673981] The buggy address belongs to the physical page:
[   19.674264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.674510] flags: 0x200000000000000(node=0|zone=2)
[   19.674688] page_type: f5(slab)
[   19.674819] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.675033] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.675609] page dumped because: kasan: bad access detected
[   19.676019] 
[   19.676170] Memory state around the buggy address:
[   19.676506]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.676672]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.676834] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.677026]                                      ^
[   19.677402]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.677963]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.678445] ==================================================================
[   18.422888] ==================================================================
[   18.423412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   18.424075] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.424813] 
[   18.425088] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.425213] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.425245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.425314] Call Trace:
[   18.425362]  <TASK>
[   18.425410]  dump_stack_lvl+0x73/0xb0
[   18.425505]  print_report+0xd1/0x650
[   18.425580]  ? __virt_addr_valid+0x1db/0x2d0
[   18.425634]  ? kasan_atomics_helper+0xf10/0x5450
[   18.425687]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.425749]  ? kasan_atomics_helper+0xf10/0x5450
[   18.425817]  kasan_report+0x141/0x180
[   18.425875]  ? kasan_atomics_helper+0xf10/0x5450
[   18.425939]  kasan_check_range+0x10c/0x1c0
[   18.426008]  __kasan_check_write+0x18/0x20
[   18.426076]  kasan_atomics_helper+0xf10/0x5450
[   18.426132]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.426193]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.426298]  ? kasan_atomics+0x152/0x310
[   18.426361]  kasan_atomics+0x1dc/0x310
[   18.426411]  ? __pfx_kasan_atomics+0x10/0x10
[   18.426479]  ? __pfx_read_tsc+0x10/0x10
[   18.426529]  ? ktime_get_ts64+0x86/0x230
[   18.426578]  kunit_try_run_case+0x1a5/0x480
[   18.426622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.426661]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.426708]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.426756]  ? __kthread_parkme+0x82/0x180
[   18.426803]  ? preempt_count_sub+0x50/0x80
[   18.426855]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.426897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.426948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.427000]  kthread+0x337/0x6f0
[   18.427037]  ? trace_preempt_on+0x20/0xc0
[   18.427080]  ? __pfx_kthread+0x10/0x10
[   18.427119]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.427164]  ? calculate_sigpending+0x7b/0xa0
[   18.427212]  ? __pfx_kthread+0x10/0x10
[   18.427289]  ret_from_fork+0x116/0x1d0
[   18.427332]  ? __pfx_kthread+0x10/0x10
[   18.427426]  ret_from_fork_asm+0x1a/0x30
[   18.427516]  </TASK>
[   18.427544] 
[   18.437830] Allocated by task 282:
[   18.438109]  kasan_save_stack+0x45/0x70
[   18.439898]  kasan_save_track+0x18/0x40
[   18.440380]  kasan_save_alloc_info+0x3b/0x50
[   18.440746]  __kasan_kmalloc+0xb7/0xc0
[   18.441019]  __kmalloc_cache_noprof+0x189/0x420
[   18.441764]  kasan_atomics+0x95/0x310
[   18.442018]  kunit_try_run_case+0x1a5/0x480
[   18.442252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.442494]  kthread+0x337/0x6f0
[   18.442606]  ret_from_fork+0x116/0x1d0
[   18.442711]  ret_from_fork_asm+0x1a/0x30
[   18.442826] 
[   18.442888] The buggy address belongs to the object at ffff8881033ecb00
[   18.442888]  which belongs to the cache kmalloc-64 of size 64
[   18.443142] The buggy address is located 0 bytes to the right of
[   18.443142]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.444405] 
[   18.444686] The buggy address belongs to the physical page:
[   18.445147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.446418] flags: 0x200000000000000(node=0|zone=2)
[   18.446699] page_type: f5(slab)
[   18.446894] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.447409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.447988] page dumped because: kasan: bad access detected
[   18.449074] 
[   18.449715] Memory state around the buggy address:
[   18.450597]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.452316]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.452885] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.454299]                                      ^
[   18.454631]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.455136]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.456702] ==================================================================
[   19.021704] ==================================================================
[   19.022781] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   19.023186] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.023620] 
[   19.023922] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.024085] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.024121] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.024223] Call Trace:
[   19.024284]  <TASK>
[   19.024331]  dump_stack_lvl+0x73/0xb0
[   19.024533]  print_report+0xd1/0x650
[   19.024588]  ? __virt_addr_valid+0x1db/0x2d0
[   19.024639]  ? kasan_atomics_helper+0x16e7/0x5450
[   19.024689]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.024744]  ? kasan_atomics_helper+0x16e7/0x5450
[   19.024797]  kasan_report+0x141/0x180
[   19.024852]  ? kasan_atomics_helper+0x16e7/0x5450
[   19.024899]  kasan_check_range+0x10c/0x1c0
[   19.024929]  __kasan_check_write+0x18/0x20
[   19.024953]  kasan_atomics_helper+0x16e7/0x5450
[   19.024981]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.025008]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.025034]  ? kasan_atomics+0x152/0x310
[   19.025065]  kasan_atomics+0x1dc/0x310
[   19.025092]  ? __pfx_kasan_atomics+0x10/0x10
[   19.025121]  ? __pfx_read_tsc+0x10/0x10
[   19.025147]  ? ktime_get_ts64+0x86/0x230
[   19.025178]  kunit_try_run_case+0x1a5/0x480
[   19.025262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.025313]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.025351]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.025383]  ? __kthread_parkme+0x82/0x180
[   19.025409]  ? preempt_count_sub+0x50/0x80
[   19.025440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.025490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.025522]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.025552]  kthread+0x337/0x6f0
[   19.025576]  ? trace_preempt_on+0x20/0xc0
[   19.025605]  ? __pfx_kthread+0x10/0x10
[   19.025630]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.025658]  ? calculate_sigpending+0x7b/0xa0
[   19.025687]  ? __pfx_kthread+0x10/0x10
[   19.025713]  ret_from_fork+0x116/0x1d0
[   19.025736]  ? __pfx_kthread+0x10/0x10
[   19.025761]  ret_from_fork_asm+0x1a/0x30
[   19.025798]  </TASK>
[   19.025813] 
[   19.039077] Allocated by task 282:
[   19.040032]  kasan_save_stack+0x45/0x70
[   19.040268]  kasan_save_track+0x18/0x40
[   19.040903]  kasan_save_alloc_info+0x3b/0x50
[   19.041374]  __kasan_kmalloc+0xb7/0xc0
[   19.041598]  __kmalloc_cache_noprof+0x189/0x420
[   19.041988]  kasan_atomics+0x95/0x310
[   19.042270]  kunit_try_run_case+0x1a5/0x480
[   19.042526]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.042770]  kthread+0x337/0x6f0
[   19.043134]  ret_from_fork+0x116/0x1d0
[   19.043543]  ret_from_fork_asm+0x1a/0x30
[   19.043950] 
[   19.044198] The buggy address belongs to the object at ffff8881033ecb00
[   19.044198]  which belongs to the cache kmalloc-64 of size 64
[   19.044802] The buggy address is located 0 bytes to the right of
[   19.044802]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.045776] 
[   19.046016] The buggy address belongs to the physical page:
[   19.046678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.047108] flags: 0x200000000000000(node=0|zone=2)
[   19.047529] page_type: f5(slab)
[   19.047749] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.048317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.048821] page dumped because: kasan: bad access detected
[   19.049351] 
[   19.049556] Memory state around the buggy address:
[   19.049942]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.050347]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.050824] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.051102]                                      ^
[   19.051520]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.052045]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.053120] ==================================================================
[   19.054876] ==================================================================
[   19.055262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   19.055997] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.056727] 
[   19.056978] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.057072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.057089] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.057116] Call Trace:
[   19.057140]  <TASK>
[   19.057166]  dump_stack_lvl+0x73/0xb0
[   19.057224]  print_report+0xd1/0x650
[   19.057547]  ? __virt_addr_valid+0x1db/0x2d0
[   19.057589]  ? kasan_atomics_helper+0x177f/0x5450
[   19.057616]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.057643]  ? kasan_atomics_helper+0x177f/0x5450
[   19.057669]  kasan_report+0x141/0x180
[   19.057695]  ? kasan_atomics_helper+0x177f/0x5450
[   19.057724]  kasan_check_range+0x10c/0x1c0
[   19.057752]  __kasan_check_write+0x18/0x20
[   19.057775]  kasan_atomics_helper+0x177f/0x5450
[   19.057802]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.057828]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.057855]  ? kasan_atomics+0x152/0x310
[   19.057883]  kasan_atomics+0x1dc/0x310
[   19.057907]  ? __pfx_kasan_atomics+0x10/0x10
[   19.057934]  ? __pfx_read_tsc+0x10/0x10
[   19.057957]  ? ktime_get_ts64+0x86/0x230
[   19.057984]  kunit_try_run_case+0x1a5/0x480
[   19.058008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.058029]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.058056]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.058082]  ? __kthread_parkme+0x82/0x180
[   19.058104]  ? preempt_count_sub+0x50/0x80
[   19.058129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.058152]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.058178]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.058250]  kthread+0x337/0x6f0
[   19.058275]  ? trace_preempt_on+0x20/0xc0
[   19.058302]  ? __pfx_kthread+0x10/0x10
[   19.058324]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.058350]  ? calculate_sigpending+0x7b/0xa0
[   19.058377]  ? __pfx_kthread+0x10/0x10
[   19.058401]  ret_from_fork+0x116/0x1d0
[   19.058423]  ? __pfx_kthread+0x10/0x10
[   19.058446]  ret_from_fork_asm+0x1a/0x30
[   19.058499]  </TASK>
[   19.058512] 
[   19.069516] Allocated by task 282:
[   19.069909]  kasan_save_stack+0x45/0x70
[   19.070325]  kasan_save_track+0x18/0x40
[   19.070660]  kasan_save_alloc_info+0x3b/0x50
[   19.071041]  __kasan_kmalloc+0xb7/0xc0
[   19.071391]  __kmalloc_cache_noprof+0x189/0x420
[   19.071822]  kasan_atomics+0x95/0x310
[   19.072160]  kunit_try_run_case+0x1a5/0x480
[   19.072488]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.072727]  kthread+0x337/0x6f0
[   19.072909]  ret_from_fork+0x116/0x1d0
[   19.073102]  ret_from_fork_asm+0x1a/0x30
[   19.073498] 
[   19.073750] The buggy address belongs to the object at ffff8881033ecb00
[   19.073750]  which belongs to the cache kmalloc-64 of size 64
[   19.074864] The buggy address is located 0 bytes to the right of
[   19.074864]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.075655] 
[   19.075822] The buggy address belongs to the physical page:
[   19.076107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.076472] flags: 0x200000000000000(node=0|zone=2)
[   19.076909] page_type: f5(slab)
[   19.077262] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.078024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.078732] page dumped because: kasan: bad access detected
[   19.079153] 
[   19.079401] Memory state around the buggy address:
[   19.079761]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.080240]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.080761] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.081234]                                      ^
[   19.081604]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.082117]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.082467] ==================================================================
[   19.502421] ==================================================================
[   19.502712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   19.503628] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.504526] 
[   19.504628] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.504732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.504751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.504789] Call Trace:
[   19.504818]  <TASK>
[   19.504845]  dump_stack_lvl+0x73/0xb0
[   19.504885]  print_report+0xd1/0x650
[   19.504912]  ? __virt_addr_valid+0x1db/0x2d0
[   19.504941]  ? kasan_atomics_helper+0x2006/0x5450
[   19.504967]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.504993]  ? kasan_atomics_helper+0x2006/0x5450
[   19.505046]  kasan_report+0x141/0x180
[   19.505077]  ? kasan_atomics_helper+0x2006/0x5450
[   19.505136]  kasan_check_range+0x10c/0x1c0
[   19.505168]  __kasan_check_write+0x18/0x20
[   19.505219]  kasan_atomics_helper+0x2006/0x5450
[   19.505249]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.505276]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.505304]  ? kasan_atomics+0x152/0x310
[   19.505335]  kasan_atomics+0x1dc/0x310
[   19.505362]  ? __pfx_kasan_atomics+0x10/0x10
[   19.505390]  ? __pfx_read_tsc+0x10/0x10
[   19.505417]  ? ktime_get_ts64+0x86/0x230
[   19.505446]  kunit_try_run_case+0x1a5/0x480
[   19.505492]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.505516]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.505546]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.505575]  ? __kthread_parkme+0x82/0x180
[   19.505602]  ? preempt_count_sub+0x50/0x80
[   19.505631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.505656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.505684]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.505713]  kthread+0x337/0x6f0
[   19.505736]  ? trace_preempt_on+0x20/0xc0
[   19.505765]  ? __pfx_kthread+0x10/0x10
[   19.505789]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.505815]  ? calculate_sigpending+0x7b/0xa0
[   19.505844]  ? __pfx_kthread+0x10/0x10
[   19.505869]  ret_from_fork+0x116/0x1d0
[   19.505892]  ? __pfx_kthread+0x10/0x10
[   19.505916]  ret_from_fork_asm+0x1a/0x30
[   19.505952]  </TASK>
[   19.505966] 
[   19.513093] Allocated by task 282:
[   19.513790]  kasan_save_stack+0x45/0x70
[   19.514135]  kasan_save_track+0x18/0x40
[   19.514405]  kasan_save_alloc_info+0x3b/0x50
[   19.515123]  __kasan_kmalloc+0xb7/0xc0
[   19.515405]  __kmalloc_cache_noprof+0x189/0x420
[   19.516088]  kasan_atomics+0x95/0x310
[   19.516895]  kunit_try_run_case+0x1a5/0x480
[   19.517767]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.518376]  kthread+0x337/0x6f0
[   19.518936]  ret_from_fork+0x116/0x1d0
[   19.519293]  ret_from_fork_asm+0x1a/0x30
[   19.519704] 
[   19.519941] The buggy address belongs to the object at ffff8881033ecb00
[   19.519941]  which belongs to the cache kmalloc-64 of size 64
[   19.520849] The buggy address is located 0 bytes to the right of
[   19.520849]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.521756] 
[   19.522004] The buggy address belongs to the physical page:
[   19.522370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.522759] flags: 0x200000000000000(node=0|zone=2)
[   19.522905] page_type: f5(slab)
[   19.523013] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.523174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.523899] page dumped because: kasan: bad access detected
[   19.524351] 
[   19.524488] Memory state around the buggy address:
[   19.524940]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.525349]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.525747] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.526077]                                      ^
[   19.526218]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.526675]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.526844] ==================================================================
[   18.894269] ==================================================================
[   18.894663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   18.895047] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.895736] 
[   18.895948] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.896032] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.896055] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.896093] Call Trace:
[   18.896132]  <TASK>
[   18.896168]  dump_stack_lvl+0x73/0xb0
[   18.896219]  print_report+0xd1/0x650
[   18.896258]  ? __virt_addr_valid+0x1db/0x2d0
[   18.896297]  ? kasan_atomics_helper+0x50d4/0x5450
[   18.896332]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.896369]  ? kasan_atomics_helper+0x50d4/0x5450
[   18.896407]  kasan_report+0x141/0x180
[   18.896448]  ? kasan_atomics_helper+0x50d4/0x5450
[   18.896509]  __asan_report_store8_noabort+0x1b/0x30
[   18.896544]  kasan_atomics_helper+0x50d4/0x5450
[   18.896583]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.896621]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.896656]  ? kasan_atomics+0x152/0x310
[   18.896698]  kasan_atomics+0x1dc/0x310
[   18.896748]  ? __pfx_kasan_atomics+0x10/0x10
[   18.896792]  ? __pfx_read_tsc+0x10/0x10
[   18.896834]  ? ktime_get_ts64+0x86/0x230
[   18.896889]  kunit_try_run_case+0x1a5/0x480
[   18.896936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.896982]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.897038]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.897094]  ? __kthread_parkme+0x82/0x180
[   18.897139]  ? preempt_count_sub+0x50/0x80
[   18.897194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.897244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.897301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.897354]  kthread+0x337/0x6f0
[   18.897400]  ? trace_preempt_on+0x20/0xc0
[   18.897449]  ? __pfx_kthread+0x10/0x10
[   18.897559]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.897604]  ? calculate_sigpending+0x7b/0xa0
[   18.897651]  ? __pfx_kthread+0x10/0x10
[   18.897699]  ret_from_fork+0x116/0x1d0
[   18.897742]  ? __pfx_kthread+0x10/0x10
[   18.897791]  ret_from_fork_asm+0x1a/0x30
[   18.897853]  </TASK>
[   18.897882] 
[   18.909702] Allocated by task 282:
[   18.910098]  kasan_save_stack+0x45/0x70
[   18.910689]  kasan_save_track+0x18/0x40
[   18.911043]  kasan_save_alloc_info+0x3b/0x50
[   18.911476]  __kasan_kmalloc+0xb7/0xc0
[   18.911833]  __kmalloc_cache_noprof+0x189/0x420
[   18.912335]  kasan_atomics+0x95/0x310
[   18.912706]  kunit_try_run_case+0x1a5/0x480
[   18.912969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.913521]  kthread+0x337/0x6f0
[   18.913891]  ret_from_fork+0x116/0x1d0
[   18.914102]  ret_from_fork_asm+0x1a/0x30
[   18.914334] 
[   18.914473] The buggy address belongs to the object at ffff8881033ecb00
[   18.914473]  which belongs to the cache kmalloc-64 of size 64
[   18.915654] The buggy address is located 0 bytes to the right of
[   18.915654]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.916625] 
[   18.916824] The buggy address belongs to the physical page:
[   18.917172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.917898] flags: 0x200000000000000(node=0|zone=2)
[   18.918144] page_type: f5(slab)
[   18.918371] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.919082] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.919794] page dumped because: kasan: bad access detected
[   18.920305] 
[   18.920492] Memory state around the buggy address:
[   18.920895]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.921519]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.922094] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.922488]                                      ^
[   18.922761]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.923412]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.923953] ==================================================================
[   19.614101] ==================================================================
[   19.615169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   19.615675] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.615969] 
[   19.616057] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.616115] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.616131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.616159] Call Trace:
[   19.616183]  <TASK>
[   19.616229]  dump_stack_lvl+0x73/0xb0
[   19.616262]  print_report+0xd1/0x650
[   19.616312]  ? __virt_addr_valid+0x1db/0x2d0
[   19.616342]  ? kasan_atomics_helper+0x4fa5/0x5450
[   19.616381]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.616409]  ? kasan_atomics_helper+0x4fa5/0x5450
[   19.616435]  kasan_report+0x141/0x180
[   19.616472]  ? kasan_atomics_helper+0x4fa5/0x5450
[   19.616505]  __asan_report_load8_noabort+0x18/0x20
[   19.616531]  kasan_atomics_helper+0x4fa5/0x5450
[   19.616559]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.616585]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.616611]  ? kasan_atomics+0x152/0x310
[   19.616666]  kasan_atomics+0x1dc/0x310
[   19.616694]  ? __pfx_kasan_atomics+0x10/0x10
[   19.616722]  ? __pfx_read_tsc+0x10/0x10
[   19.616749]  ? ktime_get_ts64+0x86/0x230
[   19.616795]  kunit_try_run_case+0x1a5/0x480
[   19.616828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.616851]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.616881]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.616911]  ? __kthread_parkme+0x82/0x180
[   19.616936]  ? preempt_count_sub+0x50/0x80
[   19.616966]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.616991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.617021]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.617049]  kthread+0x337/0x6f0
[   19.617071]  ? trace_preempt_on+0x20/0xc0
[   19.617098]  ? __pfx_kthread+0x10/0x10
[   19.617122]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.617148]  ? calculate_sigpending+0x7b/0xa0
[   19.617176]  ? __pfx_kthread+0x10/0x10
[   19.617220]  ret_from_fork+0x116/0x1d0
[   19.617298]  ? __pfx_kthread+0x10/0x10
[   19.617325]  ret_from_fork_asm+0x1a/0x30
[   19.617361]  </TASK>
[   19.617376] 
[   19.625011] Allocated by task 282:
[   19.625302]  kasan_save_stack+0x45/0x70
[   19.625558]  kasan_save_track+0x18/0x40
[   19.625821]  kasan_save_alloc_info+0x3b/0x50
[   19.626020]  __kasan_kmalloc+0xb7/0xc0
[   19.626233]  __kmalloc_cache_noprof+0x189/0x420
[   19.626400]  kasan_atomics+0x95/0x310
[   19.626532]  kunit_try_run_case+0x1a5/0x480
[   19.626814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.627148]  kthread+0x337/0x6f0
[   19.627525]  ret_from_fork+0x116/0x1d0
[   19.627749]  ret_from_fork_asm+0x1a/0x30
[   19.627966] 
[   19.628110] The buggy address belongs to the object at ffff8881033ecb00
[   19.628110]  which belongs to the cache kmalloc-64 of size 64
[   19.628715] The buggy address is located 0 bytes to the right of
[   19.628715]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.629200] 
[   19.629308] The buggy address belongs to the physical page:
[   19.629536] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.629932] flags: 0x200000000000000(node=0|zone=2)
[   19.630132] page_type: f5(slab)
[   19.630317] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.630676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.631112] page dumped because: kasan: bad access detected
[   19.631305] 
[   19.631394] Memory state around the buggy address:
[   19.631595]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.631830]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.632308] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.632812]                                      ^
[   19.633164]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.634496]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.635060] ==================================================================
[   19.527932] ==================================================================
[   19.528659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   19.529052] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.529413] 
[   19.529702] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.529767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.529784] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.529811] Call Trace:
[   19.529836]  <TASK>
[   19.529863]  dump_stack_lvl+0x73/0xb0
[   19.529922]  print_report+0xd1/0x650
[   19.529951]  ? __virt_addr_valid+0x1db/0x2d0
[   19.529998]  ? kasan_atomics_helper+0x4f98/0x5450
[   19.530027]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.530055]  ? kasan_atomics_helper+0x4f98/0x5450
[   19.530082]  kasan_report+0x141/0x180
[   19.530108]  ? kasan_atomics_helper+0x4f98/0x5450
[   19.530140]  __asan_report_load8_noabort+0x18/0x20
[   19.530165]  kasan_atomics_helper+0x4f98/0x5450
[   19.530192]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.530218]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.530245]  ? kasan_atomics+0x152/0x310
[   19.530297]  kasan_atomics+0x1dc/0x310
[   19.530337]  ? __pfx_kasan_atomics+0x10/0x10
[   19.530366]  ? __pfx_read_tsc+0x10/0x10
[   19.530394]  ? ktime_get_ts64+0x86/0x230
[   19.530425]  kunit_try_run_case+0x1a5/0x480
[   19.530451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.530488]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.530520]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.530549]  ? __kthread_parkme+0x82/0x180
[   19.530574]  ? preempt_count_sub+0x50/0x80
[   19.530602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.530627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.530657]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.530688]  kthread+0x337/0x6f0
[   19.530711]  ? trace_preempt_on+0x20/0xc0
[   19.530740]  ? __pfx_kthread+0x10/0x10
[   19.530765]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.530792]  ? calculate_sigpending+0x7b/0xa0
[   19.530821]  ? __pfx_kthread+0x10/0x10
[   19.530847]  ret_from_fork+0x116/0x1d0
[   19.530870]  ? __pfx_kthread+0x10/0x10
[   19.530895]  ret_from_fork_asm+0x1a/0x30
[   19.530931]  </TASK>
[   19.530948] 
[   19.540428] Allocated by task 282:
[   19.540595]  kasan_save_stack+0x45/0x70
[   19.541481]  kasan_save_track+0x18/0x40
[   19.541765]  kasan_save_alloc_info+0x3b/0x50
[   19.542083]  __kasan_kmalloc+0xb7/0xc0
[   19.542229]  __kmalloc_cache_noprof+0x189/0x420
[   19.542344]  kasan_atomics+0x95/0x310
[   19.542442]  kunit_try_run_case+0x1a5/0x480
[   19.542554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.542678]  kthread+0x337/0x6f0
[   19.542769]  ret_from_fork+0x116/0x1d0
[   19.542866]  ret_from_fork_asm+0x1a/0x30
[   19.542967] 
[   19.543081] The buggy address belongs to the object at ffff8881033ecb00
[   19.543081]  which belongs to the cache kmalloc-64 of size 64
[   19.543795] The buggy address is located 0 bytes to the right of
[   19.543795]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.544131] 
[   19.544198] The buggy address belongs to the physical page:
[   19.544321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.544498] flags: 0x200000000000000(node=0|zone=2)
[   19.544696] page_type: f5(slab)
[   19.545513] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.546029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.546915] page dumped because: kasan: bad access detected
[   19.547332] 
[   19.547406] Memory state around the buggy address:
[   19.547538]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.548103]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.548571] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.548975]                                      ^
[   19.549225]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.549669]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.549870] ==================================================================
[   18.832906] ==================================================================
[   18.833728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   18.834306] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.834574] 
[   18.834738] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.834847] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.834866] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.834895] Call Trace:
[   18.834921]  <TASK>
[   18.834947]  dump_stack_lvl+0x73/0xb0
[   18.834989]  print_report+0xd1/0x650
[   18.835032]  ? __virt_addr_valid+0x1db/0x2d0
[   18.835063]  ? kasan_atomics_helper+0x4eae/0x5450
[   18.835089]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.835115]  ? kasan_atomics_helper+0x4eae/0x5450
[   18.835140]  kasan_report+0x141/0x180
[   18.835167]  ? kasan_atomics_helper+0x4eae/0x5450
[   18.835197]  __asan_report_load8_noabort+0x18/0x20
[   18.835221]  kasan_atomics_helper+0x4eae/0x5450
[   18.835249]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.835275]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.835300]  ? kasan_atomics+0x152/0x310
[   18.835331]  kasan_atomics+0x1dc/0x310
[   18.835380]  ? __pfx_kasan_atomics+0x10/0x10
[   18.835410]  ? __pfx_read_tsc+0x10/0x10
[   18.835437]  ? ktime_get_ts64+0x86/0x230
[   18.835601]  kunit_try_run_case+0x1a5/0x480
[   18.835665]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.835714]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.835771]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.835825]  ? __kthread_parkme+0x82/0x180
[   18.835878]  ? preempt_count_sub+0x50/0x80
[   18.835936]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.835991]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.836046]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.836105]  kthread+0x337/0x6f0
[   18.836154]  ? trace_preempt_on+0x20/0xc0
[   18.836211]  ? __pfx_kthread+0x10/0x10
[   18.836260]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.836316]  ? calculate_sigpending+0x7b/0xa0
[   18.836374]  ? __pfx_kthread+0x10/0x10
[   18.836429]  ret_from_fork+0x116/0x1d0
[   18.836491]  ? __pfx_kthread+0x10/0x10
[   18.836562]  ret_from_fork_asm+0x1a/0x30
[   18.836602]  </TASK>
[   18.836617] 
[   18.849289] Allocated by task 282:
[   18.849722]  kasan_save_stack+0x45/0x70
[   18.850175]  kasan_save_track+0x18/0x40
[   18.850627]  kasan_save_alloc_info+0x3b/0x50
[   18.851045]  __kasan_kmalloc+0xb7/0xc0
[   18.851357]  __kmalloc_cache_noprof+0x189/0x420
[   18.851571]  kasan_atomics+0x95/0x310
[   18.851754]  kunit_try_run_case+0x1a5/0x480
[   18.851941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.852157]  kthread+0x337/0x6f0
[   18.852518]  ret_from_fork+0x116/0x1d0
[   18.852849]  ret_from_fork_asm+0x1a/0x30
[   18.853223] 
[   18.853404] The buggy address belongs to the object at ffff8881033ecb00
[   18.853404]  which belongs to the cache kmalloc-64 of size 64
[   18.854415] The buggy address is located 0 bytes to the right of
[   18.854415]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.855432] 
[   18.855655] The buggy address belongs to the physical page:
[   18.856097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.856821] flags: 0x200000000000000(node=0|zone=2)
[   18.857326] page_type: f5(slab)
[   18.857590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.857883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.858593] page dumped because: kasan: bad access detected
[   18.858987] 
[   18.859104] Memory state around the buggy address:
[   18.859438]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.860029]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.860488] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.860909]                                      ^
[   18.861371]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.861721]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.861971] ==================================================================
[   19.298000] ==================================================================
[   19.299039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   19.299517] Read of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.300025] 
[   19.300309] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.300431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.300477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.300535] Call Trace:
[   19.300585]  <TASK>
[   19.300651]  dump_stack_lvl+0x73/0xb0
[   19.300729]  print_report+0xd1/0x650
[   19.300784]  ? __virt_addr_valid+0x1db/0x2d0
[   19.300839]  ? kasan_atomics_helper+0x4f30/0x5450
[   19.300892]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.300948]  ? kasan_atomics_helper+0x4f30/0x5450
[   19.301027]  kasan_report+0x141/0x180
[   19.301076]  ? kasan_atomics_helper+0x4f30/0x5450
[   19.301136]  __asan_report_load8_noabort+0x18/0x20
[   19.301187]  kasan_atomics_helper+0x4f30/0x5450
[   19.301281]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.301336]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.301389]  ? kasan_atomics+0x152/0x310
[   19.301464]  kasan_atomics+0x1dc/0x310
[   19.301526]  ? __pfx_kasan_atomics+0x10/0x10
[   19.301609]  ? __pfx_read_tsc+0x10/0x10
[   19.301664]  ? ktime_get_ts64+0x86/0x230
[   19.301723]  kunit_try_run_case+0x1a5/0x480
[   19.301781]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.301826]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.301865]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.301899]  ? __kthread_parkme+0x82/0x180
[   19.301925]  ? preempt_count_sub+0x50/0x80
[   19.301955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.301981]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.302011]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.302040]  kthread+0x337/0x6f0
[   19.302064]  ? trace_preempt_on+0x20/0xc0
[   19.302092]  ? __pfx_kthread+0x10/0x10
[   19.302118]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.302144]  ? calculate_sigpending+0x7b/0xa0
[   19.302173]  ? __pfx_kthread+0x10/0x10
[   19.302222]  ret_from_fork+0x116/0x1d0
[   19.302276]  ? __pfx_kthread+0x10/0x10
[   19.302302]  ret_from_fork_asm+0x1a/0x30
[   19.302342]  </TASK>
[   19.302358] 
[   19.313120] Allocated by task 282:
[   19.313446]  kasan_save_stack+0x45/0x70
[   19.313905]  kasan_save_track+0x18/0x40
[   19.314116]  kasan_save_alloc_info+0x3b/0x50
[   19.314913]  __kasan_kmalloc+0xb7/0xc0
[   19.315501]  __kmalloc_cache_noprof+0x189/0x420
[   19.315718]  kasan_atomics+0x95/0x310
[   19.316036]  kunit_try_run_case+0x1a5/0x480
[   19.316387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.316699]  kthread+0x337/0x6f0
[   19.316992]  ret_from_fork+0x116/0x1d0
[   19.317267]  ret_from_fork_asm+0x1a/0x30
[   19.317623] 
[   19.317759] The buggy address belongs to the object at ffff8881033ecb00
[   19.317759]  which belongs to the cache kmalloc-64 of size 64
[   19.318511] The buggy address is located 0 bytes to the right of
[   19.318511]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.319167] 
[   19.319369] The buggy address belongs to the physical page:
[   19.319748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.320245] flags: 0x200000000000000(node=0|zone=2)
[   19.320646] page_type: f5(slab)
[   19.320966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.321383] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.321919] page dumped because: kasan: bad access detected
[   19.322263] 
[   19.322416] Memory state around the buggy address:
[   19.322636]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.323139]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.323481] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.323762]                                      ^
[   19.324144]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.324718]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.325263] ==================================================================
[   18.692301] ==================================================================
[   18.693021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   18.693368] Read of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.693667] 
[   18.694290] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.694416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.694450] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.694515] Call Trace:
[   18.694563]  <TASK>
[   18.694608]  dump_stack_lvl+0x73/0xb0
[   18.694680]  print_report+0xd1/0x650
[   18.694737]  ? __virt_addr_valid+0x1db/0x2d0
[   18.694794]  ? kasan_atomics_helper+0x49e8/0x5450
[   18.694843]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.694888]  ? kasan_atomics_helper+0x49e8/0x5450
[   18.694935]  kasan_report+0x141/0x180
[   18.695039]  ? kasan_atomics_helper+0x49e8/0x5450
[   18.695135]  __asan_report_load4_noabort+0x18/0x20
[   18.695185]  kasan_atomics_helper+0x49e8/0x5450
[   18.695258]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.695317]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.695406]  ? kasan_atomics+0x152/0x310
[   18.695442]  kasan_atomics+0x1dc/0x310
[   18.695496]  ? __pfx_kasan_atomics+0x10/0x10
[   18.695526]  ? __pfx_read_tsc+0x10/0x10
[   18.695554]  ? ktime_get_ts64+0x86/0x230
[   18.695586]  kunit_try_run_case+0x1a5/0x480
[   18.695613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.695636]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.695667]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.695696]  ? __kthread_parkme+0x82/0x180
[   18.695721]  ? preempt_count_sub+0x50/0x80
[   18.695752]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.695777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.695805]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.695834]  kthread+0x337/0x6f0
[   18.695858]  ? trace_preempt_on+0x20/0xc0
[   18.695885]  ? __pfx_kthread+0x10/0x10
[   18.695910]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.695937]  ? calculate_sigpending+0x7b/0xa0
[   18.695966]  ? __pfx_kthread+0x10/0x10
[   18.695990]  ret_from_fork+0x116/0x1d0
[   18.696014]  ? __pfx_kthread+0x10/0x10
[   18.696038]  ret_from_fork_asm+0x1a/0x30
[   18.696074]  </TASK>
[   18.696089] 
[   18.709032] Allocated by task 282:
[   18.709847]  kasan_save_stack+0x45/0x70
[   18.710245]  kasan_save_track+0x18/0x40
[   18.710478]  kasan_save_alloc_info+0x3b/0x50
[   18.710702]  __kasan_kmalloc+0xb7/0xc0
[   18.710926]  __kmalloc_cache_noprof+0x189/0x420
[   18.711171]  kasan_atomics+0x95/0x310
[   18.711516]  kunit_try_run_case+0x1a5/0x480
[   18.711834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.712089]  kthread+0x337/0x6f0
[   18.712427]  ret_from_fork+0x116/0x1d0
[   18.712782]  ret_from_fork_asm+0x1a/0x30
[   18.713082] 
[   18.713270] The buggy address belongs to the object at ffff8881033ecb00
[   18.713270]  which belongs to the cache kmalloc-64 of size 64
[   18.714643] The buggy address is located 0 bytes to the right of
[   18.714643]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.715885] 
[   18.716113] The buggy address belongs to the physical page:
[   18.716772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.717433] flags: 0x200000000000000(node=0|zone=2)
[   18.717657] page_type: f5(slab)
[   18.717818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.719760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.720719] page dumped because: kasan: bad access detected
[   18.721607] 
[   18.721820] Memory state around the buggy address:
[   18.723734]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.724801]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.725900] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.726874]                                      ^
[   18.727598]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.727894]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.728145] ==================================================================
[   18.658281] ==================================================================
[   18.659216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   18.659888] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.660450] 
[   18.660994] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.661150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.661198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.661256] Call Trace:
[   18.661307]  <TASK>
[   18.661351]  dump_stack_lvl+0x73/0xb0
[   18.661406]  print_report+0xd1/0x650
[   18.661435]  ? __virt_addr_valid+0x1db/0x2d0
[   18.661490]  ? kasan_atomics_helper+0x1217/0x5450
[   18.661519]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.661547]  ? kasan_atomics_helper+0x1217/0x5450
[   18.661574]  kasan_report+0x141/0x180
[   18.661601]  ? kasan_atomics_helper+0x1217/0x5450
[   18.661632]  kasan_check_range+0x10c/0x1c0
[   18.661661]  __kasan_check_write+0x18/0x20
[   18.661685]  kasan_atomics_helper+0x1217/0x5450
[   18.661712]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.661739]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.661766]  ? kasan_atomics+0x152/0x310
[   18.661796]  kasan_atomics+0x1dc/0x310
[   18.661823]  ? __pfx_kasan_atomics+0x10/0x10
[   18.661851]  ? __pfx_read_tsc+0x10/0x10
[   18.661877]  ? ktime_get_ts64+0x86/0x230
[   18.661905]  kunit_try_run_case+0x1a5/0x480
[   18.661932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.661956]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.661985]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.662013]  ? __kthread_parkme+0x82/0x180
[   18.662037]  ? preempt_count_sub+0x50/0x80
[   18.662065]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.662089]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.662118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.662147]  kthread+0x337/0x6f0
[   18.662171]  ? trace_preempt_on+0x20/0xc0
[   18.662206]  ? __pfx_kthread+0x10/0x10
[   18.662260]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.662288]  ? calculate_sigpending+0x7b/0xa0
[   18.662318]  ? __pfx_kthread+0x10/0x10
[   18.662343]  ret_from_fork+0x116/0x1d0
[   18.662366]  ? __pfx_kthread+0x10/0x10
[   18.662392]  ret_from_fork_asm+0x1a/0x30
[   18.662428]  </TASK>
[   18.662443] 
[   18.676091] Allocated by task 282:
[   18.676524]  kasan_save_stack+0x45/0x70
[   18.676802]  kasan_save_track+0x18/0x40
[   18.677010]  kasan_save_alloc_info+0x3b/0x50
[   18.677841]  __kasan_kmalloc+0xb7/0xc0
[   18.678238]  __kmalloc_cache_noprof+0x189/0x420
[   18.678653]  kasan_atomics+0x95/0x310
[   18.678837]  kunit_try_run_case+0x1a5/0x480
[   18.679016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.679228]  kthread+0x337/0x6f0
[   18.679388]  ret_from_fork+0x116/0x1d0
[   18.680297]  ret_from_fork_asm+0x1a/0x30
[   18.680555] 
[   18.680692] The buggy address belongs to the object at ffff8881033ecb00
[   18.680692]  which belongs to the cache kmalloc-64 of size 64
[   18.681985] The buggy address is located 0 bytes to the right of
[   18.681985]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.683086] 
[   18.683443] The buggy address belongs to the physical page:
[   18.683748] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.684201] flags: 0x200000000000000(node=0|zone=2)
[   18.684908] page_type: f5(slab)
[   18.685278] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.685939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.686530] page dumped because: kasan: bad access detected
[   18.686864] 
[   18.687046] Memory state around the buggy address:
[   18.687416]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.687936]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.688964] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.689312]                                      ^
[   18.689959]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.690691]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.691085] ==================================================================
[   17.960312] ==================================================================
[   17.960862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   17.961698] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   17.962448] 
[   17.962739] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   17.962857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   17.962889] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   17.962934] Call Trace:
[   17.962979]  <TASK>
[   17.963022]  dump_stack_lvl+0x73/0xb0
[   17.963197]  print_report+0xd1/0x650
[   17.963319]  ? __virt_addr_valid+0x1db/0x2d0
[   17.963385]  ? kasan_atomics_helper+0x5fe/0x5450
[   17.963439]  ? kasan_complete_mode_report_info+0x2a/0x200
[   17.963508]  ? kasan_atomics_helper+0x5fe/0x5450
[   17.963558]  kasan_report+0x141/0x180
[   17.963606]  ? kasan_atomics_helper+0x5fe/0x5450
[   17.963667]  kasan_check_range+0x10c/0x1c0
[   17.964518]  __kasan_check_write+0x18/0x20
[   17.964582]  kasan_atomics_helper+0x5fe/0x5450
[   17.964612]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   17.964640]  ? __kmalloc_cache_noprof+0x189/0x420
[   17.964667]  ? kasan_atomics+0x152/0x310
[   17.964711]  kasan_atomics+0x1dc/0x310
[   17.964751]  ? __pfx_kasan_atomics+0x10/0x10
[   17.964793]  ? __pfx_read_tsc+0x10/0x10
[   17.964834]  ? ktime_get_ts64+0x86/0x230
[   17.964875]  kunit_try_run_case+0x1a5/0x480
[   17.964902]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.964925]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   17.964957]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   17.964986]  ? __kthread_parkme+0x82/0x180
[   17.965009]  ? preempt_count_sub+0x50/0x80
[   17.965037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   17.965061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.965089]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   17.965117]  kthread+0x337/0x6f0
[   17.965140]  ? trace_preempt_on+0x20/0xc0
[   17.965167]  ? __pfx_kthread+0x10/0x10
[   17.965195]  ? _raw_spin_unlock_irq+0x47/0x80
[   17.965246]  ? calculate_sigpending+0x7b/0xa0
[   17.965274]  ? __pfx_kthread+0x10/0x10
[   17.965299]  ret_from_fork+0x116/0x1d0
[   17.965322]  ? __pfx_kthread+0x10/0x10
[   17.965347]  ret_from_fork_asm+0x1a/0x30
[   17.965384]  </TASK>
[   17.965399] 
[   17.975836] Allocated by task 282:
[   17.976577]  kasan_save_stack+0x45/0x70
[   17.977901]  kasan_save_track+0x18/0x40
[   17.978620]  kasan_save_alloc_info+0x3b/0x50
[   17.979247]  __kasan_kmalloc+0xb7/0xc0
[   17.979624]  __kmalloc_cache_noprof+0x189/0x420
[   17.980261]  kasan_atomics+0x95/0x310
[   17.980497]  kunit_try_run_case+0x1a5/0x480
[   17.980884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   17.982426]  kthread+0x337/0x6f0
[   17.982968]  ret_from_fork+0x116/0x1d0
[   17.983266]  ret_from_fork_asm+0x1a/0x30
[   17.983511] 
[   17.983948] The buggy address belongs to the object at ffff8881033ecb00
[   17.983948]  which belongs to the cache kmalloc-64 of size 64
[   17.985625] The buggy address is located 0 bytes to the right of
[   17.985625]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   17.986676] 
[   17.987013] The buggy address belongs to the physical page:
[   17.987429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   17.988253] flags: 0x200000000000000(node=0|zone=2)
[   17.988884] page_type: f5(slab)
[   17.989490] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   17.990294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   17.990758] page dumped because: kasan: bad access detected
[   17.991069] 
[   17.991303] Memory state around the buggy address:
[   17.991701]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.992147]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   17.992602] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   17.993232]                                      ^
[   17.993770]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.993994]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   17.994216] ==================================================================
[   19.442969] ==================================================================
[   19.443688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   19.444469] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   19.444768] 
[   19.444934] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   19.445042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.445069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   19.445119] Call Trace:
[   19.445167]  <TASK>
[   19.445210]  dump_stack_lvl+0x73/0xb0
[   19.445281]  print_report+0xd1/0x650
[   19.445332]  ? __virt_addr_valid+0x1db/0x2d0
[   19.445382]  ? kasan_atomics_helper+0x1f43/0x5450
[   19.445434]  ? kasan_complete_mode_report_info+0x2a/0x200
[   19.445499]  ? kasan_atomics_helper+0x1f43/0x5450
[   19.445548]  kasan_report+0x141/0x180
[   19.445577]  ? kasan_atomics_helper+0x1f43/0x5450
[   19.445609]  kasan_check_range+0x10c/0x1c0
[   19.445637]  __kasan_check_write+0x18/0x20
[   19.445660]  kasan_atomics_helper+0x1f43/0x5450
[   19.445687]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   19.445714]  ? __kmalloc_cache_noprof+0x189/0x420
[   19.445740]  ? kasan_atomics+0x152/0x310
[   19.445771]  kasan_atomics+0x1dc/0x310
[   19.445797]  ? __pfx_kasan_atomics+0x10/0x10
[   19.445826]  ? __pfx_read_tsc+0x10/0x10
[   19.445852]  ? ktime_get_ts64+0x86/0x230
[   19.445882]  kunit_try_run_case+0x1a5/0x480
[   19.445908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.445930]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   19.445959]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   19.445986]  ? __kthread_parkme+0x82/0x180
[   19.446010]  ? preempt_count_sub+0x50/0x80
[   19.446038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   19.446062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.446089]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   19.446118]  kthread+0x337/0x6f0
[   19.446141]  ? trace_preempt_on+0x20/0xc0
[   19.446168]  ? __pfx_kthread+0x10/0x10
[   19.446196]  ? _raw_spin_unlock_irq+0x47/0x80
[   19.446253]  ? calculate_sigpending+0x7b/0xa0
[   19.446304]  ? __pfx_kthread+0x10/0x10
[   19.446352]  ret_from_fork+0x116/0x1d0
[   19.446399]  ? __pfx_kthread+0x10/0x10
[   19.446448]  ret_from_fork_asm+0x1a/0x30
[   19.446520]  </TASK>
[   19.446544] 
[   19.459233] Allocated by task 282:
[   19.459642]  kasan_save_stack+0x45/0x70
[   19.460034]  kasan_save_track+0x18/0x40
[   19.460581]  kasan_save_alloc_info+0x3b/0x50
[   19.460823]  __kasan_kmalloc+0xb7/0xc0
[   19.461010]  __kmalloc_cache_noprof+0x189/0x420
[   19.461595]  kasan_atomics+0x95/0x310
[   19.461889]  kunit_try_run_case+0x1a5/0x480
[   19.462110]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   19.462576]  kthread+0x337/0x6f0
[   19.462897]  ret_from_fork+0x116/0x1d0
[   19.463154]  ret_from_fork_asm+0x1a/0x30
[   19.463483] 
[   19.463676] The buggy address belongs to the object at ffff8881033ecb00
[   19.463676]  which belongs to the cache kmalloc-64 of size 64
[   19.464509] The buggy address is located 0 bytes to the right of
[   19.464509]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   19.465308] 
[   19.465517] The buggy address belongs to the physical page:
[   19.465984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   19.466508] flags: 0x200000000000000(node=0|zone=2)
[   19.466946] page_type: f5(slab)
[   19.467267] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   19.467803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.468096] page dumped because: kasan: bad access detected
[   19.468593] 
[   19.468797] Memory state around the buggy address:
[   19.469250]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.469688]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.470040] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.470557]                                      ^
[   19.470923]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.471439]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.471948] ==================================================================
[   18.235263] ==================================================================
[   18.235854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   18.236557] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.237083] 
[   18.237384] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.237552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.237587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.237636] Call Trace:
[   18.237684]  <TASK>
[   18.237760]  dump_stack_lvl+0x73/0xb0
[   18.237855]  print_report+0xd1/0x650
[   18.237909]  ? __virt_addr_valid+0x1db/0x2d0
[   18.237956]  ? kasan_atomics_helper+0xb6a/0x5450
[   18.238001]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.238052]  ? kasan_atomics_helper+0xb6a/0x5450
[   18.238134]  kasan_report+0x141/0x180
[   18.238238]  ? kasan_atomics_helper+0xb6a/0x5450
[   18.238302]  kasan_check_range+0x10c/0x1c0
[   18.238385]  __kasan_check_write+0x18/0x20
[   18.238442]  kasan_atomics_helper+0xb6a/0x5450
[   18.238512]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.238568]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.238601]  ? kasan_atomics+0x152/0x310
[   18.238634]  kasan_atomics+0x1dc/0x310
[   18.238662]  ? __pfx_kasan_atomics+0x10/0x10
[   18.238691]  ? __pfx_read_tsc+0x10/0x10
[   18.238718]  ? ktime_get_ts64+0x86/0x230
[   18.238750]  kunit_try_run_case+0x1a5/0x480
[   18.238777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.238801]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.238831]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.238860]  ? __kthread_parkme+0x82/0x180
[   18.238885]  ? preempt_count_sub+0x50/0x80
[   18.238913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.238938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.238966]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.238995]  kthread+0x337/0x6f0
[   18.239018]  ? trace_preempt_on+0x20/0xc0
[   18.239044]  ? __pfx_kthread+0x10/0x10
[   18.239069]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.239094]  ? calculate_sigpending+0x7b/0xa0
[   18.239122]  ? __pfx_kthread+0x10/0x10
[   18.239148]  ret_from_fork+0x116/0x1d0
[   18.239170]  ? __pfx_kthread+0x10/0x10
[   18.239214]  ret_from_fork_asm+0x1a/0x30
[   18.239279]  </TASK>
[   18.239295] 
[   18.251845] Allocated by task 282:
[   18.252120]  kasan_save_stack+0x45/0x70
[   18.252392]  kasan_save_track+0x18/0x40
[   18.252585]  kasan_save_alloc_info+0x3b/0x50
[   18.252702]  __kasan_kmalloc+0xb7/0xc0
[   18.252804]  __kmalloc_cache_noprof+0x189/0x420
[   18.252917]  kasan_atomics+0x95/0x310
[   18.253018]  kunit_try_run_case+0x1a5/0x480
[   18.253120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.253242]  kthread+0x337/0x6f0
[   18.253338]  ret_from_fork+0x116/0x1d0
[   18.253438]  ret_from_fork_asm+0x1a/0x30
[   18.254141] 
[   18.254392] The buggy address belongs to the object at ffff8881033ecb00
[   18.254392]  which belongs to the cache kmalloc-64 of size 64
[   18.256716] The buggy address is located 0 bytes to the right of
[   18.256716]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.257763] 
[   18.257856] The buggy address belongs to the physical page:
[   18.257987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.258164] flags: 0x200000000000000(node=0|zone=2)
[   18.258595] page_type: f5(slab)
[   18.258912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.259534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.260128] page dumped because: kasan: bad access detected
[   18.260562] 
[   18.260692] Memory state around the buggy address:
[   18.261044]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.262208]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.262866] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.263223]                                      ^
[   18.263425]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.263687]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.264197] ==================================================================
[   18.081979] ==================================================================
[   18.083013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   18.083577] Write of size 4 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.083962] 
[   18.084222] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.084328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.084358] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.084407] Call Trace:
[   18.084463]  <TASK>
[   18.084511]  dump_stack_lvl+0x73/0xb0
[   18.084584]  print_report+0xd1/0x650
[   18.084642]  ? __virt_addr_valid+0x1db/0x2d0
[   18.084700]  ? kasan_atomics_helper+0x860/0x5450
[   18.084754]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.084809]  ? kasan_atomics_helper+0x860/0x5450
[   18.084863]  kasan_report+0x141/0x180
[   18.084919]  ? kasan_atomics_helper+0x860/0x5450
[   18.084986]  kasan_check_range+0x10c/0x1c0
[   18.085045]  __kasan_check_write+0x18/0x20
[   18.085096]  kasan_atomics_helper+0x860/0x5450
[   18.085153]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.085239]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.085297]  ? kasan_atomics+0x152/0x310
[   18.085352]  kasan_atomics+0x1dc/0x310
[   18.085396]  ? __pfx_kasan_atomics+0x10/0x10
[   18.085442]  ? __pfx_read_tsc+0x10/0x10
[   18.085502]  ? ktime_get_ts64+0x86/0x230
[   18.085560]  kunit_try_run_case+0x1a5/0x480
[   18.085612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.085658]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.085714]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.085770]  ? __kthread_parkme+0x82/0x180
[   18.085818]  ? preempt_count_sub+0x50/0x80
[   18.085874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.085922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.085973]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.086027]  kthread+0x337/0x6f0
[   18.086072]  ? trace_preempt_on+0x20/0xc0
[   18.086125]  ? __pfx_kthread+0x10/0x10
[   18.086175]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.086254]  ? calculate_sigpending+0x7b/0xa0
[   18.086300]  ? __pfx_kthread+0x10/0x10
[   18.086347]  ret_from_fork+0x116/0x1d0
[   18.086389]  ? __pfx_kthread+0x10/0x10
[   18.086427]  ret_from_fork_asm+0x1a/0x30
[   18.086505]  </TASK>
[   18.086534] 
[   18.096286] Allocated by task 282:
[   18.096682]  kasan_save_stack+0x45/0x70
[   18.097087]  kasan_save_track+0x18/0x40
[   18.097426]  kasan_save_alloc_info+0x3b/0x50
[   18.097837]  __kasan_kmalloc+0xb7/0xc0
[   18.098222]  __kmalloc_cache_noprof+0x189/0x420
[   18.098500]  kasan_atomics+0x95/0x310
[   18.098682]  kunit_try_run_case+0x1a5/0x480
[   18.098883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.099126]  kthread+0x337/0x6f0
[   18.099513]  ret_from_fork+0x116/0x1d0
[   18.099854]  ret_from_fork_asm+0x1a/0x30
[   18.100285] 
[   18.100496] The buggy address belongs to the object at ffff8881033ecb00
[   18.100496]  which belongs to the cache kmalloc-64 of size 64
[   18.101437] The buggy address is located 0 bytes to the right of
[   18.101437]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.102429] 
[   18.102629] The buggy address belongs to the physical page:
[   18.103051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.103750] flags: 0x200000000000000(node=0|zone=2)
[   18.104165] page_type: f5(slab)
[   18.104492] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.105077] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.105651] page dumped because: kasan: bad access detected
[   18.106080] 
[   18.106298] Memory state around the buggy address:
[   18.106726]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.107347]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.107849] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.108602]                                      ^
[   18.109028]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.109813]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.110302] ==================================================================
[   18.953540] ==================================================================
[   18.954060] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   18.954399] Write of size 8 at addr ffff8881033ecb30 by task kunit_try_catch/282
[   18.954976] 
[   18.955181] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250603 #1 PREEMPT(voluntary) 
[   18.955267] Tainted: [B]=BAD_PAGE, [N]=TEST
[   18.955326] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   18.955382] Call Trace:
[   18.955443]  <TASK>
[   18.955497]  dump_stack_lvl+0x73/0xb0
[   18.955568]  print_report+0xd1/0x650
[   18.955618]  ? __virt_addr_valid+0x1db/0x2d0
[   18.955675]  ? kasan_atomics_helper+0x15b6/0x5450
[   18.955730]  ? kasan_complete_mode_report_info+0x2a/0x200
[   18.955788]  ? kasan_atomics_helper+0x15b6/0x5450
[   18.955845]  kasan_report+0x141/0x180
[   18.955902]  ? kasan_atomics_helper+0x15b6/0x5450
[   18.955983]  kasan_check_range+0x10c/0x1c0
[   18.956038]  __kasan_check_write+0x18/0x20
[   18.956083]  kasan_atomics_helper+0x15b6/0x5450
[   18.956136]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   18.956204]  ? __kmalloc_cache_noprof+0x189/0x420
[   18.956268]  ? kasan_atomics+0x152/0x310
[   18.956327]  kasan_atomics+0x1dc/0x310
[   18.956385]  ? __pfx_kasan_atomics+0x10/0x10
[   18.956447]  ? __pfx_read_tsc+0x10/0x10
[   18.956516]  ? ktime_get_ts64+0x86/0x230
[   18.956580]  kunit_try_run_case+0x1a5/0x480
[   18.956637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.956688]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   18.956750]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   18.956808]  ? __kthread_parkme+0x82/0x180
[   18.956858]  ? preempt_count_sub+0x50/0x80
[   18.956918]  ? __pfx_kunit_try_run_case+0x10/0x10
[   18.956972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.957033]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   18.957093]  kthread+0x337/0x6f0
[   18.957142]  ? trace_preempt_on+0x20/0xc0
[   18.957199]  ? __pfx_kthread+0x10/0x10
[   18.957266]  ? _raw_spin_unlock_irq+0x47/0x80
[   18.957319]  ? calculate_sigpending+0x7b/0xa0
[   18.957373]  ? __pfx_kthread+0x10/0x10
[   18.957419]  ret_from_fork+0x116/0x1d0
[   18.957502]  ? __pfx_kthread+0x10/0x10
[   18.957552]  ret_from_fork_asm+0x1a/0x30
[   18.957632]  </TASK>
[   18.957665] 
[   18.969853] Allocated by task 282:
[   18.970451]  kasan_save_stack+0x45/0x70
[   18.970750]  kasan_save_track+0x18/0x40
[   18.971037]  kasan_save_alloc_info+0x3b/0x50
[   18.971479]  __kasan_kmalloc+0xb7/0xc0
[   18.971760]  __kmalloc_cache_noprof+0x189/0x420
[   18.972153]  kasan_atomics+0x95/0x310
[   18.972556]  kunit_try_run_case+0x1a5/0x480
[   18.972861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   18.973310]  kthread+0x337/0x6f0
[   18.973681]  ret_from_fork+0x116/0x1d0
[   18.973937]  ret_from_fork_asm+0x1a/0x30
[   18.974299] 
[   18.974512] The buggy address belongs to the object at ffff8881033ecb00
[   18.974512]  which belongs to the cache kmalloc-64 of size 64
[   18.975148] The buggy address is located 0 bytes to the right of
[   18.975148]  allocated 48-byte region [ffff8881033ecb00, ffff8881033ecb30)
[   18.975910] 
[   18.976112] The buggy address belongs to the physical page:
[   18.976491] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1033ec
[   18.977057] flags: 0x200000000000000(node=0|zone=2)
[   18.977529] page_type: f5(slab)
[   18.977819] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   18.978292] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   18.978864] page dumped because: kasan: bad access detected
[   18.979181] 
[   18.979429] Memory state around the buggy address:
[   18.979743]  ffff8881033eca00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.980296]  ffff8881033eca80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   18.980626] >ffff8881033ecb00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   18.980861]                                      ^
[   18.982749]  ffff8881033ecb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.983275]  ffff8881033ecc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   18.984601] ==================================================================