Hay
Date
June 5, 2025, 7:08 a.m.

Environment
qemu-arm64
qemu-x86_64

[   29.967624] ==================================================================
[   29.967741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   29.968068] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.968392] 
[   29.968630] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.968868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.968940] Hardware name: linux,dummy-virt (DT)
[   29.969025] Call trace:
[   29.969270]  show_stack+0x20/0x38 (C)
[   29.969736]  dump_stack_lvl+0x8c/0xd0
[   29.970371]  print_report+0x118/0x608
[   29.970895]  kasan_report+0xdc/0x128
[   29.971023]  kasan_check_range+0x100/0x1a8
[   29.971409]  __kasan_check_write+0x20/0x30
[   29.971692]  kasan_atomics_helper+0x10c0/0x4858
[   29.972317]  kasan_atomics+0x198/0x2e0
[   29.972935]  kunit_try_run_case+0x170/0x3f0
[   29.973115]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.973252]  kthread+0x328/0x630
[   29.973391]  ret_from_fork+0x10/0x20
[   29.973516] 
[   29.973759] Allocated by task 265:
[   29.974508]  kasan_save_stack+0x3c/0x68
[   29.974703]  kasan_save_track+0x20/0x40
[   29.974913]  kasan_save_alloc_info+0x40/0x58
[   29.975081]  __kasan_kmalloc+0xd4/0xd8
[   29.975203]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.975497]  kasan_atomics+0xb8/0x2e0
[   29.975612]  kunit_try_run_case+0x170/0x3f0
[   29.975937]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.976122]  kthread+0x328/0x630
[   29.976258]  ret_from_fork+0x10/0x20
[   29.976394] 
[   29.976453] The buggy address belongs to the object at fff00000c770a480
[   29.976453]  which belongs to the cache kmalloc-64 of size 64
[   29.976624] The buggy address is located 0 bytes to the right of
[   29.976624]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.976880] 
[   29.976977] The buggy address belongs to the physical page:
[   29.977063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.977195] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.977356] page_type: f5(slab)
[   29.977472] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.977666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.977982] page dumped because: kasan: bad access detected
[   29.978120] 
[   29.978174] Memory state around the buggy address:
[   29.978256]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.978390]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.978508] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.978605]                                      ^
[   29.978883]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.979042]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.979160] ==================================================================
[   30.035564] ==================================================================
[   30.035678] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   30.035804] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.036707] 
[   30.036823] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.037654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.037764] Hardware name: linux,dummy-virt (DT)
[   30.038017] Call trace:
[   30.038189]  show_stack+0x20/0x38 (C)
[   30.038989]  dump_stack_lvl+0x8c/0xd0
[   30.039381]  print_report+0x118/0x608
[   30.039756]  kasan_report+0xdc/0x128
[   30.040381]  kasan_check_range+0x100/0x1a8
[   30.040756]  __kasan_check_write+0x20/0x30
[   30.041296]  kasan_atomics_helper+0x126c/0x4858
[   30.041503]  kasan_atomics+0x198/0x2e0
[   30.041630]  kunit_try_run_case+0x170/0x3f0
[   30.042254]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.043034]  kthread+0x328/0x630
[   30.043457]  ret_from_fork+0x10/0x20
[   30.043747] 
[   30.044167] Allocated by task 265:
[   30.044256]  kasan_save_stack+0x3c/0x68
[   30.044457]  kasan_save_track+0x20/0x40
[   30.045227]  kasan_save_alloc_info+0x40/0x58
[   30.045387]  __kasan_kmalloc+0xd4/0xd8
[   30.045773]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.045881]  kasan_atomics+0xb8/0x2e0
[   30.046761]  kunit_try_run_case+0x170/0x3f0
[   30.046906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.047022]  kthread+0x328/0x630
[   30.047074]  ret_from_fork+0x10/0x20
[   30.047126] 
[   30.047153] The buggy address belongs to the object at fff00000c770a480
[   30.047153]  which belongs to the cache kmalloc-64 of size 64
[   30.047230] The buggy address is located 0 bytes to the right of
[   30.047230]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.047314] 
[   30.047402] The buggy address belongs to the physical page:
[   30.047609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.047743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.047921] page_type: f5(slab)
[   30.048106] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.048244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.048384] page dumped because: kasan: bad access detected
[   30.048471] 
[   30.048519] Memory state around the buggy address:
[   30.048640]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.048993]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.049574] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.049846]                                      ^
[   30.049943]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.050566]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.050940] ==================================================================
[   29.518953] ==================================================================
[   29.519063] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858
[   29.519172] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.519758] 
[   29.520734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.521094] Hardware name: linux,dummy-virt (DT)
[   29.521247] Call trace:
[   29.521862]  show_stack+0x20/0x38 (C)
[   29.522034]  dump_stack_lvl+0x8c/0xd0
[   29.522504]  print_report+0x118/0x608
[   29.522667]  kasan_report+0xdc/0x128
[   29.523456]  __kasan_check_write+0x20/0x30
[   29.526492]  kthread+0x328/0x630
[   29.527268] 
[   29.527802]  __kasan_kmalloc+0xd4/0xd8
[   29.527976]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.529084]  ret_from_fork+0x10/0x20
[   29.529204] 
[   29.529686] The buggy address is located 0 bytes to the right of
[   29.529686]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.529991] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.530883] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.531037] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.531144] page dumped because: kasan: bad access detected
[   29.531257] 
[   29.531319] Memory state around the buggy address:
[   29.531602]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.531857] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.532672]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.538462]  kasan_report+0xdc/0x128
[   29.540869]  kthread+0x328/0x630
[   29.542528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.544317] 
[   29.546679] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.546820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.546926] page dumped because: kasan: bad access detected
[   29.547008] 
[   29.547080] Memory state around the buggy address:
[   29.547161]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.547274]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.547419] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.547525]                                      ^
[   29.547612]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.547719]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.548041] ==================================================================
[   30.005300] ==================================================================
[   30.005426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   30.005546] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.005676] 
[   30.005739] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.006128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.006243] Hardware name: linux,dummy-virt (DT)
[   30.006356] Call trace:
[   30.006467]  show_stack+0x20/0x38 (C)
[   30.006914]  dump_stack_lvl+0x8c/0xd0
[   30.007108]  print_report+0x118/0x608
[   30.007226]  kasan_report+0xdc/0x128
[   30.007360]  kasan_check_range+0x100/0x1a8
[   30.007490]  __kasan_check_write+0x20/0x30
[   30.007610]  kasan_atomics_helper+0x11f8/0x4858
[   30.007728]  kasan_atomics+0x198/0x2e0
[   30.007859]  kunit_try_run_case+0x170/0x3f0
[   30.009660]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.011533]  kthread+0x328/0x630
[   30.012360]  ret_from_fork+0x10/0x20
[   30.013111] 
[   30.013166] Allocated by task 265:
[   30.013765]  kasan_save_stack+0x3c/0x68
[   30.014010]  kasan_save_track+0x20/0x40
[   30.014678]  kasan_save_alloc_info+0x40/0x58
[   30.014797]  __kasan_kmalloc+0xd4/0xd8
[   30.015627]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.016075]  kasan_atomics+0xb8/0x2e0
[   30.016175]  kunit_try_run_case+0x170/0x3f0
[   30.016275]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.018427]  kthread+0x328/0x630
[   30.018968]  ret_from_fork+0x10/0x20
[   30.019558] 
[   30.019616] The buggy address belongs to the object at fff00000c770a480
[   30.019616]  which belongs to the cache kmalloc-64 of size 64
[   30.020267] The buggy address is located 0 bytes to the right of
[   30.020267]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.021636] 
[   30.021783] The buggy address belongs to the physical page:
[   30.021867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.021997] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.022116] page_type: f5(slab)
[   30.022209] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.024544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.025534] page dumped because: kasan: bad access detected
[   30.025725] 
[   30.025777] Memory state around the buggy address:
[   30.026617]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.027438]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.028219] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.028435]                                      ^
[   30.028920]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.030125]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.030400] ==================================================================
[   30.255580] ==================================================================
[   30.257271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   30.257889] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.258465] 
[   30.258541] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.259166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.259238] Hardware name: linux,dummy-virt (DT)
[   30.259321] Call trace:
[   30.259400]  show_stack+0x20/0x38 (C)
[   30.260864]  dump_stack_lvl+0x8c/0xd0
[   30.261855]  print_report+0x118/0x608
[   30.262002]  kasan_report+0xdc/0x128
[   30.262122]  __asan_report_load8_noabort+0x20/0x30
[   30.262251]  kasan_atomics_helper+0x3e20/0x4858
[   30.264588]  kasan_atomics+0x198/0x2e0
[   30.264928]  kunit_try_run_case+0x170/0x3f0
[   30.265520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.266469]  kthread+0x328/0x630
[   30.266586]  ret_from_fork+0x10/0x20
[   30.267766] 
[   30.267994] Allocated by task 265:
[   30.268080]  kasan_save_stack+0x3c/0x68
[   30.268188]  kasan_save_track+0x20/0x40
[   30.268286]  kasan_save_alloc_info+0x40/0x58
[   30.269541]  __kasan_kmalloc+0xd4/0xd8
[   30.269652]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.270851]  kasan_atomics+0xb8/0x2e0
[   30.271403]  kunit_try_run_case+0x170/0x3f0
[   30.272726]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.273205]  kthread+0x328/0x630
[   30.273534]  ret_from_fork+0x10/0x20
[   30.274292] 
[   30.274369] The buggy address belongs to the object at fff00000c770a480
[   30.274369]  which belongs to the cache kmalloc-64 of size 64
[   30.274780] The buggy address is located 0 bytes to the right of
[   30.274780]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.276119] 
[   30.276502] The buggy address belongs to the physical page:
[   30.276921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.277724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.277867] page_type: f5(slab)
[   30.278844] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.279631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.280212] page dumped because: kasan: bad access detected
[   30.280302] 
[   30.280375] Memory state around the buggy address:
[   30.281582]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.282658]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.283397] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.284089]                                      ^
[   30.284908]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.285072]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.285175] ==================================================================
[   29.928772] ==================================================================
[   29.928883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   29.929018] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.929146] 
[   29.929220] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.929456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.929525] Hardware name: linux,dummy-virt (DT)
[   29.929604] Call trace:
[   29.929657]  show_stack+0x20/0x38 (C)
[   29.929776]  dump_stack_lvl+0x8c/0xd0
[   29.929889]  print_report+0x118/0x608
[   29.930006]  kasan_report+0xdc/0x128
[   29.930118]  kasan_check_range+0x100/0x1a8
[   29.930238]  __kasan_check_write+0x20/0x30
[   29.932295]  kasan_atomics_helper+0xf88/0x4858
[   29.932555]  kasan_atomics+0x198/0x2e0
[   29.932691]  kunit_try_run_case+0x170/0x3f0
[   29.932835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.933479]  kthread+0x328/0x630
[   29.933633]  ret_from_fork+0x10/0x20
[   29.934278] 
[   29.934640] Allocated by task 265:
[   29.934954]  kasan_save_stack+0x3c/0x68
[   29.935083]  kasan_save_track+0x20/0x40
[   29.935504]  kasan_save_alloc_info+0x40/0x58
[   29.935908]  __kasan_kmalloc+0xd4/0xd8
[   29.936434]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.937079]  kasan_atomics+0xb8/0x2e0
[   29.937211]  kunit_try_run_case+0x170/0x3f0
[   29.937363]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.937599]  kthread+0x328/0x630
[   29.938076]  ret_from_fork+0x10/0x20
[   29.938436] 
[   29.938828] The buggy address belongs to the object at fff00000c770a480
[   29.938828]  which belongs to the cache kmalloc-64 of size 64
[   29.939025] The buggy address is located 0 bytes to the right of
[   29.939025]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.939979] 
[   29.940048] The buggy address belongs to the physical page:
[   29.940141] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.940661] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.940938] page_type: f5(slab)
[   29.941039] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.941261] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.941898] page dumped because: kasan: bad access detected
[   29.942009] 
[   29.942063] Memory state around the buggy address:
[   29.942129]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.942193]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.942250] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.942300]                                      ^
[   29.942751]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.943031]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.943224] ==================================================================
[   29.731680] ==================================================================
[   29.731744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   29.731808] Read of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.733223]  kthread+0x328/0x630
[   29.740746] 
[   29.740810] The buggy address belongs to the physical page:
[   29.741079] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.742353]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.747385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   29.748203]  dump_stack_lvl+0x8c/0xd0
[   29.755143] The buggy address belongs to the physical page:
[   29.755511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.755787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.755959] page_type: f5(slab)
[   29.756299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.756566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.756676] page dumped because: kasan: bad access detected
[   29.756758] 
[   29.756810] Memory state around the buggy address:
[   29.757137]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.757674]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.758206] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.758533]                                      ^
[   29.758677]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.758909]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.759018] ==================================================================
[   29.979803] ==================================================================
[   29.979906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   29.980147] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.980380] 
[   29.980610] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.981083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.981250] Hardware name: linux,dummy-virt (DT)
[   29.981477] Call trace:
[   29.981588]  show_stack+0x20/0x38 (C)
[   29.981758]  dump_stack_lvl+0x8c/0xd0
[   29.981893]  print_report+0x118/0x608
[   29.982023]  kasan_report+0xdc/0x128
[   29.982248]  kasan_check_range+0x100/0x1a8
[   29.982424]  __kasan_check_write+0x20/0x30
[   29.982544]  kasan_atomics_helper+0x1128/0x4858
[   29.983926]  kasan_atomics+0x198/0x2e0
[   29.984440]  kunit_try_run_case+0x170/0x3f0
[   29.984638]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.984884]  kthread+0x328/0x630
[   29.985073]  ret_from_fork+0x10/0x20
[   29.985319] 
[   29.985422] Allocated by task 265:
[   29.985757]  kasan_save_stack+0x3c/0x68
[   29.985908]  kasan_save_track+0x20/0x40
[   29.986015]  kasan_save_alloc_info+0x40/0x58
[   29.986165]  __kasan_kmalloc+0xd4/0xd8
[   29.987937]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.988425]  kasan_atomics+0xb8/0x2e0
[   29.989363]  kunit_try_run_case+0x170/0x3f0
[   29.989624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.989929]  kthread+0x328/0x630
[   29.990022]  ret_from_fork+0x10/0x20
[   29.990283] 
[   29.990490] The buggy address belongs to the object at fff00000c770a480
[   29.990490]  which belongs to the cache kmalloc-64 of size 64
[   29.991302] The buggy address is located 0 bytes to the right of
[   29.991302]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.991761] 
[   29.992198] The buggy address belongs to the physical page:
[   29.992293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.992506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.992681] page_type: f5(slab)
[   29.992798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.993084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.993193] page dumped because: kasan: bad access detected
[   29.993316] 
[   29.993447] Memory state around the buggy address:
[   29.993526]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.993717]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.993962] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.994140]                                      ^
[   29.994277]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.994843]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.995368] ==================================================================
[   29.717808] ==================================================================
[   29.718000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   29.718119] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.719064] Hardware name: linux,dummy-virt (DT)
[   29.722364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.727282] The buggy address is located 0 bytes to the right of
[   29.727282]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.728211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.730593]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.730697] ==================================================================
[   29.549485] ==================================================================
[   29.549593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   29.549873] Read of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.550012] 
[   29.550081] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.550382] Hardware name: linux,dummy-virt (DT)
[   29.551313]  __asan_report_load4_noabort+0x20/0x30
[   29.554707] 
[   29.557094]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.558635] 
[   29.558841] The buggy address is located 0 bytes to the right of
[   29.558841]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.560558] page_type: f5(slab)
[   29.561757]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.565879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   29.572364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.572509]  kthread+0x328/0x630
[   29.572627]  ret_from_fork+0x10/0x20
[   29.573964] 
[   29.574216] Allocated by task 265:
[   29.574298]  kasan_save_stack+0x3c/0x68
[   29.575018]  kasan_save_track+0x20/0x40
[   29.575404]  kasan_save_alloc_info+0x40/0x58
[   29.576001]  __kasan_kmalloc+0xd4/0xd8
[   29.576119]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.576667]  kasan_atomics+0xb8/0x2e0
[   29.576812]  kunit_try_run_case+0x170/0x3f0
[   29.577223]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.577767]  kthread+0x328/0x630
[   29.577910]  ret_from_fork+0x10/0x20
[   29.578013] 
[   29.578770] The buggy address belongs to the object at fff00000c770a480
[   29.578770]  which belongs to the cache kmalloc-64 of size 64
[   29.579245] The buggy address is located 0 bytes to the right of
[   29.579245]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.579705] 
[   29.579762] The buggy address belongs to the physical page:
[   29.580451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.581058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.581191] page_type: f5(slab)
[   29.581298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.581448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.581557] page dumped because: kasan: bad access detected
[   29.581640] 
[   29.581687] Memory state around the buggy address:
[   29.582380]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.582612]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.582819] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.583902]                                      ^
[   29.584313]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.584457]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.585261] ==================================================================
[   29.630227] ==================================================================
[   29.630361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   29.630482] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.630610] 
[   29.630681] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.632609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.633964] Hardware name: linux,dummy-virt (DT)
[   29.634054] Call trace:
[   29.635011]  show_stack+0x20/0x38 (C)
[   29.635216]  dump_stack_lvl+0x8c/0xd0
[   29.635457]  print_report+0x118/0x608
[   29.636368]  kasan_report+0xdc/0x128
[   29.636642]  kasan_check_range+0x100/0x1a8
[   29.636782]  __kasan_check_write+0x20/0x30
[   29.637702]  kasan_atomics_helper+0xa6c/0x4858
[   29.638559]  kasan_atomics+0x198/0x2e0
[   29.638972]  kunit_try_run_case+0x170/0x3f0
[   29.639431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.640626]  kthread+0x328/0x630
[   29.641037]  ret_from_fork+0x10/0x20
[   29.642016] 
[   29.642136] Allocated by task 265:
[   29.642221]  kasan_save_stack+0x3c/0x68
[   29.643293]  kasan_save_track+0x20/0x40
[   29.643571]  kasan_save_alloc_info+0x40/0x58
[   29.644515]  __kasan_kmalloc+0xd4/0xd8
[   29.644994]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.645111]  kasan_atomics+0xb8/0x2e0
[   29.645603]  kunit_try_run_case+0x170/0x3f0
[   29.645970]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.646094]  kthread+0x328/0x630
[   29.647404]  ret_from_fork+0x10/0x20
[   29.647927] 
[   29.648104] The buggy address belongs to the object at fff00000c770a480
[   29.648104]  which belongs to the cache kmalloc-64 of size 64
[   29.648485] The buggy address is located 0 bytes to the right of
[   29.648485]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.648658] 
[   29.649421] The buggy address belongs to the physical page:
[   29.649547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.650871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.651436] page_type: f5(slab)
[   29.651577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.651707] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.651814] page dumped because: kasan: bad access detected
[   29.652877] 
[   29.652989] Memory state around the buggy address:
[   29.653506]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.654272]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.654408] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.654512]                                      ^
[   29.655847]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.656016]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.656809] ==================================================================
[   29.885390] ==================================================================
[   29.885493] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   29.886886] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.887312] 
[   29.887434] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.887668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.887953] Hardware name: linux,dummy-virt (DT)
[   29.888940] Call trace:
[   29.889029]  show_stack+0x20/0x38 (C)
[   29.889157]  dump_stack_lvl+0x8c/0xd0
[   29.889427]  print_report+0x118/0x608
[   29.889567]  kasan_report+0xdc/0x128
[   29.889797]  kasan_check_range+0x100/0x1a8
[   29.889968]  __kasan_check_write+0x20/0x30
[   29.890160]  kasan_atomics_helper+0xeb8/0x4858
[   29.890443]  kasan_atomics+0x198/0x2e0
[   29.890627]  kunit_try_run_case+0x170/0x3f0
[   29.890955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.891102]  kthread+0x328/0x630
[   29.891668]  ret_from_fork+0x10/0x20
[   29.892078] 
[   29.892135] Allocated by task 265:
[   29.892236]  kasan_save_stack+0x3c/0x68
[   29.892369]  kasan_save_track+0x20/0x40
[   29.892473]  kasan_save_alloc_info+0x40/0x58
[   29.893749]  __kasan_kmalloc+0xd4/0xd8
[   29.894823]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.894976]  kasan_atomics+0xb8/0x2e0
[   29.895662]  kunit_try_run_case+0x170/0x3f0
[   29.896129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.896257]  kthread+0x328/0x630
[   29.896375]  ret_from_fork+0x10/0x20
[   29.896482] 
[   29.896538] The buggy address belongs to the object at fff00000c770a480
[   29.896538]  which belongs to the cache kmalloc-64 of size 64
[   29.896687] The buggy address is located 0 bytes to the right of
[   29.896687]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.896847] 
[   29.897722] The buggy address belongs to the physical page:
[   29.897982] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.898359] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.898965] page_type: f5(slab)
[   29.899418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.900026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.900131] page dumped because: kasan: bad access detected
[   29.900922] 
[   29.901356] Memory state around the buggy address:
[   29.901460]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.901590]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.901716] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.902611]                                      ^
[   29.902866]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.903589]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.903856] ==================================================================
[   30.198510] ==================================================================
[   30.198624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   30.198801] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.199167] 
[   30.199248] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.199474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.199544] Hardware name: linux,dummy-virt (DT)
[   30.199650] Call trace:
[   30.199729]  show_stack+0x20/0x38 (C)
[   30.199931]  dump_stack_lvl+0x8c/0xd0
[   30.200362]  print_report+0x118/0x608
[   30.200523]  kasan_report+0xdc/0x128
[   30.200654]  __asan_report_load8_noabort+0x20/0x30
[   30.200791]  kasan_atomics_helper+0x3df4/0x4858
[   30.200942]  kasan_atomics+0x198/0x2e0
[   30.201238]  kunit_try_run_case+0x170/0x3f0
[   30.201532]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.201733]  kthread+0x328/0x630
[   30.201882]  ret_from_fork+0x10/0x20
[   30.202165] 
[   30.202316] Allocated by task 265:
[   30.202444]  kasan_save_stack+0x3c/0x68
[   30.202717]  kasan_save_track+0x20/0x40
[   30.202833]  kasan_save_alloc_info+0x40/0x58
[   30.202968]  __kasan_kmalloc+0xd4/0xd8
[   30.203264]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.203403]  kasan_atomics+0xb8/0x2e0
[   30.203797]  kunit_try_run_case+0x170/0x3f0
[   30.203933]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.204072]  kthread+0x328/0x630
[   30.204174]  ret_from_fork+0x10/0x20
[   30.205034] 
[   30.205405] The buggy address belongs to the object at fff00000c770a480
[   30.205405]  which belongs to the cache kmalloc-64 of size 64
[   30.205833] The buggy address is located 0 bytes to the right of
[   30.205833]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.206486] 
[   30.206601] The buggy address belongs to the physical page:
[   30.206699] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.207396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.207565] page_type: f5(slab)
[   30.207668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.207797] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.207909] page dumped because: kasan: bad access detected
[   30.208015] 
[   30.208081] Memory state around the buggy address:
[   30.208359]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.208868]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.208991] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.209674]                                      ^
[   30.209994]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.210522]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.210703] ==================================================================
[   29.588949] ==================================================================
[   29.589052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   29.589159] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.589300] 
[   29.589429] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.589662] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.589742] Hardware name: linux,dummy-virt (DT)
[   29.589821] Call trace:
[   29.589876]  show_stack+0x20/0x38 (C)
[   29.589994]  dump_stack_lvl+0x8c/0xd0
[   29.590116]  print_report+0x118/0x608
[   29.590241]  kasan_report+0xdc/0x128
[   29.590784]  kasan_check_range+0x100/0x1a8
[   29.590916]  __kasan_check_write+0x20/0x30
[   29.591028]  kasan_atomics_helper+0x99c/0x4858
[   29.591147]  kasan_atomics+0x198/0x2e0
[   29.591254]  kunit_try_run_case+0x170/0x3f0
[   29.592032]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.592418]  kthread+0x328/0x630
[   29.592540]  ret_from_fork+0x10/0x20
[   29.592660] 
[   29.592712] Allocated by task 265:
[   29.592781]  kasan_save_stack+0x3c/0x68
[   29.592890]  kasan_save_track+0x20/0x40
[   29.592993]  kasan_save_alloc_info+0x40/0x58
[   29.593091]  __kasan_kmalloc+0xd4/0xd8
[   29.593177]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.593289]  kasan_atomics+0xb8/0x2e0
[   29.594416]  kunit_try_run_case+0x170/0x3f0
[   29.594537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.594662]  kthread+0x328/0x630
[   29.594745]  ret_from_fork+0x10/0x20
[   29.594836] 
[   29.594897] The buggy address belongs to the object at fff00000c770a480
[   29.594897]  which belongs to the cache kmalloc-64 of size 64
[   29.596591] The buggy address is located 0 bytes to the right of
[   29.596591]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.597070] 
[   29.597128] The buggy address belongs to the physical page:
[   29.597206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.597373] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.597655] page_type: f5(slab)
[   29.597772] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.597903] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.598012] page dumped because: kasan: bad access detected
[   29.598103] 
[   29.598159] Memory state around the buggy address:
[   29.598246]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.598383]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.598495] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.598595]                                      ^
[   29.598677]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.598788]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.598886] ==================================================================
[   29.873306] ==================================================================
[   29.873478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   29.873596] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.873722] 
[   29.873806] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.874220] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.874393] Hardware name: linux,dummy-virt (DT)
[   29.874490] Call trace:
[   29.874548]  show_stack+0x20/0x38 (C)
[   29.874776]  dump_stack_lvl+0x8c/0xd0
[   29.875137]  print_report+0x118/0x608
[   29.875399]  kasan_report+0xdc/0x128
[   29.875527]  __asan_report_store8_noabort+0x20/0x30
[   29.875670]  kasan_atomics_helper+0x3e5c/0x4858
[   29.875806]  kasan_atomics+0x198/0x2e0
[   29.876060]  kunit_try_run_case+0x170/0x3f0
[   29.876406]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.876673]  kthread+0x328/0x630
[   29.876795]  ret_from_fork+0x10/0x20
[   29.876945] 
[   29.877010] Allocated by task 265:
[   29.877350]  kasan_save_stack+0x3c/0x68
[   29.877644]  kasan_save_track+0x20/0x40
[   29.877753]  kasan_save_alloc_info+0x40/0x58
[   29.878145]  __kasan_kmalloc+0xd4/0xd8
[   29.878257]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.878385]  kasan_atomics+0xb8/0x2e0
[   29.878589]  kunit_try_run_case+0x170/0x3f0
[   29.878707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.878845]  kthread+0x328/0x630
[   29.879033]  ret_from_fork+0x10/0x20
[   29.879221] 
[   29.879792] The buggy address belongs to the object at fff00000c770a480
[   29.879792]  which belongs to the cache kmalloc-64 of size 64
[   29.880013] The buggy address is located 0 bytes to the right of
[   29.880013]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.880186] 
[   29.880250] The buggy address belongs to the physical page:
[   29.880349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.880482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.880643] page_type: f5(slab)
[   29.880738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.881009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.881148] page dumped because: kasan: bad access detected
[   29.881367] 
[   29.882201] Memory state around the buggy address:
[   29.882929]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.883101]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.883230] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.883364]                                      ^
[   29.883624]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.884225]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.884507] ==================================================================
[   29.906919] ==================================================================
[   29.907024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   29.907135] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.907258] 
[   29.907324] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.907968] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.908525] Hardware name: linux,dummy-virt (DT)
[   29.908726] Call trace:
[   29.909749]  show_stack+0x20/0x38 (C)
[   29.910888]  dump_stack_lvl+0x8c/0xd0
[   29.911387]  print_report+0x118/0x608
[   29.911516]  kasan_report+0xdc/0x128
[   29.912437]  kasan_check_range+0x100/0x1a8
[   29.913205]  __kasan_check_write+0x20/0x30
[   29.913986]  kasan_atomics_helper+0xf20/0x4858
[   29.914136]  kasan_atomics+0x198/0x2e0
[   29.914257]  kunit_try_run_case+0x170/0x3f0
[   29.914407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.914553]  kthread+0x328/0x630
[   29.914672]  ret_from_fork+0x10/0x20
[   29.915897] 
[   29.916046] Allocated by task 265:
[   29.916142]  kasan_save_stack+0x3c/0x68
[   29.916263]  kasan_save_track+0x20/0x40
[   29.917068]  kasan_save_alloc_info+0x40/0x58
[   29.917266]  __kasan_kmalloc+0xd4/0xd8
[   29.917645]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.918121]  kasan_atomics+0xb8/0x2e0
[   29.918768]  kunit_try_run_case+0x170/0x3f0
[   29.918883]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.919790]  kthread+0x328/0x630
[   29.919882]  ret_from_fork+0x10/0x20
[   29.919935] 
[   29.919962] The buggy address belongs to the object at fff00000c770a480
[   29.919962]  which belongs to the cache kmalloc-64 of size 64
[   29.920141] The buggy address is located 0 bytes to the right of
[   29.920141]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.920515] 
[   29.920600] The buggy address belongs to the physical page:
[   29.920954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.921431] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.921893] page_type: f5(slab)
[   29.922538] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.922676] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.923354] page dumped because: kasan: bad access detected
[   29.923460] 
[   29.923509] Memory state around the buggy address:
[   29.924612]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.924825]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.924937] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.925035]                                      ^
[   29.925126]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.926756]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.927432] ==================================================================
[   30.052058] ==================================================================
[   30.052171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   30.052420] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.053102] 
[   30.053307] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.053545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.053616] Hardware name: linux,dummy-virt (DT)
[   30.054136] Call trace:
[   30.054265]  show_stack+0x20/0x38 (C)
[   30.054416]  dump_stack_lvl+0x8c/0xd0
[   30.054670]  print_report+0x118/0x608
[   30.054820]  kasan_report+0xdc/0x128
[   30.054953]  kasan_check_range+0x100/0x1a8
[   30.055377]  __kasan_check_write+0x20/0x30
[   30.055541]  kasan_atomics_helper+0x12d8/0x4858
[   30.055790]  kasan_atomics+0x198/0x2e0
[   30.055953]  kunit_try_run_case+0x170/0x3f0
[   30.056095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.056299]  kthread+0x328/0x630
[   30.056431]  ret_from_fork+0x10/0x20
[   30.056626] 
[   30.056841] Allocated by task 265:
[   30.056917]  kasan_save_stack+0x3c/0x68
[   30.057024]  kasan_save_track+0x20/0x40
[   30.057120]  kasan_save_alloc_info+0x40/0x58
[   30.057246]  __kasan_kmalloc+0xd4/0xd8
[   30.057404]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.057606]  kasan_atomics+0xb8/0x2e0
[   30.057898]  kunit_try_run_case+0x170/0x3f0
[   30.058008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.058123]  kthread+0x328/0x630
[   30.058219]  ret_from_fork+0x10/0x20
[   30.058478] 
[   30.058536] The buggy address belongs to the object at fff00000c770a480
[   30.058536]  which belongs to the cache kmalloc-64 of size 64
[   30.058715] The buggy address is located 0 bytes to the right of
[   30.058715]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.058970] 
[   30.059133] The buggy address belongs to the physical page:
[   30.059362] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.059505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.059626] page_type: f5(slab)
[   30.059740] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.059957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.060081] page dumped because: kasan: bad access detected
[   30.060175] 
[   30.060221] Memory state around the buggy address:
[   30.060300]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.060445]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.060570] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.060736]                                      ^
[   30.060834]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.060980]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.061124] ==================================================================
[   30.125234] ==================================================================
[   30.125434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   30.125550] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.125668] 
[   30.125744] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.125952] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.126028] Hardware name: linux,dummy-virt (DT)
[   30.126107] Call trace:
[   30.126165]  show_stack+0x20/0x38 (C)
[   30.126300]  dump_stack_lvl+0x8c/0xd0
[   30.126447]  print_report+0x118/0x608
[   30.126702]  kasan_report+0xdc/0x128
[   30.127535]  kasan_check_range+0x100/0x1a8
[   30.127660]  __kasan_check_write+0x20/0x30
[   30.127768]  kasan_atomics_helper+0x14e4/0x4858
[   30.127979]  kasan_atomics+0x198/0x2e0
[   30.128158]  kunit_try_run_case+0x170/0x3f0
[   30.128277]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.128442]  kthread+0x328/0x630
[   30.128549]  ret_from_fork+0x10/0x20
[   30.128661] 
[   30.128722] Allocated by task 265:
[   30.128813]  kasan_save_stack+0x3c/0x68
[   30.129011]  kasan_save_track+0x20/0x40
[   30.130307]  kasan_save_alloc_info+0x40/0x58
[   30.130502]  __kasan_kmalloc+0xd4/0xd8
[   30.130689]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.130825]  kasan_atomics+0xb8/0x2e0
[   30.130936]  kunit_try_run_case+0x170/0x3f0
[   30.131053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.131180]  kthread+0x328/0x630
[   30.131281]  ret_from_fork+0x10/0x20
[   30.131413] 
[   30.131468] The buggy address belongs to the object at fff00000c770a480
[   30.131468]  which belongs to the cache kmalloc-64 of size 64
[   30.131614] The buggy address is located 0 bytes to the right of
[   30.131614]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.131774] 
[   30.131825] The buggy address belongs to the physical page:
[   30.131907] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.132039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.132166] page_type: f5(slab)
[   30.132269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.133035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.133183] page dumped because: kasan: bad access detected
[   30.133261] 
[   30.133316] Memory state around the buggy address:
[   30.133512]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.134464]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.134666] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.134784]                                      ^
[   30.134877]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.134986]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.135083] ==================================================================
[   29.830139] ==================================================================
[   29.830243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   29.830374] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.830505] 
[   29.830572] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.830771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.831384] Hardware name: linux,dummy-virt (DT)
[   29.831801] Call trace:
[   29.832456]  show_stack+0x20/0x38 (C)
[   29.833366]  dump_stack_lvl+0x8c/0xd0
[   29.833834]  print_report+0x118/0x608
[   29.834085]  kasan_report+0xdc/0x128
[   29.834817]  __asan_report_load8_noabort+0x20/0x30
[   29.834976]  kasan_atomics_helper+0x3f58/0x4858
[   29.835432]  kasan_atomics+0x198/0x2e0
[   29.835656]  kunit_try_run_case+0x170/0x3f0
[   29.835810]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.835978]  kthread+0x328/0x630
[   29.836467]  ret_from_fork+0x10/0x20
[   29.837171] 
[   29.837446] Allocated by task 265:
[   29.837538]  kasan_save_stack+0x3c/0x68
[   29.837674]  kasan_save_track+0x20/0x40
[   29.837776]  kasan_save_alloc_info+0x40/0x58
[   29.838297]  __kasan_kmalloc+0xd4/0xd8
[   29.838420]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.839213]  kasan_atomics+0xb8/0x2e0
[   29.839322]  kunit_try_run_case+0x170/0x3f0
[   29.839459]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.839581]  kthread+0x328/0x630
[   29.839675]  ret_from_fork+0x10/0x20
[   29.840841] 
[   29.840933] The buggy address belongs to the object at fff00000c770a480
[   29.840933]  which belongs to the cache kmalloc-64 of size 64
[   29.841196] The buggy address is located 0 bytes to the right of
[   29.841196]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.841504] 
[   29.841788] The buggy address belongs to the physical page:
[   29.842566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.842959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.843638] page_type: f5(slab)
[   29.843933] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.844080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.844193] page dumped because: kasan: bad access detected
[   29.845042] 
[   29.845097] Memory state around the buggy address:
[   29.845179]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.846305]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.846450] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.846904]                                      ^
[   29.847351]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.847701]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.847808] ==================================================================
[   30.076939] ==================================================================
[   30.077130] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   30.077252] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.077409] 
[   30.077484] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.078122] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.078263] Hardware name: linux,dummy-virt (DT)
[   30.078513] Call trace:
[   30.078731]  show_stack+0x20/0x38 (C)
[   30.078864]  dump_stack_lvl+0x8c/0xd0
[   30.078989]  print_report+0x118/0x608
[   30.079105]  kasan_report+0xdc/0x128
[   30.079223]  __asan_report_load8_noabort+0x20/0x30
[   30.079364]  kasan_atomics_helper+0x3f04/0x4858
[   30.079489]  kasan_atomics+0x198/0x2e0
[   30.079620]  kunit_try_run_case+0x170/0x3f0
[   30.079922]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.080225]  kthread+0x328/0x630
[   30.080437]  ret_from_fork+0x10/0x20
[   30.080588] 
[   30.080647] Allocated by task 265:
[   30.080830]  kasan_save_stack+0x3c/0x68
[   30.081152]  kasan_save_track+0x20/0x40
[   30.081273]  kasan_save_alloc_info+0x40/0x58
[   30.081445]  __kasan_kmalloc+0xd4/0xd8
[   30.081761]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.081872]  kasan_atomics+0xb8/0x2e0
[   30.082028]  kunit_try_run_case+0x170/0x3f0
[   30.082155]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.082376]  kthread+0x328/0x630
[   30.082485]  ret_from_fork+0x10/0x20
[   30.082594] 
[   30.082644] The buggy address belongs to the object at fff00000c770a480
[   30.082644]  which belongs to the cache kmalloc-64 of size 64
[   30.082831] The buggy address is located 0 bytes to the right of
[   30.082831]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.083048] 
[   30.083221] The buggy address belongs to the physical page:
[   30.083784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.084189] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.084320] page_type: f5(slab)
[   30.084443] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.084570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.084679] page dumped because: kasan: bad access detected
[   30.086253] 
[   30.086696] Memory state around the buggy address:
[   30.087449]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.088298]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.088448] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.088987]                                      ^
[   30.089425]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.089639]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.089742] ==================================================================
[   30.211853] ==================================================================
[   30.211961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   30.212075] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.212146] 
[   30.212187] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.212442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.212609] Hardware name: linux,dummy-virt (DT)
[   30.212951] Call trace:
[   30.213011]  show_stack+0x20/0x38 (C)
[   30.213880]  dump_stack_lvl+0x8c/0xd0
[   30.214846]  print_report+0x118/0x608
[   30.215789]  kasan_report+0xdc/0x128
[   30.216320]  kasan_check_range+0x100/0x1a8
[   30.217039]  __kasan_check_write+0x20/0x30
[   30.217513]  kasan_atomics_helper+0x16d0/0x4858
[   30.218234]  kasan_atomics+0x198/0x2e0
[   30.218374]  kunit_try_run_case+0x170/0x3f0
[   30.218505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.219898]  kthread+0x328/0x630
[   30.220037]  ret_from_fork+0x10/0x20
[   30.220183] 
[   30.220247] Allocated by task 265:
[   30.220350]  kasan_save_stack+0x3c/0x68
[   30.220469]  kasan_save_track+0x20/0x40
[   30.220591]  kasan_save_alloc_info+0x40/0x58
[   30.220717]  __kasan_kmalloc+0xd4/0xd8
[   30.220833]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.220958]  kasan_atomics+0xb8/0x2e0
[   30.221072]  kunit_try_run_case+0x170/0x3f0
[   30.221191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.221349]  kthread+0x328/0x630
[   30.221457]  ret_from_fork+0x10/0x20
[   30.221573] 
[   30.221630] The buggy address belongs to the object at fff00000c770a480
[   30.221630]  which belongs to the cache kmalloc-64 of size 64
[   30.221776] The buggy address is located 0 bytes to the right of
[   30.221776]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.221938] 
[   30.221996] The buggy address belongs to the physical page:
[   30.222072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.222203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.222318] page_type: f5(slab)
[   30.222506] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.222655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.222778] page dumped because: kasan: bad access detected
[   30.222897] 
[   30.222957] Memory state around the buggy address:
[   30.223068]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.223904]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.224033] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.224193]                                      ^
[   30.224290]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.224428]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.224538] ==================================================================
[   30.290850] ==================================================================
[   30.290959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   30.292260] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.292695] 
[   30.292775] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.292993] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.295585] Hardware name: linux,dummy-virt (DT)
[   30.295845] Call trace:
[   30.295912]  show_stack+0x20/0x38 (C)
[   30.296039]  dump_stack_lvl+0x8c/0xd0
[   30.296175]  print_report+0x118/0x608
[   30.297362]  kasan_report+0xdc/0x128
[   30.297504]  kasan_check_range+0x100/0x1a8
[   30.297575]  __kasan_check_write+0x20/0x30
[   30.297651]  kasan_atomics_helper+0x17ec/0x4858
[   30.297758]  kasan_atomics+0x198/0x2e0
[   30.297819]  kunit_try_run_case+0x170/0x3f0
[   30.297888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.297959]  kthread+0x328/0x630
[   30.298012]  ret_from_fork+0x10/0x20
[   30.298074] 
[   30.298099] Allocated by task 265:
[   30.298136]  kasan_save_stack+0x3c/0x68
[   30.298191]  kasan_save_track+0x20/0x40
[   30.298241]  kasan_save_alloc_info+0x40/0x58
[   30.298292]  __kasan_kmalloc+0xd4/0xd8
[   30.298413]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.298758]  kasan_atomics+0xb8/0x2e0
[   30.298954]  kunit_try_run_case+0x170/0x3f0
[   30.299188]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.299555]  kthread+0x328/0x630
[   30.299663]  ret_from_fork+0x10/0x20
[   30.299782] 
[   30.299983] The buggy address belongs to the object at fff00000c770a480
[   30.299983]  which belongs to the cache kmalloc-64 of size 64
[   30.300618] The buggy address is located 0 bytes to the right of
[   30.300618]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.301135] 
[   30.301486] The buggy address belongs to the physical page:
[   30.301613] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.301770] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.301911] page_type: f5(slab)
[   30.302117] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.303064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.303180] page dumped because: kasan: bad access detected
[   30.303598] 
[   30.303806] Memory state around the buggy address:
[   30.303959]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.304596]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.304977] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.305082]                                      ^
[   30.305545]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.305660]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.305757] ==================================================================
[   30.182658] ==================================================================
[   30.182764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   30.182883] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.183007] 
[   30.183073] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.183276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.183360] Hardware name: linux,dummy-virt (DT)
[   30.184053] Call trace:
[   30.184185]  show_stack+0x20/0x38 (C)
[   30.184419]  dump_stack_lvl+0x8c/0xd0
[   30.184763]  print_report+0x118/0x608
[   30.184888]  kasan_report+0xdc/0x128
[   30.185004]  kasan_check_range+0x100/0x1a8
[   30.185531]  __kasan_check_write+0x20/0x30
[   30.185874]  kasan_atomics_helper+0x1644/0x4858
[   30.186292]  kasan_atomics+0x198/0x2e0
[   30.186524]  kunit_try_run_case+0x170/0x3f0
[   30.187054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.187202]  kthread+0x328/0x630
[   30.187313]  ret_from_fork+0x10/0x20
[   30.187572] 
[   30.187663] Allocated by task 265:
[   30.187736]  kasan_save_stack+0x3c/0x68
[   30.188836]  kasan_save_track+0x20/0x40
[   30.189060]  kasan_save_alloc_info+0x40/0x58
[   30.189349]  __kasan_kmalloc+0xd4/0xd8
[   30.190105]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.190226]  kasan_atomics+0xb8/0x2e0
[   30.190854]  kunit_try_run_case+0x170/0x3f0
[   30.190971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.191382]  kthread+0x328/0x630
[   30.191937]  ret_from_fork+0x10/0x20
[   30.192230] 
[   30.192295] The buggy address belongs to the object at fff00000c770a480
[   30.192295]  which belongs to the cache kmalloc-64 of size 64
[   30.192757] The buggy address is located 0 bytes to the right of
[   30.192757]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.193077] 
[   30.193174] The buggy address belongs to the physical page:
[   30.193348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.193500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.193889] page_type: f5(slab)
[   30.194171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.194314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.194659] page dumped because: kasan: bad access detected
[   30.195087] 
[   30.195151] Memory state around the buggy address:
[   30.195232]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.195735]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.195975] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.196360]                                      ^
[   30.196467]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.196581]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.196691] ==================================================================
[   30.165435] ==================================================================
[   30.165831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   30.165970] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.166576] 
[   30.166662] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.166976] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.167057] Hardware name: linux,dummy-virt (DT)
[   30.167141] Call trace:
[   30.167195]  show_stack+0x20/0x38 (C)
[   30.167318]  dump_stack_lvl+0x8c/0xd0
[   30.167467]  print_report+0x118/0x608
[   30.168478]  kasan_report+0xdc/0x128
[   30.168777]  __asan_report_load8_noabort+0x20/0x30
[   30.169043]  kasan_atomics_helper+0x3db0/0x4858
[   30.169400]  kasan_atomics+0x198/0x2e0
[   30.169551]  kunit_try_run_case+0x170/0x3f0
[   30.169691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.170216]  kthread+0x328/0x630
[   30.170366]  ret_from_fork+0x10/0x20
[   30.171133] 
[   30.171263] Allocated by task 265:
[   30.171359]  kasan_save_stack+0x3c/0x68
[   30.171488]  kasan_save_track+0x20/0x40
[   30.171606]  kasan_save_alloc_info+0x40/0x58
[   30.171739]  __kasan_kmalloc+0xd4/0xd8
[   30.172013]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.172415]  kasan_atomics+0xb8/0x2e0
[   30.172533]  kunit_try_run_case+0x170/0x3f0
[   30.172875]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.173436]  kthread+0x328/0x630
[   30.173564]  ret_from_fork+0x10/0x20
[   30.173953] 
[   30.174310] The buggy address belongs to the object at fff00000c770a480
[   30.174310]  which belongs to the cache kmalloc-64 of size 64
[   30.174680] The buggy address is located 0 bytes to the right of
[   30.174680]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.174852] 
[   30.175705] The buggy address belongs to the physical page:
[   30.176680] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.176957] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.177677] page_type: f5(slab)
[   30.178463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.179127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.179375] page dumped because: kasan: bad access detected
[   30.180096] 
[   30.180155] Memory state around the buggy address:
[   30.180553]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.181083]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.181260] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.181395]                                      ^
[   30.181480]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.181666]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.181971] ==================================================================
[   30.137118] ==================================================================
[   30.137227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   30.137367] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.137492] 
[   30.137562] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.137769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.137840] Hardware name: linux,dummy-virt (DT)
[   30.137917] Call trace:
[   30.137969]  show_stack+0x20/0x38 (C)
[   30.138082]  dump_stack_lvl+0x8c/0xd0
[   30.138199]  print_report+0x118/0x608
[   30.138321]  kasan_report+0xdc/0x128
[   30.138474]  kasan_check_range+0x100/0x1a8
[   30.138593]  __kasan_check_write+0x20/0x30
[   30.138708]  kasan_atomics_helper+0x154c/0x4858
[   30.138857]  kasan_atomics+0x198/0x2e0
[   30.138992]  kunit_try_run_case+0x170/0x3f0
[   30.139125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.139257]  kthread+0x328/0x630
[   30.139766]  ret_from_fork+0x10/0x20
[   30.140464] 
[   30.140609] Allocated by task 265:
[   30.140703]  kasan_save_stack+0x3c/0x68
[   30.140812]  kasan_save_track+0x20/0x40
[   30.140909]  kasan_save_alloc_info+0x40/0x58
[   30.141680]  __kasan_kmalloc+0xd4/0xd8
[   30.141791]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.141897]  kasan_atomics+0xb8/0x2e0
[   30.141997]  kunit_try_run_case+0x170/0x3f0
[   30.142780]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.143011]  kthread+0x328/0x630
[   30.143291]  ret_from_fork+0x10/0x20
[   30.143418] 
[   30.143748] The buggy address belongs to the object at fff00000c770a480
[   30.143748]  which belongs to the cache kmalloc-64 of size 64
[   30.144040] The buggy address is located 0 bytes to the right of
[   30.144040]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.144853] 
[   30.145158] The buggy address belongs to the physical page:
[   30.145349] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.145740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.145954] page_type: f5(slab)
[   30.146053] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.146287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.146861] page dumped because: kasan: bad access detected
[   30.147215] 
[   30.147307] Memory state around the buggy address:
[   30.147452]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.148125]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.148312] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.148489]                                      ^
[   30.148587]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.148720]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.148822] ==================================================================
[   29.788929] ==================================================================
[   29.789043] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   29.789802] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.790848] 
[   29.791040] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.791546] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.791634] Hardware name: linux,dummy-virt (DT)
[   29.791884] Call trace:
[   29.791944]  show_stack+0x20/0x38 (C)
[   29.792298]  dump_stack_lvl+0x8c/0xd0
[   29.792520]  print_report+0x118/0x608
[   29.792647]  kasan_report+0xdc/0x128
[   29.792811]  kasan_check_range+0x100/0x1a8
[   29.793105]  __kasan_check_write+0x20/0x30
[   29.793484]  kasan_atomics_helper+0xd3c/0x4858
[   29.793627]  kasan_atomics+0x198/0x2e0
[   29.793958]  kunit_try_run_case+0x170/0x3f0
[   29.794086]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.794842]  kthread+0x328/0x630
[   29.794976]  ret_from_fork+0x10/0x20
[   29.795099] 
[   29.795163] Allocated by task 265:
[   29.795253]  kasan_save_stack+0x3c/0x68
[   29.795415]  kasan_save_track+0x20/0x40
[   29.795665]  kasan_save_alloc_info+0x40/0x58
[   29.795761]  __kasan_kmalloc+0xd4/0xd8
[   29.796355]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.796484]  kasan_atomics+0xb8/0x2e0
[   29.796750]  kunit_try_run_case+0x170/0x3f0
[   29.796871]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.796994]  kthread+0x328/0x630
[   29.797097]  ret_from_fork+0x10/0x20
[   29.797194] 
[   29.797245] The buggy address belongs to the object at fff00000c770a480
[   29.797245]  which belongs to the cache kmalloc-64 of size 64
[   29.799913] The buggy address is located 0 bytes to the right of
[   29.799913]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.800135] 
[   29.800257] The buggy address belongs to the physical page:
[   29.800364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.800494] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.800617] page_type: f5(slab)
[   29.800711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.800840] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.800942] page dumped because: kasan: bad access detected
[   29.801081] 
[   29.801175] Memory state around the buggy address:
[   29.801263]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.801457]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.801575] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.801673]                                      ^
[   29.801759]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.801866]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.801963] ==================================================================
[   30.150550] ==================================================================
[   30.151283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   30.151668] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.152203] 
[   30.152547] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.153394] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.153706] Hardware name: linux,dummy-virt (DT)
[   30.154072] Call trace:
[   30.154193]  show_stack+0x20/0x38 (C)
[   30.154582]  dump_stack_lvl+0x8c/0xd0
[   30.154714]  print_report+0x118/0x608
[   30.155510]  kasan_report+0xdc/0x128
[   30.155744]  kasan_check_range+0x100/0x1a8
[   30.155887]  __kasan_check_write+0x20/0x30
[   30.156007]  kasan_atomics_helper+0x15b4/0x4858
[   30.156134]  kasan_atomics+0x198/0x2e0
[   30.156246]  kunit_try_run_case+0x170/0x3f0
[   30.156389]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.156548]  kthread+0x328/0x630
[   30.157324]  ret_from_fork+0x10/0x20
[   30.158771] 
[   30.158836] Allocated by task 265:
[   30.158943]  kasan_save_stack+0x3c/0x68
[   30.159058]  kasan_save_track+0x20/0x40
[   30.159223]  kasan_save_alloc_info+0x40/0x58
[   30.159514]  __kasan_kmalloc+0xd4/0xd8
[   30.159657]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.159794]  kasan_atomics+0xb8/0x2e0
[   30.159970]  kunit_try_run_case+0x170/0x3f0
[   30.160111]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.160235]  kthread+0x328/0x630
[   30.160364]  ret_from_fork+0x10/0x20
[   30.160482] 
[   30.160544] The buggy address belongs to the object at fff00000c770a480
[   30.160544]  which belongs to the cache kmalloc-64 of size 64
[   30.160811] The buggy address is located 0 bytes to the right of
[   30.160811]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.160999] 
[   30.161063] The buggy address belongs to the physical page:
[   30.161154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.161307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.161488] page_type: f5(slab)
[   30.161592] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.161714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.161819] page dumped because: kasan: bad access detected
[   30.161895] 
[   30.161994] Memory state around the buggy address:
[   30.162083]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.162196]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.162374] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.162932]                                      ^
[   30.163058]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.163174]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.163272] ==================================================================
[   29.603599] ==================================================================
[   29.603720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   29.603832] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.603951] 
[   29.604022] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.604288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.609294]  ret_from_fork+0x10/0x20
[   29.614357]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.614959]  kthread+0x328/0x630
[   29.615058]  ret_from_fork+0x10/0x20
[   29.615155] 
[   29.615838] The buggy address belongs to the object at fff00000c770a480
[   29.615838]  which belongs to the cache kmalloc-64 of size 64
[   29.616206] The buggy address is located 0 bytes to the right of
[   29.616206]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.616473] 
[   29.616535] The buggy address belongs to the physical page:
[   29.616618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.618603] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.618787] page_type: f5(slab)
[   29.618881] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.620115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.620965] page dumped because: kasan: bad access detected
[   29.621103] 
[   29.621153] Memory state around the buggy address:
[   29.621234]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.622306]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.622520] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.623244]                                      ^
[   29.623411]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.623911]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.624156] ==================================================================
[   29.849046] ==================================================================
[   29.849150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   29.850287] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.850449] 
[   29.851242] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.852063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.852776] Hardware name: linux,dummy-virt (DT)
[   29.852921] Call trace:
[   29.852984]  show_stack+0x20/0x38 (C)
[   29.853117]  dump_stack_lvl+0x8c/0xd0
[   29.853238]  print_report+0x118/0x608
[   29.853388]  kasan_report+0xdc/0x128
[   29.853512]  kasan_check_range+0x100/0x1a8
[   29.853630]  __kasan_check_write+0x20/0x30
[   29.856402]  kasan_atomics_helper+0xe44/0x4858
[   29.856545]  kasan_atomics+0x198/0x2e0
[   29.858130]  kunit_try_run_case+0x170/0x3f0
[   29.858401]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.858553]  kthread+0x328/0x630
[   29.858676]  ret_from_fork+0x10/0x20
[   29.858802] 
[   29.858851] Allocated by task 265:
[   29.858928]  kasan_save_stack+0x3c/0x68
[   29.859062]  kasan_save_track+0x20/0x40
[   29.859168]  kasan_save_alloc_info+0x40/0x58
[   29.859302]  __kasan_kmalloc+0xd4/0xd8
[   29.859426]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.859537]  kasan_atomics+0xb8/0x2e0
[   29.860066]  kunit_try_run_case+0x170/0x3f0
[   29.860742]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.862856]  kthread+0x328/0x630
[   29.862970]  ret_from_fork+0x10/0x20
[   29.863081] 
[   29.863140] The buggy address belongs to the object at fff00000c770a480
[   29.863140]  which belongs to the cache kmalloc-64 of size 64
[   29.863299] The buggy address is located 0 bytes to the right of
[   29.863299]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.863558] 
[   29.865397] The buggy address belongs to the physical page:
[   29.865485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.865629] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.865811] page_type: f5(slab)
[   29.865907] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.866045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.866145] page dumped because: kasan: bad access detected
[   29.866229] 
[   29.866276] Memory state around the buggy address:
[   29.867410]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.867540]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.869305] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.870028]                                      ^
[   29.870168]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.872738]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.872861] ==================================================================
[   30.091306] ==================================================================
[   30.091895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   30.092650] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.093032] 
[   30.093152] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.094175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.094303] Hardware name: linux,dummy-virt (DT)
[   30.094484] Call trace:
[   30.094541]  show_stack+0x20/0x38 (C)
[   30.094663]  dump_stack_lvl+0x8c/0xd0
[   30.094783]  print_report+0x118/0x608
[   30.094908]  kasan_report+0xdc/0x128
[   30.095023]  kasan_check_range+0x100/0x1a8
[   30.095146]  __kasan_check_write+0x20/0x30
[   30.095263]  kasan_atomics_helper+0x1414/0x4858
[   30.096531]  kasan_atomics+0x198/0x2e0
[   30.096879]  kunit_try_run_case+0x170/0x3f0
[   30.097229]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.097404]  kthread+0x328/0x630
[   30.098219]  ret_from_fork+0x10/0x20
[   30.098982] 
[   30.099268] Allocated by task 265:
[   30.099887]  kasan_save_stack+0x3c/0x68
[   30.100015]  kasan_save_track+0x20/0x40
[   30.100231]  kasan_save_alloc_info+0x40/0x58
[   30.100815]  __kasan_kmalloc+0xd4/0xd8
[   30.101185]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.101433]  kasan_atomics+0xb8/0x2e0
[   30.101535]  kunit_try_run_case+0x170/0x3f0
[   30.101948]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.102096]  kthread+0x328/0x630
[   30.102190]  ret_from_fork+0x10/0x20
[   30.102792] 
[   30.102863] The buggy address belongs to the object at fff00000c770a480
[   30.102863]  which belongs to the cache kmalloc-64 of size 64
[   30.103570] The buggy address is located 0 bytes to the right of
[   30.103570]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.104501] 
[   30.104653] The buggy address belongs to the physical page:
[   30.104829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.105221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.106024] page_type: f5(slab)
[   30.106134] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.106805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.106934] page dumped because: kasan: bad access detected
[   30.107782] 
[   30.108019] Memory state around the buggy address:
[   30.108247]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.108449]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.108561] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.108657]                                      ^
[   30.110823]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.110893]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.110945] ==================================================================
[   29.944511] ==================================================================
[   29.944616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   29.944725] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.944849] 
[   29.944927] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.946064] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.946601] Hardware name: linux,dummy-virt (DT)
[   29.946872] Call trace:
[   29.946967]  show_stack+0x20/0x38 (C)
[   29.947305]  dump_stack_lvl+0x8c/0xd0
[   29.948013]  print_report+0x118/0x608
[   29.948180]  kasan_report+0xdc/0x128
[   29.948345]  kasan_check_range+0x100/0x1a8
[   29.949041]  __kasan_check_write+0x20/0x30
[   29.949173]  kasan_atomics_helper+0xff0/0x4858
[   29.949632]  kasan_atomics+0x198/0x2e0
[   29.950316]  kunit_try_run_case+0x170/0x3f0
[   29.950758]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.950905]  kthread+0x328/0x630
[   29.951577]  ret_from_fork+0x10/0x20
[   29.951743] 
[   29.951801] Allocated by task 265:
[   29.952322]  kasan_save_stack+0x3c/0x68
[   29.952827]  kasan_save_track+0x20/0x40
[   29.952977]  kasan_save_alloc_info+0x40/0x58
[   29.953259]  __kasan_kmalloc+0xd4/0xd8
[   29.953589]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.953913]  kasan_atomics+0xb8/0x2e0
[   29.954398]  kunit_try_run_case+0x170/0x3f0
[   29.954531]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.954996]  kthread+0x328/0x630
[   29.955091]  ret_from_fork+0x10/0x20
[   29.955186] 
[   29.955733] The buggy address belongs to the object at fff00000c770a480
[   29.955733]  which belongs to the cache kmalloc-64 of size 64
[   29.956280] The buggy address is located 0 bytes to the right of
[   29.956280]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.956790] 
[   29.956892] The buggy address belongs to the physical page:
[   29.956985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.957119] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.957238] page_type: f5(slab)
[   29.957356] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.957619] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.957880] page dumped because: kasan: bad access detected
[   29.958047] 
[   29.958098] Memory state around the buggy address:
[   29.958244]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.958406]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.958520] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.958618]                                      ^
[   29.958704]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.958816]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.958978] ==================================================================
[   29.761942] ==================================================================
[   29.762047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   29.762164] Read of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.762287] 
[   29.762603] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.763137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.763418] Hardware name: linux,dummy-virt (DT)
[   29.764314] Call trace:
[   29.764962]  show_stack+0x20/0x38 (C)
[   29.765919]  dump_stack_lvl+0x8c/0xd0
[   29.766419]  print_report+0x118/0x608
[   29.767422]  kasan_report+0xdc/0x128
[   29.767947]  __asan_report_load4_noabort+0x20/0x30
[   29.768223]  kasan_atomics_helper+0x3dd8/0x4858
[   29.768845]  kasan_atomics+0x198/0x2e0
[   29.769411]  kunit_try_run_case+0x170/0x3f0
[   29.770395]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.770675]  kthread+0x328/0x630
[   29.770798]  ret_from_fork+0x10/0x20
[   29.771769] 
[   29.772049] Allocated by task 265:
[   29.772221]  kasan_save_stack+0x3c/0x68
[   29.772931]  kasan_save_track+0x20/0x40
[   29.773063]  kasan_save_alloc_info+0x40/0x58
[   29.773742]  __kasan_kmalloc+0xd4/0xd8
[   29.773850]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.774772]  kasan_atomics+0xb8/0x2e0
[   29.775196]  kunit_try_run_case+0x170/0x3f0
[   29.775763]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.776181]  kthread+0x328/0x630
[   29.776737]  ret_from_fork+0x10/0x20
[   29.776846] 
[   29.777105] The buggy address belongs to the object at fff00000c770a480
[   29.777105]  which belongs to the cache kmalloc-64 of size 64
[   29.777738] The buggy address is located 0 bytes to the right of
[   29.777738]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.777946] 
[   29.778807] The buggy address belongs to the physical page:
[   29.779036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.779425] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.780247] page_type: f5(slab)
[   29.780477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.780608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.781622] page dumped because: kasan: bad access detected
[   29.782030] 
[   29.782364] Memory state around the buggy address:
[   29.782623]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.782745]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.782861] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.783942]                                      ^
[   29.784423]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.784613]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.784737] ==================================================================
[   30.112460] ==================================================================
[   30.112575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   30.112703] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.113053] 
[   30.113217] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.113457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.113554] Hardware name: linux,dummy-virt (DT)
[   30.113793] Call trace:
[   30.113888]  show_stack+0x20/0x38 (C)
[   30.114006]  dump_stack_lvl+0x8c/0xd0
[   30.114126]  print_report+0x118/0x608
[   30.114238]  kasan_report+0xdc/0x128
[   30.114694]  kasan_check_range+0x100/0x1a8
[   30.115495]  __kasan_check_write+0x20/0x30
[   30.115875]  kasan_atomics_helper+0x147c/0x4858
[   30.116033]  kasan_atomics+0x198/0x2e0
[   30.116223]  kunit_try_run_case+0x170/0x3f0
[   30.116721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.117172]  kthread+0x328/0x630
[   30.117323]  ret_from_fork+0x10/0x20
[   30.117475] 
[   30.117845] Allocated by task 265:
[   30.117934]  kasan_save_stack+0x3c/0x68
[   30.118042]  kasan_save_track+0x20/0x40
[   30.118160]  kasan_save_alloc_info+0x40/0x58
[   30.118288]  __kasan_kmalloc+0xd4/0xd8
[   30.118428]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.118543]  kasan_atomics+0xb8/0x2e0
[   30.119367]  kunit_try_run_case+0x170/0x3f0
[   30.119514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.119863]  kthread+0x328/0x630
[   30.119987]  ret_from_fork+0x10/0x20
[   30.120199] 
[   30.120292] The buggy address belongs to the object at fff00000c770a480
[   30.120292]  which belongs to the cache kmalloc-64 of size 64
[   30.120616] The buggy address is located 0 bytes to the right of
[   30.120616]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.121222] 
[   30.121290] The buggy address belongs to the physical page:
[   30.121389] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.121520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.122143] page_type: f5(slab)
[   30.123122] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.123274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.123413] page dumped because: kasan: bad access detected
[   30.123499] 
[   30.123553] Memory state around the buggy address:
[   30.123642]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.123756]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.123970] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.124071]                                      ^
[   30.124155]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.124264]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.124383] ==================================================================
[   30.225505] ==================================================================
[   30.225631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   30.225815] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.225945] 
[   30.226015] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.226211] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.226282] Hardware name: linux,dummy-virt (DT)
[   30.226385] Call trace:
[   30.226555]  show_stack+0x20/0x38 (C)
[   30.226677]  dump_stack_lvl+0x8c/0xd0
[   30.226956]  print_report+0x118/0x608
[   30.227317]  kasan_report+0xdc/0x128
[   30.227602]  __asan_report_load8_noabort+0x20/0x30
[   30.227760]  kasan_atomics_helper+0x3e10/0x4858
[   30.227904]  kasan_atomics+0x198/0x2e0
[   30.228048]  kunit_try_run_case+0x170/0x3f0
[   30.228300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.228484]  kthread+0x328/0x630
[   30.228798]  ret_from_fork+0x10/0x20
[   30.229164] 
[   30.229248] Allocated by task 265:
[   30.229419]  kasan_save_stack+0x3c/0x68
[   30.229523]  kasan_save_track+0x20/0x40
[   30.229630]  kasan_save_alloc_info+0x40/0x58
[   30.229738]  __kasan_kmalloc+0xd4/0xd8
[   30.229839]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.229941]  kasan_atomics+0xb8/0x2e0
[   30.230036]  kunit_try_run_case+0x170/0x3f0
[   30.230145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.230401]  kthread+0x328/0x630
[   30.230542]  ret_from_fork+0x10/0x20
[   30.230691] 
[   30.230756] The buggy address belongs to the object at fff00000c770a480
[   30.230756]  which belongs to the cache kmalloc-64 of size 64
[   30.230915] The buggy address is located 0 bytes to the right of
[   30.230915]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.231179] 
[   30.231246] The buggy address belongs to the physical page:
[   30.231425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.231663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.231812] page_type: f5(slab)
[   30.231923] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.232107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.232232] page dumped because: kasan: bad access detected
[   30.232321] 
[   30.232385] Memory state around the buggy address:
[   30.232465]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.232645]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.232780] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.233113]                                      ^
[   30.233234]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.233436]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.233553] ==================================================================
[   30.234145] ==================================================================
[   30.234248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   30.234376] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.234502] 
[   30.234568] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.234771] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.234853] Hardware name: linux,dummy-virt (DT)
[   30.234952] Call trace:
[   30.235054]  show_stack+0x20/0x38 (C)
[   30.235194]  dump_stack_lvl+0x8c/0xd0
[   30.235344]  print_report+0x118/0x608
[   30.235642]  kasan_report+0xdc/0x128
[   30.235865]  kasan_check_range+0x100/0x1a8
[   30.236130]  __kasan_check_write+0x20/0x30
[   30.236353]  kasan_atomics_helper+0x175c/0x4858
[   30.236545]  kasan_atomics+0x198/0x2e0
[   30.236685]  kunit_try_run_case+0x170/0x3f0
[   30.236866]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.237024]  kthread+0x328/0x630
[   30.237203]  ret_from_fork+0x10/0x20
[   30.237356] 
[   30.237407] Allocated by task 265:
[   30.237611]  kasan_save_stack+0x3c/0x68
[   30.237990]  kasan_save_track+0x20/0x40
[   30.238348]  kasan_save_alloc_info+0x40/0x58
[   30.238694]  __kasan_kmalloc+0xd4/0xd8
[   30.239594]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.239833]  kasan_atomics+0xb8/0x2e0
[   30.239935]  kunit_try_run_case+0x170/0x3f0
[   30.241578]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.241713]  kthread+0x328/0x630
[   30.241811]  ret_from_fork+0x10/0x20
[   30.241920] 
[   30.241976] The buggy address belongs to the object at fff00000c770a480
[   30.241976]  which belongs to the cache kmalloc-64 of size 64
[   30.244171] The buggy address is located 0 bytes to the right of
[   30.244171]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.244811] 
[   30.244868] The buggy address belongs to the physical page:
[   30.244959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.245790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.246414] page_type: f5(slab)
[   30.246635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.246790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.247176] page dumped because: kasan: bad access detected
[   30.247421] 
[   30.247483] Memory state around the buggy address:
[   30.247586]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.248605]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.248736] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.248912]                                      ^
[   30.249212]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.249555]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.249679] ==================================================================
[   29.802345] ==================================================================
[   29.802456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   29.802585] Read of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.802725] 
[   29.802914] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.803237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.803363] Hardware name: linux,dummy-virt (DT)
[   29.803438] Call trace:
[   29.803573]  show_stack+0x20/0x38 (C)
[   29.804213]  dump_stack_lvl+0x8c/0xd0
[   29.804378]  print_report+0x118/0x608
[   29.804511]  kasan_report+0xdc/0x128
[   29.804705]  __asan_report_load4_noabort+0x20/0x30
[   29.804838]  kasan_atomics_helper+0x3e04/0x4858
[   29.804974]  kasan_atomics+0x198/0x2e0
[   29.805324]  kunit_try_run_case+0x170/0x3f0
[   29.805661]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.805898]  kthread+0x328/0x630
[   29.806029]  ret_from_fork+0x10/0x20
[   29.806362] 
[   29.806411] Allocated by task 265:
[   29.806483]  kasan_save_stack+0x3c/0x68
[   29.806675]  kasan_save_track+0x20/0x40
[   29.807007]  kasan_save_alloc_info+0x40/0x58
[   29.807154]  __kasan_kmalloc+0xd4/0xd8
[   29.807256]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.807397]  kasan_atomics+0xb8/0x2e0
[   29.807508]  kunit_try_run_case+0x170/0x3f0
[   29.807650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.807894]  kthread+0x328/0x630
[   29.808054]  ret_from_fork+0x10/0x20
[   29.808273] 
[   29.808360] The buggy address belongs to the object at fff00000c770a480
[   29.808360]  which belongs to the cache kmalloc-64 of size 64
[   29.808547] The buggy address is located 0 bytes to the right of
[   29.808547]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.808718] 
[   29.808773] The buggy address belongs to the physical page:
[   29.808862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.809105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.809248] page_type: f5(slab)
[   29.809387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.809515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.809644] page dumped because: kasan: bad access detected
[   29.809819] 
[   29.809864] Memory state around the buggy address:
[   29.809986]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.810110]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.810219] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.810322]                                      ^
[   29.810453]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.810909]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.811017] ==================================================================
[   30.061751] ==================================================================
[   30.061830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   30.061897] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   30.062007] 
[   30.062130] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   30.062379] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.062447] Hardware name: linux,dummy-virt (DT)
[   30.062525] Call trace:
[   30.062579]  show_stack+0x20/0x38 (C)
[   30.062693]  dump_stack_lvl+0x8c/0xd0
[   30.062812]  print_report+0x118/0x608
[   30.062930]  kasan_report+0xdc/0x128
[   30.063043]  kasan_check_range+0x100/0x1a8
[   30.063165]  __kasan_check_write+0x20/0x30
[   30.063279]  kasan_atomics_helper+0x1384/0x4858
[   30.064120]  kasan_atomics+0x198/0x2e0
[   30.064487]  kunit_try_run_case+0x170/0x3f0
[   30.064649]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.064827]  kthread+0x328/0x630
[   30.065138]  ret_from_fork+0x10/0x20
[   30.065496] 
[   30.065576] Allocated by task 265:
[   30.065652]  kasan_save_stack+0x3c/0x68
[   30.065831]  kasan_save_track+0x20/0x40
[   30.065985]  kasan_save_alloc_info+0x40/0x58
[   30.066319]  __kasan_kmalloc+0xd4/0xd8
[   30.067270]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.067420]  kasan_atomics+0xb8/0x2e0
[   30.067767]  kunit_try_run_case+0x170/0x3f0
[   30.068343]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.069051]  kthread+0x328/0x630
[   30.069470]  ret_from_fork+0x10/0x20
[   30.069717] 
[   30.069887] The buggy address belongs to the object at fff00000c770a480
[   30.069887]  which belongs to the cache kmalloc-64 of size 64
[   30.070036] The buggy address is located 0 bytes to the right of
[   30.070036]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.070200] 
[   30.070960] The buggy address belongs to the physical page:
[   30.071377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.071851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.072079] page_type: f5(slab)
[   30.072287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.072748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.073353] page dumped because: kasan: bad access detected
[   30.073442] 
[   30.073959] Memory state around the buggy address:
[   30.074057]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.074625]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.074978] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.075085]                                      ^
[   30.075175]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.075287]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.075405] ==================================================================
[   29.662141] ==================================================================
[   29.662252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   29.663236] Write of size 4 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.664683] 
[   29.664774] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.664997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.665743] Hardware name: linux,dummy-virt (DT)
[   29.665834] Call trace:
[   29.666436]  show_stack+0x20/0x38 (C)
[   29.666577]  dump_stack_lvl+0x8c/0xd0
[   29.667445]  kasan_atomics_helper+0xad4/0x4858
[   29.669120]  ret_from_fork+0x10/0x20
[   29.670043]  kasan_save_alloc_info+0x40/0x58
[   29.670814]  kasan_atomics+0xb8/0x2e0
[   29.672071] The buggy address belongs to the object at fff00000c770a480
[   29.672071]  which belongs to the cache kmalloc-64 of size 64
[   29.672255] The buggy address is located 0 bytes to the right of
[   29.672255]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.672451] 
[   29.672612] The buggy address belongs to the physical page:
[   29.672938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.673152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.673583] page_type: f5(slab)
[   29.673697] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.673771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.673825] page dumped because: kasan: bad access detected
[   29.673915] 
[   29.673946] Memory state around the buggy address:
[   29.674104] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.674303] ==================================================================
[   29.959463] ==================================================================
[   29.959577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   29.959709] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.959852] 
[   29.959934] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.960167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.960247] Hardware name: linux,dummy-virt (DT)
[   29.960342] Call trace:
[   29.960468]  show_stack+0x20/0x38 (C)
[   29.960596]  dump_stack_lvl+0x8c/0xd0
[   29.960716]  print_report+0x118/0x608
[   29.960840]  kasan_report+0xdc/0x128
[   29.960974]  kasan_check_range+0x100/0x1a8
[   29.961197]  __kasan_check_write+0x20/0x30
[   29.961364]  kasan_atomics_helper+0x1058/0x4858
[   29.961510]  kasan_atomics+0x198/0x2e0
[   29.961667]  kunit_try_run_case+0x170/0x3f0
[   29.961834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.961980]  kthread+0x328/0x630
[   29.962271]  ret_from_fork+0x10/0x20
[   29.962416] 
[   29.962467] Allocated by task 265:
[   29.962552]  kasan_save_stack+0x3c/0x68
[   29.962860]  kasan_save_track+0x20/0x40
[   29.962974]  kasan_save_alloc_info+0x40/0x58
[   29.963098]  __kasan_kmalloc+0xd4/0xd8
[   29.963312]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.963466]  kasan_atomics+0xb8/0x2e0
[   29.963584]  kunit_try_run_case+0x170/0x3f0
[   29.963706]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.963869]  kthread+0x328/0x630
[   29.963976]  ret_from_fork+0x10/0x20
[   29.964107] 
[   29.964233] The buggy address belongs to the object at fff00000c770a480
[   29.964233]  which belongs to the cache kmalloc-64 of size 64
[   29.964504] The buggy address is located 0 bytes to the right of
[   29.964504]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.964740] 
[   29.964804] The buggy address belongs to the physical page:
[   29.964895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.965047] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.965174] page_type: f5(slab)
[   29.965324] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.965525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.965825] page dumped because: kasan: bad access detected
[   29.965912] 
[   29.965966] Memory state around the buggy address:
[   29.966052]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.966177]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.966313] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.966475]                                      ^
[   29.966569]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.966677]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.966875] ==================================================================
[   29.813045] ==================================================================
[   29.813148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   29.813268] Read of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.813423] 
[   29.813492] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.813693] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.813763] Hardware name: linux,dummy-virt (DT)
[   29.813836] Call trace:
[   29.813894]  show_stack+0x20/0x38 (C)
[   29.814008]  dump_stack_lvl+0x8c/0xd0
[   29.814260]  print_report+0x118/0x608
[   29.814402]  kasan_report+0xdc/0x128
[   29.814523]  kasan_check_range+0x100/0x1a8
[   29.814652]  __kasan_check_read+0x20/0x30
[   29.814783]  kasan_atomics_helper+0xdd4/0x4858
[   29.814913]  kasan_atomics+0x198/0x2e0
[   29.815029]  kunit_try_run_case+0x170/0x3f0
[   29.815148]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.816454]  kthread+0x328/0x630
[   29.816777]  ret_from_fork+0x10/0x20
[   29.817068] 
[   29.817128] Allocated by task 265:
[   29.817236]  kasan_save_stack+0x3c/0x68
[   29.817368]  kasan_save_track+0x20/0x40
[   29.817591]  kasan_save_alloc_info+0x40/0x58
[   29.817756]  __kasan_kmalloc+0xd4/0xd8
[   29.818079]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.818193]  kasan_atomics+0xb8/0x2e0
[   29.818947]  kunit_try_run_case+0x170/0x3f0
[   29.819809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.820041]  kthread+0x328/0x630
[   29.820582]  ret_from_fork+0x10/0x20
[   29.820719] 
[   29.820777] The buggy address belongs to the object at fff00000c770a480
[   29.820777]  which belongs to the cache kmalloc-64 of size 64
[   29.820930] The buggy address is located 0 bytes to the right of
[   29.820930]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   29.821996] 
[   29.822159] The buggy address belongs to the physical page:
[   29.822759] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   29.823240] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.823403] page_type: f5(slab)
[   29.824206] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.824589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.825220] page dumped because: kasan: bad access detected
[   29.825944] 
[   29.826006] Memory state around the buggy address:
[   29.826385]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.827186]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.827433] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.827548]                                      ^
[   29.827648]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.827777]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.829119] ==================================================================
[   29.996546] ==================================================================
[   29.996653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   29.996776] Write of size 8 at addr fff00000c770a4b0 by task kunit_try_catch/265
[   29.996904] 
[   29.996976] CPU: 0 UID: 0 PID: 265 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT 
[   29.997181] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.997259] Hardware name: linux,dummy-virt (DT)
[   29.997368] Call trace:
[   29.997428]  show_stack+0x20/0x38 (C)
[   29.997547]  dump_stack_lvl+0x8c/0xd0
[   29.997666]  print_report+0x118/0x608
[   29.997777]  kasan_report+0xdc/0x128
[   29.997893]  kasan_check_range+0x100/0x1a8
[   29.998367]  __kasan_check_write+0x20/0x30
[   29.998852]  kasan_atomics_helper+0x1190/0x4858
[   29.999125]  kasan_atomics+0x198/0x2e0
[   29.999283]  kunit_try_run_case+0x170/0x3f0
[   29.999701]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.000017]  kthread+0x328/0x630
[   30.000142]  ret_from_fork+0x10/0x20
[   30.000290] 
[   30.000376] Allocated by task 265:
[   30.000859]  kasan_save_stack+0x3c/0x68
[   30.001211]  kasan_save_track+0x20/0x40
[   30.001374]  kasan_save_alloc_info+0x40/0x58
[   30.001514]  __kasan_kmalloc+0xd4/0xd8
[   30.001741]  __kmalloc_cache_noprof+0x16c/0x3c0
[   30.001858]  kasan_atomics+0xb8/0x2e0
[   30.001963]  kunit_try_run_case+0x170/0x3f0
[   30.002145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   30.002728]  kthread+0x328/0x630
[   30.002902]  ret_from_fork+0x10/0x20
[   30.003483] 
[   30.003620] The buggy address belongs to the object at fff00000c770a480
[   30.003620]  which belongs to the cache kmalloc-64 of size 64
[   30.003974] The buggy address is located 0 bytes to the right of
[   30.003974]  allocated 48-byte region [fff00000c770a480, fff00000c770a4b0)
[   30.004124] 
[   30.004155] The buggy address belongs to the physical page:
[   30.004197] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10770a
[   30.004277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   30.004395] page_type: f5(slab)
[   30.004447] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   30.004513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.004567] page dumped because: kasan: bad access detected
[   30.004609] 
[   30.004633] Memory state around the buggy address:
[   30.004672]  fff00000c770a380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.004728]  fff00000c770a400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.004784] >fff00000c770a480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.004834]                                      ^
[   30.004874]  fff00000c770a500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.004930]  fff00000c770a580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.004981] ==================================================================


[   14.047964] ==================================================================
[   14.048358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   14.048682] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.049029] 
[   14.049123] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.049202] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.049217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.049238] Call Trace:
[   14.049276]  <TASK>
[   14.049290]  dump_stack_lvl+0x73/0xb0
[   14.049317]  print_report+0xd1/0x650
[   14.049352]  ? __virt_addr_valid+0x1db/0x2d0
[   14.049376]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.049398]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.049421]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.049444]  kasan_report+0x141/0x180
[   14.049467]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.049493]  kasan_check_range+0x10c/0x1c0
[   14.049518]  __kasan_check_write+0x18/0x20
[   14.049538]  kasan_atomics_helper+0x5fe/0x5450
[   14.049562]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.049584]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.049610]  ? ret_from_fork_asm+0x1a/0x30
[   14.049651]  ? kasan_atomics+0x152/0x310
[   14.049678]  kasan_atomics+0x1dc/0x310
[   14.049702]  ? __pfx_kasan_atomics+0x10/0x10
[   14.049727]  ? __pfx_read_tsc+0x10/0x10
[   14.049749]  ? ktime_get_ts64+0x86/0x230
[   14.049773]  kunit_try_run_case+0x1a5/0x480
[   14.049795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.049816]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.049841]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.049867]  ? __kthread_parkme+0x82/0x180
[   14.049889]  ? preempt_count_sub+0x50/0x80
[   14.049924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.049946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.049971]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.049997]  kthread+0x337/0x6f0
[   14.050017]  ? trace_preempt_on+0x20/0xc0
[   14.050091]  ? __pfx_kthread+0x10/0x10
[   14.050113]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.050138]  ? calculate_sigpending+0x7b/0xa0
[   14.050163]  ? __pfx_kthread+0x10/0x10
[   14.050186]  ret_from_fork+0x116/0x1d0
[   14.050206]  ? __pfx_kthread+0x10/0x10
[   14.050227]  ret_from_fork_asm+0x1a/0x30
[   14.050257]  </TASK>
[   14.050268] 
[   14.062857] Allocated by task 282:
[   14.063421]  kasan_save_stack+0x45/0x70
[   14.063912]  kasan_save_track+0x18/0x40
[   14.064401]  kasan_save_alloc_info+0x3b/0x50
[   14.064557]  __kasan_kmalloc+0xb7/0xc0
[   14.064711]  __kmalloc_cache_noprof+0x189/0x420
[   14.064863]  kasan_atomics+0x95/0x310
[   14.065019]  kunit_try_run_case+0x1a5/0x480
[   14.065789]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.066296]  kthread+0x337/0x6f0
[   14.066424]  ret_from_fork+0x116/0x1d0
[   14.066919]  ret_from_fork_asm+0x1a/0x30
[   14.067457] 
[   14.067554] The buggy address belongs to the object at ffff888102b49680
[   14.067554]  which belongs to the cache kmalloc-64 of size 64
[   14.068387] The buggy address is located 0 bytes to the right of
[   14.068387]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.069240] 
[   14.069532] The buggy address belongs to the physical page:
[   14.069930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.070794] flags: 0x200000000000000(node=0|zone=2)
[   14.071158] page_type: f5(slab)
[   14.071554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.072113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.072583] page dumped because: kasan: bad access detected
[   14.072954] 
[   14.073027] Memory state around the buggy address:
[   14.073464]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.074088]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.074313] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.074520]                                      ^
[   14.074679]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.074956]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.075284] ==================================================================
[   15.147031] ==================================================================
[   15.147283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   15.147514] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   15.147762] 
[   15.147871] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   15.147923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.147956] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.147978] Call Trace:
[   15.147994]  <TASK>
[   15.148010]  dump_stack_lvl+0x73/0xb0
[   15.148036]  print_report+0xd1/0x650
[   15.148058]  ? __virt_addr_valid+0x1db/0x2d0
[   15.148082]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.148104]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.148128]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.148151]  kasan_report+0x141/0x180
[   15.148175]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.148202]  kasan_check_range+0x10c/0x1c0
[   15.148227]  __kasan_check_write+0x18/0x20
[   15.148247]  kasan_atomics_helper+0x1e12/0x5450
[   15.148270]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.148293]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.148319]  ? ret_from_fork_asm+0x1a/0x30
[   15.148341]  ? kasan_atomics+0x152/0x310
[   15.148368]  kasan_atomics+0x1dc/0x310
[   15.148392]  ? __pfx_kasan_atomics+0x10/0x10
[   15.148417]  ? __pfx_read_tsc+0x10/0x10
[   15.148439]  ? ktime_get_ts64+0x86/0x230
[   15.148463]  kunit_try_run_case+0x1a5/0x480
[   15.148485]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.148505]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.148531]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.148556]  ? __kthread_parkme+0x82/0x180
[   15.148577]  ? preempt_count_sub+0x50/0x80
[   15.148602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.148643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.148669]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.148694]  kthread+0x337/0x6f0
[   15.148715]  ? trace_preempt_on+0x20/0xc0
[   15.148739]  ? __pfx_kthread+0x10/0x10
[   15.148760]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.148784]  ? calculate_sigpending+0x7b/0xa0
[   15.148809]  ? __pfx_kthread+0x10/0x10
[   15.148831]  ret_from_fork+0x116/0x1d0
[   15.148850]  ? __pfx_kthread+0x10/0x10
[   15.148871]  ret_from_fork_asm+0x1a/0x30
[   15.148909]  </TASK>
[   15.148920] 
[   15.156445] Allocated by task 282:
[   15.156593]  kasan_save_stack+0x45/0x70
[   15.156810]  kasan_save_track+0x18/0x40
[   15.157003]  kasan_save_alloc_info+0x3b/0x50
[   15.157205]  __kasan_kmalloc+0xb7/0xc0
[   15.157372]  __kmalloc_cache_noprof+0x189/0x420
[   15.157526]  kasan_atomics+0x95/0x310
[   15.157685]  kunit_try_run_case+0x1a5/0x480
[   15.157831]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.158017]  kthread+0x337/0x6f0
[   15.158138]  ret_from_fork+0x116/0x1d0
[   15.158271]  ret_from_fork_asm+0x1a/0x30
[   15.158410] 
[   15.158481] The buggy address belongs to the object at ffff888102b49680
[   15.158481]  which belongs to the cache kmalloc-64 of size 64
[   15.158979] The buggy address is located 0 bytes to the right of
[   15.158979]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   15.159520] 
[   15.159632] The buggy address belongs to the physical page:
[   15.159882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.160236] flags: 0x200000000000000(node=0|zone=2)
[   15.160464] page_type: f5(slab)
[   15.160592] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.160931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.161213] page dumped because: kasan: bad access detected
[   15.161386] 
[   15.161456] Memory state around the buggy address:
[   15.161628]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.161853]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.162185] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.162506]                                      ^
[   15.162763]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.163100]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.163410] ==================================================================
[   14.825512] ==================================================================
[   14.826481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.827532] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.828749] 
[   14.829198] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.829248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.829263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.829285] Call Trace:
[   14.829300]  <TASK>
[   14.829315]  dump_stack_lvl+0x73/0xb0
[   14.829342]  print_report+0xd1/0x650
[   14.829401]  ? __virt_addr_valid+0x1db/0x2d0
[   14.829427]  ? kasan_atomics_helper+0x164f/0x5450
[   14.829450]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.829566]  ? kasan_atomics_helper+0x164f/0x5450
[   14.829591]  kasan_report+0x141/0x180
[   14.829615]  ? kasan_atomics_helper+0x164f/0x5450
[   14.829652]  kasan_check_range+0x10c/0x1c0
[   14.829677]  __kasan_check_write+0x18/0x20
[   14.829697]  kasan_atomics_helper+0x164f/0x5450
[   14.829720]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.829743]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.829769]  ? ret_from_fork_asm+0x1a/0x30
[   14.829792]  ? kasan_atomics+0x152/0x310
[   14.829818]  kasan_atomics+0x1dc/0x310
[   14.829841]  ? __pfx_kasan_atomics+0x10/0x10
[   14.829866]  ? __pfx_read_tsc+0x10/0x10
[   14.829888]  ? ktime_get_ts64+0x86/0x230
[   14.829925]  kunit_try_run_case+0x1a5/0x480
[   14.829958]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.829978]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.830004]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.830030]  ? __kthread_parkme+0x82/0x180
[   14.830051]  ? preempt_count_sub+0x50/0x80
[   14.830075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.830096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.830121]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.830147]  kthread+0x337/0x6f0
[   14.830166]  ? trace_preempt_on+0x20/0xc0
[   14.830190]  ? __pfx_kthread+0x10/0x10
[   14.830210]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.830234]  ? calculate_sigpending+0x7b/0xa0
[   14.830259]  ? __pfx_kthread+0x10/0x10
[   14.830281]  ret_from_fork+0x116/0x1d0
[   14.830301]  ? __pfx_kthread+0x10/0x10
[   14.830323]  ret_from_fork_asm+0x1a/0x30
[   14.830353]  </TASK>
[   14.830364] 
[   14.845288] Allocated by task 282:
[   14.845425]  kasan_save_stack+0x45/0x70
[   14.845575]  kasan_save_track+0x18/0x40
[   14.845713]  kasan_save_alloc_info+0x3b/0x50
[   14.845861]  __kasan_kmalloc+0xb7/0xc0
[   14.846224]  __kmalloc_cache_noprof+0x189/0x420
[   14.846642]  kasan_atomics+0x95/0x310
[   14.846983]  kunit_try_run_case+0x1a5/0x480
[   14.847352]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.848051]  kthread+0x337/0x6f0
[   14.848358]  ret_from_fork+0x116/0x1d0
[   14.848714]  ret_from_fork_asm+0x1a/0x30
[   14.849098] 
[   14.849443] The buggy address belongs to the object at ffff888102b49680
[   14.849443]  which belongs to the cache kmalloc-64 of size 64
[   14.850673] The buggy address is located 0 bytes to the right of
[   14.850673]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.852018] 
[   14.852191] The buggy address belongs to the physical page:
[   14.852669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.853075] flags: 0x200000000000000(node=0|zone=2)
[   14.853510] page_type: f5(slab)
[   14.853824] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.854287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.854519] page dumped because: kasan: bad access detected
[   14.854816] 
[   14.854989] Memory state around the buggy address:
[   14.855463]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.856360]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.857086] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.857450]                                      ^
[   14.857606]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.858311]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.859060] ==================================================================
[   14.493102] ==================================================================
[   14.493333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   14.493564] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.493815] 
[   14.493908] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.493989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.494002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.494023] Call Trace:
[   14.494035]  <TASK>
[   14.494049]  dump_stack_lvl+0x73/0xb0
[   14.494073]  print_report+0xd1/0x650
[   14.494097]  ? __virt_addr_valid+0x1db/0x2d0
[   14.494120]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.494143]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.494166]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.494189]  kasan_report+0x141/0x180
[   14.494212]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.494240]  __asan_report_load4_noabort+0x18/0x20
[   14.494262]  kasan_atomics_helper+0x4a02/0x5450
[   14.494286]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.494309]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.494333]  ? ret_from_fork_asm+0x1a/0x30
[   14.494355]  ? kasan_atomics+0x152/0x310
[   14.494383]  kasan_atomics+0x1dc/0x310
[   14.494407]  ? __pfx_kasan_atomics+0x10/0x10
[   14.494433]  ? __pfx_read_tsc+0x10/0x10
[   14.494456]  ? ktime_get_ts64+0x86/0x230
[   14.494480]  kunit_try_run_case+0x1a5/0x480
[   14.494502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.494523]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.494548]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.494574]  ? __kthread_parkme+0x82/0x180
[   14.494595]  ? preempt_count_sub+0x50/0x80
[   14.494636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.494659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.494683]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.494709]  kthread+0x337/0x6f0
[   14.494730]  ? trace_preempt_on+0x20/0xc0
[   14.494753]  ? __pfx_kthread+0x10/0x10
[   14.494774]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.494798]  ? calculate_sigpending+0x7b/0xa0
[   14.494823]  ? __pfx_kthread+0x10/0x10
[   14.494845]  ret_from_fork+0x116/0x1d0
[   14.494864]  ? __pfx_kthread+0x10/0x10
[   14.494885]  ret_from_fork_asm+0x1a/0x30
[   14.494925]  </TASK>
[   14.494954] 
[   14.503108] Allocated by task 282:
[   14.503294]  kasan_save_stack+0x45/0x70
[   14.503493]  kasan_save_track+0x18/0x40
[   14.503688]  kasan_save_alloc_info+0x3b/0x50
[   14.503911]  __kasan_kmalloc+0xb7/0xc0
[   14.504105]  __kmalloc_cache_noprof+0x189/0x420
[   14.504274]  kasan_atomics+0x95/0x310
[   14.504426]  kunit_try_run_case+0x1a5/0x480
[   14.504635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.504879]  kthread+0x337/0x6f0
[   14.505103]  ret_from_fork+0x116/0x1d0
[   14.505332]  ret_from_fork_asm+0x1a/0x30
[   14.505524] 
[   14.505665] The buggy address belongs to the object at ffff888102b49680
[   14.505665]  which belongs to the cache kmalloc-64 of size 64
[   14.506062] The buggy address is located 0 bytes to the right of
[   14.506062]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.506435] 
[   14.506513] The buggy address belongs to the physical page:
[   14.506685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.507005] flags: 0x200000000000000(node=0|zone=2)
[   14.507241] page_type: f5(slab)
[   14.507407] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.507742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.508110] page dumped because: kasan: bad access detected
[   14.508359] 
[   14.508451] Memory state around the buggy address:
[   14.508700]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.509023]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.509426] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.509659]                                      ^
[   14.509815]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.510144]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.510466] ==================================================================
[   14.604193] ==================================================================
[   14.604590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   14.604977] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.605782] 
[   14.605972] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.606015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.606027] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.606048] Call Trace:
[   14.606064]  <TASK>
[   14.606079]  dump_stack_lvl+0x73/0xb0
[   14.606105]  print_report+0xd1/0x650
[   14.606127]  ? __virt_addr_valid+0x1db/0x2d0
[   14.606151]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.606173]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.606196]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.606219]  kasan_report+0x141/0x180
[   14.606241]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.606269]  __asan_report_load4_noabort+0x18/0x20
[   14.606290]  kasan_atomics_helper+0x49ce/0x5450
[   14.606314]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.606337]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.606362]  ? ret_from_fork_asm+0x1a/0x30
[   14.606384]  ? kasan_atomics+0x152/0x310
[   14.606414]  kasan_atomics+0x1dc/0x310
[   14.606438]  ? __pfx_kasan_atomics+0x10/0x10
[   14.606463]  ? __pfx_read_tsc+0x10/0x10
[   14.606484]  ? ktime_get_ts64+0x86/0x230
[   14.606509]  kunit_try_run_case+0x1a5/0x480
[   14.606531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.606551]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.606576]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.606601]  ? __kthread_parkme+0x82/0x180
[   14.606622]  ? preempt_count_sub+0x50/0x80
[   14.606647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.606669]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.606694]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.606720]  kthread+0x337/0x6f0
[   14.606740]  ? trace_preempt_on+0x20/0xc0
[   14.606762]  ? __pfx_kthread+0x10/0x10
[   14.606784]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.606806]  ? calculate_sigpending+0x7b/0xa0
[   14.606831]  ? __pfx_kthread+0x10/0x10
[   14.606852]  ret_from_fork+0x116/0x1d0
[   14.606872]  ? __pfx_kthread+0x10/0x10
[   14.606903]  ret_from_fork_asm+0x1a/0x30
[   14.606933]  </TASK>
[   14.606958] 
[   14.617340] Allocated by task 282:
[   14.617516]  kasan_save_stack+0x45/0x70
[   14.617663]  kasan_save_track+0x18/0x40
[   14.617801]  kasan_save_alloc_info+0x3b/0x50
[   14.617963]  __kasan_kmalloc+0xb7/0xc0
[   14.618290]  __kmalloc_cache_noprof+0x189/0x420
[   14.618697]  kasan_atomics+0x95/0x310
[   14.618902]  kunit_try_run_case+0x1a5/0x480
[   14.619109]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.619337]  kthread+0x337/0x6f0
[   14.619511]  ret_from_fork+0x116/0x1d0
[   14.619706]  ret_from_fork_asm+0x1a/0x30
[   14.619875] 
[   14.619956] The buggy address belongs to the object at ffff888102b49680
[   14.619956]  which belongs to the cache kmalloc-64 of size 64
[   14.620459] The buggy address is located 0 bytes to the right of
[   14.620459]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.621066] 
[   14.621139] The buggy address belongs to the physical page:
[   14.621475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.621755] flags: 0x200000000000000(node=0|zone=2)
[   14.622595] page_type: f5(slab)
[   14.622806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.623172] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.623490] page dumped because: kasan: bad access detected
[   14.623702] 
[   14.623794] Memory state around the buggy address:
[   14.624029]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.624301]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.624598] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.624885]                                      ^
[   14.625864]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.626565]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.627504] ==================================================================
[   15.241871] ==================================================================
[   15.242831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   15.243337] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   15.243781] 
[   15.244113] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   15.244166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.244181] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.244202] Call Trace:
[   15.244217]  <TASK>
[   15.244230]  dump_stack_lvl+0x73/0xb0
[   15.244295]  print_report+0xd1/0x650
[   15.244322]  ? __virt_addr_valid+0x1db/0x2d0
[   15.244347]  ? kasan_atomics_helper+0x2006/0x5450
[   15.244371]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.244395]  ? kasan_atomics_helper+0x2006/0x5450
[   15.244418]  kasan_report+0x141/0x180
[   15.244441]  ? kasan_atomics_helper+0x2006/0x5450
[   15.244468]  kasan_check_range+0x10c/0x1c0
[   15.244492]  __kasan_check_write+0x18/0x20
[   15.244513]  kasan_atomics_helper+0x2006/0x5450
[   15.244536]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.244559]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.244585]  ? ret_from_fork_asm+0x1a/0x30
[   15.244607]  ? kasan_atomics+0x152/0x310
[   15.244648]  kasan_atomics+0x1dc/0x310
[   15.244671]  ? __pfx_kasan_atomics+0x10/0x10
[   15.244696]  ? __pfx_read_tsc+0x10/0x10
[   15.244717]  ? ktime_get_ts64+0x86/0x230
[   15.244742]  kunit_try_run_case+0x1a5/0x480
[   15.244764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.244784]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.244810]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.244835]  ? __kthread_parkme+0x82/0x180
[   15.244856]  ? preempt_count_sub+0x50/0x80
[   15.244881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.244913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.244939]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.244965]  kthread+0x337/0x6f0
[   15.244985]  ? trace_preempt_on+0x20/0xc0
[   15.245008]  ? __pfx_kthread+0x10/0x10
[   15.245029]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.245057]  ? calculate_sigpending+0x7b/0xa0
[   15.245082]  ? __pfx_kthread+0x10/0x10
[   15.245104]  ret_from_fork+0x116/0x1d0
[   15.245123]  ? __pfx_kthread+0x10/0x10
[   15.245144]  ret_from_fork_asm+0x1a/0x30
[   15.245174]  </TASK>
[   15.245186] 
[   15.255020] Allocated by task 282:
[   15.255152]  kasan_save_stack+0x45/0x70
[   15.255342]  kasan_save_track+0x18/0x40
[   15.255537]  kasan_save_alloc_info+0x3b/0x50
[   15.255732]  __kasan_kmalloc+0xb7/0xc0
[   15.255865]  __kmalloc_cache_noprof+0x189/0x420
[   15.256032]  kasan_atomics+0x95/0x310
[   15.256235]  kunit_try_run_case+0x1a5/0x480
[   15.256445]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.256702]  kthread+0x337/0x6f0
[   15.256886]  ret_from_fork+0x116/0x1d0
[   15.257185]  ret_from_fork_asm+0x1a/0x30
[   15.257433] 
[   15.257519] The buggy address belongs to the object at ffff888102b49680
[   15.257519]  which belongs to the cache kmalloc-64 of size 64
[   15.257994] The buggy address is located 0 bytes to the right of
[   15.257994]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   15.258498] 
[   15.258599] The buggy address belongs to the physical page:
[   15.258829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.259078] flags: 0x200000000000000(node=0|zone=2)
[   15.259238] page_type: f5(slab)
[   15.259507] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.259931] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.260156] page dumped because: kasan: bad access detected
[   15.260325] 
[   15.260393] Memory state around the buggy address:
[   15.260562]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.260821]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.261383] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.261599]                                      ^
[   15.262474]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.263192]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.263650] ==================================================================
[   14.193655] ==================================================================
[   14.194038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   14.194387] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.194756] 
[   14.194852] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.194922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.194953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.194977] Call Trace:
[   14.194995]  <TASK>
[   14.195010]  dump_stack_lvl+0x73/0xb0
[   14.195036]  print_report+0xd1/0x650
[   14.195060]  ? __virt_addr_valid+0x1db/0x2d0
[   14.195085]  ? kasan_atomics_helper+0x992/0x5450
[   14.195107]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.195131]  ? kasan_atomics_helper+0x992/0x5450
[   14.195154]  kasan_report+0x141/0x180
[   14.195177]  ? kasan_atomics_helper+0x992/0x5450
[   14.195206]  kasan_check_range+0x10c/0x1c0
[   14.195231]  __kasan_check_write+0x18/0x20
[   14.195252]  kasan_atomics_helper+0x992/0x5450
[   14.195276]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.195299]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.195324]  ? ret_from_fork_asm+0x1a/0x30
[   14.195347]  ? kasan_atomics+0x152/0x310
[   14.195375]  kasan_atomics+0x1dc/0x310
[   14.195398]  ? __pfx_kasan_atomics+0x10/0x10
[   14.195423]  ? __pfx_read_tsc+0x10/0x10
[   14.195445]  ? ktime_get_ts64+0x86/0x230
[   14.195471]  kunit_try_run_case+0x1a5/0x480
[   14.195494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.195514]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.195541]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.195566]  ? __kthread_parkme+0x82/0x180
[   14.195588]  ? preempt_count_sub+0x50/0x80
[   14.195629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.195651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.195677]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.195702]  kthread+0x337/0x6f0
[   14.195722]  ? trace_preempt_on+0x20/0xc0
[   14.195746]  ? __pfx_kthread+0x10/0x10
[   14.195767]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.195790]  ? calculate_sigpending+0x7b/0xa0
[   14.195815]  ? __pfx_kthread+0x10/0x10
[   14.195836]  ret_from_fork+0x116/0x1d0
[   14.195855]  ? __pfx_kthread+0x10/0x10
[   14.195877]  ret_from_fork_asm+0x1a/0x30
[   14.195916]  </TASK>
[   14.195945] 
[   14.204170] Allocated by task 282:
[   14.204336]  kasan_save_stack+0x45/0x70
[   14.204482]  kasan_save_track+0x18/0x40
[   14.204665]  kasan_save_alloc_info+0x3b/0x50
[   14.204879]  __kasan_kmalloc+0xb7/0xc0
[   14.205104]  __kmalloc_cache_noprof+0x189/0x420
[   14.205382]  kasan_atomics+0x95/0x310
[   14.205518]  kunit_try_run_case+0x1a5/0x480
[   14.205791]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.206058]  kthread+0x337/0x6f0
[   14.206235]  ret_from_fork+0x116/0x1d0
[   14.206433]  ret_from_fork_asm+0x1a/0x30
[   14.206580] 
[   14.206653] The buggy address belongs to the object at ffff888102b49680
[   14.206653]  which belongs to the cache kmalloc-64 of size 64
[   14.207034] The buggy address is located 0 bytes to the right of
[   14.207034]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.207572] 
[   14.207666] The buggy address belongs to the physical page:
[   14.208374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.209217] flags: 0x200000000000000(node=0|zone=2)
[   14.209406] page_type: f5(slab)
[   14.209533] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.210344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.210945] page dumped because: kasan: bad access detected
[   14.211448] 
[   14.211738] Memory state around the buggy address:
[   14.212213]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.212526]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.213258] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.213576]                                      ^
[   14.214042]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.214495]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.215037] ==================================================================
[   15.322028] ==================================================================
[   15.322364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   15.322623] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   15.323088] 
[   15.323199] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   15.323241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.323253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.323274] Call Trace:
[   15.323287]  <TASK>
[   15.323300]  dump_stack_lvl+0x73/0xb0
[   15.323324]  print_report+0xd1/0x650
[   15.323346]  ? __virt_addr_valid+0x1db/0x2d0
[   15.323369]  ? kasan_atomics_helper+0x218a/0x5450
[   15.323390]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.323413]  ? kasan_atomics_helper+0x218a/0x5450
[   15.323435]  kasan_report+0x141/0x180
[   15.323457]  ? kasan_atomics_helper+0x218a/0x5450
[   15.323484]  kasan_check_range+0x10c/0x1c0
[   15.323507]  __kasan_check_write+0x18/0x20
[   15.323526]  kasan_atomics_helper+0x218a/0x5450
[   15.323549]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.323572]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.323596]  ? ret_from_fork_asm+0x1a/0x30
[   15.323618]  ? kasan_atomics+0x152/0x310
[   15.323644]  kasan_atomics+0x1dc/0x310
[   15.323667]  ? __pfx_kasan_atomics+0x10/0x10
[   15.323692]  ? __pfx_read_tsc+0x10/0x10
[   15.323712]  ? ktime_get_ts64+0x86/0x230
[   15.323736]  kunit_try_run_case+0x1a5/0x480
[   15.323757]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.323777]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.323802]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.323827]  ? __kthread_parkme+0x82/0x180
[   15.323847]  ? preempt_count_sub+0x50/0x80
[   15.323871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.323902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.323927]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.323952]  kthread+0x337/0x6f0
[   15.323971]  ? trace_preempt_on+0x20/0xc0
[   15.323993]  ? __pfx_kthread+0x10/0x10
[   15.324014]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.324037]  ? calculate_sigpending+0x7b/0xa0
[   15.324061]  ? __pfx_kthread+0x10/0x10
[   15.324082]  ret_from_fork+0x116/0x1d0
[   15.324101]  ? __pfx_kthread+0x10/0x10
[   15.324122]  ret_from_fork_asm+0x1a/0x30
[   15.324152]  </TASK>
[   15.324162] 
[   15.331583] Allocated by task 282:
[   15.331771]  kasan_save_stack+0x45/0x70
[   15.331976]  kasan_save_track+0x18/0x40
[   15.332128]  kasan_save_alloc_info+0x3b/0x50
[   15.332323]  __kasan_kmalloc+0xb7/0xc0
[   15.332457]  __kmalloc_cache_noprof+0x189/0x420
[   15.332613]  kasan_atomics+0x95/0x310
[   15.332799]  kunit_try_run_case+0x1a5/0x480
[   15.333071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.333322]  kthread+0x337/0x6f0
[   15.333466]  ret_from_fork+0x116/0x1d0
[   15.333597]  ret_from_fork_asm+0x1a/0x30
[   15.333761] 
[   15.333861] The buggy address belongs to the object at ffff888102b49680
[   15.333861]  which belongs to the cache kmalloc-64 of size 64
[   15.334413] The buggy address is located 0 bytes to the right of
[   15.334413]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   15.334862] 
[   15.334967] The buggy address belongs to the physical page:
[   15.335222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.335531] flags: 0x200000000000000(node=0|zone=2)
[   15.335707] page_type: f5(slab)
[   15.335844] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.336192] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.336421] page dumped because: kasan: bad access detected
[   15.336591] 
[   15.336659] Memory state around the buggy address:
[   15.336812]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.337038]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.337260] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.337474]                                      ^
[   15.337629]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.337955]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.338272] ==================================================================
[   14.075708] ==================================================================
[   14.076200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   14.076513] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.076783] 
[   14.076958] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.077011] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.077024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.077049] Call Trace:
[   14.077063]  <TASK>
[   14.077089]  dump_stack_lvl+0x73/0xb0
[   14.077114]  print_report+0xd1/0x650
[   14.077137]  ? __virt_addr_valid+0x1db/0x2d0
[   14.077162]  ? kasan_atomics_helper+0x697/0x5450
[   14.077198]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.077221]  ? kasan_atomics_helper+0x697/0x5450
[   14.077253]  kasan_report+0x141/0x180
[   14.077276]  ? kasan_atomics_helper+0x697/0x5450
[   14.077303]  kasan_check_range+0x10c/0x1c0
[   14.077338]  __kasan_check_write+0x18/0x20
[   14.077359]  kasan_atomics_helper+0x697/0x5450
[   14.077383]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.077406]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.077430]  ? ret_from_fork_asm+0x1a/0x30
[   14.077452]  ? kasan_atomics+0x152/0x310
[   14.077480]  kasan_atomics+0x1dc/0x310
[   14.077503]  ? __pfx_kasan_atomics+0x10/0x10
[   14.077528]  ? __pfx_read_tsc+0x10/0x10
[   14.077549]  ? ktime_get_ts64+0x86/0x230
[   14.077574]  kunit_try_run_case+0x1a5/0x480
[   14.077595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.077616]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.077652]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.077677]  ? __kthread_parkme+0x82/0x180
[   14.077707]  ? preempt_count_sub+0x50/0x80
[   14.077732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.077753]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.077788]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.077814]  kthread+0x337/0x6f0
[   14.077834]  ? trace_preempt_on+0x20/0xc0
[   14.077857]  ? __pfx_kthread+0x10/0x10
[   14.077885]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.077924]  ? calculate_sigpending+0x7b/0xa0
[   14.077959]  ? __pfx_kthread+0x10/0x10
[   14.077982]  ret_from_fork+0x116/0x1d0
[   14.078001]  ? __pfx_kthread+0x10/0x10
[   14.078023]  ret_from_fork_asm+0x1a/0x30
[   14.078054]  </TASK>
[   14.078066] 
[   14.088252] Allocated by task 282:
[   14.088859]  kasan_save_stack+0x45/0x70
[   14.089220]  kasan_save_track+0x18/0x40
[   14.089405]  kasan_save_alloc_info+0x3b/0x50
[   14.089605]  __kasan_kmalloc+0xb7/0xc0
[   14.090042]  __kmalloc_cache_noprof+0x189/0x420
[   14.090389]  kasan_atomics+0x95/0x310
[   14.090778]  kunit_try_run_case+0x1a5/0x480
[   14.091173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.091537]  kthread+0x337/0x6f0
[   14.092000]  ret_from_fork+0x116/0x1d0
[   14.092277]  ret_from_fork_asm+0x1a/0x30
[   14.092562] 
[   14.092880] The buggy address belongs to the object at ffff888102b49680
[   14.092880]  which belongs to the cache kmalloc-64 of size 64
[   14.094039] The buggy address is located 0 bytes to the right of
[   14.094039]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.094827] 
[   14.094943] The buggy address belongs to the physical page:
[   14.095388] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.096011] flags: 0x200000000000000(node=0|zone=2)
[   14.096351] page_type: f5(slab)
[   14.096506] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.097148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.097827] page dumped because: kasan: bad access detected
[   14.098312] 
[   14.098475] Memory state around the buggy address:
[   14.098667]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.099092]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.099337] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.099626]                                      ^
[   14.099831]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.100272]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.100605] ==================================================================
[   14.215505] ==================================================================
[   14.215773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   14.216214] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.216490] 
[   14.216603] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.216665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.216679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.216700] Call Trace:
[   14.216716]  <TASK>
[   14.216732]  dump_stack_lvl+0x73/0xb0
[   14.216758]  print_report+0xd1/0x650
[   14.216781]  ? __virt_addr_valid+0x1db/0x2d0
[   14.216804]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.216826]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.216850]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.216873]  kasan_report+0x141/0x180
[   14.216905]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.216950]  kasan_check_range+0x10c/0x1c0
[   14.216976]  __kasan_check_write+0x18/0x20
[   14.216996]  kasan_atomics_helper+0xa2b/0x5450
[   14.217019]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.217053]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.217079]  ? ret_from_fork_asm+0x1a/0x30
[   14.217102]  ? kasan_atomics+0x152/0x310
[   14.217129]  kasan_atomics+0x1dc/0x310
[   14.217153]  ? __pfx_kasan_atomics+0x10/0x10
[   14.217178]  ? __pfx_read_tsc+0x10/0x10
[   14.217200]  ? ktime_get_ts64+0x86/0x230
[   14.217225]  kunit_try_run_case+0x1a5/0x480
[   14.217247]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.217268]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.217294]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.217320]  ? __kthread_parkme+0x82/0x180
[   14.217342]  ? preempt_count_sub+0x50/0x80
[   14.217366]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.217388]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.217414]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.217440]  kthread+0x337/0x6f0
[   14.217460]  ? trace_preempt_on+0x20/0xc0
[   14.217484]  ? __pfx_kthread+0x10/0x10
[   14.217505]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.217528]  ? calculate_sigpending+0x7b/0xa0
[   14.217553]  ? __pfx_kthread+0x10/0x10
[   14.217575]  ret_from_fork+0x116/0x1d0
[   14.217595]  ? __pfx_kthread+0x10/0x10
[   14.217631]  ret_from_fork_asm+0x1a/0x30
[   14.217662]  </TASK>
[   14.217673] 
[   14.226087] Allocated by task 282:
[   14.226271]  kasan_save_stack+0x45/0x70
[   14.226437]  kasan_save_track+0x18/0x40
[   14.226573]  kasan_save_alloc_info+0x3b/0x50
[   14.226795]  __kasan_kmalloc+0xb7/0xc0
[   14.227067]  __kmalloc_cache_noprof+0x189/0x420
[   14.227295]  kasan_atomics+0x95/0x310
[   14.227453]  kunit_try_run_case+0x1a5/0x480
[   14.227636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.227888]  kthread+0x337/0x6f0
[   14.228041]  ret_from_fork+0x116/0x1d0
[   14.228175]  ret_from_fork_asm+0x1a/0x30
[   14.228415] 
[   14.228509] The buggy address belongs to the object at ffff888102b49680
[   14.228509]  which belongs to the cache kmalloc-64 of size 64
[   14.229180] The buggy address is located 0 bytes to the right of
[   14.229180]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.229560] 
[   14.229659] The buggy address belongs to the physical page:
[   14.229919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.230473] flags: 0x200000000000000(node=0|zone=2)
[   14.230710] page_type: f5(slab)
[   14.230915] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.231190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.231507] page dumped because: kasan: bad access detected
[   14.231748] 
[   14.231843] Memory state around the buggy address:
[   14.232111]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.232370]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.232689] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.232973]                                      ^
[   14.233204]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.233590]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.233984] ==================================================================
[   14.859681] ==================================================================
[   14.859928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.860736] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.861522] 
[   14.861702] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.861747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.861759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.861781] Call Trace:
[   14.861797]  <TASK>
[   14.861813]  dump_stack_lvl+0x73/0xb0
[   14.861849]  print_report+0xd1/0x650
[   14.861872]  ? __virt_addr_valid+0x1db/0x2d0
[   14.861909]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.861932]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.861971]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.861994]  kasan_report+0x141/0x180
[   14.862017]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.862045]  kasan_check_range+0x10c/0x1c0
[   14.862070]  __kasan_check_write+0x18/0x20
[   14.862090]  kasan_atomics_helper+0x16e7/0x5450
[   14.862113]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.862136]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.862160]  ? ret_from_fork_asm+0x1a/0x30
[   14.862183]  ? kasan_atomics+0x152/0x310
[   14.862210]  kasan_atomics+0x1dc/0x310
[   14.862233]  ? __pfx_kasan_atomics+0x10/0x10
[   14.862258]  ? __pfx_read_tsc+0x10/0x10
[   14.862280]  ? ktime_get_ts64+0x86/0x230
[   14.862304]  kunit_try_run_case+0x1a5/0x480
[   14.862327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.862346]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.862372]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.862397]  ? __kthread_parkme+0x82/0x180
[   14.862418]  ? preempt_count_sub+0x50/0x80
[   14.862444]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.862466]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.862491]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.862516]  kthread+0x337/0x6f0
[   14.862536]  ? trace_preempt_on+0x20/0xc0
[   14.862559]  ? __pfx_kthread+0x10/0x10
[   14.862580]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.862604]  ? calculate_sigpending+0x7b/0xa0
[   14.862670]  ? __pfx_kthread+0x10/0x10
[   14.862695]  ret_from_fork+0x116/0x1d0
[   14.862715]  ? __pfx_kthread+0x10/0x10
[   14.862736]  ret_from_fork_asm+0x1a/0x30
[   14.862766]  </TASK>
[   14.862777] 
[   14.876482] Allocated by task 282:
[   14.876640]  kasan_save_stack+0x45/0x70
[   14.877220]  kasan_save_track+0x18/0x40
[   14.877567]  kasan_save_alloc_info+0x3b/0x50
[   14.878030]  __kasan_kmalloc+0xb7/0xc0
[   14.878203]  __kmalloc_cache_noprof+0x189/0x420
[   14.878376]  kasan_atomics+0x95/0x310
[   14.878513]  kunit_try_run_case+0x1a5/0x480
[   14.878783]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.879337]  kthread+0x337/0x6f0
[   14.879696]  ret_from_fork+0x116/0x1d0
[   14.880110]  ret_from_fork_asm+0x1a/0x30
[   14.880477] 
[   14.880656] The buggy address belongs to the object at ffff888102b49680
[   14.880656]  which belongs to the cache kmalloc-64 of size 64
[   14.881735] The buggy address is located 0 bytes to the right of
[   14.881735]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.882126] 
[   14.882206] The buggy address belongs to the physical page:
[   14.882377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.882619] flags: 0x200000000000000(node=0|zone=2)
[   14.882783] page_type: f5(slab)
[   14.882915] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.883148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.883377] page dumped because: kasan: bad access detected
[   14.883549] 
[   14.883619] Memory state around the buggy address:
[   14.883772]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.884104]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.884324] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.884539]                                      ^
[   14.884779]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.885310]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.885657] ==================================================================
[   14.628356] ==================================================================
[   14.629345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.629901] Read of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.631054] 
[   14.631240] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.631285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.631298] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.631320] Call Trace:
[   14.631335]  <TASK>
[   14.631349]  dump_stack_lvl+0x73/0xb0
[   14.631375]  print_report+0xd1/0x650
[   14.631399]  ? __virt_addr_valid+0x1db/0x2d0
[   14.631424]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.631446]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.631470]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.631492]  kasan_report+0x141/0x180
[   14.631515]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.631542]  kasan_check_range+0x10c/0x1c0
[   14.631566]  __kasan_check_read+0x15/0x20
[   14.631586]  kasan_atomics_helper+0x13b5/0x5450
[   14.631610]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.631634]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.631659]  ? ret_from_fork_asm+0x1a/0x30
[   14.631681]  ? kasan_atomics+0x152/0x310
[   14.631708]  kasan_atomics+0x1dc/0x310
[   14.631732]  ? __pfx_kasan_atomics+0x10/0x10
[   14.631757]  ? __pfx_read_tsc+0x10/0x10
[   14.631779]  ? ktime_get_ts64+0x86/0x230
[   14.631803]  kunit_try_run_case+0x1a5/0x480
[   14.631825]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.631845]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.631871]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.631906]  ? __kthread_parkme+0x82/0x180
[   14.631927]  ? preempt_count_sub+0x50/0x80
[   14.631952]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.631973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.631998]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.632024]  kthread+0x337/0x6f0
[   14.632045]  ? trace_preempt_on+0x20/0xc0
[   14.632068]  ? __pfx_kthread+0x10/0x10
[   14.632089]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.632158]  ? calculate_sigpending+0x7b/0xa0
[   14.632184]  ? __pfx_kthread+0x10/0x10
[   14.632216]  ret_from_fork+0x116/0x1d0
[   14.632236]  ? __pfx_kthread+0x10/0x10
[   14.632257]  ret_from_fork_asm+0x1a/0x30
[   14.632287]  </TASK>
[   14.632298] 
[   14.647394] Allocated by task 282:
[   14.647527]  kasan_save_stack+0x45/0x70
[   14.647692]  kasan_save_track+0x18/0x40
[   14.648064]  kasan_save_alloc_info+0x3b/0x50
[   14.648566]  __kasan_kmalloc+0xb7/0xc0
[   14.649012]  __kmalloc_cache_noprof+0x189/0x420
[   14.649584]  kasan_atomics+0x95/0x310
[   14.650068]  kunit_try_run_case+0x1a5/0x480
[   14.650350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.650528]  kthread+0x337/0x6f0
[   14.650668]  ret_from_fork+0x116/0x1d0
[   14.651030]  ret_from_fork_asm+0x1a/0x30
[   14.651644] 
[   14.651879] The buggy address belongs to the object at ffff888102b49680
[   14.651879]  which belongs to the cache kmalloc-64 of size 64
[   14.653124] The buggy address is located 0 bytes to the right of
[   14.653124]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.653650] 
[   14.653837] The buggy address belongs to the physical page:
[   14.654453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.655248] flags: 0x200000000000000(node=0|zone=2)
[   14.655661] page_type: f5(slab)
[   14.656048] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.656647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.657234] page dumped because: kasan: bad access detected
[   14.657412] 
[   14.657482] Memory state around the buggy address:
[   14.657638]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.657860]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.658112] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.658587]                                      ^
[   14.659078]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.659494]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.659741] ==================================================================
[   13.952437] ==================================================================
[   13.953125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   13.953505] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   13.953726] 
[   13.953807] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.953857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.953870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.953899] Call Trace:
[   13.953915]  <TASK>
[   13.953928]  dump_stack_lvl+0x73/0xb0
[   13.953953]  print_report+0xd1/0x650
[   13.953975]  ? __virt_addr_valid+0x1db/0x2d0
[   13.953999]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.954022]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.954045]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.954068]  kasan_report+0x141/0x180
[   13.954092]  ? kasan_atomics_helper+0x4a0/0x5450
[   13.954120]  kasan_check_range+0x10c/0x1c0
[   13.954145]  __kasan_check_write+0x18/0x20
[   13.954166]  kasan_atomics_helper+0x4a0/0x5450
[   13.954190]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.954213]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.954239]  ? ret_from_fork_asm+0x1a/0x30
[   13.954261]  ? kasan_atomics+0x152/0x310
[   13.954289]  kasan_atomics+0x1dc/0x310
[   13.954313]  ? __pfx_kasan_atomics+0x10/0x10
[   13.954339]  ? __pfx_read_tsc+0x10/0x10
[   13.954361]  ? ktime_get_ts64+0x86/0x230
[   13.954386]  kunit_try_run_case+0x1a5/0x480
[   13.954409]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.954429]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.954456]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.954482]  ? __kthread_parkme+0x82/0x180
[   13.954503]  ? preempt_count_sub+0x50/0x80
[   13.954529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.954552]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.954579]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.954605]  kthread+0x337/0x6f0
[   13.954626]  ? trace_preempt_on+0x20/0xc0
[   13.954649]  ? __pfx_kthread+0x10/0x10
[   13.954673]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.954696]  ? calculate_sigpending+0x7b/0xa0
[   13.954721]  ? __pfx_kthread+0x10/0x10
[   13.954744]  ret_from_fork+0x116/0x1d0
[   13.954763]  ? __pfx_kthread+0x10/0x10
[   13.954785]  ret_from_fork_asm+0x1a/0x30
[   13.954817]  </TASK>
[   13.954828] 
[   13.971672] Allocated by task 282:
[   13.972100]  kasan_save_stack+0x45/0x70
[   13.972476]  kasan_save_track+0x18/0x40
[   13.972986]  kasan_save_alloc_info+0x3b/0x50
[   13.973400]  __kasan_kmalloc+0xb7/0xc0
[   13.973818]  __kmalloc_cache_noprof+0x189/0x420
[   13.974228]  kasan_atomics+0x95/0x310
[   13.974757]  kunit_try_run_case+0x1a5/0x480
[   13.975055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.975565]  kthread+0x337/0x6f0
[   13.975806]  ret_from_fork+0x116/0x1d0
[   13.976253]  ret_from_fork_asm+0x1a/0x30
[   13.976603] 
[   13.976696] The buggy address belongs to the object at ffff888102b49680
[   13.976696]  which belongs to the cache kmalloc-64 of size 64
[   13.977106] The buggy address is located 0 bytes to the right of
[   13.977106]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   13.978270] 
[   13.978446] The buggy address belongs to the physical page:
[   13.979059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   13.979779] flags: 0x200000000000000(node=0|zone=2)
[   13.980175] page_type: f5(slab)
[   13.980496] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.981170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.981398] page dumped because: kasan: bad access detected
[   13.981566] 
[   13.981643] Memory state around the buggy address:
[   13.982073]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.982807]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.983587] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.984286]                                      ^
[   13.984824]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.985706]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.986120] ==================================================================
[   14.252818] ==================================================================
[   14.253186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   14.253516] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.253843] 
[   14.253946] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.254008] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.254021] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.254042] Call Trace:
[   14.254055]  <TASK>
[   14.254069]  dump_stack_lvl+0x73/0xb0
[   14.254093]  print_report+0xd1/0x650
[   14.254115]  ? __virt_addr_valid+0x1db/0x2d0
[   14.254140]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.254162]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.254185]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.254207]  kasan_report+0x141/0x180
[   14.254230]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.254257]  kasan_check_range+0x10c/0x1c0
[   14.254282]  __kasan_check_write+0x18/0x20
[   14.254302]  kasan_atomics_helper+0xb6a/0x5450
[   14.254325]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.254348]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.254373]  ? ret_from_fork_asm+0x1a/0x30
[   14.254395]  ? kasan_atomics+0x152/0x310
[   14.254422]  kasan_atomics+0x1dc/0x310
[   14.254445]  ? __pfx_kasan_atomics+0x10/0x10
[   14.254471]  ? __pfx_read_tsc+0x10/0x10
[   14.254493]  ? ktime_get_ts64+0x86/0x230
[   14.254518]  kunit_try_run_case+0x1a5/0x480
[   14.254543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.254564]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.254590]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.254634]  ? __kthread_parkme+0x82/0x180
[   14.254673]  ? preempt_count_sub+0x50/0x80
[   14.254697]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.254719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.254744]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.254771]  kthread+0x337/0x6f0
[   14.254792]  ? trace_preempt_on+0x20/0xc0
[   14.254815]  ? __pfx_kthread+0x10/0x10
[   14.254836]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.254859]  ? calculate_sigpending+0x7b/0xa0
[   14.254884]  ? __pfx_kthread+0x10/0x10
[   14.254916]  ret_from_fork+0x116/0x1d0
[   14.254954]  ? __pfx_kthread+0x10/0x10
[   14.254975]  ret_from_fork_asm+0x1a/0x30
[   14.255006]  </TASK>
[   14.255017] 
[   14.267169] Allocated by task 282:
[   14.267319]  kasan_save_stack+0x45/0x70
[   14.267503]  kasan_save_track+0x18/0x40
[   14.267688]  kasan_save_alloc_info+0x3b/0x50
[   14.268003]  __kasan_kmalloc+0xb7/0xc0
[   14.268309]  __kmalloc_cache_noprof+0x189/0x420
[   14.268470]  kasan_atomics+0x95/0x310
[   14.269231]  kunit_try_run_case+0x1a5/0x480
[   14.269756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.270073]  kthread+0x337/0x6f0
[   14.271096]  ret_from_fork+0x116/0x1d0
[   14.271249]  ret_from_fork_asm+0x1a/0x30
[   14.271455] 
[   14.271555] The buggy address belongs to the object at ffff888102b49680
[   14.271555]  which belongs to the cache kmalloc-64 of size 64
[   14.272069] The buggy address is located 0 bytes to the right of
[   14.272069]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.272859] 
[   14.272986] The buggy address belongs to the physical page:
[   14.273271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.273622] flags: 0x200000000000000(node=0|zone=2)
[   14.273845] page_type: f5(slab)
[   14.274169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.274420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.274649] page dumped because: kasan: bad access detected
[   14.274821] 
[   14.274968] Memory state around the buggy address:
[   14.275195]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.275675]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.276080] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.276388]                                      ^
[   14.276620]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.276992]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.277359] ==================================================================
[   14.886125] ==================================================================
[   14.886444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   14.886742] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.887045] 
[   14.887154] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.887198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.887211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.887231] Call Trace:
[   14.887246]  <TASK>
[   14.887260]  dump_stack_lvl+0x73/0xb0
[   14.887285]  print_report+0xd1/0x650
[   14.887307]  ? __virt_addr_valid+0x1db/0x2d0
[   14.887332]  ? kasan_atomics_helper+0x177f/0x5450
[   14.887354]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.887378]  ? kasan_atomics_helper+0x177f/0x5450
[   14.887401]  kasan_report+0x141/0x180
[   14.887424]  ? kasan_atomics_helper+0x177f/0x5450
[   14.887451]  kasan_check_range+0x10c/0x1c0
[   14.887476]  __kasan_check_write+0x18/0x20
[   14.887497]  kasan_atomics_helper+0x177f/0x5450
[   14.887521]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.887544]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.887569]  ? ret_from_fork_asm+0x1a/0x30
[   14.887592]  ? kasan_atomics+0x152/0x310
[   14.887637]  kasan_atomics+0x1dc/0x310
[   14.887661]  ? __pfx_kasan_atomics+0x10/0x10
[   14.887687]  ? __pfx_read_tsc+0x10/0x10
[   14.887708]  ? ktime_get_ts64+0x86/0x230
[   14.887732]  kunit_try_run_case+0x1a5/0x480
[   14.887754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.887774]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.887801]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.887825]  ? __kthread_parkme+0x82/0x180
[   14.887847]  ? preempt_count_sub+0x50/0x80
[   14.887870]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.887901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.887944]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.887971]  kthread+0x337/0x6f0
[   14.887990]  ? trace_preempt_on+0x20/0xc0
[   14.888014]  ? __pfx_kthread+0x10/0x10
[   14.888035]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.888059]  ? calculate_sigpending+0x7b/0xa0
[   14.888085]  ? __pfx_kthread+0x10/0x10
[   14.888107]  ret_from_fork+0x116/0x1d0
[   14.888126]  ? __pfx_kthread+0x10/0x10
[   14.888147]  ret_from_fork_asm+0x1a/0x30
[   14.888178]  </TASK>
[   14.888189] 
[   14.896517] Allocated by task 282:
[   14.896723]  kasan_save_stack+0x45/0x70
[   14.896950]  kasan_save_track+0x18/0x40
[   14.897248]  kasan_save_alloc_info+0x3b/0x50
[   14.897426]  __kasan_kmalloc+0xb7/0xc0
[   14.897631]  __kmalloc_cache_noprof+0x189/0x420
[   14.897818]  kasan_atomics+0x95/0x310
[   14.897987]  kunit_try_run_case+0x1a5/0x480
[   14.898135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.898318]  kthread+0x337/0x6f0
[   14.898487]  ret_from_fork+0x116/0x1d0
[   14.898749]  ret_from_fork_asm+0x1a/0x30
[   14.898993] 
[   14.899094] The buggy address belongs to the object at ffff888102b49680
[   14.899094]  which belongs to the cache kmalloc-64 of size 64
[   14.899651] The buggy address is located 0 bytes to the right of
[   14.899651]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.900196] 
[   14.900296] The buggy address belongs to the physical page:
[   14.900527] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.901012] flags: 0x200000000000000(node=0|zone=2)
[   14.901211] page_type: f5(slab)
[   14.901333] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.901635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.901984] page dumped because: kasan: bad access detected
[   14.902238] 
[   14.902325] Memory state around the buggy address:
[   14.902481]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.902697]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.902946] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.903176]                                      ^
[   14.903396]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.903741]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.904211] ==================================================================
[   14.123683] ==================================================================
[   14.123963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.124622] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.124975] 
[   14.125348] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.125467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.125496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.125517] Call Trace:
[   14.125532]  <TASK>
[   14.125659]  dump_stack_lvl+0x73/0xb0
[   14.125691]  print_report+0xd1/0x650
[   14.125716]  ? __virt_addr_valid+0x1db/0x2d0
[   14.125741]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.125764]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.125789]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.125811]  kasan_report+0x141/0x180
[   14.125834]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.125862]  kasan_check_range+0x10c/0x1c0
[   14.125887]  __kasan_check_write+0x18/0x20
[   14.125918]  kasan_atomics_helper+0x7c7/0x5450
[   14.125961]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.125985]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.126009]  ? ret_from_fork_asm+0x1a/0x30
[   14.126032]  ? kasan_atomics+0x152/0x310
[   14.126059]  kasan_atomics+0x1dc/0x310
[   14.126083]  ? __pfx_kasan_atomics+0x10/0x10
[   14.126109]  ? __pfx_read_tsc+0x10/0x10
[   14.126131]  ? ktime_get_ts64+0x86/0x230
[   14.126157]  kunit_try_run_case+0x1a5/0x480
[   14.126179]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.126199]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.126225]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.126250]  ? __kthread_parkme+0x82/0x180
[   14.126270]  ? preempt_count_sub+0x50/0x80
[   14.126295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.126317]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.126343]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.126369]  kthread+0x337/0x6f0
[   14.126389]  ? trace_preempt_on+0x20/0xc0
[   14.126413]  ? __pfx_kthread+0x10/0x10
[   14.126435]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.126458]  ? calculate_sigpending+0x7b/0xa0
[   14.126483]  ? __pfx_kthread+0x10/0x10
[   14.126505]  ret_from_fork+0x116/0x1d0
[   14.126526]  ? __pfx_kthread+0x10/0x10
[   14.126549]  ret_from_fork_asm+0x1a/0x30
[   14.126580]  </TASK>
[   14.126591] 
[   14.138062] Allocated by task 282:
[   14.138409]  kasan_save_stack+0x45/0x70
[   14.138752]  kasan_save_track+0x18/0x40
[   14.138962]  kasan_save_alloc_info+0x3b/0x50
[   14.139451]  __kasan_kmalloc+0xb7/0xc0
[   14.139620]  __kmalloc_cache_noprof+0x189/0x420
[   14.140026]  kasan_atomics+0x95/0x310
[   14.140264]  kunit_try_run_case+0x1a5/0x480
[   14.140438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.140693]  kthread+0x337/0x6f0
[   14.141189]  ret_from_fork+0x116/0x1d0
[   14.141470]  ret_from_fork_asm+0x1a/0x30
[   14.141640] 
[   14.141876] The buggy address belongs to the object at ffff888102b49680
[   14.141876]  which belongs to the cache kmalloc-64 of size 64
[   14.142745] The buggy address is located 0 bytes to the right of
[   14.142745]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.143494] 
[   14.143599] The buggy address belongs to the physical page:
[   14.144048] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.144402] flags: 0x200000000000000(node=0|zone=2)
[   14.144735] page_type: f5(slab)
[   14.144922] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.145443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.145991] page dumped because: kasan: bad access detected
[   14.146238] 
[   14.146504] Memory state around the buggy address:
[   14.146735]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.147411]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.147773] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.148085]                                      ^
[   14.148456]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.148797]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.149360] ==================================================================
[   14.168802] ==================================================================
[   14.169265] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   14.169719] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.170009] 
[   14.170162] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.170204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.170216] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.170237] Call Trace:
[   14.170250]  <TASK>
[   14.170264]  dump_stack_lvl+0x73/0xb0
[   14.170288]  print_report+0xd1/0x650
[   14.170311]  ? __virt_addr_valid+0x1db/0x2d0
[   14.170334]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.170356]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.170379]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.170402]  kasan_report+0x141/0x180
[   14.170424]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.170451]  kasan_check_range+0x10c/0x1c0
[   14.170477]  __kasan_check_write+0x18/0x20
[   14.170497]  kasan_atomics_helper+0x8f9/0x5450
[   14.170521]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.170544]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.170569]  ? ret_from_fork_asm+0x1a/0x30
[   14.170592]  ? kasan_atomics+0x152/0x310
[   14.170619]  kasan_atomics+0x1dc/0x310
[   14.170644]  ? __pfx_kasan_atomics+0x10/0x10
[   14.170671]  ? __pfx_read_tsc+0x10/0x10
[   14.170692]  ? ktime_get_ts64+0x86/0x230
[   14.170717]  kunit_try_run_case+0x1a5/0x480
[   14.170738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.170759]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.170786]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.170812]  ? __kthread_parkme+0x82/0x180
[   14.170833]  ? preempt_count_sub+0x50/0x80
[   14.170857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.170880]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.170918]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.170943]  kthread+0x337/0x6f0
[   14.170963]  ? trace_preempt_on+0x20/0xc0
[   14.170996]  ? __pfx_kthread+0x10/0x10
[   14.171027]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.171050]  ? calculate_sigpending+0x7b/0xa0
[   14.171075]  ? __pfx_kthread+0x10/0x10
[   14.171098]  ret_from_fork+0x116/0x1d0
[   14.171118]  ? __pfx_kthread+0x10/0x10
[   14.171139]  ret_from_fork_asm+0x1a/0x30
[   14.171170]  </TASK>
[   14.171181] 
[   14.182312] Allocated by task 282:
[   14.182607]  kasan_save_stack+0x45/0x70
[   14.183018]  kasan_save_track+0x18/0x40
[   14.183424]  kasan_save_alloc_info+0x3b/0x50
[   14.183789]  __kasan_kmalloc+0xb7/0xc0
[   14.184159]  __kmalloc_cache_noprof+0x189/0x420
[   14.184398]  kasan_atomics+0x95/0x310
[   14.184576]  kunit_try_run_case+0x1a5/0x480
[   14.185095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.185538]  kthread+0x337/0x6f0
[   14.185840]  ret_from_fork+0x116/0x1d0
[   14.186254]  ret_from_fork_asm+0x1a/0x30
[   14.186560] 
[   14.186798] The buggy address belongs to the object at ffff888102b49680
[   14.186798]  which belongs to the cache kmalloc-64 of size 64
[   14.187851] The buggy address is located 0 bytes to the right of
[   14.187851]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.188839] 
[   14.188925] The buggy address belongs to the physical page:
[   14.189323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.189584] flags: 0x200000000000000(node=0|zone=2)
[   14.189836] page_type: f5(slab)
[   14.190033] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.190320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.190687] page dumped because: kasan: bad access detected
[   14.190908] 
[   14.191034] Memory state around the buggy address:
[   14.191255]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.191533]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.191790] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.192107]                                      ^
[   14.192336]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.192685]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.193110] ==================================================================
[   14.361133] ==================================================================
[   14.361369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   14.361601] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.362104] 
[   14.362242] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.362287] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.362317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.362352] Call Trace:
[   14.362367]  <TASK>
[   14.362382]  dump_stack_lvl+0x73/0xb0
[   14.362422]  print_report+0xd1/0x650
[   14.362445]  ? __virt_addr_valid+0x1db/0x2d0
[   14.362487]  ? kasan_atomics_helper+0xe78/0x5450
[   14.362509]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.362550]  ? kasan_atomics_helper+0xe78/0x5450
[   14.362573]  kasan_report+0x141/0x180
[   14.362612]  ? kasan_atomics_helper+0xe78/0x5450
[   14.362689]  kasan_check_range+0x10c/0x1c0
[   14.362729]  __kasan_check_write+0x18/0x20
[   14.362753]  kasan_atomics_helper+0xe78/0x5450
[   14.362791]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.362828]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.362854]  ? ret_from_fork_asm+0x1a/0x30
[   14.362876]  ? kasan_atomics+0x152/0x310
[   14.362913]  kasan_atomics+0x1dc/0x310
[   14.362956]  ? __pfx_kasan_atomics+0x10/0x10
[   14.362984]  ? __pfx_read_tsc+0x10/0x10
[   14.363007]  ? ktime_get_ts64+0x86/0x230
[   14.363031]  kunit_try_run_case+0x1a5/0x480
[   14.363054]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.363075]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.363102]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.363128]  ? __kthread_parkme+0x82/0x180
[   14.363167]  ? preempt_count_sub+0x50/0x80
[   14.363192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.363215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.363257]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.363284]  kthread+0x337/0x6f0
[   14.363304]  ? trace_preempt_on+0x20/0xc0
[   14.363327]  ? __pfx_kthread+0x10/0x10
[   14.363349]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.363372]  ? calculate_sigpending+0x7b/0xa0
[   14.363397]  ? __pfx_kthread+0x10/0x10
[   14.363420]  ret_from_fork+0x116/0x1d0
[   14.363439]  ? __pfx_kthread+0x10/0x10
[   14.363461]  ret_from_fork_asm+0x1a/0x30
[   14.363491]  </TASK>
[   14.363502] 
[   14.373189] Allocated by task 282:
[   14.373319]  kasan_save_stack+0x45/0x70
[   14.373463]  kasan_save_track+0x18/0x40
[   14.373628]  kasan_save_alloc_info+0x3b/0x50
[   14.373790]  __kasan_kmalloc+0xb7/0xc0
[   14.373988]  __kmalloc_cache_noprof+0x189/0x420
[   14.374172]  kasan_atomics+0x95/0x310
[   14.374311]  kunit_try_run_case+0x1a5/0x480
[   14.374456]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.374678]  kthread+0x337/0x6f0
[   14.374845]  ret_from_fork+0x116/0x1d0
[   14.375213]  ret_from_fork_asm+0x1a/0x30
[   14.375412] 
[   14.375511] The buggy address belongs to the object at ffff888102b49680
[   14.375511]  which belongs to the cache kmalloc-64 of size 64
[   14.376125] The buggy address is located 0 bytes to the right of
[   14.376125]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.376649] 
[   14.376724] The buggy address belongs to the physical page:
[   14.377078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.377322] flags: 0x200000000000000(node=0|zone=2)
[   14.377486] page_type: f5(slab)
[   14.377607] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.377857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.378200] page dumped because: kasan: bad access detected
[   14.378459] 
[   14.378555] Memory state around the buggy address:
[   14.378816]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.379203]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.379422] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.379667]                                      ^
[   14.379924]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.380246]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.380564] ==================================================================
[   14.692593] ==================================================================
[   14.693291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.694141] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.695134] 
[   14.695277] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.695339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.695351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.695392] Call Trace:
[   14.695408]  <TASK>
[   14.695423]  dump_stack_lvl+0x73/0xb0
[   14.695450]  print_report+0xd1/0x650
[   14.695483]  ? __virt_addr_valid+0x1db/0x2d0
[   14.695507]  ? kasan_atomics_helper+0x1467/0x5450
[   14.695530]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.695554]  ? kasan_atomics_helper+0x1467/0x5450
[   14.695576]  kasan_report+0x141/0x180
[   14.695599]  ? kasan_atomics_helper+0x1467/0x5450
[   14.695626]  kasan_check_range+0x10c/0x1c0
[   14.695663]  __kasan_check_write+0x18/0x20
[   14.695684]  kasan_atomics_helper+0x1467/0x5450
[   14.695708]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.695730]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.695756]  ? ret_from_fork_asm+0x1a/0x30
[   14.695778]  ? kasan_atomics+0x152/0x310
[   14.695805]  kasan_atomics+0x1dc/0x310
[   14.695829]  ? __pfx_kasan_atomics+0x10/0x10
[   14.695854]  ? __pfx_read_tsc+0x10/0x10
[   14.695875]  ? ktime_get_ts64+0x86/0x230
[   14.695912]  kunit_try_run_case+0x1a5/0x480
[   14.695933]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.695996]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.696023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.696049]  ? __kthread_parkme+0x82/0x180
[   14.696069]  ? preempt_count_sub+0x50/0x80
[   14.696094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.696116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.696142]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.696168]  kthread+0x337/0x6f0
[   14.696188]  ? trace_preempt_on+0x20/0xc0
[   14.696212]  ? __pfx_kthread+0x10/0x10
[   14.696233]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.696257]  ? calculate_sigpending+0x7b/0xa0
[   14.696281]  ? __pfx_kthread+0x10/0x10
[   14.696304]  ret_from_fork+0x116/0x1d0
[   14.696323]  ? __pfx_kthread+0x10/0x10
[   14.696344]  ret_from_fork_asm+0x1a/0x30
[   14.696375]  </TASK>
[   14.696387] 
[   14.711140] Allocated by task 282:
[   14.711408]  kasan_save_stack+0x45/0x70
[   14.711742]  kasan_save_track+0x18/0x40
[   14.711883]  kasan_save_alloc_info+0x3b/0x50
[   14.712325]  __kasan_kmalloc+0xb7/0xc0
[   14.712701]  __kmalloc_cache_noprof+0x189/0x420
[   14.713178]  kasan_atomics+0x95/0x310
[   14.713479]  kunit_try_run_case+0x1a5/0x480
[   14.713627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.713804]  kthread+0x337/0x6f0
[   14.714097]  ret_from_fork+0x116/0x1d0
[   14.714489]  ret_from_fork_asm+0x1a/0x30
[   14.714902] 
[   14.715102] The buggy address belongs to the object at ffff888102b49680
[   14.715102]  which belongs to the cache kmalloc-64 of size 64
[   14.716435] The buggy address is located 0 bytes to the right of
[   14.716435]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.717576] 
[   14.717673] The buggy address belongs to the physical page:
[   14.718259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.718781] flags: 0x200000000000000(node=0|zone=2)
[   14.719003] page_type: f5(slab)
[   14.719339] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.720287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.720959] page dumped because: kasan: bad access detected
[   14.721265] 
[   14.721355] Memory state around the buggy address:
[   14.721618]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.721930]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.722299] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.722619]                                      ^
[   14.722847]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.723228]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.723996] ==================================================================
[   15.129532] ==================================================================
[   15.129866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   15.130251] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   15.130584] 
[   15.130718] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   15.130760] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.130772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.130792] Call Trace:
[   15.130807]  <TASK>
[   15.130821]  dump_stack_lvl+0x73/0xb0
[   15.130855]  print_report+0xd1/0x650
[   15.130877]  ? __virt_addr_valid+0x1db/0x2d0
[   15.130911]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.130933]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.130957]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.130981]  kasan_report+0x141/0x180
[   15.131004]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.131031]  kasan_check_range+0x10c/0x1c0
[   15.131055]  __kasan_check_write+0x18/0x20
[   15.131109]  kasan_atomics_helper+0x1d7a/0x5450
[   15.131134]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.131157]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.131182]  ? ret_from_fork_asm+0x1a/0x30
[   15.131204]  ? kasan_atomics+0x152/0x310
[   15.131231]  kasan_atomics+0x1dc/0x310
[   15.131256]  ? __pfx_kasan_atomics+0x10/0x10
[   15.131280]  ? __pfx_read_tsc+0x10/0x10
[   15.131302]  ? ktime_get_ts64+0x86/0x230
[   15.131326]  kunit_try_run_case+0x1a5/0x480
[   15.131348]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.131369]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.131394]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.131419]  ? __kthread_parkme+0x82/0x180
[   15.131441]  ? preempt_count_sub+0x50/0x80
[   15.131465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.131487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.131513]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.131538]  kthread+0x337/0x6f0
[   15.131559]  ? trace_preempt_on+0x20/0xc0
[   15.131581]  ? __pfx_kthread+0x10/0x10
[   15.131603]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.131633]  ? calculate_sigpending+0x7b/0xa0
[   15.131657]  ? __pfx_kthread+0x10/0x10
[   15.131679]  ret_from_fork+0x116/0x1d0
[   15.131698]  ? __pfx_kthread+0x10/0x10
[   15.131720]  ret_from_fork_asm+0x1a/0x30
[   15.131750]  </TASK>
[   15.131760] 
[   15.139102] Allocated by task 282:
[   15.139277]  kasan_save_stack+0x45/0x70
[   15.139454]  kasan_save_track+0x18/0x40
[   15.139666]  kasan_save_alloc_info+0x3b/0x50
[   15.139875]  __kasan_kmalloc+0xb7/0xc0
[   15.140072]  __kmalloc_cache_noprof+0x189/0x420
[   15.140296]  kasan_atomics+0x95/0x310
[   15.140480]  kunit_try_run_case+0x1a5/0x480
[   15.140712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.140966]  kthread+0x337/0x6f0
[   15.141144]  ret_from_fork+0x116/0x1d0
[   15.141307]  ret_from_fork_asm+0x1a/0x30
[   15.141467] 
[   15.141539] The buggy address belongs to the object at ffff888102b49680
[   15.141539]  which belongs to the cache kmalloc-64 of size 64
[   15.141922] The buggy address is located 0 bytes to the right of
[   15.141922]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   15.142473] 
[   15.142568] The buggy address belongs to the physical page:
[   15.142842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.143214] flags: 0x200000000000000(node=0|zone=2)
[   15.143425] page_type: f5(slab)
[   15.143580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.143907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.144134] page dumped because: kasan: bad access detected
[   15.144377] 
[   15.144469] Memory state around the buggy address:
[   15.144719]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.145053]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.145329] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.145672]                                      ^
[   15.145865]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.146160]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.146404] ==================================================================
[   14.572332] ==================================================================
[   14.573045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   14.573371] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.573594] 
[   14.573720] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.573763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.573776] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.573797] Call Trace:
[   14.573812]  <TASK>
[   14.573827]  dump_stack_lvl+0x73/0xb0
[   14.573851]  print_report+0xd1/0x650
[   14.573873]  ? __virt_addr_valid+0x1db/0x2d0
[   14.573908]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.573932]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.573958]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.573982]  kasan_report+0x141/0x180
[   14.574005]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.574032]  kasan_check_range+0x10c/0x1c0
[   14.574058]  __kasan_check_write+0x18/0x20
[   14.574086]  kasan_atomics_helper+0x12e6/0x5450
[   14.574110]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.574133]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.574158]  ? ret_from_fork_asm+0x1a/0x30
[   14.574180]  ? kasan_atomics+0x152/0x310
[   14.574210]  kasan_atomics+0x1dc/0x310
[   14.574233]  ? __pfx_kasan_atomics+0x10/0x10
[   14.574259]  ? __pfx_read_tsc+0x10/0x10
[   14.574280]  ? ktime_get_ts64+0x86/0x230
[   14.574305]  kunit_try_run_case+0x1a5/0x480
[   14.574327]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.574348]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.574374]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.574400]  ? __kthread_parkme+0x82/0x180
[   14.574421]  ? preempt_count_sub+0x50/0x80
[   14.574446]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.574467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.574492]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.574518]  kthread+0x337/0x6f0
[   14.574538]  ? trace_preempt_on+0x20/0xc0
[   14.574561]  ? __pfx_kthread+0x10/0x10
[   14.574583]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.574606]  ? calculate_sigpending+0x7b/0xa0
[   14.574630]  ? __pfx_kthread+0x10/0x10
[   14.574653]  ret_from_fork+0x116/0x1d0
[   14.574672]  ? __pfx_kthread+0x10/0x10
[   14.574693]  ret_from_fork_asm+0x1a/0x30
[   14.574724]  </TASK>
[   14.574746] 
[   14.589803] Allocated by task 282:
[   14.590074]  kasan_save_stack+0x45/0x70
[   14.590280]  kasan_save_track+0x18/0x40
[   14.590432]  kasan_save_alloc_info+0x3b/0x50
[   14.590824]  __kasan_kmalloc+0xb7/0xc0
[   14.591215]  __kmalloc_cache_noprof+0x189/0x420
[   14.591647]  kasan_atomics+0x95/0x310
[   14.592007]  kunit_try_run_case+0x1a5/0x480
[   14.592397]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.592719]  kthread+0x337/0x6f0
[   14.592842]  ret_from_fork+0x116/0x1d0
[   14.593128]  ret_from_fork_asm+0x1a/0x30
[   14.593494] 
[   14.593658] The buggy address belongs to the object at ffff888102b49680
[   14.593658]  which belongs to the cache kmalloc-64 of size 64
[   14.594843] The buggy address is located 0 bytes to the right of
[   14.594843]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.596027] 
[   14.596201] The buggy address belongs to the physical page:
[   14.596435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.596918] flags: 0x200000000000000(node=0|zone=2)
[   14.597132] page_type: f5(slab)
[   14.597482] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.598229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.599013] page dumped because: kasan: bad access detected
[   14.599270] 
[   14.599340] Memory state around the buggy address:
[   14.599496]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.599871]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.600576] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.601328]                                      ^
[   14.601828]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.602571]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.603336] ==================================================================
[   13.928504] ==================================================================
[   13.928847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   13.929404] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   13.929647] 
[   13.929799] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.929843] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.929875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.929905] Call Trace:
[   13.929919]  <TASK>
[   13.930009]  dump_stack_lvl+0x73/0xb0
[   13.930039]  print_report+0xd1/0x650
[   13.930063]  ? __virt_addr_valid+0x1db/0x2d0
[   13.930087]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.930109]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.930133]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.930156]  kasan_report+0x141/0x180
[   13.930179]  ? kasan_atomics_helper+0x4b54/0x5450
[   13.930206]  __asan_report_load4_noabort+0x18/0x20
[   13.930227]  kasan_atomics_helper+0x4b54/0x5450
[   13.930251]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.930275]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.930321]  ? ret_from_fork_asm+0x1a/0x30
[   13.930357]  ? kasan_atomics+0x152/0x310
[   13.930397]  kasan_atomics+0x1dc/0x310
[   13.930434]  ? __pfx_kasan_atomics+0x10/0x10
[   13.930459]  ? __pfx_read_tsc+0x10/0x10
[   13.930495]  ? ktime_get_ts64+0x86/0x230
[   13.930519]  kunit_try_run_case+0x1a5/0x480
[   13.930555]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.930575]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.930601]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.930645]  ? __kthread_parkme+0x82/0x180
[   13.930666]  ? preempt_count_sub+0x50/0x80
[   13.930691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.930712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.930738]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.930764]  kthread+0x337/0x6f0
[   13.930783]  ? trace_preempt_on+0x20/0xc0
[   13.930807]  ? __pfx_kthread+0x10/0x10
[   13.930829]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.930852]  ? calculate_sigpending+0x7b/0xa0
[   13.930876]  ? __pfx_kthread+0x10/0x10
[   13.930907]  ret_from_fork+0x116/0x1d0
[   13.930984]  ? __pfx_kthread+0x10/0x10
[   13.931011]  ret_from_fork_asm+0x1a/0x30
[   13.931042]  </TASK>
[   13.931053] 
[   13.939811] Allocated by task 282:
[   13.940099]  kasan_save_stack+0x45/0x70
[   13.940257]  kasan_save_track+0x18/0x40
[   13.940448]  kasan_save_alloc_info+0x3b/0x50
[   13.940643]  __kasan_kmalloc+0xb7/0xc0
[   13.940845]  __kmalloc_cache_noprof+0x189/0x420
[   13.941162]  kasan_atomics+0x95/0x310
[   13.941354]  kunit_try_run_case+0x1a5/0x480
[   13.941569]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.941824]  kthread+0x337/0x6f0
[   13.942045]  ret_from_fork+0x116/0x1d0
[   13.942225]  ret_from_fork_asm+0x1a/0x30
[   13.942361] 
[   13.942458] The buggy address belongs to the object at ffff888102b49680
[   13.942458]  which belongs to the cache kmalloc-64 of size 64
[   13.943103] The buggy address is located 0 bytes to the right of
[   13.943103]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   13.944010] 
[   13.944197] The buggy address belongs to the physical page:
[   13.944705] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   13.945423] flags: 0x200000000000000(node=0|zone=2)
[   13.945600] page_type: f5(slab)
[   13.946039] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.946722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.947450] page dumped because: kasan: bad access detected
[   13.948024] 
[   13.948099] Memory state around the buggy address:
[   13.948251]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.948465]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.948879] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.949591]                                      ^
[   13.950036]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.950851]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.951566] ==================================================================
[   14.101161] ==================================================================
[   14.101522] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   14.101989] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.102296] 
[   14.102425] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.102470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.102483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.102504] Call Trace:
[   14.102520]  <TASK>
[   14.102535]  dump_stack_lvl+0x73/0xb0
[   14.102559]  print_report+0xd1/0x650
[   14.102583]  ? __virt_addr_valid+0x1db/0x2d0
[   14.102607]  ? kasan_atomics_helper+0x72f/0x5450
[   14.102640]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.102664]  ? kasan_atomics_helper+0x72f/0x5450
[   14.102687]  kasan_report+0x141/0x180
[   14.102710]  ? kasan_atomics_helper+0x72f/0x5450
[   14.102748]  kasan_check_range+0x10c/0x1c0
[   14.102773]  __kasan_check_write+0x18/0x20
[   14.102792]  kasan_atomics_helper+0x72f/0x5450
[   14.102827]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.102850]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.102875]  ? ret_from_fork_asm+0x1a/0x30
[   14.102918]  ? kasan_atomics+0x152/0x310
[   14.102945]  kasan_atomics+0x1dc/0x310
[   14.102968]  ? __pfx_kasan_atomics+0x10/0x10
[   14.102993]  ? __pfx_read_tsc+0x10/0x10
[   14.103015]  ? ktime_get_ts64+0x86/0x230
[   14.103039]  kunit_try_run_case+0x1a5/0x480
[   14.103061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.103085]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.103113]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.103138]  ? __kthread_parkme+0x82/0x180
[   14.103159]  ? preempt_count_sub+0x50/0x80
[   14.103184]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.103217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.103243]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.103268]  kthread+0x337/0x6f0
[   14.103289]  ? trace_preempt_on+0x20/0xc0
[   14.103311]  ? __pfx_kthread+0x10/0x10
[   14.103333]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.103365]  ? calculate_sigpending+0x7b/0xa0
[   14.103391]  ? __pfx_kthread+0x10/0x10
[   14.103413]  ret_from_fork+0x116/0x1d0
[   14.103443]  ? __pfx_kthread+0x10/0x10
[   14.103464]  ret_from_fork_asm+0x1a/0x30
[   14.103494]  </TASK>
[   14.103506] 
[   14.111905] Allocated by task 282:
[   14.112035]  kasan_save_stack+0x45/0x70
[   14.112178]  kasan_save_track+0x18/0x40
[   14.112384]  kasan_save_alloc_info+0x3b/0x50
[   14.112623]  __kasan_kmalloc+0xb7/0xc0
[   14.112811]  __kmalloc_cache_noprof+0x189/0x420
[   14.113051]  kasan_atomics+0x95/0x310
[   14.113187]  kunit_try_run_case+0x1a5/0x480
[   14.113330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.113507]  kthread+0x337/0x6f0
[   14.113627]  ret_from_fork+0x116/0x1d0
[   14.113983]  ret_from_fork_asm+0x1a/0x30
[   14.114186] 
[   14.114283] The buggy address belongs to the object at ffff888102b49680
[   14.114283]  which belongs to the cache kmalloc-64 of size 64
[   14.115559] The buggy address is located 0 bytes to the right of
[   14.115559]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.117051] 
[   14.117147] The buggy address belongs to the physical page:
[   14.117381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.117711] flags: 0x200000000000000(node=0|zone=2)
[   14.118577] page_type: f5(slab)
[   14.118833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.119326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.119757] page dumped because: kasan: bad access detected
[   14.120154] 
[   14.120257] Memory state around the buggy address:
[   14.120466]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.120967]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.121344] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.121807]                                      ^
[   14.122196]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.122491]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.122809] ==================================================================
[   15.189328] ==================================================================
[   15.189843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   15.190253] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   15.190869] 
[   15.191131] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   15.191183] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.191198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.191221] Call Trace:
[   15.191238]  <TASK>
[   15.191254]  dump_stack_lvl+0x73/0xb0
[   15.191316]  print_report+0xd1/0x650
[   15.191340]  ? __virt_addr_valid+0x1db/0x2d0
[   15.191365]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.191388]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.191411]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.191434]  kasan_report+0x141/0x180
[   15.191458]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.191486]  kasan_check_range+0x10c/0x1c0
[   15.191512]  __kasan_check_write+0x18/0x20
[   15.191531]  kasan_atomics_helper+0x1f43/0x5450
[   15.191555]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.191578]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.191603]  ? ret_from_fork_asm+0x1a/0x30
[   15.191649]  ? kasan_atomics+0x152/0x310
[   15.191676]  kasan_atomics+0x1dc/0x310
[   15.191699]  ? __pfx_kasan_atomics+0x10/0x10
[   15.191724]  ? __pfx_read_tsc+0x10/0x10
[   15.191746]  ? ktime_get_ts64+0x86/0x230
[   15.191771]  kunit_try_run_case+0x1a5/0x480
[   15.191793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.191813]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.191839]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.191865]  ? __kthread_parkme+0x82/0x180
[   15.191886]  ? preempt_count_sub+0x50/0x80
[   15.191920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.191941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.191966]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.191992]  kthread+0x337/0x6f0
[   15.192012]  ? trace_preempt_on+0x20/0xc0
[   15.192035]  ? __pfx_kthread+0x10/0x10
[   15.192056]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.192080]  ? calculate_sigpending+0x7b/0xa0
[   15.192107]  ? __pfx_kthread+0x10/0x10
[   15.192129]  ret_from_fork+0x116/0x1d0
[   15.192148]  ? __pfx_kthread+0x10/0x10
[   15.192169]  ret_from_fork_asm+0x1a/0x30
[   15.192201]  </TASK>
[   15.192213] 
[   15.203587] Allocated by task 282:
[   15.204012]  kasan_save_stack+0x45/0x70
[   15.204319]  kasan_save_track+0x18/0x40
[   15.204640]  kasan_save_alloc_info+0x3b/0x50
[   15.204849]  __kasan_kmalloc+0xb7/0xc0
[   15.205035]  __kmalloc_cache_noprof+0x189/0x420
[   15.205247]  kasan_atomics+0x95/0x310
[   15.205416]  kunit_try_run_case+0x1a5/0x480
[   15.205589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.206220]  kthread+0x337/0x6f0
[   15.206510]  ret_from_fork+0x116/0x1d0
[   15.206853]  ret_from_fork_asm+0x1a/0x30
[   15.207049] 
[   15.207139] The buggy address belongs to the object at ffff888102b49680
[   15.207139]  which belongs to the cache kmalloc-64 of size 64
[   15.207888] The buggy address is located 0 bytes to the right of
[   15.207888]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   15.208643] 
[   15.208871] The buggy address belongs to the physical page:
[   15.209239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.209795] flags: 0x200000000000000(node=0|zone=2)
[   15.210028] page_type: f5(slab)
[   15.210178] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.210484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.211119] page dumped because: kasan: bad access detected
[   15.211470] 
[   15.211713] Memory state around the buggy address:
[   15.212048]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.212667]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.212972] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.213264]                                      ^
[   15.213467]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.214103]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.214546] ==================================================================
[   13.986864] ==================================================================
[   13.987499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   13.987986] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   13.988267] 
[   13.988447] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.988492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.988505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.988527] Call Trace:
[   13.988542]  <TASK>
[   13.988557]  dump_stack_lvl+0x73/0xb0
[   13.988582]  print_report+0xd1/0x650
[   13.988604]  ? __virt_addr_valid+0x1db/0x2d0
[   13.988628]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.988650]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.988674]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.988707]  kasan_report+0x141/0x180
[   13.988731]  ? kasan_atomics_helper+0x4b3a/0x5450
[   13.988758]  __asan_report_store4_noabort+0x1b/0x30
[   13.988780]  kasan_atomics_helper+0x4b3a/0x5450
[   13.988803]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.988827]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.988851]  ? ret_from_fork_asm+0x1a/0x30
[   13.988874]  ? kasan_atomics+0x152/0x310
[   13.988914]  kasan_atomics+0x1dc/0x310
[   13.988938]  ? __pfx_kasan_atomics+0x10/0x10
[   13.988973]  ? __pfx_read_tsc+0x10/0x10
[   13.988996]  ? ktime_get_ts64+0x86/0x230
[   13.989020]  kunit_try_run_case+0x1a5/0x480
[   13.989046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.989067]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.989094]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.989119]  ? __kthread_parkme+0x82/0x180
[   13.989141]  ? preempt_count_sub+0x50/0x80
[   13.989166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.989188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.989213]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.989239]  kthread+0x337/0x6f0
[   13.989260]  ? trace_preempt_on+0x20/0xc0
[   13.989283]  ? __pfx_kthread+0x10/0x10
[   13.989304]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.989328]  ? calculate_sigpending+0x7b/0xa0
[   13.989353]  ? __pfx_kthread+0x10/0x10
[   13.989375]  ret_from_fork+0x116/0x1d0
[   13.989394]  ? __pfx_kthread+0x10/0x10
[   13.989416]  ret_from_fork_asm+0x1a/0x30
[   13.989447]  </TASK>
[   13.989458] 
[   14.007346] Allocated by task 282:
[   14.007936]  kasan_save_stack+0x45/0x70
[   14.008389]  kasan_save_track+0x18/0x40
[   14.008766]  kasan_save_alloc_info+0x3b/0x50
[   14.009259]  __kasan_kmalloc+0xb7/0xc0
[   14.009400]  __kmalloc_cache_noprof+0x189/0x420
[   14.009558]  kasan_atomics+0x95/0x310
[   14.009776]  kunit_try_run_case+0x1a5/0x480
[   14.010192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.010743]  kthread+0x337/0x6f0
[   14.011164]  ret_from_fork+0x116/0x1d0
[   14.011524]  ret_from_fork_asm+0x1a/0x30
[   14.011885] 
[   14.012215] The buggy address belongs to the object at ffff888102b49680
[   14.012215]  which belongs to the cache kmalloc-64 of size 64
[   14.013178] The buggy address is located 0 bytes to the right of
[   14.013178]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.013560] 
[   14.013644] The buggy address belongs to the physical page:
[   14.014153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.014890] flags: 0x200000000000000(node=0|zone=2)
[   14.015381] page_type: f5(slab)
[   14.015702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.016401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.017315] page dumped because: kasan: bad access detected
[   14.017749] 
[   14.017822] Memory state around the buggy address:
[   14.018073]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.018721]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.019436] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.020069]                                      ^
[   14.020231]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.020448]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.020723] ==================================================================
[   15.284263] ==================================================================
[   15.284566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   15.284853] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   15.285095] 
[   15.285258] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   15.285301] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.285312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.285334] Call Trace:
[   15.285347]  <TASK>
[   15.285361]  dump_stack_lvl+0x73/0xb0
[   15.285385]  print_report+0xd1/0x650
[   15.285408]  ? __virt_addr_valid+0x1db/0x2d0
[   15.285431]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.285454]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.285478]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.285501]  kasan_report+0x141/0x180
[   15.285524]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.285550]  kasan_check_range+0x10c/0x1c0
[   15.285575]  __kasan_check_write+0x18/0x20
[   15.285596]  kasan_atomics_helper+0x20c8/0x5450
[   15.285619]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.285642]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.285678]  ? ret_from_fork_asm+0x1a/0x30
[   15.285700]  ? kasan_atomics+0x152/0x310
[   15.285727]  kasan_atomics+0x1dc/0x310
[   15.285751]  ? __pfx_kasan_atomics+0x10/0x10
[   15.285776]  ? __pfx_read_tsc+0x10/0x10
[   15.285798]  ? ktime_get_ts64+0x86/0x230
[   15.285823]  kunit_try_run_case+0x1a5/0x480
[   15.285846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.285867]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.285903]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.285931]  ? __kthread_parkme+0x82/0x180
[   15.285952]  ? preempt_count_sub+0x50/0x80
[   15.285977]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.286001]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.286027]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.286052]  kthread+0x337/0x6f0
[   15.286072]  ? trace_preempt_on+0x20/0xc0
[   15.286095]  ? __pfx_kthread+0x10/0x10
[   15.286117]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.286140]  ? calculate_sigpending+0x7b/0xa0
[   15.286166]  ? __pfx_kthread+0x10/0x10
[   15.286188]  ret_from_fork+0x116/0x1d0
[   15.286207]  ? __pfx_kthread+0x10/0x10
[   15.286229]  ret_from_fork_asm+0x1a/0x30
[   15.286259]  </TASK>
[   15.286270] 
[   15.293935] Allocated by task 282:
[   15.294094]  kasan_save_stack+0x45/0x70
[   15.294260]  kasan_save_track+0x18/0x40
[   15.294443]  kasan_save_alloc_info+0x3b/0x50
[   15.294642]  __kasan_kmalloc+0xb7/0xc0
[   15.294816]  __kmalloc_cache_noprof+0x189/0x420
[   15.295024]  kasan_atomics+0x95/0x310
[   15.295212]  kunit_try_run_case+0x1a5/0x480
[   15.295398]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.295616]  kthread+0x337/0x6f0
[   15.295791]  ret_from_fork+0x116/0x1d0
[   15.295946]  ret_from_fork_asm+0x1a/0x30
[   15.296086] 
[   15.296159] The buggy address belongs to the object at ffff888102b49680
[   15.296159]  which belongs to the cache kmalloc-64 of size 64
[   15.296507] The buggy address is located 0 bytes to the right of
[   15.296507]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   15.296871] 
[   15.296972] The buggy address belongs to the physical page:
[   15.297494] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.297973] flags: 0x200000000000000(node=0|zone=2)
[   15.298204] page_type: f5(slab)
[   15.298369] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.298907] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.299134] page dumped because: kasan: bad access detected
[   15.299304] 
[   15.299373] Memory state around the buggy address:
[   15.299527]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.299743]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.299967] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.300180]                                      ^
[   15.300422]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.300746]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.303054] ==================================================================
[   15.387343] ==================================================================
[   15.387630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   15.388006] Read of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   15.388608] 
[   15.388843] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   15.388985] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.389000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.389085] Call Trace:
[   15.389101]  <TASK>
[   15.389115]  dump_stack_lvl+0x73/0xb0
[   15.389142]  print_report+0xd1/0x650
[   15.389165]  ? __virt_addr_valid+0x1db/0x2d0
[   15.389189]  ? kasan_atomics_helper+0x5115/0x5450
[   15.389210]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.389233]  ? kasan_atomics_helper+0x5115/0x5450
[   15.389256]  kasan_report+0x141/0x180
[   15.389279]  ? kasan_atomics_helper+0x5115/0x5450
[   15.389306]  __asan_report_load8_noabort+0x18/0x20
[   15.389327]  kasan_atomics_helper+0x5115/0x5450
[   15.389351]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.389373]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.389398]  ? ret_from_fork_asm+0x1a/0x30
[   15.389421]  ? kasan_atomics+0x152/0x310
[   15.389448]  kasan_atomics+0x1dc/0x310
[   15.389471]  ? __pfx_kasan_atomics+0x10/0x10
[   15.389496]  ? __pfx_read_tsc+0x10/0x10
[   15.389518]  ? ktime_get_ts64+0x86/0x230
[   15.389543]  kunit_try_run_case+0x1a5/0x480
[   15.389564]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.389585]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.389611]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.389646]  ? __kthread_parkme+0x82/0x180
[   15.389668]  ? preempt_count_sub+0x50/0x80
[   15.389692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.389714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.389740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.389767]  kthread+0x337/0x6f0
[   15.389787]  ? trace_preempt_on+0x20/0xc0
[   15.389811]  ? __pfx_kthread+0x10/0x10
[   15.389832]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.389856]  ? calculate_sigpending+0x7b/0xa0
[   15.389880]  ? __pfx_kthread+0x10/0x10
[   15.389914]  ret_from_fork+0x116/0x1d0
[   15.389934]  ? __pfx_kthread+0x10/0x10
[   15.389954]  ret_from_fork_asm+0x1a/0x30
[   15.389984]  </TASK>
[   15.389995] 
[   15.399656] Allocated by task 282:
[   15.400161]  kasan_save_stack+0x45/0x70
[   15.400361]  kasan_save_track+0x18/0x40
[   15.400607]  kasan_save_alloc_info+0x3b/0x50
[   15.400796]  __kasan_kmalloc+0xb7/0xc0
[   15.401128]  __kmalloc_cache_noprof+0x189/0x420
[   15.401496]  kasan_atomics+0x95/0x310
[   15.401690]  kunit_try_run_case+0x1a5/0x480
[   15.401998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.402295]  kthread+0x337/0x6f0
[   15.402462]  ret_from_fork+0x116/0x1d0
[   15.402689]  ret_from_fork_asm+0x1a/0x30
[   15.402986] 
[   15.403076] The buggy address belongs to the object at ffff888102b49680
[   15.403076]  which belongs to the cache kmalloc-64 of size 64
[   15.403572] The buggy address is located 0 bytes to the right of
[   15.403572]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   15.404355] 
[   15.404452] The buggy address belongs to the physical page:
[   15.404659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.405156] flags: 0x200000000000000(node=0|zone=2)
[   15.405464] page_type: f5(slab)
[   15.405594] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.406162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.406486] page dumped because: kasan: bad access detected
[   15.406833] 
[   15.406920] Memory state around the buggy address:
[   15.407276]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.407571]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.408002] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.408351]                                      ^
[   15.408612]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.409073]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.409352] ==================================================================
[   13.822324] ==================================================================
[   13.823099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   13.823415] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   13.824246] 
[   13.824371] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.824418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.824430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.824453] Call Trace:
[   13.824464]  <TASK>
[   13.824478]  dump_stack_lvl+0x73/0xb0
[   13.824506]  print_report+0xd1/0x650
[   13.824648]  ? __virt_addr_valid+0x1db/0x2d0
[   13.824676]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.824699]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.824722]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.824744]  kasan_report+0x141/0x180
[   13.824765]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.824791]  __asan_report_load4_noabort+0x18/0x20
[   13.824811]  kasan_atomics_helper+0x4bbc/0x5450
[   13.824834]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.824856]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.824880]  ? ret_from_fork_asm+0x1a/0x30
[   13.824914]  ? kasan_atomics+0x152/0x310
[   13.824940]  kasan_atomics+0x1dc/0x310
[   13.825011]  ? __pfx_kasan_atomics+0x10/0x10
[   13.825036]  ? __pfx_read_tsc+0x10/0x10
[   13.825065]  ? ktime_get_ts64+0x86/0x230
[   13.825089]  kunit_try_run_case+0x1a5/0x480
[   13.825110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.825129]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.825154]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.825178]  ? __kthread_parkme+0x82/0x180
[   13.825199]  ? preempt_count_sub+0x50/0x80
[   13.825222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.825243]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.825267]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.825291]  kthread+0x337/0x6f0
[   13.825311]  ? trace_preempt_on+0x20/0xc0
[   13.825332]  ? __pfx_kthread+0x10/0x10
[   13.825353]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.825375]  ? calculate_sigpending+0x7b/0xa0
[   13.825398]  ? __pfx_kthread+0x10/0x10
[   13.825419]  ret_from_fork+0x116/0x1d0
[   13.825437]  ? __pfx_kthread+0x10/0x10
[   13.825458]  ret_from_fork_asm+0x1a/0x30
[   13.825486]  </TASK>
[   13.825497] 
[   13.838311] Allocated by task 282:
[   13.838638]  kasan_save_stack+0x45/0x70
[   13.838937]  kasan_save_track+0x18/0x40
[   13.839316]  kasan_save_alloc_info+0x3b/0x50
[   13.839759]  __kasan_kmalloc+0xb7/0xc0
[   13.840135]  __kmalloc_cache_noprof+0x189/0x420
[   13.840494]  kasan_atomics+0x95/0x310
[   13.840712]  kunit_try_run_case+0x1a5/0x480
[   13.840905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.841173]  kthread+0x337/0x6f0
[   13.841526]  ret_from_fork+0x116/0x1d0
[   13.841711]  ret_from_fork_asm+0x1a/0x30
[   13.841916] 
[   13.842043] The buggy address belongs to the object at ffff888102b49680
[   13.842043]  which belongs to the cache kmalloc-64 of size 64
[   13.842619] The buggy address is located 0 bytes to the right of
[   13.842619]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   13.843174] 
[   13.843314] The buggy address belongs to the physical page:
[   13.843594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   13.844032] flags: 0x200000000000000(node=0|zone=2)
[   13.844286] page_type: f5(slab)
[   13.844431] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.844885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.845184] page dumped because: kasan: bad access detected
[   13.845468] 
[   13.845579] Memory state around the buggy address:
[   13.845802]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.846347]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.846762] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.847146]                                      ^
[   13.847344]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.847643]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.847980] ==================================================================
[   14.381055] ==================================================================
[   14.381400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   14.381701] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.382059] 
[   14.382290] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.382334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.382346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.382368] Call Trace:
[   14.382382]  <TASK>
[   14.382396]  dump_stack_lvl+0x73/0xb0
[   14.382421]  print_report+0xd1/0x650
[   14.382444]  ? __virt_addr_valid+0x1db/0x2d0
[   14.382468]  ? kasan_atomics_helper+0xf10/0x5450
[   14.382490]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.382513]  ? kasan_atomics_helper+0xf10/0x5450
[   14.382536]  kasan_report+0x141/0x180
[   14.382559]  ? kasan_atomics_helper+0xf10/0x5450
[   14.382586]  kasan_check_range+0x10c/0x1c0
[   14.382611]  __kasan_check_write+0x18/0x20
[   14.382639]  kasan_atomics_helper+0xf10/0x5450
[   14.382662]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.382686]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.382711]  ? ret_from_fork_asm+0x1a/0x30
[   14.382733]  ? kasan_atomics+0x152/0x310
[   14.382761]  kasan_atomics+0x1dc/0x310
[   14.382784]  ? __pfx_kasan_atomics+0x10/0x10
[   14.382809]  ? __pfx_read_tsc+0x10/0x10
[   14.382831]  ? ktime_get_ts64+0x86/0x230
[   14.382855]  kunit_try_run_case+0x1a5/0x480
[   14.382877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.382907]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.382934]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.382959]  ? __kthread_parkme+0x82/0x180
[   14.382981]  ? preempt_count_sub+0x50/0x80
[   14.383006]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.383028]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.383053]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.383078]  kthread+0x337/0x6f0
[   14.383098]  ? trace_preempt_on+0x20/0xc0
[   14.383121]  ? __pfx_kthread+0x10/0x10
[   14.383142]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.383165]  ? calculate_sigpending+0x7b/0xa0
[   14.383190]  ? __pfx_kthread+0x10/0x10
[   14.383212]  ret_from_fork+0x116/0x1d0
[   14.383231]  ? __pfx_kthread+0x10/0x10
[   14.383253]  ret_from_fork_asm+0x1a/0x30
[   14.383284]  </TASK>
[   14.383295] 
[   14.392047] Allocated by task 282:
[   14.392231]  kasan_save_stack+0x45/0x70
[   14.392425]  kasan_save_track+0x18/0x40
[   14.392570]  kasan_save_alloc_info+0x3b/0x50
[   14.392731]  __kasan_kmalloc+0xb7/0xc0
[   14.392867]  __kmalloc_cache_noprof+0x189/0x420
[   14.393036]  kasan_atomics+0x95/0x310
[   14.393176]  kunit_try_run_case+0x1a5/0x480
[   14.393323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.393541]  kthread+0x337/0x6f0
[   14.393709]  ret_from_fork+0x116/0x1d0
[   14.393921]  ret_from_fork_asm+0x1a/0x30
[   14.394141] 
[   14.394238] The buggy address belongs to the object at ffff888102b49680
[   14.394238]  which belongs to the cache kmalloc-64 of size 64
[   14.394958] The buggy address is located 0 bytes to the right of
[   14.394958]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.395507] 
[   14.395601] The buggy address belongs to the physical page:
[   14.395886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.396138] flags: 0x200000000000000(node=0|zone=2)
[   14.396302] page_type: f5(slab)
[   14.396423] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.397025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.397367] page dumped because: kasan: bad access detected
[   14.397592] 
[   14.397695] Memory state around the buggy address:
[   14.397905]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.398244]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.398496] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.398819]                                      ^
[   14.399015]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.399326]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.399674] ==================================================================
[   14.924133] ==================================================================
[   14.924464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   14.924756] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.925032] 
[   14.925120] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.925162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.925174] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.925195] Call Trace:
[   14.925207]  <TASK>
[   14.925222]  dump_stack_lvl+0x73/0xb0
[   14.925246]  print_report+0xd1/0x650
[   14.925268]  ? __virt_addr_valid+0x1db/0x2d0
[   14.925291]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.925314]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.925337]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.925359]  kasan_report+0x141/0x180
[   14.925382]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.925410]  kasan_check_range+0x10c/0x1c0
[   14.925434]  __kasan_check_write+0x18/0x20
[   14.925455]  kasan_atomics_helper+0x18b1/0x5450
[   14.925478]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.925501]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.925526]  ? ret_from_fork_asm+0x1a/0x30
[   14.925548]  ? kasan_atomics+0x152/0x310
[   14.925574]  kasan_atomics+0x1dc/0x310
[   14.925598]  ? __pfx_kasan_atomics+0x10/0x10
[   14.925622]  ? __pfx_read_tsc+0x10/0x10
[   14.925643]  ? ktime_get_ts64+0x86/0x230
[   14.925667]  kunit_try_run_case+0x1a5/0x480
[   14.925689]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.925710]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.925735]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.925759]  ? __kthread_parkme+0x82/0x180
[   14.925779]  ? preempt_count_sub+0x50/0x80
[   14.925803]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.925825]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.925850]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.925875]  kthread+0x337/0x6f0
[   14.925929]  ? trace_preempt_on+0x20/0xc0
[   14.925955]  ? __pfx_kthread+0x10/0x10
[   14.925985]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.926008]  ? calculate_sigpending+0x7b/0xa0
[   14.926034]  ? __pfx_kthread+0x10/0x10
[   14.926057]  ret_from_fork+0x116/0x1d0
[   14.926078]  ? __pfx_kthread+0x10/0x10
[   14.926099]  ret_from_fork_asm+0x1a/0x30
[   14.926131]  </TASK>
[   14.926142] 
[   14.933672] Allocated by task 282:
[   14.933859]  kasan_save_stack+0x45/0x70
[   14.934073]  kasan_save_track+0x18/0x40
[   14.934442]  kasan_save_alloc_info+0x3b/0x50
[   14.934629]  __kasan_kmalloc+0xb7/0xc0
[   14.934765]  __kmalloc_cache_noprof+0x189/0x420
[   14.934970]  kasan_atomics+0x95/0x310
[   14.935165]  kunit_try_run_case+0x1a5/0x480
[   14.935372]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.935646]  kthread+0x337/0x6f0
[   14.935813]  ret_from_fork+0x116/0x1d0
[   14.936052]  ret_from_fork_asm+0x1a/0x30
[   14.936224] 
[   14.936296] The buggy address belongs to the object at ffff888102b49680
[   14.936296]  which belongs to the cache kmalloc-64 of size 64
[   14.936770] The buggy address is located 0 bytes to the right of
[   14.936770]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.937812] 
[   14.938010] The buggy address belongs to the physical page:
[   14.938478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.939170] flags: 0x200000000000000(node=0|zone=2)
[   14.939702] page_type: f5(slab)
[   14.940003] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.940767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.941642] page dumped because: kasan: bad access detected
[   14.942231] 
[   14.942395] Memory state around the buggy address:
[   14.942841]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.943573]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.944325] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.944821]                                      ^
[   14.945129]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.945348]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.945792] ==================================================================
[   15.000550] ==================================================================
[   15.001161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   15.001506] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   15.001911] 
[   15.002123] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   15.002168] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.002213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.002235] Call Trace:
[   15.002249]  <TASK>
[   15.002274]  dump_stack_lvl+0x73/0xb0
[   15.002302]  print_report+0xd1/0x650
[   15.002325]  ? __virt_addr_valid+0x1db/0x2d0
[   15.002348]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.002371]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.002395]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.002445]  kasan_report+0x141/0x180
[   15.002470]  ? kasan_atomics_helper+0x1a7f/0x5450
[   15.002497]  kasan_check_range+0x10c/0x1c0
[   15.002533]  __kasan_check_write+0x18/0x20
[   15.002553]  kasan_atomics_helper+0x1a7f/0x5450
[   15.002577]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.002601]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.002639]  ? ret_from_fork_asm+0x1a/0x30
[   15.002663]  ? kasan_atomics+0x152/0x310
[   15.002690]  kasan_atomics+0x1dc/0x310
[   15.002714]  ? __pfx_kasan_atomics+0x10/0x10
[   15.002739]  ? __pfx_read_tsc+0x10/0x10
[   15.002761]  ? ktime_get_ts64+0x86/0x230
[   15.002812]  kunit_try_run_case+0x1a5/0x480
[   15.002835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.002855]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.002881]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.002917]  ? __kthread_parkme+0x82/0x180
[   15.002938]  ? preempt_count_sub+0x50/0x80
[   15.003009]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.003032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.003058]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.003083]  kthread+0x337/0x6f0
[   15.003103]  ? trace_preempt_on+0x20/0xc0
[   15.003125]  ? __pfx_kthread+0x10/0x10
[   15.003146]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.003171]  ? calculate_sigpending+0x7b/0xa0
[   15.003195]  ? __pfx_kthread+0x10/0x10
[   15.003217]  ret_from_fork+0x116/0x1d0
[   15.003236]  ? __pfx_kthread+0x10/0x10
[   15.003257]  ret_from_fork_asm+0x1a/0x30
[   15.003288]  </TASK>
[   15.003299] 
[   15.016254] Allocated by task 282:
[   15.016411]  kasan_save_stack+0x45/0x70
[   15.016710]  kasan_save_track+0x18/0x40
[   15.017099]  kasan_save_alloc_info+0x3b/0x50
[   15.017327]  __kasan_kmalloc+0xb7/0xc0
[   15.017521]  __kmalloc_cache_noprof+0x189/0x420
[   15.017913]  kasan_atomics+0x95/0x310
[   15.018211]  kunit_try_run_case+0x1a5/0x480
[   15.018409]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.018629]  kthread+0x337/0x6f0
[   15.018785]  ret_from_fork+0x116/0x1d0
[   15.018927]  ret_from_fork_asm+0x1a/0x30
[   15.019125] 
[   15.019223] The buggy address belongs to the object at ffff888102b49680
[   15.019223]  which belongs to the cache kmalloc-64 of size 64
[   15.020092] The buggy address is located 0 bytes to the right of
[   15.020092]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   15.020688] 
[   15.020810] The buggy address belongs to the physical page:
[   15.021104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.021351] flags: 0x200000000000000(node=0|zone=2)
[   15.021517] page_type: f5(slab)
[   15.021702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.022120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.022762] page dumped because: kasan: bad access detected
[   15.023167] 
[   15.023271] Memory state around the buggy address:
[   15.023557]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.023861]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.024220] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.025088]                                      ^
[   15.025325]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.025633]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.025972] ==================================================================
[   14.149889] ==================================================================
[   14.150154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   14.150454] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.150820] 
[   14.150979] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.151025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.151038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.151059] Call Trace:
[   14.151074]  <TASK>
[   14.151096]  dump_stack_lvl+0x73/0xb0
[   14.151121]  print_report+0xd1/0x650
[   14.151144]  ? __virt_addr_valid+0x1db/0x2d0
[   14.151167]  ? kasan_atomics_helper+0x860/0x5450
[   14.151189]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.151213]  ? kasan_atomics_helper+0x860/0x5450
[   14.151235]  kasan_report+0x141/0x180
[   14.151259]  ? kasan_atomics_helper+0x860/0x5450
[   14.151285]  kasan_check_range+0x10c/0x1c0
[   14.151310]  __kasan_check_write+0x18/0x20
[   14.151330]  kasan_atomics_helper+0x860/0x5450
[   14.151353]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.151377]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.151401]  ? ret_from_fork_asm+0x1a/0x30
[   14.151424]  ? kasan_atomics+0x152/0x310
[   14.151450]  kasan_atomics+0x1dc/0x310
[   14.151474]  ? __pfx_kasan_atomics+0x10/0x10
[   14.151498]  ? __pfx_read_tsc+0x10/0x10
[   14.151520]  ? ktime_get_ts64+0x86/0x230
[   14.151544]  kunit_try_run_case+0x1a5/0x480
[   14.151566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.151587]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.151612]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.151649]  ? __kthread_parkme+0x82/0x180
[   14.151669]  ? preempt_count_sub+0x50/0x80
[   14.151693]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.151716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.151740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.151766]  kthread+0x337/0x6f0
[   14.151786]  ? trace_preempt_on+0x20/0xc0
[   14.151810]  ? __pfx_kthread+0x10/0x10
[   14.151832]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.151856]  ? calculate_sigpending+0x7b/0xa0
[   14.151881]  ? __pfx_kthread+0x10/0x10
[   14.151914]  ret_from_fork+0x116/0x1d0
[   14.151933]  ? __pfx_kthread+0x10/0x10
[   14.151954]  ret_from_fork_asm+0x1a/0x30
[   14.151985]  </TASK>
[   14.151995] 
[   14.160303] Allocated by task 282:
[   14.160433]  kasan_save_stack+0x45/0x70
[   14.160595]  kasan_save_track+0x18/0x40
[   14.161087]  kasan_save_alloc_info+0x3b/0x50
[   14.161290]  __kasan_kmalloc+0xb7/0xc0
[   14.161424]  __kmalloc_cache_noprof+0x189/0x420
[   14.161580]  kasan_atomics+0x95/0x310
[   14.161942]  kunit_try_run_case+0x1a5/0x480
[   14.162154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.162414]  kthread+0x337/0x6f0
[   14.162618]  ret_from_fork+0x116/0x1d0
[   14.162815]  ret_from_fork_asm+0x1a/0x30
[   14.163051] 
[   14.163147] The buggy address belongs to the object at ffff888102b49680
[   14.163147]  which belongs to the cache kmalloc-64 of size 64
[   14.163510] The buggy address is located 0 bytes to the right of
[   14.163510]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.164103] 
[   14.164203] The buggy address belongs to the physical page:
[   14.164608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.164978] flags: 0x200000000000000(node=0|zone=2)
[   14.165263] page_type: f5(slab)
[   14.165387] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.165621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.165848] page dumped because: kasan: bad access detected
[   14.166190] 
[   14.166307] Memory state around the buggy address:
[   14.166533]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.166833]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.167261] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.167477]                                      ^
[   14.167643]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.168010]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.168324] ==================================================================
[   15.093073] ==================================================================
[   15.093596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   15.094270] Read of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   15.095042] 
[   15.095216] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   15.095260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.095273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.095295] Call Trace:
[   15.095307]  <TASK>
[   15.095320]  dump_stack_lvl+0x73/0xb0
[   15.095345]  print_report+0xd1/0x650
[   15.095367]  ? __virt_addr_valid+0x1db/0x2d0
[   15.095391]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.095413]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.095437]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.095460]  kasan_report+0x141/0x180
[   15.095482]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.095510]  __asan_report_load8_noabort+0x18/0x20
[   15.095531]  kasan_atomics_helper+0x4f30/0x5450
[   15.095554]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.095577]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.095601]  ? ret_from_fork_asm+0x1a/0x30
[   15.095623]  ? kasan_atomics+0x152/0x310
[   15.095663]  kasan_atomics+0x1dc/0x310
[   15.095687]  ? __pfx_kasan_atomics+0x10/0x10
[   15.095712]  ? __pfx_read_tsc+0x10/0x10
[   15.095733]  ? ktime_get_ts64+0x86/0x230
[   15.095758]  kunit_try_run_case+0x1a5/0x480
[   15.095780]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.095801]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.095827]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.095853]  ? __kthread_parkme+0x82/0x180
[   15.095874]  ? preempt_count_sub+0x50/0x80
[   15.095908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.095930]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.095955]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.095981]  kthread+0x337/0x6f0
[   15.096000]  ? trace_preempt_on+0x20/0xc0
[   15.096023]  ? __pfx_kthread+0x10/0x10
[   15.096045]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.096068]  ? calculate_sigpending+0x7b/0xa0
[   15.096092]  ? __pfx_kthread+0x10/0x10
[   15.096113]  ret_from_fork+0x116/0x1d0
[   15.096132]  ? __pfx_kthread+0x10/0x10
[   15.096153]  ret_from_fork_asm+0x1a/0x30
[   15.096183]  </TASK>
[   15.096194] 
[   15.104598] Allocated by task 282:
[   15.104791]  kasan_save_stack+0x45/0x70
[   15.105001]  kasan_save_track+0x18/0x40
[   15.105200]  kasan_save_alloc_info+0x3b/0x50
[   15.105413]  __kasan_kmalloc+0xb7/0xc0
[   15.105615]  __kmalloc_cache_noprof+0x189/0x420
[   15.105812]  kasan_atomics+0x95/0x310
[   15.106036]  kunit_try_run_case+0x1a5/0x480
[   15.106221]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.106404]  kthread+0x337/0x6f0
[   15.106524]  ret_from_fork+0x116/0x1d0
[   15.106704]  ret_from_fork_asm+0x1a/0x30
[   15.106916] 
[   15.107017] The buggy address belongs to the object at ffff888102b49680
[   15.107017]  which belongs to the cache kmalloc-64 of size 64
[   15.107562] The buggy address is located 0 bytes to the right of
[   15.107562]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   15.108079] 
[   15.108154] The buggy address belongs to the physical page:
[   15.108345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.108723] flags: 0x200000000000000(node=0|zone=2)
[   15.108955] page_type: f5(slab)
[   15.109119] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.109413] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.109675] page dumped because: kasan: bad access detected
[   15.109847] 
[   15.109925] Memory state around the buggy address:
[   15.110082]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.110399]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.110726] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.111010]                                      ^
[   15.111165]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.111381]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.111594] ==================================================================
[   15.026544] ==================================================================
[   15.027047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   15.027381] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   15.027720] 
[   15.027877] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   15.027936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.027999] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.028021] Call Trace:
[   15.028075]  <TASK>
[   15.028090]  dump_stack_lvl+0x73/0xb0
[   15.028141]  print_report+0xd1/0x650
[   15.028164]  ? __virt_addr_valid+0x1db/0x2d0
[   15.028212]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.028236]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.028259]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.028282]  kasan_report+0x141/0x180
[   15.028305]  ? kasan_atomics_helper+0x1b22/0x5450
[   15.028332]  kasan_check_range+0x10c/0x1c0
[   15.028357]  __kasan_check_write+0x18/0x20
[   15.028377]  kasan_atomics_helper+0x1b22/0x5450
[   15.028401]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.028424]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.028449]  ? ret_from_fork_asm+0x1a/0x30
[   15.028471]  ? kasan_atomics+0x152/0x310
[   15.028499]  kasan_atomics+0x1dc/0x310
[   15.028522]  ? __pfx_kasan_atomics+0x10/0x10
[   15.028548]  ? __pfx_read_tsc+0x10/0x10
[   15.028571]  ? ktime_get_ts64+0x86/0x230
[   15.028595]  kunit_try_run_case+0x1a5/0x480
[   15.028617]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.028665]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.028692]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.028718]  ? __kthread_parkme+0x82/0x180
[   15.028740]  ? preempt_count_sub+0x50/0x80
[   15.028765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.028788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.028813]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.028838]  kthread+0x337/0x6f0
[   15.028858]  ? trace_preempt_on+0x20/0xc0
[   15.028881]  ? __pfx_kthread+0x10/0x10
[   15.028914]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.028937]  ? calculate_sigpending+0x7b/0xa0
[   15.028972]  ? __pfx_kthread+0x10/0x10
[   15.028994]  ret_from_fork+0x116/0x1d0
[   15.029014]  ? __pfx_kthread+0x10/0x10
[   15.029035]  ret_from_fork_asm+0x1a/0x30
[   15.029071]  </TASK>
[   15.029082] 
[   15.040318] Allocated by task 282:
[   15.040469]  kasan_save_stack+0x45/0x70
[   15.042495]  kasan_save_track+0x18/0x40
[   15.042716]  kasan_save_alloc_info+0x3b/0x50
[   15.042869]  __kasan_kmalloc+0xb7/0xc0
[   15.043789]  __kmalloc_cache_noprof+0x189/0x420
[   15.044388]  kasan_atomics+0x95/0x310
[   15.044737]  kunit_try_run_case+0x1a5/0x480
[   15.044902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.045902]  kthread+0x337/0x6f0
[   15.046610]  ret_from_fork+0x116/0x1d0
[   15.046953]  ret_from_fork_asm+0x1a/0x30
[   15.047095] 
[   15.047170] The buggy address belongs to the object at ffff888102b49680
[   15.047170]  which belongs to the cache kmalloc-64 of size 64
[   15.047515] The buggy address is located 0 bytes to the right of
[   15.047515]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   15.047865] 
[   15.048546] The buggy address belongs to the physical page:
[   15.049816] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.050865] flags: 0x200000000000000(node=0|zone=2)
[   15.051748] page_type: f5(slab)
[   15.052191] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.053393] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.054309] page dumped because: kasan: bad access detected
[   15.055002] 
[   15.055240] Memory state around the buggy address:
[   15.055654]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.056406]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.057129] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.057869]                                      ^
[   15.058586]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.059331]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.059558] ==================================================================
[   14.791906] ==================================================================
[   14.792741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.793202] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.793581] 
[   14.793816] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.793888] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.793926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.793947] Call Trace:
[   14.794015]  <TASK>
[   14.794031]  dump_stack_lvl+0x73/0xb0
[   14.794062]  print_report+0xd1/0x650
[   14.794110]  ? __virt_addr_valid+0x1db/0x2d0
[   14.794135]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.794181]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.794222]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.794256]  kasan_report+0x141/0x180
[   14.794279]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.794307]  kasan_check_range+0x10c/0x1c0
[   14.794332]  __kasan_check_write+0x18/0x20
[   14.794352]  kasan_atomics_helper+0x15b6/0x5450
[   14.794376]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.794399]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.794423]  ? ret_from_fork_asm+0x1a/0x30
[   14.794446]  ? kasan_atomics+0x152/0x310
[   14.794497]  kasan_atomics+0x1dc/0x310
[   14.794520]  ? __pfx_kasan_atomics+0x10/0x10
[   14.794545]  ? __pfx_read_tsc+0x10/0x10
[   14.794577]  ? ktime_get_ts64+0x86/0x230
[   14.794602]  kunit_try_run_case+0x1a5/0x480
[   14.794623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.794644]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.794670]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.794695]  ? __kthread_parkme+0x82/0x180
[   14.794742]  ? preempt_count_sub+0x50/0x80
[   14.794767]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.794788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.794836]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.794862]  kthread+0x337/0x6f0
[   14.794911]  ? trace_preempt_on+0x20/0xc0
[   14.794944]  ? __pfx_kthread+0x10/0x10
[   14.794965]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.794989]  ? calculate_sigpending+0x7b/0xa0
[   14.795023]  ? __pfx_kthread+0x10/0x10
[   14.795094]  ret_from_fork+0x116/0x1d0
[   14.795116]  ? __pfx_kthread+0x10/0x10
[   14.795138]  ret_from_fork_asm+0x1a/0x30
[   14.795169]  </TASK>
[   14.795181] 
[   14.809601] Allocated by task 282:
[   14.810052]  kasan_save_stack+0x45/0x70
[   14.810574]  kasan_save_track+0x18/0x40
[   14.811054]  kasan_save_alloc_info+0x3b/0x50
[   14.811479]  __kasan_kmalloc+0xb7/0xc0
[   14.811923]  __kmalloc_cache_noprof+0x189/0x420
[   14.812303]  kasan_atomics+0x95/0x310
[   14.812441]  kunit_try_run_case+0x1a5/0x480
[   14.812587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.813249]  kthread+0x337/0x6f0
[   14.813605]  ret_from_fork+0x116/0x1d0
[   14.814003]  ret_from_fork_asm+0x1a/0x30
[   14.814511] 
[   14.814713] The buggy address belongs to the object at ffff888102b49680
[   14.814713]  which belongs to the cache kmalloc-64 of size 64
[   14.815528] The buggy address is located 0 bytes to the right of
[   14.815528]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.816754] 
[   14.816937] The buggy address belongs to the physical page:
[   14.817469] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.817877] flags: 0x200000000000000(node=0|zone=2)
[   14.818472] page_type: f5(slab)
[   14.818812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.819607] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.820003] page dumped because: kasan: bad access detected
[   14.820177] 
[   14.820246] Memory state around the buggy address:
[   14.820400]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.820614]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.821778] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.822604]                                      ^
[   14.823421]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.824285]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.825140] ==================================================================
[   14.474104] ==================================================================
[   14.474446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   14.474815] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.475213] 
[   14.475298] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.475343] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.475355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.475376] Call Trace:
[   14.475390]  <TASK>
[   14.475405]  dump_stack_lvl+0x73/0xb0
[   14.475428]  print_report+0xd1/0x650
[   14.475451]  ? __virt_addr_valid+0x1db/0x2d0
[   14.475475]  ? kasan_atomics_helper+0x1148/0x5450
[   14.475497]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.475522]  ? kasan_atomics_helper+0x1148/0x5450
[   14.475545]  kasan_report+0x141/0x180
[   14.475568]  ? kasan_atomics_helper+0x1148/0x5450
[   14.475596]  kasan_check_range+0x10c/0x1c0
[   14.475639]  __kasan_check_write+0x18/0x20
[   14.475659]  kasan_atomics_helper+0x1148/0x5450
[   14.475683]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.475707]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.475731]  ? ret_from_fork_asm+0x1a/0x30
[   14.475754]  ? kasan_atomics+0x152/0x310
[   14.475780]  kasan_atomics+0x1dc/0x310
[   14.475804]  ? __pfx_kasan_atomics+0x10/0x10
[   14.475828]  ? __pfx_read_tsc+0x10/0x10
[   14.475851]  ? ktime_get_ts64+0x86/0x230
[   14.475875]  kunit_try_run_case+0x1a5/0x480
[   14.475906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.475945]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.475973]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.475999]  ? __kthread_parkme+0x82/0x180
[   14.476019]  ? preempt_count_sub+0x50/0x80
[   14.476044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.476067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.476092]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.476118]  kthread+0x337/0x6f0
[   14.476137]  ? trace_preempt_on+0x20/0xc0
[   14.476161]  ? __pfx_kthread+0x10/0x10
[   14.476182]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.476205]  ? calculate_sigpending+0x7b/0xa0
[   14.476229]  ? __pfx_kthread+0x10/0x10
[   14.476252]  ret_from_fork+0x116/0x1d0
[   14.476271]  ? __pfx_kthread+0x10/0x10
[   14.476292]  ret_from_fork_asm+0x1a/0x30
[   14.476323]  </TASK>
[   14.476334] 
[   14.485025] Allocated by task 282:
[   14.485181]  kasan_save_stack+0x45/0x70
[   14.485415]  kasan_save_track+0x18/0x40
[   14.485674]  kasan_save_alloc_info+0x3b/0x50
[   14.485872]  __kasan_kmalloc+0xb7/0xc0
[   14.486068]  __kmalloc_cache_noprof+0x189/0x420
[   14.486357]  kasan_atomics+0x95/0x310
[   14.486518]  kunit_try_run_case+0x1a5/0x480
[   14.486689]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.486869]  kthread+0x337/0x6f0
[   14.486999]  ret_from_fork+0x116/0x1d0
[   14.487132]  ret_from_fork_asm+0x1a/0x30
[   14.487271] 
[   14.487343] The buggy address belongs to the object at ffff888102b49680
[   14.487343]  which belongs to the cache kmalloc-64 of size 64
[   14.487754] The buggy address is located 0 bytes to the right of
[   14.487754]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.488306] 
[   14.488402] The buggy address belongs to the physical page:
[   14.488673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.489068] flags: 0x200000000000000(node=0|zone=2)
[   14.489302] page_type: f5(slab)
[   14.489466] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.489805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.490151] page dumped because: kasan: bad access detected
[   14.490406] 
[   14.490499] Memory state around the buggy address:
[   14.490676]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.490924]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.491629] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.491901]                                      ^
[   14.492101]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.492383]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.492729] ==================================================================
[   14.437082] ==================================================================
[   14.437432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   14.437799] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.438312] 
[   14.438422] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.438465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.438477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.438498] Call Trace:
[   14.438513]  <TASK>
[   14.438527]  dump_stack_lvl+0x73/0xb0
[   14.438553]  print_report+0xd1/0x650
[   14.438575]  ? __virt_addr_valid+0x1db/0x2d0
[   14.438599]  ? kasan_atomics_helper+0x1079/0x5450
[   14.438643]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.438668]  ? kasan_atomics_helper+0x1079/0x5450
[   14.438691]  kasan_report+0x141/0x180
[   14.438714]  ? kasan_atomics_helper+0x1079/0x5450
[   14.438742]  kasan_check_range+0x10c/0x1c0
[   14.438766]  __kasan_check_write+0x18/0x20
[   14.438787]  kasan_atomics_helper+0x1079/0x5450
[   14.438811]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.438835]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.438860]  ? ret_from_fork_asm+0x1a/0x30
[   14.438884]  ? kasan_atomics+0x152/0x310
[   14.438920]  kasan_atomics+0x1dc/0x310
[   14.438962]  ? __pfx_kasan_atomics+0x10/0x10
[   14.438988]  ? __pfx_read_tsc+0x10/0x10
[   14.439010]  ? ktime_get_ts64+0x86/0x230
[   14.439035]  kunit_try_run_case+0x1a5/0x480
[   14.439057]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.439077]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.439103]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.439128]  ? __kthread_parkme+0x82/0x180
[   14.439149]  ? preempt_count_sub+0x50/0x80
[   14.439174]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.439195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.439220]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.439245]  kthread+0x337/0x6f0
[   14.439265]  ? trace_preempt_on+0x20/0xc0
[   14.439288]  ? __pfx_kthread+0x10/0x10
[   14.439309]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.439333]  ? calculate_sigpending+0x7b/0xa0
[   14.439357]  ? __pfx_kthread+0x10/0x10
[   14.439380]  ret_from_fork+0x116/0x1d0
[   14.439399]  ? __pfx_kthread+0x10/0x10
[   14.439421]  ret_from_fork_asm+0x1a/0x30
[   14.439450]  </TASK>
[   14.439462] 
[   14.447636] Allocated by task 282:
[   14.447794]  kasan_save_stack+0x45/0x70
[   14.448055]  kasan_save_track+0x18/0x40
[   14.448194]  kasan_save_alloc_info+0x3b/0x50
[   14.448407]  __kasan_kmalloc+0xb7/0xc0
[   14.448601]  __kmalloc_cache_noprof+0x189/0x420
[   14.448823]  kasan_atomics+0x95/0x310
[   14.449095]  kunit_try_run_case+0x1a5/0x480
[   14.449257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.449434]  kthread+0x337/0x6f0
[   14.449556]  ret_from_fork+0x116/0x1d0
[   14.449712]  ret_from_fork_asm+0x1a/0x30
[   14.449854] 
[   14.449956] The buggy address belongs to the object at ffff888102b49680
[   14.449956]  which belongs to the cache kmalloc-64 of size 64
[   14.450312] The buggy address is located 0 bytes to the right of
[   14.450312]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.450785] 
[   14.450880] The buggy address belongs to the physical page:
[   14.451136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.451482] flags: 0x200000000000000(node=0|zone=2)
[   14.451739] page_type: f5(slab)
[   14.451911] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.452247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.452848] page dumped because: kasan: bad access detected
[   14.453301] 
[   14.453399] Memory state around the buggy address:
[   14.453637]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.453882]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.454512] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.454809]                                      ^
[   14.455052]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.455317]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.455630] ==================================================================
[   15.112218] ==================================================================
[   15.112723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   15.113212] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   15.113542] 
[   15.113675] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   15.113719] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.113730] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.113751] Call Trace:
[   15.113763]  <TASK>
[   15.113777]  dump_stack_lvl+0x73/0xb0
[   15.113801]  print_report+0xd1/0x650
[   15.113824]  ? __virt_addr_valid+0x1db/0x2d0
[   15.113848]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.113871]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.113905]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.113927]  kasan_report+0x141/0x180
[   15.113950]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.113977]  kasan_check_range+0x10c/0x1c0
[   15.114002]  __kasan_check_write+0x18/0x20
[   15.114022]  kasan_atomics_helper+0x1ce1/0x5450
[   15.114045]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.114069]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.114093]  ? ret_from_fork_asm+0x1a/0x30
[   15.114115]  ? kasan_atomics+0x152/0x310
[   15.114141]  kasan_atomics+0x1dc/0x310
[   15.114165]  ? __pfx_kasan_atomics+0x10/0x10
[   15.114190]  ? __pfx_read_tsc+0x10/0x10
[   15.114211]  ? ktime_get_ts64+0x86/0x230
[   15.114236]  kunit_try_run_case+0x1a5/0x480
[   15.114258]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.114279]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.114306]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.114332]  ? __kthread_parkme+0x82/0x180
[   15.114352]  ? preempt_count_sub+0x50/0x80
[   15.114377]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.114399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.114424]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.114450]  kthread+0x337/0x6f0
[   15.114470]  ? trace_preempt_on+0x20/0xc0
[   15.114492]  ? __pfx_kthread+0x10/0x10
[   15.114514]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.114537]  ? calculate_sigpending+0x7b/0xa0
[   15.114562]  ? __pfx_kthread+0x10/0x10
[   15.114584]  ret_from_fork+0x116/0x1d0
[   15.114603]  ? __pfx_kthread+0x10/0x10
[   15.114645]  ret_from_fork_asm+0x1a/0x30
[   15.114675]  </TASK>
[   15.114687] 
[   15.121901] Allocated by task 282:
[   15.122079]  kasan_save_stack+0x45/0x70
[   15.122275]  kasan_save_track+0x18/0x40
[   15.122464]  kasan_save_alloc_info+0x3b/0x50
[   15.122704]  __kasan_kmalloc+0xb7/0xc0
[   15.122890]  __kmalloc_cache_noprof+0x189/0x420
[   15.123118]  kasan_atomics+0x95/0x310
[   15.123297]  kunit_try_run_case+0x1a5/0x480
[   15.123442]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.123655]  kthread+0x337/0x6f0
[   15.123826]  ret_from_fork+0x116/0x1d0
[   15.124022]  ret_from_fork_asm+0x1a/0x30
[   15.124218] 
[   15.124313] The buggy address belongs to the object at ffff888102b49680
[   15.124313]  which belongs to the cache kmalloc-64 of size 64
[   15.124831] The buggy address is located 0 bytes to the right of
[   15.124831]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   15.125344] 
[   15.125419] The buggy address belongs to the physical page:
[   15.125693] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.126022] flags: 0x200000000000000(node=0|zone=2)
[   15.126215] page_type: f5(slab)
[   15.126376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.126683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.126919] page dumped because: kasan: bad access detected
[   15.127090] 
[   15.127158] Memory state around the buggy address:
[   15.127329]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.127671]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.127995] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.128307]                                      ^
[   15.128513]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.128811]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.129056] ==================================================================
[   14.418518] ==================================================================
[   14.418852] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   14.419195] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.419470] 
[   14.419558] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.419601] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.419614] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.419635] Call Trace:
[   14.419648]  <TASK>
[   14.419661]  dump_stack_lvl+0x73/0xb0
[   14.419684]  print_report+0xd1/0x650
[   14.419707]  ? __virt_addr_valid+0x1db/0x2d0
[   14.419731]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.419753]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.419776]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.419799]  kasan_report+0x141/0x180
[   14.419822]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.419849]  __asan_report_load4_noabort+0x18/0x20
[   14.419870]  kasan_atomics_helper+0x4a36/0x5450
[   14.419927]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.419952]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.419978]  ? ret_from_fork_asm+0x1a/0x30
[   14.420000]  ? kasan_atomics+0x152/0x310
[   14.420028]  kasan_atomics+0x1dc/0x310
[   14.420052]  ? __pfx_kasan_atomics+0x10/0x10
[   14.420079]  ? __pfx_read_tsc+0x10/0x10
[   14.420101]  ? ktime_get_ts64+0x86/0x230
[   14.420125]  kunit_try_run_case+0x1a5/0x480
[   14.420147]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.420167]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.420193]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.420219]  ? __kthread_parkme+0x82/0x180
[   14.420240]  ? preempt_count_sub+0x50/0x80
[   14.420264]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.420286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.420312]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.420337]  kthread+0x337/0x6f0
[   14.420356]  ? trace_preempt_on+0x20/0xc0
[   14.420379]  ? __pfx_kthread+0x10/0x10
[   14.420401]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.420424]  ? calculate_sigpending+0x7b/0xa0
[   14.420448]  ? __pfx_kthread+0x10/0x10
[   14.420471]  ret_from_fork+0x116/0x1d0
[   14.420489]  ? __pfx_kthread+0x10/0x10
[   14.420511]  ret_from_fork_asm+0x1a/0x30
[   14.420541]  </TASK>
[   14.420552] 
[   14.429100] Allocated by task 282:
[   14.429380]  kasan_save_stack+0x45/0x70
[   14.429573]  kasan_save_track+0x18/0x40
[   14.429806]  kasan_save_alloc_info+0x3b/0x50
[   14.430028]  __kasan_kmalloc+0xb7/0xc0
[   14.430212]  __kmalloc_cache_noprof+0x189/0x420
[   14.430394]  kasan_atomics+0x95/0x310
[   14.430559]  kunit_try_run_case+0x1a5/0x480
[   14.430776]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.431086]  kthread+0x337/0x6f0
[   14.431249]  ret_from_fork+0x116/0x1d0
[   14.431384]  ret_from_fork_asm+0x1a/0x30
[   14.431581] 
[   14.431698] The buggy address belongs to the object at ffff888102b49680
[   14.431698]  which belongs to the cache kmalloc-64 of size 64
[   14.432273] The buggy address is located 0 bytes to the right of
[   14.432273]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.432761] 
[   14.432837] The buggy address belongs to the physical page:
[   14.433052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.433298] flags: 0x200000000000000(node=0|zone=2)
[   14.433465] page_type: f5(slab)
[   14.433586] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.433838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.434279] page dumped because: kasan: bad access detected
[   14.434664] 
[   14.434759] Memory state around the buggy address:
[   14.435001]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.435506]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.435734] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.435959]                                      ^
[   14.436122]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.436343]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.436559] ==================================================================
[   14.340520] ==================================================================
[   14.340916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   14.341242] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.341461] 
[   14.341543] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.341605] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.341636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.341658] Call Trace:
[   14.341673]  <TASK>
[   14.341688]  dump_stack_lvl+0x73/0xb0
[   14.341734]  print_report+0xd1/0x650
[   14.341758]  ? __virt_addr_valid+0x1db/0x2d0
[   14.341799]  ? kasan_atomics_helper+0xde0/0x5450
[   14.341821]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.341844]  ? kasan_atomics_helper+0xde0/0x5450
[   14.341884]  kasan_report+0x141/0x180
[   14.341920]  ? kasan_atomics_helper+0xde0/0x5450
[   14.341970]  kasan_check_range+0x10c/0x1c0
[   14.341996]  __kasan_check_write+0x18/0x20
[   14.342017]  kasan_atomics_helper+0xde0/0x5450
[   14.342040]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.342063]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.342088]  ? ret_from_fork_asm+0x1a/0x30
[   14.342110]  ? kasan_atomics+0x152/0x310
[   14.342137]  kasan_atomics+0x1dc/0x310
[   14.342160]  ? __pfx_kasan_atomics+0x10/0x10
[   14.342186]  ? __pfx_read_tsc+0x10/0x10
[   14.342207]  ? ktime_get_ts64+0x86/0x230
[   14.342232]  kunit_try_run_case+0x1a5/0x480
[   14.342254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.342274]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.342300]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.342325]  ? __kthread_parkme+0x82/0x180
[   14.342346]  ? preempt_count_sub+0x50/0x80
[   14.342371]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.342393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.342418]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.342443]  kthread+0x337/0x6f0
[   14.342464]  ? trace_preempt_on+0x20/0xc0
[   14.342486]  ? __pfx_kthread+0x10/0x10
[   14.342509]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.342532]  ? calculate_sigpending+0x7b/0xa0
[   14.342557]  ? __pfx_kthread+0x10/0x10
[   14.342579]  ret_from_fork+0x116/0x1d0
[   14.342598]  ? __pfx_kthread+0x10/0x10
[   14.342627]  ret_from_fork_asm+0x1a/0x30
[   14.342657]  </TASK>
[   14.342668] 
[   14.351347] Allocated by task 282:
[   14.351481]  kasan_save_stack+0x45/0x70
[   14.351649]  kasan_save_track+0x18/0x40
[   14.351848]  kasan_save_alloc_info+0x3b/0x50
[   14.352261]  __kasan_kmalloc+0xb7/0xc0
[   14.352457]  __kmalloc_cache_noprof+0x189/0x420
[   14.352727]  kasan_atomics+0x95/0x310
[   14.352924]  kunit_try_run_case+0x1a5/0x480
[   14.353260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.353529]  kthread+0x337/0x6f0
[   14.353751]  ret_from_fork+0x116/0x1d0
[   14.353908]  ret_from_fork_asm+0x1a/0x30
[   14.354188] 
[   14.354287] The buggy address belongs to the object at ffff888102b49680
[   14.354287]  which belongs to the cache kmalloc-64 of size 64
[   14.354880] The buggy address is located 0 bytes to the right of
[   14.354880]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.355517] 
[   14.355695] The buggy address belongs to the physical page:
[   14.356265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.356641] flags: 0x200000000000000(node=0|zone=2)
[   14.356873] page_type: f5(slab)
[   14.357204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.357472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.357723] page dumped because: kasan: bad access detected
[   14.357904] 
[   14.358111] Memory state around the buggy address:
[   14.358338]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.358690]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.359064] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.359472]                                      ^
[   14.359830]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.360227]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.360719] ==================================================================
[   14.234414] ==================================================================
[   14.234754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   14.235033] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.235360] 
[   14.235465] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.235508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.235520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.235542] Call Trace:
[   14.235555]  <TASK>
[   14.235569]  dump_stack_lvl+0x73/0xb0
[   14.235595]  print_report+0xd1/0x650
[   14.235634]  ? __virt_addr_valid+0x1db/0x2d0
[   14.235659]  ? kasan_atomics_helper+0xac7/0x5450
[   14.235681]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.235705]  ? kasan_atomics_helper+0xac7/0x5450
[   14.235727]  kasan_report+0x141/0x180
[   14.235750]  ? kasan_atomics_helper+0xac7/0x5450
[   14.235776]  kasan_check_range+0x10c/0x1c0
[   14.235801]  __kasan_check_write+0x18/0x20
[   14.235821]  kasan_atomics_helper+0xac7/0x5450
[   14.235844]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.235868]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.235901]  ? ret_from_fork_asm+0x1a/0x30
[   14.235923]  ? kasan_atomics+0x152/0x310
[   14.235968]  kasan_atomics+0x1dc/0x310
[   14.235992]  ? __pfx_kasan_atomics+0x10/0x10
[   14.236017]  ? __pfx_read_tsc+0x10/0x10
[   14.236038]  ? ktime_get_ts64+0x86/0x230
[   14.236062]  kunit_try_run_case+0x1a5/0x480
[   14.236083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.236104]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.236129]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.236154]  ? __kthread_parkme+0x82/0x180
[   14.236175]  ? preempt_count_sub+0x50/0x80
[   14.236199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.236221]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.236246]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.236271]  kthread+0x337/0x6f0
[   14.236291]  ? trace_preempt_on+0x20/0xc0
[   14.236314]  ? __pfx_kthread+0x10/0x10
[   14.236335]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.236359]  ? calculate_sigpending+0x7b/0xa0
[   14.236383]  ? __pfx_kthread+0x10/0x10
[   14.236405]  ret_from_fork+0x116/0x1d0
[   14.236424]  ? __pfx_kthread+0x10/0x10
[   14.236445]  ret_from_fork_asm+0x1a/0x30
[   14.236476]  </TASK>
[   14.236487] 
[   14.244715] Allocated by task 282:
[   14.244906]  kasan_save_stack+0x45/0x70
[   14.245061]  kasan_save_track+0x18/0x40
[   14.245216]  kasan_save_alloc_info+0x3b/0x50
[   14.245515]  __kasan_kmalloc+0xb7/0xc0
[   14.245727]  __kmalloc_cache_noprof+0x189/0x420
[   14.245961]  kasan_atomics+0x95/0x310
[   14.246267]  kunit_try_run_case+0x1a5/0x480
[   14.246418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.246596]  kthread+0x337/0x6f0
[   14.246733]  ret_from_fork+0x116/0x1d0
[   14.246867]  ret_from_fork_asm+0x1a/0x30
[   14.247247] 
[   14.247344] The buggy address belongs to the object at ffff888102b49680
[   14.247344]  which belongs to the cache kmalloc-64 of size 64
[   14.247910] The buggy address is located 0 bytes to the right of
[   14.247910]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.248529] 
[   14.248638] The buggy address belongs to the physical page:
[   14.248855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.249237] flags: 0x200000000000000(node=0|zone=2)
[   14.249422] page_type: f5(slab)
[   14.249542] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.249799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.250128] page dumped because: kasan: bad access detected
[   14.250383] 
[   14.250475] Memory state around the buggy address:
[   14.250719]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.251070]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.251366] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.251580]                                      ^
[   14.251734]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.251987]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.252304] ==================================================================
[   14.540845] ==================================================================
[   14.541606] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   14.542498] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.543237] 
[   14.543481] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.543526] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.543539] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.543561] Call Trace:
[   14.543577]  <TASK>
[   14.543593]  dump_stack_lvl+0x73/0xb0
[   14.543620]  print_report+0xd1/0x650
[   14.543642]  ? __virt_addr_valid+0x1db/0x2d0
[   14.543681]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.543704]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.543728]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.543751]  kasan_report+0x141/0x180
[   14.543774]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.543801]  __asan_report_load4_noabort+0x18/0x20
[   14.543822]  kasan_atomics_helper+0x49e8/0x5450
[   14.543845]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.543868]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.543905]  ? ret_from_fork_asm+0x1a/0x30
[   14.543928]  ? kasan_atomics+0x152/0x310
[   14.544027]  kasan_atomics+0x1dc/0x310
[   14.544053]  ? __pfx_kasan_atomics+0x10/0x10
[   14.544079]  ? __pfx_read_tsc+0x10/0x10
[   14.544100]  ? ktime_get_ts64+0x86/0x230
[   14.544125]  kunit_try_run_case+0x1a5/0x480
[   14.544148]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.544168]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.544194]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.544219]  ? __kthread_parkme+0x82/0x180
[   14.544240]  ? preempt_count_sub+0x50/0x80
[   14.544264]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.544286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.544311]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.544336]  kthread+0x337/0x6f0
[   14.544356]  ? trace_preempt_on+0x20/0xc0
[   14.544379]  ? __pfx_kthread+0x10/0x10
[   14.544401]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.544424]  ? calculate_sigpending+0x7b/0xa0
[   14.544449]  ? __pfx_kthread+0x10/0x10
[   14.544470]  ret_from_fork+0x116/0x1d0
[   14.544489]  ? __pfx_kthread+0x10/0x10
[   14.544509]  ret_from_fork_asm+0x1a/0x30
[   14.544540]  </TASK>
[   14.544551] 
[   14.558004] Allocated by task 282:
[   14.558375]  kasan_save_stack+0x45/0x70
[   14.558812]  kasan_save_track+0x18/0x40
[   14.558964]  kasan_save_alloc_info+0x3b/0x50
[   14.559136]  __kasan_kmalloc+0xb7/0xc0
[   14.559273]  __kmalloc_cache_noprof+0x189/0x420
[   14.559430]  kasan_atomics+0x95/0x310
[   14.559564]  kunit_try_run_case+0x1a5/0x480
[   14.559872]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.560427]  kthread+0x337/0x6f0
[   14.560753]  ret_from_fork+0x116/0x1d0
[   14.561234]  ret_from_fork_asm+0x1a/0x30
[   14.561685] 
[   14.561845] The buggy address belongs to the object at ffff888102b49680
[   14.561845]  which belongs to the cache kmalloc-64 of size 64
[   14.563236] The buggy address is located 0 bytes to the right of
[   14.563236]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.564496] 
[   14.564628] The buggy address belongs to the physical page:
[   14.564803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.565597] flags: 0x200000000000000(node=0|zone=2)
[   14.566049] page_type: f5(slab)
[   14.566354] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.566971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.567262] page dumped because: kasan: bad access detected
[   14.567729] 
[   14.567920] Memory state around the buggy address:
[   14.568433]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.569086]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.569712] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.570106]                                      ^
[   14.570267]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.570675]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.571364] ==================================================================
[   13.848496] ==================================================================
[   13.848913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   13.849329] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   13.849651] 
[   13.849735] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.849796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.849807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.849840] Call Trace:
[   13.849854]  <TASK>
[   13.849867]  dump_stack_lvl+0x73/0xb0
[   13.849925]  print_report+0xd1/0x650
[   13.850005]  ? __virt_addr_valid+0x1db/0x2d0
[   13.850030]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.850075]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.850097]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.850119]  kasan_report+0x141/0x180
[   13.850142]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.850169]  __asan_report_store4_noabort+0x1b/0x30
[   13.850190]  kasan_atomics_helper+0x4ba2/0x5450
[   13.850213]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.850250]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.850286]  ? ret_from_fork_asm+0x1a/0x30
[   13.850320]  ? kasan_atomics+0x152/0x310
[   13.850346]  kasan_atomics+0x1dc/0x310
[   13.850368]  ? __pfx_kasan_atomics+0x10/0x10
[   13.850392]  ? __pfx_read_tsc+0x10/0x10
[   13.850413]  ? ktime_get_ts64+0x86/0x230
[   13.850437]  kunit_try_run_case+0x1a5/0x480
[   13.850458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.850478]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.850503]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.850527]  ? __kthread_parkme+0x82/0x180
[   13.850546]  ? preempt_count_sub+0x50/0x80
[   13.850570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.850593]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.850650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.850676]  kthread+0x337/0x6f0
[   13.850695]  ? trace_preempt_on+0x20/0xc0
[   13.850717]  ? __pfx_kthread+0x10/0x10
[   13.850754]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.850777]  ? calculate_sigpending+0x7b/0xa0
[   13.850801]  ? __pfx_kthread+0x10/0x10
[   13.850822]  ret_from_fork+0x116/0x1d0
[   13.850841]  ? __pfx_kthread+0x10/0x10
[   13.850861]  ret_from_fork_asm+0x1a/0x30
[   13.850889]  </TASK>
[   13.850909] 
[   13.859124] Allocated by task 282:
[   13.859300]  kasan_save_stack+0x45/0x70
[   13.859504]  kasan_save_track+0x18/0x40
[   13.859695]  kasan_save_alloc_info+0x3b/0x50
[   13.860183]  __kasan_kmalloc+0xb7/0xc0
[   13.860323]  __kmalloc_cache_noprof+0x189/0x420
[   13.860475]  kasan_atomics+0x95/0x310
[   13.860603]  kunit_try_run_case+0x1a5/0x480
[   13.860800]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.861185]  kthread+0x337/0x6f0
[   13.861374]  ret_from_fork+0x116/0x1d0
[   13.861599]  ret_from_fork_asm+0x1a/0x30
[   13.861829] 
[   13.862011] The buggy address belongs to the object at ffff888102b49680
[   13.862011]  which belongs to the cache kmalloc-64 of size 64
[   13.862550] The buggy address is located 0 bytes to the right of
[   13.862550]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   13.863148] 
[   13.863221] The buggy address belongs to the physical page:
[   13.863386] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   13.863745] flags: 0x200000000000000(node=0|zone=2)
[   13.864113] page_type: f5(slab)
[   13.864302] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.864679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.865214] page dumped because: kasan: bad access detected
[   13.865481] 
[   13.865575] Memory state around the buggy address:
[   13.865725]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.866109]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.866464] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.866821]                                      ^
[   13.867117]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.867443]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.867761] ==================================================================
[   14.400096] ==================================================================
[   14.400360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   14.400665] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.401036] 
[   14.401151] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.401196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.401209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.401231] Call Trace:
[   14.401244]  <TASK>
[   14.401258]  dump_stack_lvl+0x73/0xb0
[   14.401282]  print_report+0xd1/0x650
[   14.401305]  ? __virt_addr_valid+0x1db/0x2d0
[   14.401330]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.401353]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.401377]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.401400]  kasan_report+0x141/0x180
[   14.401422]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.401450]  kasan_check_range+0x10c/0x1c0
[   14.401474]  __kasan_check_write+0x18/0x20
[   14.401495]  kasan_atomics_helper+0xfa9/0x5450
[   14.401518]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.401541]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.401565]  ? ret_from_fork_asm+0x1a/0x30
[   14.401587]  ? kasan_atomics+0x152/0x310
[   14.401632]  kasan_atomics+0x1dc/0x310
[   14.401657]  ? __pfx_kasan_atomics+0x10/0x10
[   14.401682]  ? __pfx_read_tsc+0x10/0x10
[   14.401703]  ? ktime_get_ts64+0x86/0x230
[   14.401727]  kunit_try_run_case+0x1a5/0x480
[   14.401748]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.401770]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.401794]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.401820]  ? __kthread_parkme+0x82/0x180
[   14.401840]  ? preempt_count_sub+0x50/0x80
[   14.401865]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.401887]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.401921]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.401965]  kthread+0x337/0x6f0
[   14.401985]  ? trace_preempt_on+0x20/0xc0
[   14.402008]  ? __pfx_kthread+0x10/0x10
[   14.402028]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.402052]  ? calculate_sigpending+0x7b/0xa0
[   14.402077]  ? __pfx_kthread+0x10/0x10
[   14.402098]  ret_from_fork+0x116/0x1d0
[   14.402117]  ? __pfx_kthread+0x10/0x10
[   14.402138]  ret_from_fork_asm+0x1a/0x30
[   14.402169]  </TASK>
[   14.402180] 
[   14.410630] Allocated by task 282:
[   14.410794]  kasan_save_stack+0x45/0x70
[   14.410949]  kasan_save_track+0x18/0x40
[   14.411139]  kasan_save_alloc_info+0x3b/0x50
[   14.411438]  __kasan_kmalloc+0xb7/0xc0
[   14.411635]  __kmalloc_cache_noprof+0x189/0x420
[   14.411833]  kasan_atomics+0x95/0x310
[   14.412086]  kunit_try_run_case+0x1a5/0x480
[   14.412290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.412481]  kthread+0x337/0x6f0
[   14.412675]  ret_from_fork+0x116/0x1d0
[   14.412836]  ret_from_fork_asm+0x1a/0x30
[   14.413064] 
[   14.413151] The buggy address belongs to the object at ffff888102b49680
[   14.413151]  which belongs to the cache kmalloc-64 of size 64
[   14.413533] The buggy address is located 0 bytes to the right of
[   14.413533]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.414240] 
[   14.414340] The buggy address belongs to the physical page:
[   14.414592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.414924] flags: 0x200000000000000(node=0|zone=2)
[   14.415168] page_type: f5(slab)
[   14.415290] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.415521] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.415900] page dumped because: kasan: bad access detected
[   14.416154] 
[   14.416251] Memory state around the buggy address:
[   14.416479]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.416724]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.416952] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.417170]                                      ^
[   14.417324]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.417539]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.418081] ==================================================================
[   14.456198] ==================================================================
[   14.456476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   14.456735] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.457074] 
[   14.457183] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.457225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.457237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.457258] Call Trace:
[   14.457269]  <TASK>
[   14.457282]  dump_stack_lvl+0x73/0xb0
[   14.457307]  print_report+0xd1/0x650
[   14.457330]  ? __virt_addr_valid+0x1db/0x2d0
[   14.457354]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.457376]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.457399]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.457423]  kasan_report+0x141/0x180
[   14.457446]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.457474]  __asan_report_load4_noabort+0x18/0x20
[   14.457496]  kasan_atomics_helper+0x4a1c/0x5450
[   14.457520]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.457543]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.457568]  ? ret_from_fork_asm+0x1a/0x30
[   14.457591]  ? kasan_atomics+0x152/0x310
[   14.457637]  kasan_atomics+0x1dc/0x310
[   14.457661]  ? __pfx_kasan_atomics+0x10/0x10
[   14.457686]  ? __pfx_read_tsc+0x10/0x10
[   14.457708]  ? ktime_get_ts64+0x86/0x230
[   14.457732]  kunit_try_run_case+0x1a5/0x480
[   14.457755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.457776]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.457802]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.457828]  ? __kthread_parkme+0x82/0x180
[   14.457849]  ? preempt_count_sub+0x50/0x80
[   14.457873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.457905]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.457948]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.457974]  kthread+0x337/0x6f0
[   14.457995]  ? trace_preempt_on+0x20/0xc0
[   14.458018]  ? __pfx_kthread+0x10/0x10
[   14.458041]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.458066]  ? calculate_sigpending+0x7b/0xa0
[   14.458091]  ? __pfx_kthread+0x10/0x10
[   14.458114]  ret_from_fork+0x116/0x1d0
[   14.458134]  ? __pfx_kthread+0x10/0x10
[   14.458156]  ret_from_fork_asm+0x1a/0x30
[   14.458186]  </TASK>
[   14.458197] 
[   14.465944] Allocated by task 282:
[   14.466076]  kasan_save_stack+0x45/0x70
[   14.466271]  kasan_save_track+0x18/0x40
[   14.466447]  kasan_save_alloc_info+0x3b/0x50
[   14.466677]  __kasan_kmalloc+0xb7/0xc0
[   14.466812]  __kmalloc_cache_noprof+0x189/0x420
[   14.466997]  kasan_atomics+0x95/0x310
[   14.467134]  kunit_try_run_case+0x1a5/0x480
[   14.467277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.467455]  kthread+0x337/0x6f0
[   14.467576]  ret_from_fork+0x116/0x1d0
[   14.467791]  ret_from_fork_asm+0x1a/0x30
[   14.468006] 
[   14.468103] The buggy address belongs to the object at ffff888102b49680
[   14.468103]  which belongs to the cache kmalloc-64 of size 64
[   14.468943] The buggy address is located 0 bytes to the right of
[   14.468943]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.469426] 
[   14.469528] The buggy address belongs to the physical page:
[   14.469764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.470074] flags: 0x200000000000000(node=0|zone=2)
[   14.470448] page_type: f5(slab)
[   14.470644] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.470911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.471480] page dumped because: kasan: bad access detected
[   14.471701] 
[   14.471796] Memory state around the buggy address:
[   14.472070]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.472330]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.472628] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.472913]                                      ^
[   14.473124]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.473451]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.473707] ==================================================================
[   14.660451] ==================================================================
[   14.660989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.661436] Read of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.661802] 
[   14.662040] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.662128] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.662141] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.662164] Call Trace:
[   14.662189]  <TASK>
[   14.662205]  dump_stack_lvl+0x73/0xb0
[   14.662232]  print_report+0xd1/0x650
[   14.662266]  ? __virt_addr_valid+0x1db/0x2d0
[   14.662291]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.662313]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.662337]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.662361]  kasan_report+0x141/0x180
[   14.662385]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.662412]  __asan_report_load8_noabort+0x18/0x20
[   14.662435]  kasan_atomics_helper+0x4eae/0x5450
[   14.662467]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.662491]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.662516]  ? ret_from_fork_asm+0x1a/0x30
[   14.662548]  ? kasan_atomics+0x152/0x310
[   14.662575]  kasan_atomics+0x1dc/0x310
[   14.662598]  ? __pfx_kasan_atomics+0x10/0x10
[   14.662623]  ? __pfx_read_tsc+0x10/0x10
[   14.662645]  ? ktime_get_ts64+0x86/0x230
[   14.662678]  kunit_try_run_case+0x1a5/0x480
[   14.662700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.662721]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.662767]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.662793]  ? __kthread_parkme+0x82/0x180
[   14.662814]  ? preempt_count_sub+0x50/0x80
[   14.662838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.662860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.662885]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.662921]  kthread+0x337/0x6f0
[   14.662984]  ? trace_preempt_on+0x20/0xc0
[   14.663009]  ? __pfx_kthread+0x10/0x10
[   14.663031]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.663053]  ? calculate_sigpending+0x7b/0xa0
[   14.663079]  ? __pfx_kthread+0x10/0x10
[   14.663101]  ret_from_fork+0x116/0x1d0
[   14.663120]  ? __pfx_kthread+0x10/0x10
[   14.663141]  ret_from_fork_asm+0x1a/0x30
[   14.663171]  </TASK>
[   14.663183] 
[   14.678320] Allocated by task 282:
[   14.678647]  kasan_save_stack+0x45/0x70
[   14.678914]  kasan_save_track+0x18/0x40
[   14.679333]  kasan_save_alloc_info+0x3b/0x50
[   14.679595]  __kasan_kmalloc+0xb7/0xc0
[   14.679812]  __kmalloc_cache_noprof+0x189/0x420
[   14.680284]  kasan_atomics+0x95/0x310
[   14.680538]  kunit_try_run_case+0x1a5/0x480
[   14.680805]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.681480]  kthread+0x337/0x6f0
[   14.681801]  ret_from_fork+0x116/0x1d0
[   14.682130]  ret_from_fork_asm+0x1a/0x30
[   14.682378] 
[   14.682457] The buggy address belongs to the object at ffff888102b49680
[   14.682457]  which belongs to the cache kmalloc-64 of size 64
[   14.683175] The buggy address is located 0 bytes to the right of
[   14.683175]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.684407] 
[   14.684582] The buggy address belongs to the physical page:
[   14.685129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.685655] flags: 0x200000000000000(node=0|zone=2)
[   14.685927] page_type: f5(slab)
[   14.686442] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.686835] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.687402] page dumped because: kasan: bad access detected
[   14.687990] 
[   14.688157] Memory state around the buggy address:
[   14.688606]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.689290]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.689514] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.689969]                                      ^
[   14.690440]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.691378]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.692125] ==================================================================
[   14.724766] ==================================================================
[   14.725456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.726384] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.727337] 
[   14.727539] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.727584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.727607] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.727628] Call Trace:
[   14.727644]  <TASK>
[   14.727660]  dump_stack_lvl+0x73/0xb0
[   14.727697]  print_report+0xd1/0x650
[   14.727720]  ? __virt_addr_valid+0x1db/0x2d0
[   14.727753]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.727775]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.727798]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.727821]  kasan_report+0x141/0x180
[   14.727845]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.727872]  __asan_report_store8_noabort+0x1b/0x30
[   14.727904]  kasan_atomics_helper+0x50d4/0x5450
[   14.727928]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.727966]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.727992]  ? ret_from_fork_asm+0x1a/0x30
[   14.728014]  ? kasan_atomics+0x152/0x310
[   14.728041]  kasan_atomics+0x1dc/0x310
[   14.728065]  ? __pfx_kasan_atomics+0x10/0x10
[   14.728090]  ? __pfx_read_tsc+0x10/0x10
[   14.728111]  ? ktime_get_ts64+0x86/0x230
[   14.728136]  kunit_try_run_case+0x1a5/0x480
[   14.728159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.728180]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.728206]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.728232]  ? __kthread_parkme+0x82/0x180
[   14.728253]  ? preempt_count_sub+0x50/0x80
[   14.728277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.728300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.728326]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.728352]  kthread+0x337/0x6f0
[   14.728372]  ? trace_preempt_on+0x20/0xc0
[   14.728396]  ? __pfx_kthread+0x10/0x10
[   14.728417]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.728440]  ? calculate_sigpending+0x7b/0xa0
[   14.728466]  ? __pfx_kthread+0x10/0x10
[   14.728488]  ret_from_fork+0x116/0x1d0
[   14.728508]  ? __pfx_kthread+0x10/0x10
[   14.728529]  ret_from_fork_asm+0x1a/0x30
[   14.728561]  </TASK>
[   14.728571] 
[   14.741564] Allocated by task 282:
[   14.741856]  kasan_save_stack+0x45/0x70
[   14.742321]  kasan_save_track+0x18/0x40
[   14.742721]  kasan_save_alloc_info+0x3b/0x50
[   14.743141]  __kasan_kmalloc+0xb7/0xc0
[   14.743475]  __kmalloc_cache_noprof+0x189/0x420
[   14.743648]  kasan_atomics+0x95/0x310
[   14.744046]  kunit_try_run_case+0x1a5/0x480
[   14.744484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.745097]  kthread+0x337/0x6f0
[   14.745239]  ret_from_fork+0x116/0x1d0
[   14.745610]  ret_from_fork_asm+0x1a/0x30
[   14.745843] 
[   14.746042] The buggy address belongs to the object at ffff888102b49680
[   14.746042]  which belongs to the cache kmalloc-64 of size 64
[   14.746984] The buggy address is located 0 bytes to the right of
[   14.746984]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.747977] 
[   14.748163] The buggy address belongs to the physical page:
[   14.748513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.748911] flags: 0x200000000000000(node=0|zone=2)
[   14.749416] page_type: f5(slab)
[   14.749733] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.750357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.751210] page dumped because: kasan: bad access detected
[   14.751390] 
[   14.751461] Memory state around the buggy address:
[   14.751617]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.751834]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.752445] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.753198]                                      ^
[   14.753728]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.754405]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.755146] ==================================================================
[   14.299380] ==================================================================
[   14.299741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   14.300160] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.300604] 
[   14.300759] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.300804] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.300816] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.300839] Call Trace:
[   14.300855]  <TASK>
[   14.300869]  dump_stack_lvl+0x73/0xb0
[   14.300907]  print_report+0xd1/0x650
[   14.300930]  ? __virt_addr_valid+0x1db/0x2d0
[   14.300955]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.300976]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.300999]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.301022]  kasan_report+0x141/0x180
[   14.301051]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.301078]  __asan_report_load4_noabort+0x18/0x20
[   14.301100]  kasan_atomics_helper+0x4a84/0x5450
[   14.301124]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.301147]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.301172]  ? ret_from_fork_asm+0x1a/0x30
[   14.301194]  ? kasan_atomics+0x152/0x310
[   14.301222]  kasan_atomics+0x1dc/0x310
[   14.301245]  ? __pfx_kasan_atomics+0x10/0x10
[   14.301270]  ? __pfx_read_tsc+0x10/0x10
[   14.301292]  ? ktime_get_ts64+0x86/0x230
[   14.301317]  kunit_try_run_case+0x1a5/0x480
[   14.301339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.301360]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.301386]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.301411]  ? __kthread_parkme+0x82/0x180
[   14.301433]  ? preempt_count_sub+0x50/0x80
[   14.301458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.301480]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.301505]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.301530]  kthread+0x337/0x6f0
[   14.301551]  ? trace_preempt_on+0x20/0xc0
[   14.301576]  ? __pfx_kthread+0x10/0x10
[   14.301597]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.301633]  ? calculate_sigpending+0x7b/0xa0
[   14.301658]  ? __pfx_kthread+0x10/0x10
[   14.301680]  ret_from_fork+0x116/0x1d0
[   14.301698]  ? __pfx_kthread+0x10/0x10
[   14.301720]  ret_from_fork_asm+0x1a/0x30
[   14.301772]  </TASK>
[   14.301784] 
[   14.310279] Allocated by task 282:
[   14.310412]  kasan_save_stack+0x45/0x70
[   14.310601]  kasan_save_track+0x18/0x40
[   14.310793]  kasan_save_alloc_info+0x3b/0x50
[   14.311020]  __kasan_kmalloc+0xb7/0xc0
[   14.311208]  __kmalloc_cache_noprof+0x189/0x420
[   14.311429]  kasan_atomics+0x95/0x310
[   14.311734]  kunit_try_run_case+0x1a5/0x480
[   14.311882]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.312325]  kthread+0x337/0x6f0
[   14.312511]  ret_from_fork+0x116/0x1d0
[   14.312723]  ret_from_fork_asm+0x1a/0x30
[   14.313055] 
[   14.313161] The buggy address belongs to the object at ffff888102b49680
[   14.313161]  which belongs to the cache kmalloc-64 of size 64
[   14.313718] The buggy address is located 0 bytes to the right of
[   14.313718]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.314289] 
[   14.314387] The buggy address belongs to the physical page:
[   14.314659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.315044] flags: 0x200000000000000(node=0|zone=2)
[   14.315321] page_type: f5(slab)
[   14.315443] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.315700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.315976] page dumped because: kasan: bad access detected
[   14.316270] 
[   14.316382] Memory state around the buggy address:
[   14.316776]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.317189]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.317506] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.317904]                                      ^
[   14.318177]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.318494]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.318837] ==================================================================
[   14.756122] ==================================================================
[   14.756673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.757028] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.757677] 
[   14.757764] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.757808] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.757822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.757843] Call Trace:
[   14.757857]  <TASK>
[   14.757870]  dump_stack_lvl+0x73/0xb0
[   14.757907]  print_report+0xd1/0x650
[   14.757930]  ? __virt_addr_valid+0x1db/0x2d0
[   14.757954]  ? kasan_atomics_helper+0x151d/0x5450
[   14.757976]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.758000]  ? kasan_atomics_helper+0x151d/0x5450
[   14.758023]  kasan_report+0x141/0x180
[   14.758046]  ? kasan_atomics_helper+0x151d/0x5450
[   14.758086]  kasan_check_range+0x10c/0x1c0
[   14.758111]  __kasan_check_write+0x18/0x20
[   14.758131]  kasan_atomics_helper+0x151d/0x5450
[   14.758168]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.758192]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.758217]  ? ret_from_fork_asm+0x1a/0x30
[   14.758240]  ? kasan_atomics+0x152/0x310
[   14.758268]  kasan_atomics+0x1dc/0x310
[   14.758293]  ? __pfx_kasan_atomics+0x10/0x10
[   14.758327]  ? __pfx_read_tsc+0x10/0x10
[   14.758349]  ? ktime_get_ts64+0x86/0x230
[   14.758372]  kunit_try_run_case+0x1a5/0x480
[   14.758413]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.758434]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.758460]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.758495]  ? __kthread_parkme+0x82/0x180
[   14.758516]  ? preempt_count_sub+0x50/0x80
[   14.758541]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.758563]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.758589]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.758615]  kthread+0x337/0x6f0
[   14.758644]  ? trace_preempt_on+0x20/0xc0
[   14.758667]  ? __pfx_kthread+0x10/0x10
[   14.758689]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.758712]  ? calculate_sigpending+0x7b/0xa0
[   14.758736]  ? __pfx_kthread+0x10/0x10
[   14.758759]  ret_from_fork+0x116/0x1d0
[   14.758779]  ? __pfx_kthread+0x10/0x10
[   14.758800]  ret_from_fork_asm+0x1a/0x30
[   14.758831]  </TASK>
[   14.758842] 
[   14.774211] Allocated by task 282:
[   14.774632]  kasan_save_stack+0x45/0x70
[   14.774887]  kasan_save_track+0x18/0x40
[   14.775219]  kasan_save_alloc_info+0x3b/0x50
[   14.775557]  __kasan_kmalloc+0xb7/0xc0
[   14.775990]  __kmalloc_cache_noprof+0x189/0x420
[   14.776404]  kasan_atomics+0x95/0x310
[   14.776796]  kunit_try_run_case+0x1a5/0x480
[   14.777137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.777321]  kthread+0x337/0x6f0
[   14.777445]  ret_from_fork+0x116/0x1d0
[   14.777579]  ret_from_fork_asm+0x1a/0x30
[   14.777747] 
[   14.777927] The buggy address belongs to the object at ffff888102b49680
[   14.777927]  which belongs to the cache kmalloc-64 of size 64
[   14.779153] The buggy address is located 0 bytes to the right of
[   14.779153]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.780366] 
[   14.780539] The buggy address belongs to the physical page:
[   14.781076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.781932] flags: 0x200000000000000(node=0|zone=2)
[   14.782386] page_type: f5(slab)
[   14.782611] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.783058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.783522] page dumped because: kasan: bad access detected
[   14.783694] 
[   14.783765] Memory state around the buggy address:
[   14.784783]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.786112]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.787390] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.787627]                                      ^
[   14.787789]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.789131]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.790371] ==================================================================
[   15.061394] ==================================================================
[   15.062190] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   15.062709] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   15.063656] 
[   15.064063] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   15.064119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.064134] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.064157] Call Trace:
[   15.064175]  <TASK>
[   15.064192]  dump_stack_lvl+0x73/0xb0
[   15.064254]  print_report+0xd1/0x650
[   15.064278]  ? __virt_addr_valid+0x1db/0x2d0
[   15.064302]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.064325]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.064349]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.064371]  kasan_report+0x141/0x180
[   15.064394]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.064421]  kasan_check_range+0x10c/0x1c0
[   15.064446]  __kasan_check_write+0x18/0x20
[   15.064465]  kasan_atomics_helper+0x1c18/0x5450
[   15.064489]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.064512]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.064537]  ? ret_from_fork_asm+0x1a/0x30
[   15.064560]  ? kasan_atomics+0x152/0x310
[   15.064587]  kasan_atomics+0x1dc/0x310
[   15.064610]  ? __pfx_kasan_atomics+0x10/0x10
[   15.064656]  ? __pfx_read_tsc+0x10/0x10
[   15.064678]  ? ktime_get_ts64+0x86/0x230
[   15.064704]  kunit_try_run_case+0x1a5/0x480
[   15.064726]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.064747]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.064773]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.064799]  ? __kthread_parkme+0x82/0x180
[   15.064820]  ? preempt_count_sub+0x50/0x80
[   15.064844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.064866]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.064899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.064925]  kthread+0x337/0x6f0
[   15.064963]  ? trace_preempt_on+0x20/0xc0
[   15.064987]  ? __pfx_kthread+0x10/0x10
[   15.065008]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.065030]  ? calculate_sigpending+0x7b/0xa0
[   15.065061]  ? __pfx_kthread+0x10/0x10
[   15.065083]  ret_from_fork+0x116/0x1d0
[   15.065102]  ? __pfx_kthread+0x10/0x10
[   15.065123]  ret_from_fork_asm+0x1a/0x30
[   15.065153]  </TASK>
[   15.065164] 
[   15.079370] Allocated by task 282:
[   15.079775]  kasan_save_stack+0x45/0x70
[   15.080182]  kasan_save_track+0x18/0x40
[   15.080579]  kasan_save_alloc_info+0x3b/0x50
[   15.081055]  __kasan_kmalloc+0xb7/0xc0
[   15.081473]  __kmalloc_cache_noprof+0x189/0x420
[   15.081785]  kasan_atomics+0x95/0x310
[   15.081959]  kunit_try_run_case+0x1a5/0x480
[   15.082123]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.082592]  kthread+0x337/0x6f0
[   15.082915]  ret_from_fork+0x116/0x1d0
[   15.083141]  ret_from_fork_asm+0x1a/0x30
[   15.083491] 
[   15.083610] The buggy address belongs to the object at ffff888102b49680
[   15.083610]  which belongs to the cache kmalloc-64 of size 64
[   15.083992] The buggy address is located 0 bytes to the right of
[   15.083992]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   15.085286] 
[   15.085476] The buggy address belongs to the physical page:
[   15.086039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.086765] flags: 0x200000000000000(node=0|zone=2)
[   15.087269] page_type: f5(slab)
[   15.087466] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.087836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.088575] page dumped because: kasan: bad access detected
[   15.089158] 
[   15.089328] Memory state around the buggy address:
[   15.089635]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.089921]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.090137] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.090610]                                      ^
[   15.090789]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.091584]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.092265] ==================================================================
[   15.339023] ==================================================================
[   15.339355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   15.339682] Read of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   15.340100] 
[   15.340206] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   15.340245] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.340257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.340277] Call Trace:
[   15.340290]  <TASK>
[   15.340303]  dump_stack_lvl+0x73/0xb0
[   15.340326]  print_report+0xd1/0x650
[   15.340348]  ? __virt_addr_valid+0x1db/0x2d0
[   15.340370]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.340391]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.340414]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.340435]  kasan_report+0x141/0x180
[   15.340458]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.340484]  __asan_report_load8_noabort+0x18/0x20
[   15.340505]  kasan_atomics_helper+0x4fa5/0x5450
[   15.340528]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.340550]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.340574]  ? ret_from_fork_asm+0x1a/0x30
[   15.340596]  ? kasan_atomics+0x152/0x310
[   15.340623]  kasan_atomics+0x1dc/0x310
[   15.340646]  ? __pfx_kasan_atomics+0x10/0x10
[   15.340670]  ? __pfx_read_tsc+0x10/0x10
[   15.340690]  ? ktime_get_ts64+0x86/0x230
[   15.340714]  kunit_try_run_case+0x1a5/0x480
[   15.340735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.340755]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.340780]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.340804]  ? __kthread_parkme+0x82/0x180
[   15.340824]  ? preempt_count_sub+0x50/0x80
[   15.340848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.340869]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.340904]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.340929]  kthread+0x337/0x6f0
[   15.340948]  ? trace_preempt_on+0x20/0xc0
[   15.340971]  ? __pfx_kthread+0x10/0x10
[   15.340991]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.341015]  ? calculate_sigpending+0x7b/0xa0
[   15.341038]  ? __pfx_kthread+0x10/0x10
[   15.341065]  ret_from_fork+0x116/0x1d0
[   15.341084]  ? __pfx_kthread+0x10/0x10
[   15.341105]  ret_from_fork_asm+0x1a/0x30
[   15.341135]  </TASK>
[   15.341145] 
[   15.348957] Allocated by task 282:
[   15.349143]  kasan_save_stack+0x45/0x70
[   15.349316]  kasan_save_track+0x18/0x40
[   15.349505]  kasan_save_alloc_info+0x3b/0x50
[   15.349743]  __kasan_kmalloc+0xb7/0xc0
[   15.349917]  __kmalloc_cache_noprof+0x189/0x420
[   15.350117]  kasan_atomics+0x95/0x310
[   15.350250]  kunit_try_run_case+0x1a5/0x480
[   15.350394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.350569]  kthread+0x337/0x6f0
[   15.350690]  ret_from_fork+0x116/0x1d0
[   15.350821]  ret_from_fork_asm+0x1a/0x30
[   15.351038] 
[   15.351134] The buggy address belongs to the object at ffff888102b49680
[   15.351134]  which belongs to the cache kmalloc-64 of size 64
[   15.351668] The buggy address is located 0 bytes to the right of
[   15.351668]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   15.352535] 
[   15.352628] The buggy address belongs to the physical page:
[   15.352882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.353302] flags: 0x200000000000000(node=0|zone=2)
[   15.353468] page_type: f5(slab)
[   15.353587] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.354121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.354469] page dumped because: kasan: bad access detected
[   15.354687] 
[   15.356268] Memory state around the buggy address:
[   15.356563]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.357695]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.358304] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.359268]                                      ^
[   15.359949]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.360561]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.361498] ==================================================================
[   15.215742] ==================================================================
[   15.216100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   15.216534] Read of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   15.217113] 
[   15.217324] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   15.217373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.217394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.217417] Call Trace:
[   15.217432]  <TASK>
[   15.217448]  dump_stack_lvl+0x73/0xb0
[   15.217476]  print_report+0xd1/0x650
[   15.217500]  ? __virt_addr_valid+0x1db/0x2d0
[   15.217524]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.217548]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.217572]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.217596]  kasan_report+0x141/0x180
[   15.217744]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.217778]  __asan_report_load8_noabort+0x18/0x20
[   15.217801]  kasan_atomics_helper+0x4f71/0x5450
[   15.217825]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.217851]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.217919]  ? ret_from_fork_asm+0x1a/0x30
[   15.217943]  ? kasan_atomics+0x152/0x310
[   15.217969]  kasan_atomics+0x1dc/0x310
[   15.217993]  ? __pfx_kasan_atomics+0x10/0x10
[   15.218018]  ? __pfx_read_tsc+0x10/0x10
[   15.218040]  ? ktime_get_ts64+0x86/0x230
[   15.218066]  kunit_try_run_case+0x1a5/0x480
[   15.218088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.218109]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.218136]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.218162]  ? __kthread_parkme+0x82/0x180
[   15.218184]  ? preempt_count_sub+0x50/0x80
[   15.218208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.218229]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.218254]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.218281]  kthread+0x337/0x6f0
[   15.218301]  ? trace_preempt_on+0x20/0xc0
[   15.218324]  ? __pfx_kthread+0x10/0x10
[   15.218345]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.218369]  ? calculate_sigpending+0x7b/0xa0
[   15.218393]  ? __pfx_kthread+0x10/0x10
[   15.218415]  ret_from_fork+0x116/0x1d0
[   15.218435]  ? __pfx_kthread+0x10/0x10
[   15.218455]  ret_from_fork_asm+0x1a/0x30
[   15.218485]  </TASK>
[   15.218497] 
[   15.229263] Allocated by task 282:
[   15.229438]  kasan_save_stack+0x45/0x70
[   15.230004]  kasan_save_track+0x18/0x40
[   15.230246]  kasan_save_alloc_info+0x3b/0x50
[   15.230577]  __kasan_kmalloc+0xb7/0xc0
[   15.230945]  __kmalloc_cache_noprof+0x189/0x420
[   15.231258]  kasan_atomics+0x95/0x310
[   15.231617]  kunit_try_run_case+0x1a5/0x480
[   15.231968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.232333]  kthread+0x337/0x6f0
[   15.232500]  ret_from_fork+0x116/0x1d0
[   15.232919]  ret_from_fork_asm+0x1a/0x30
[   15.233197] 
[   15.233418] The buggy address belongs to the object at ffff888102b49680
[   15.233418]  which belongs to the cache kmalloc-64 of size 64
[   15.234338] The buggy address is located 0 bytes to the right of
[   15.234338]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   15.235098] 
[   15.235208] The buggy address belongs to the physical page:
[   15.235429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.236064] flags: 0x200000000000000(node=0|zone=2)
[   15.236369] page_type: f5(slab)
[   15.236652] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.237134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.237442] page dumped because: kasan: bad access detected
[   15.237859] 
[   15.238102] Memory state around the buggy address:
[   15.238400]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.238877]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.239356] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.240033]                                      ^
[   15.240314]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.240610]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.241276] ==================================================================
[   13.888487] ==================================================================
[   13.888873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   13.889446] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   13.889781] 
[   13.889887] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.889996] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.890009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.890029] Call Trace:
[   13.890042]  <TASK>
[   13.890055]  dump_stack_lvl+0x73/0xb0
[   13.890080]  print_report+0xd1/0x650
[   13.890103]  ? __virt_addr_valid+0x1db/0x2d0
[   13.890234]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.890257]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.890299]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.890322]  kasan_report+0x141/0x180
[   13.890374]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.890403]  __asan_report_store4_noabort+0x1b/0x30
[   13.890424]  kasan_atomics_helper+0x4b6e/0x5450
[   13.890463]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.890487]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.890512]  ? ret_from_fork_asm+0x1a/0x30
[   13.890535]  ? kasan_atomics+0x152/0x310
[   13.890562]  kasan_atomics+0x1dc/0x310
[   13.890585]  ? __pfx_kasan_atomics+0x10/0x10
[   13.890630]  ? __pfx_read_tsc+0x10/0x10
[   13.890652]  ? ktime_get_ts64+0x86/0x230
[   13.890677]  kunit_try_run_case+0x1a5/0x480
[   13.890699]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.890720]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.890765]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.890790]  ? __kthread_parkme+0x82/0x180
[   13.890810]  ? preempt_count_sub+0x50/0x80
[   13.890834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.890856]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.890882]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.891025]  kthread+0x337/0x6f0
[   13.891050]  ? trace_preempt_on+0x20/0xc0
[   13.891074]  ? __pfx_kthread+0x10/0x10
[   13.891109]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.891146]  ? calculate_sigpending+0x7b/0xa0
[   13.891172]  ? __pfx_kthread+0x10/0x10
[   13.891194]  ret_from_fork+0x116/0x1d0
[   13.891212]  ? __pfx_kthread+0x10/0x10
[   13.891234]  ret_from_fork_asm+0x1a/0x30
[   13.891265]  </TASK>
[   13.891276] 
[   13.899298] Allocated by task 282:
[   13.899429]  kasan_save_stack+0x45/0x70
[   13.899712]  kasan_save_track+0x18/0x40
[   13.899955]  kasan_save_alloc_info+0x3b/0x50
[   13.900162]  __kasan_kmalloc+0xb7/0xc0
[   13.900356]  __kmalloc_cache_noprof+0x189/0x420
[   13.900509]  kasan_atomics+0x95/0x310
[   13.900700]  kunit_try_run_case+0x1a5/0x480
[   13.901236]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.901480]  kthread+0x337/0x6f0
[   13.901681]  ret_from_fork+0x116/0x1d0
[   13.901911]  ret_from_fork_asm+0x1a/0x30
[   13.902166] 
[   13.902264] The buggy address belongs to the object at ffff888102b49680
[   13.902264]  which belongs to the cache kmalloc-64 of size 64
[   13.902681] The buggy address is located 0 bytes to the right of
[   13.902681]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   13.903359] 
[   13.903478] The buggy address belongs to the physical page:
[   13.903673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   13.904178] flags: 0x200000000000000(node=0|zone=2)
[   13.904369] page_type: f5(slab)
[   13.904555] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.904988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.905345] page dumped because: kasan: bad access detected
[   13.905605] 
[   13.905715] Memory state around the buggy address:
[   13.906111]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.906437]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.906734] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.907167]                                      ^
[   13.907387]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.907741]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.908126] ==================================================================
[   14.021634] ==================================================================
[   14.022330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.023180] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.023902] 
[   14.024153] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.024198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.024210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.024232] Call Trace:
[   14.024246]  <TASK>
[   14.024260]  dump_stack_lvl+0x73/0xb0
[   14.024288]  print_report+0xd1/0x650
[   14.024310]  ? __virt_addr_valid+0x1db/0x2d0
[   14.024334]  ? kasan_atomics_helper+0x565/0x5450
[   14.024356]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.024379]  ? kasan_atomics_helper+0x565/0x5450
[   14.024402]  kasan_report+0x141/0x180
[   14.024425]  ? kasan_atomics_helper+0x565/0x5450
[   14.024452]  kasan_check_range+0x10c/0x1c0
[   14.024476]  __kasan_check_write+0x18/0x20
[   14.024497]  kasan_atomics_helper+0x565/0x5450
[   14.024520]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.024543]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.024569]  ? ret_from_fork_asm+0x1a/0x30
[   14.024592]  ? kasan_atomics+0x152/0x310
[   14.024619]  kasan_atomics+0x1dc/0x310
[   14.024652]  ? __pfx_kasan_atomics+0x10/0x10
[   14.024676]  ? __pfx_read_tsc+0x10/0x10
[   14.024698]  ? ktime_get_ts64+0x86/0x230
[   14.024724]  kunit_try_run_case+0x1a5/0x480
[   14.024746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.024767]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.024793]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.024818]  ? __kthread_parkme+0x82/0x180
[   14.024839]  ? preempt_count_sub+0x50/0x80
[   14.024864]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.024886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.024925]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.024961]  kthread+0x337/0x6f0
[   14.024981]  ? trace_preempt_on+0x20/0xc0
[   14.025004]  ? __pfx_kthread+0x10/0x10
[   14.025025]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.025054]  ? calculate_sigpending+0x7b/0xa0
[   14.025079]  ? __pfx_kthread+0x10/0x10
[   14.025100]  ret_from_fork+0x116/0x1d0
[   14.025120]  ? __pfx_kthread+0x10/0x10
[   14.025142]  ret_from_fork_asm+0x1a/0x30
[   14.025173]  </TASK>
[   14.025184] 
[   14.038972] Allocated by task 282:
[   14.039181]  kasan_save_stack+0x45/0x70
[   14.039390]  kasan_save_track+0x18/0x40
[   14.039580]  kasan_save_alloc_info+0x3b/0x50
[   14.039755]  __kasan_kmalloc+0xb7/0xc0
[   14.039919]  __kmalloc_cache_noprof+0x189/0x420
[   14.040194]  kasan_atomics+0x95/0x310
[   14.040392]  kunit_try_run_case+0x1a5/0x480
[   14.040548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.040752]  kthread+0x337/0x6f0
[   14.041049]  ret_from_fork+0x116/0x1d0
[   14.041276]  ret_from_fork_asm+0x1a/0x30
[   14.041460] 
[   14.041559] The buggy address belongs to the object at ffff888102b49680
[   14.041559]  which belongs to the cache kmalloc-64 of size 64
[   14.041993] The buggy address is located 0 bytes to the right of
[   14.041993]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.042817] 
[   14.042925] The buggy address belongs to the physical page:
[   14.043193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.043549] flags: 0x200000000000000(node=0|zone=2)
[   14.043885] page_type: f5(slab)
[   14.044051] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.044286] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.044764] page dumped because: kasan: bad access detected
[   14.044963] 
[   14.045063] Memory state around the buggy address:
[   14.045290]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.045531]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.045924] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.046276]                                      ^
[   14.046436]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.046926]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.047207] ==================================================================
[   14.511122] ==================================================================
[   14.511587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   14.511921] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.512330] 
[   14.512417] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.512461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.512474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.512495] Call Trace:
[   14.512509]  <TASK>
[   14.512523]  dump_stack_lvl+0x73/0xb0
[   14.512548]  print_report+0xd1/0x650
[   14.512571]  ? __virt_addr_valid+0x1db/0x2d0
[   14.512594]  ? kasan_atomics_helper+0x1217/0x5450
[   14.512639]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.512663]  ? kasan_atomics_helper+0x1217/0x5450
[   14.512686]  kasan_report+0x141/0x180
[   14.512709]  ? kasan_atomics_helper+0x1217/0x5450
[   14.512738]  kasan_check_range+0x10c/0x1c0
[   14.512762]  __kasan_check_write+0x18/0x20
[   14.512783]  kasan_atomics_helper+0x1217/0x5450
[   14.512806]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.512830]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.512855]  ? ret_from_fork_asm+0x1a/0x30
[   14.512878]  ? kasan_atomics+0x152/0x310
[   14.512914]  kasan_atomics+0x1dc/0x310
[   14.512938]  ? __pfx_kasan_atomics+0x10/0x10
[   14.512963]  ? __pfx_read_tsc+0x10/0x10
[   14.512986]  ? ktime_get_ts64+0x86/0x230
[   14.513010]  kunit_try_run_case+0x1a5/0x480
[   14.513032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.513056]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.513082]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.513108]  ? __kthread_parkme+0x82/0x180
[   14.513128]  ? preempt_count_sub+0x50/0x80
[   14.513153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.513175]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.513200]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.513226]  kthread+0x337/0x6f0
[   14.513246]  ? trace_preempt_on+0x20/0xc0
[   14.513270]  ? __pfx_kthread+0x10/0x10
[   14.513291]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.513315]  ? calculate_sigpending+0x7b/0xa0
[   14.513339]  ? __pfx_kthread+0x10/0x10
[   14.513361]  ret_from_fork+0x116/0x1d0
[   14.513381]  ? __pfx_kthread+0x10/0x10
[   14.513403]  ret_from_fork_asm+0x1a/0x30
[   14.513432]  </TASK>
[   14.513444] 
[   14.524817] Allocated by task 282:
[   14.526942]  kasan_save_stack+0x45/0x70
[   14.527181]  kasan_save_track+0x18/0x40
[   14.527753]  kasan_save_alloc_info+0x3b/0x50
[   14.527955]  __kasan_kmalloc+0xb7/0xc0
[   14.528089]  __kmalloc_cache_noprof+0x189/0x420
[   14.528242]  kasan_atomics+0x95/0x310
[   14.528372]  kunit_try_run_case+0x1a5/0x480
[   14.528578]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.528774]  kthread+0x337/0x6f0
[   14.530292]  ret_from_fork+0x116/0x1d0
[   14.530500]  ret_from_fork_asm+0x1a/0x30
[   14.531112] 
[   14.531220] The buggy address belongs to the object at ffff888102b49680
[   14.531220]  which belongs to the cache kmalloc-64 of size 64
[   14.531744] The buggy address is located 0 bytes to the right of
[   14.531744]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.532281] 
[   14.532383] The buggy address belongs to the physical page:
[   14.532588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.533651] flags: 0x200000000000000(node=0|zone=2)
[   14.533863] page_type: f5(slab)
[   14.534073] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.534673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.535189] page dumped because: kasan: bad access detected
[   14.535830] 
[   14.536095] Memory state around the buggy address:
[   14.536597]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.537368]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.537890] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.538653]                                      ^
[   14.539096]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.539481]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.539917] ==================================================================
[   14.904586] ==================================================================
[   14.904847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   14.905539] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.906040] 
[   14.906154] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.906198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.906211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.906232] Call Trace:
[   14.906268]  <TASK>
[   14.906282]  dump_stack_lvl+0x73/0xb0
[   14.906306]  print_report+0xd1/0x650
[   14.906329]  ? __virt_addr_valid+0x1db/0x2d0
[   14.906354]  ? kasan_atomics_helper+0x1818/0x5450
[   14.906376]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.906400]  ? kasan_atomics_helper+0x1818/0x5450
[   14.906440]  kasan_report+0x141/0x180
[   14.906464]  ? kasan_atomics_helper+0x1818/0x5450
[   14.906492]  kasan_check_range+0x10c/0x1c0
[   14.906517]  __kasan_check_write+0x18/0x20
[   14.906538]  kasan_atomics_helper+0x1818/0x5450
[   14.906562]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.906586]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.906624]  ? ret_from_fork_asm+0x1a/0x30
[   14.906647]  ? kasan_atomics+0x152/0x310
[   14.906674]  kasan_atomics+0x1dc/0x310
[   14.906697]  ? __pfx_kasan_atomics+0x10/0x10
[   14.906723]  ? __pfx_read_tsc+0x10/0x10
[   14.906745]  ? ktime_get_ts64+0x86/0x230
[   14.906770]  kunit_try_run_case+0x1a5/0x480
[   14.906792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.906812]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.906838]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.906863]  ? __kthread_parkme+0x82/0x180
[   14.906883]  ? preempt_count_sub+0x50/0x80
[   14.906916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.906956]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.906981]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.907007]  kthread+0x337/0x6f0
[   14.907027]  ? trace_preempt_on+0x20/0xc0
[   14.907050]  ? __pfx_kthread+0x10/0x10
[   14.907071]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.907094]  ? calculate_sigpending+0x7b/0xa0
[   14.907118]  ? __pfx_kthread+0x10/0x10
[   14.907140]  ret_from_fork+0x116/0x1d0
[   14.907160]  ? __pfx_kthread+0x10/0x10
[   14.907181]  ret_from_fork_asm+0x1a/0x30
[   14.907211]  </TASK>
[   14.907222] 
[   14.915642] Allocated by task 282:
[   14.915887]  kasan_save_stack+0x45/0x70
[   14.916195]  kasan_save_track+0x18/0x40
[   14.916375]  kasan_save_alloc_info+0x3b/0x50
[   14.916593]  __kasan_kmalloc+0xb7/0xc0
[   14.916767]  __kmalloc_cache_noprof+0x189/0x420
[   14.917091]  kasan_atomics+0x95/0x310
[   14.917258]  kunit_try_run_case+0x1a5/0x480
[   14.917467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.917668]  kthread+0x337/0x6f0
[   14.917791]  ret_from_fork+0x116/0x1d0
[   14.917972]  ret_from_fork_asm+0x1a/0x30
[   14.918173] 
[   14.918270] The buggy address belongs to the object at ffff888102b49680
[   14.918270]  which belongs to the cache kmalloc-64 of size 64
[   14.918813] The buggy address is located 0 bytes to the right of
[   14.918813]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.919230] 
[   14.919309] The buggy address belongs to the physical page:
[   14.919719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.920097] flags: 0x200000000000000(node=0|zone=2)
[   14.920313] page_type: f5(slab)
[   14.920462] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.920803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.921219] page dumped because: kasan: bad access detected
[   14.921459] 
[   14.921548] Memory state around the buggy address:
[   14.921761]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.922078]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.922412] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.922728]                                      ^
[   14.922939]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.923294]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.923656] ==================================================================
[   14.946663] ==================================================================
[   14.947368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   14.948066] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.948780] 
[   14.949014] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.949061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.949073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.949094] Call Trace:
[   14.949110]  <TASK>
[   14.949124]  dump_stack_lvl+0x73/0xb0
[   14.949149]  print_report+0xd1/0x650
[   14.949173]  ? __virt_addr_valid+0x1db/0x2d0
[   14.949197]  ? kasan_atomics_helper+0x194a/0x5450
[   14.949220]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.949244]  ? kasan_atomics_helper+0x194a/0x5450
[   14.949268]  kasan_report+0x141/0x180
[   14.949291]  ? kasan_atomics_helper+0x194a/0x5450
[   14.949318]  kasan_check_range+0x10c/0x1c0
[   14.949343]  __kasan_check_write+0x18/0x20
[   14.949364]  kasan_atomics_helper+0x194a/0x5450
[   14.949388]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.949411]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.949437]  ? ret_from_fork_asm+0x1a/0x30
[   14.949459]  ? kasan_atomics+0x152/0x310
[   14.949487]  kasan_atomics+0x1dc/0x310
[   14.949510]  ? __pfx_kasan_atomics+0x10/0x10
[   14.949535]  ? __pfx_read_tsc+0x10/0x10
[   14.949557]  ? ktime_get_ts64+0x86/0x230
[   14.949582]  kunit_try_run_case+0x1a5/0x480
[   14.949605]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.949634]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.949660]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.949686]  ? __kthread_parkme+0x82/0x180
[   14.949707]  ? preempt_count_sub+0x50/0x80
[   14.949731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.949753]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.949777]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.949803]  kthread+0x337/0x6f0
[   14.949824]  ? trace_preempt_on+0x20/0xc0
[   14.949846]  ? __pfx_kthread+0x10/0x10
[   14.949868]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.949899]  ? calculate_sigpending+0x7b/0xa0
[   14.949934]  ? __pfx_kthread+0x10/0x10
[   14.949965]  ret_from_fork+0x116/0x1d0
[   14.949985]  ? __pfx_kthread+0x10/0x10
[   14.950005]  ret_from_fork_asm+0x1a/0x30
[   14.950036]  </TASK>
[   14.950048] 
[   14.964533] Allocated by task 282:
[   14.964689]  kasan_save_stack+0x45/0x70
[   14.964835]  kasan_save_track+0x18/0x40
[   14.964984]  kasan_save_alloc_info+0x3b/0x50
[   14.965147]  __kasan_kmalloc+0xb7/0xc0
[   14.965309]  __kmalloc_cache_noprof+0x189/0x420
[   14.965573]  kasan_atomics+0x95/0x310
[   14.965976]  kunit_try_run_case+0x1a5/0x480
[   14.966356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.966959]  kthread+0x337/0x6f0
[   14.967294]  ret_from_fork+0x116/0x1d0
[   14.967692]  ret_from_fork_asm+0x1a/0x30
[   14.967972] 
[   14.968147] The buggy address belongs to the object at ffff888102b49680
[   14.968147]  which belongs to the cache kmalloc-64 of size 64
[   14.969204] The buggy address is located 0 bytes to the right of
[   14.969204]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.970299] 
[   14.970474] The buggy address belongs to the physical page:
[   14.970765] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.971114] flags: 0x200000000000000(node=0|zone=2)
[   14.971542] page_type: f5(slab)
[   14.971867] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.972448] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.972700] page dumped because: kasan: bad access detected
[   14.973217] 
[   14.973403] Memory state around the buggy address:
[   14.973875]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.974523]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.975243] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.975927]                                      ^
[   14.976330]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.976712]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.976935] ==================================================================
[   15.264413] ==================================================================
[   15.265079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   15.265841] Read of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   15.266264] 
[   15.266352] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   15.266396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.266408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.266429] Call Trace:
[   15.266444]  <TASK>
[   15.266458]  dump_stack_lvl+0x73/0xb0
[   15.266482]  print_report+0xd1/0x650
[   15.266504]  ? __virt_addr_valid+0x1db/0x2d0
[   15.266528]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.266551]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.266574]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.266598]  kasan_report+0x141/0x180
[   15.266621]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.266660]  __asan_report_load8_noabort+0x18/0x20
[   15.266682]  kasan_atomics_helper+0x4f98/0x5450
[   15.266706]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.266729]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.266754]  ? ret_from_fork_asm+0x1a/0x30
[   15.266776]  ? kasan_atomics+0x152/0x310
[   15.266803]  kasan_atomics+0x1dc/0x310
[   15.266826]  ? __pfx_kasan_atomics+0x10/0x10
[   15.266852]  ? __pfx_read_tsc+0x10/0x10
[   15.266874]  ? ktime_get_ts64+0x86/0x230
[   15.266909]  kunit_try_run_case+0x1a5/0x480
[   15.266931]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.266951]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.266976]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.267002]  ? __kthread_parkme+0x82/0x180
[   15.267023]  ? preempt_count_sub+0x50/0x80
[   15.267047]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.267071]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.267096]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.267122]  kthread+0x337/0x6f0
[   15.267144]  ? trace_preempt_on+0x20/0xc0
[   15.267167]  ? __pfx_kthread+0x10/0x10
[   15.267188]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.267212]  ? calculate_sigpending+0x7b/0xa0
[   15.267236]  ? __pfx_kthread+0x10/0x10
[   15.267258]  ret_from_fork+0x116/0x1d0
[   15.267277]  ? __pfx_kthread+0x10/0x10
[   15.267299]  ret_from_fork_asm+0x1a/0x30
[   15.267329]  </TASK>
[   15.267340] 
[   15.276234] Allocated by task 282:
[   15.276372]  kasan_save_stack+0x45/0x70
[   15.276573]  kasan_save_track+0x18/0x40
[   15.276759]  kasan_save_alloc_info+0x3b/0x50
[   15.276980]  __kasan_kmalloc+0xb7/0xc0
[   15.277252]  __kmalloc_cache_noprof+0x189/0x420
[   15.277442]  kasan_atomics+0x95/0x310
[   15.277609]  kunit_try_run_case+0x1a5/0x480
[   15.277801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.278044]  kthread+0x337/0x6f0
[   15.278211]  ret_from_fork+0x116/0x1d0
[   15.278345]  ret_from_fork_asm+0x1a/0x30
[   15.278485] 
[   15.278556] The buggy address belongs to the object at ffff888102b49680
[   15.278556]  which belongs to the cache kmalloc-64 of size 64
[   15.279108] The buggy address is located 0 bytes to the right of
[   15.279108]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   15.279781] 
[   15.279873] The buggy address belongs to the physical page:
[   15.280099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.280416] flags: 0x200000000000000(node=0|zone=2)
[   15.280644] page_type: f5(slab)
[   15.280794] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.281063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.281292] page dumped because: kasan: bad access detected
[   15.281541] 
[   15.281641] Memory state around the buggy address:
[   15.281867]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.282208]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.282486] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.282886]                                      ^
[   15.283103]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.283375]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.283689] ==================================================================
[   15.363602] ==================================================================
[   15.363977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   15.364937] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   15.365284] 
[   15.365372] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   15.365416] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.365429] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.365449] Call Trace:
[   15.365465]  <TASK>
[   15.365481]  dump_stack_lvl+0x73/0xb0
[   15.365507]  print_report+0xd1/0x650
[   15.365531]  ? __virt_addr_valid+0x1db/0x2d0
[   15.365555]  ? kasan_atomics_helper+0x224c/0x5450
[   15.365578]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.365602]  ? kasan_atomics_helper+0x224c/0x5450
[   15.365624]  kasan_report+0x141/0x180
[   15.365648]  ? kasan_atomics_helper+0x224c/0x5450
[   15.365675]  kasan_check_range+0x10c/0x1c0
[   15.365699]  __kasan_check_write+0x18/0x20
[   15.365719]  kasan_atomics_helper+0x224c/0x5450
[   15.365742]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.365765]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.365929]  ? ret_from_fork_asm+0x1a/0x30
[   15.365953]  ? kasan_atomics+0x152/0x310
[   15.365981]  kasan_atomics+0x1dc/0x310
[   15.366004]  ? __pfx_kasan_atomics+0x10/0x10
[   15.366030]  ? __pfx_read_tsc+0x10/0x10
[   15.366052]  ? ktime_get_ts64+0x86/0x230
[   15.366077]  kunit_try_run_case+0x1a5/0x480
[   15.366099]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.366120]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.366146]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.366171]  ? __kthread_parkme+0x82/0x180
[   15.366193]  ? preempt_count_sub+0x50/0x80
[   15.366217]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.366238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.366264]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.366290]  kthread+0x337/0x6f0
[   15.366309]  ? trace_preempt_on+0x20/0xc0
[   15.366332]  ? __pfx_kthread+0x10/0x10
[   15.366353]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.366377]  ? calculate_sigpending+0x7b/0xa0
[   15.366401]  ? __pfx_kthread+0x10/0x10
[   15.366423]  ret_from_fork+0x116/0x1d0
[   15.366443]  ? __pfx_kthread+0x10/0x10
[   15.366464]  ret_from_fork_asm+0x1a/0x30
[   15.366494]  </TASK>
[   15.366505] 
[   15.377014] Allocated by task 282:
[   15.377388]  kasan_save_stack+0x45/0x70
[   15.377704]  kasan_save_track+0x18/0x40
[   15.377850]  kasan_save_alloc_info+0x3b/0x50
[   15.378186]  __kasan_kmalloc+0xb7/0xc0
[   15.378498]  __kmalloc_cache_noprof+0x189/0x420
[   15.378702]  kasan_atomics+0x95/0x310
[   15.379003]  kunit_try_run_case+0x1a5/0x480
[   15.379195]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.379439]  kthread+0x337/0x6f0
[   15.379600]  ret_from_fork+0x116/0x1d0
[   15.380041]  ret_from_fork_asm+0x1a/0x30
[   15.380221] 
[   15.380293] The buggy address belongs to the object at ffff888102b49680
[   15.380293]  which belongs to the cache kmalloc-64 of size 64
[   15.380954] The buggy address is located 0 bytes to the right of
[   15.380954]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   15.381591] 
[   15.381855] The buggy address belongs to the physical page:
[   15.382077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.382525] flags: 0x200000000000000(node=0|zone=2)
[   15.382871] page_type: f5(slab)
[   15.383021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.383335] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.383878] page dumped because: kasan: bad access detected
[   15.384140] 
[   15.384217] Memory state around the buggy address:
[   15.384544]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.385022]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.385396] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.385790]                                      ^
[   15.385979]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.386287]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.386595] ==================================================================
[   15.303534] ==================================================================
[   15.303789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   15.304039] Read of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   15.304329] 
[   15.304415] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   15.304458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.304470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.304490] Call Trace:
[   15.304505]  <TASK>
[   15.304518]  dump_stack_lvl+0x73/0xb0
[   15.304543]  print_report+0xd1/0x650
[   15.304566]  ? __virt_addr_valid+0x1db/0x2d0
[   15.304589]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.304611]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.304635]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.304658]  kasan_report+0x141/0x180
[   15.304680]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.304709]  __asan_report_load8_noabort+0x18/0x20
[   15.304730]  kasan_atomics_helper+0x4fb2/0x5450
[   15.304753]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.304776]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.304800]  ? ret_from_fork_asm+0x1a/0x30
[   15.304823]  ? kasan_atomics+0x152/0x310
[   15.304850]  kasan_atomics+0x1dc/0x310
[   15.304874]  ? __pfx_kasan_atomics+0x10/0x10
[   15.304928]  ? __pfx_read_tsc+0x10/0x10
[   15.304951]  ? ktime_get_ts64+0x86/0x230
[   15.304975]  kunit_try_run_case+0x1a5/0x480
[   15.304998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.305018]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.306979]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.307010]  ? __kthread_parkme+0x82/0x180
[   15.307034]  ? preempt_count_sub+0x50/0x80
[   15.307061]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.307086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.307112]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.307138]  kthread+0x337/0x6f0
[   15.307159]  ? trace_preempt_on+0x20/0xc0
[   15.307183]  ? __pfx_kthread+0x10/0x10
[   15.307204]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.307228]  ? calculate_sigpending+0x7b/0xa0
[   15.307253]  ? __pfx_kthread+0x10/0x10
[   15.307276]  ret_from_fork+0x116/0x1d0
[   15.307295]  ? __pfx_kthread+0x10/0x10
[   15.307316]  ret_from_fork_asm+0x1a/0x30
[   15.307346]  </TASK>
[   15.307358] 
[   15.314142] Allocated by task 282:
[   15.314324]  kasan_save_stack+0x45/0x70
[   15.314518]  kasan_save_track+0x18/0x40
[   15.314712]  kasan_save_alloc_info+0x3b/0x50
[   15.314935]  __kasan_kmalloc+0xb7/0xc0
[   15.315097]  __kmalloc_cache_noprof+0x189/0x420
[   15.315272]  kasan_atomics+0x95/0x310
[   15.315465]  kunit_try_run_case+0x1a5/0x480
[   15.315677]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.315855]  kthread+0x337/0x6f0
[   15.316024]  ret_from_fork+0x116/0x1d0
[   15.316216]  ret_from_fork_asm+0x1a/0x30
[   15.316390] 
[   15.316462] The buggy address belongs to the object at ffff888102b49680
[   15.316462]  which belongs to the cache kmalloc-64 of size 64
[   15.317029] The buggy address is located 0 bytes to the right of
[   15.317029]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   15.317521] 
[   15.317619] The buggy address belongs to the physical page:
[   15.317844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.318163] flags: 0x200000000000000(node=0|zone=2)
[   15.318371] page_type: f5(slab)
[   15.318511] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.318853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.319168] page dumped because: kasan: bad access detected
[   15.319390] 
[   15.319480] Memory state around the buggy address:
[   15.319668]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.320046]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.320331] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.320603]                                      ^
[   15.320810]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.321118]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.321463] ==================================================================
[   13.908533] ==================================================================
[   13.908919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   13.909314] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   13.909648] 
[   13.909776] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.909818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.909831] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.909872] Call Trace:
[   13.909885]  <TASK>
[   13.909907]  dump_stack_lvl+0x73/0xb0
[   13.909998]  print_report+0xd1/0x650
[   13.910046]  ? __virt_addr_valid+0x1db/0x2d0
[   13.910071]  ? kasan_atomics_helper+0x3df/0x5450
[   13.910094]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.910118]  ? kasan_atomics_helper+0x3df/0x5450
[   13.910141]  kasan_report+0x141/0x180
[   13.910164]  ? kasan_atomics_helper+0x3df/0x5450
[   13.910208]  kasan_check_range+0x10c/0x1c0
[   13.910233]  __kasan_check_read+0x15/0x20
[   13.910254]  kasan_atomics_helper+0x3df/0x5450
[   13.910277]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.910301]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.910324]  ? ret_from_fork_asm+0x1a/0x30
[   13.910363]  ? kasan_atomics+0x152/0x310
[   13.910392]  kasan_atomics+0x1dc/0x310
[   13.910415]  ? __pfx_kasan_atomics+0x10/0x10
[   13.910441]  ? __pfx_read_tsc+0x10/0x10
[   13.910463]  ? ktime_get_ts64+0x86/0x230
[   13.910488]  kunit_try_run_case+0x1a5/0x480
[   13.910510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.910531]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.910557]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.910583]  ? __kthread_parkme+0x82/0x180
[   13.910604]  ? preempt_count_sub+0x50/0x80
[   13.910628]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.910668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.910694]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.910720]  kthread+0x337/0x6f0
[   13.910756]  ? trace_preempt_on+0x20/0xc0
[   13.910780]  ? __pfx_kthread+0x10/0x10
[   13.910802]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.910825]  ? calculate_sigpending+0x7b/0xa0
[   13.910850]  ? __pfx_kthread+0x10/0x10
[   13.910873]  ret_from_fork+0x116/0x1d0
[   13.910900]  ? __pfx_kthread+0x10/0x10
[   13.911023]  ret_from_fork_asm+0x1a/0x30
[   13.911057]  </TASK>
[   13.911070] 
[   13.919733] Allocated by task 282:
[   13.919974]  kasan_save_stack+0x45/0x70
[   13.920238]  kasan_save_track+0x18/0x40
[   13.920437]  kasan_save_alloc_info+0x3b/0x50
[   13.920730]  __kasan_kmalloc+0xb7/0xc0
[   13.920979]  __kmalloc_cache_noprof+0x189/0x420
[   13.921225]  kasan_atomics+0x95/0x310
[   13.921409]  kunit_try_run_case+0x1a5/0x480
[   13.921628]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.921856]  kthread+0x337/0x6f0
[   13.922088]  ret_from_fork+0x116/0x1d0
[   13.922276]  ret_from_fork_asm+0x1a/0x30
[   13.922458] 
[   13.922569] The buggy address belongs to the object at ffff888102b49680
[   13.922569]  which belongs to the cache kmalloc-64 of size 64
[   13.923211] The buggy address is located 0 bytes to the right of
[   13.923211]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   13.923644] 
[   13.923715] The buggy address belongs to the physical page:
[   13.923923] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   13.924485] flags: 0x200000000000000(node=0|zone=2)
[   13.924738] page_type: f5(slab)
[   13.924914] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.925254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.925534] page dumped because: kasan: bad access detected
[   13.925789] 
[   13.925884] Memory state around the buggy address:
[   13.926213]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.926514]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.926757] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.927107]                                      ^
[   13.927330]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.927691]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.928121] ==================================================================
[   14.319443] ==================================================================
[   14.319817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   14.320153] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.320469] 
[   14.320554] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.320598] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.320611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.320650] Call Trace:
[   14.320663]  <TASK>
[   14.320678]  dump_stack_lvl+0x73/0xb0
[   14.320702]  print_report+0xd1/0x650
[   14.320725]  ? __virt_addr_valid+0x1db/0x2d0
[   14.320749]  ? kasan_atomics_helper+0xd47/0x5450
[   14.320771]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.320795]  ? kasan_atomics_helper+0xd47/0x5450
[   14.320818]  kasan_report+0x141/0x180
[   14.320840]  ? kasan_atomics_helper+0xd47/0x5450
[   14.320867]  kasan_check_range+0x10c/0x1c0
[   14.320901]  __kasan_check_write+0x18/0x20
[   14.320923]  kasan_atomics_helper+0xd47/0x5450
[   14.320946]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.320988]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.321013]  ? ret_from_fork_asm+0x1a/0x30
[   14.321034]  ? kasan_atomics+0x152/0x310
[   14.321065]  kasan_atomics+0x1dc/0x310
[   14.321089]  ? __pfx_kasan_atomics+0x10/0x10
[   14.321114]  ? __pfx_read_tsc+0x10/0x10
[   14.321136]  ? ktime_get_ts64+0x86/0x230
[   14.321161]  kunit_try_run_case+0x1a5/0x480
[   14.321183]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.321204]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.321231]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.321255]  ? __kthread_parkme+0x82/0x180
[   14.321276]  ? preempt_count_sub+0x50/0x80
[   14.321301]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.321323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.321348]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.321374]  kthread+0x337/0x6f0
[   14.321394]  ? trace_preempt_on+0x20/0xc0
[   14.321417]  ? __pfx_kthread+0x10/0x10
[   14.321439]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.321462]  ? calculate_sigpending+0x7b/0xa0
[   14.321487]  ? __pfx_kthread+0x10/0x10
[   14.321509]  ret_from_fork+0x116/0x1d0
[   14.321528]  ? __pfx_kthread+0x10/0x10
[   14.321550]  ret_from_fork_asm+0x1a/0x30
[   14.321581]  </TASK>
[   14.321591] 
[   14.331552] Allocated by task 282:
[   14.331727]  kasan_save_stack+0x45/0x70
[   14.331933]  kasan_save_track+0x18/0x40
[   14.332200]  kasan_save_alloc_info+0x3b/0x50
[   14.332437]  __kasan_kmalloc+0xb7/0xc0
[   14.332636]  __kmalloc_cache_noprof+0x189/0x420
[   14.332854]  kasan_atomics+0x95/0x310
[   14.333057]  kunit_try_run_case+0x1a5/0x480
[   14.333268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.333514]  kthread+0x337/0x6f0
[   14.333748]  ret_from_fork+0x116/0x1d0
[   14.333918]  ret_from_fork_asm+0x1a/0x30
[   14.334238] 
[   14.334309] The buggy address belongs to the object at ffff888102b49680
[   14.334309]  which belongs to the cache kmalloc-64 of size 64
[   14.334683] The buggy address is located 0 bytes to the right of
[   14.334683]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.335062] 
[   14.335178] The buggy address belongs to the physical page:
[   14.335434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.335884] flags: 0x200000000000000(node=0|zone=2)
[   14.336424] page_type: f5(slab)
[   14.336622] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.337004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.337514] page dumped because: kasan: bad access detected
[   14.337795] 
[   14.337916] Memory state around the buggy address:
[   14.338172]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.338462]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.338714] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.338953]                                      ^
[   14.339202]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.339610]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.340007] ==================================================================
[   15.164005] ==================================================================
[   15.164317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   15.164545] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   15.164907] 
[   15.165045] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   15.165089] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.165101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.165123] Call Trace:
[   15.165135]  <TASK>
[   15.165148]  dump_stack_lvl+0x73/0xb0
[   15.165173]  print_report+0xd1/0x650
[   15.165197]  ? __virt_addr_valid+0x1db/0x2d0
[   15.165219]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.165242]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.165265]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.165288]  kasan_report+0x141/0x180
[   15.165311]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.165338]  kasan_check_range+0x10c/0x1c0
[   15.165363]  __kasan_check_write+0x18/0x20
[   15.165383]  kasan_atomics_helper+0x1eaa/0x5450
[   15.165406]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.165430]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.165454]  ? ret_from_fork_asm+0x1a/0x30
[   15.165476]  ? kasan_atomics+0x152/0x310
[   15.165503]  kasan_atomics+0x1dc/0x310
[   15.165527]  ? __pfx_kasan_atomics+0x10/0x10
[   15.165552]  ? __pfx_read_tsc+0x10/0x10
[   15.165573]  ? ktime_get_ts64+0x86/0x230
[   15.165597]  kunit_try_run_case+0x1a5/0x480
[   15.165640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.165661]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.165685]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.165710]  ? __kthread_parkme+0x82/0x180
[   15.165731]  ? preempt_count_sub+0x50/0x80
[   15.165755]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.165777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.165803]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.165828]  kthread+0x337/0x6f0
[   15.165848]  ? trace_preempt_on+0x20/0xc0
[   15.165870]  ? __pfx_kthread+0x10/0x10
[   15.165901]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.165924]  ? calculate_sigpending+0x7b/0xa0
[   15.165950]  ? __pfx_kthread+0x10/0x10
[   15.165973]  ret_from_fork+0x116/0x1d0
[   15.165992]  ? __pfx_kthread+0x10/0x10
[   15.166014]  ret_from_fork_asm+0x1a/0x30
[   15.166044]  </TASK>
[   15.166056] 
[   15.177118] Allocated by task 282:
[   15.177285]  kasan_save_stack+0x45/0x70
[   15.177481]  kasan_save_track+0x18/0x40
[   15.177928]  kasan_save_alloc_info+0x3b/0x50
[   15.178240]  __kasan_kmalloc+0xb7/0xc0
[   15.178608]  __kmalloc_cache_noprof+0x189/0x420
[   15.178980]  kasan_atomics+0x95/0x310
[   15.179168]  kunit_try_run_case+0x1a5/0x480
[   15.179365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.179595]  kthread+0x337/0x6f0
[   15.179761]  ret_from_fork+0x116/0x1d0
[   15.179943]  ret_from_fork_asm+0x1a/0x30
[   15.180127] 
[   15.180219] The buggy address belongs to the object at ffff888102b49680
[   15.180219]  which belongs to the cache kmalloc-64 of size 64
[   15.180698] The buggy address is located 0 bytes to the right of
[   15.180698]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   15.181839] 
[   15.182084] The buggy address belongs to the physical page:
[   15.182547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   15.183044] flags: 0x200000000000000(node=0|zone=2)
[   15.183445] page_type: f5(slab)
[   15.183672] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.184133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.184579] page dumped because: kasan: bad access detected
[   15.185008] 
[   15.185253] Memory state around the buggy address:
[   15.185459]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.185942]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.186238] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.186521]                                      ^
[   15.187099]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.187541]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.188058] ==================================================================
[   14.277964] ==================================================================
[   14.278530] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   14.279209] Write of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.279599] 
[   14.279797] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.279863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.279884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.279930] Call Trace:
[   14.279949]  <TASK>
[   14.279967]  dump_stack_lvl+0x73/0xb0
[   14.280014]  print_report+0xd1/0x650
[   14.280037]  ? __virt_addr_valid+0x1db/0x2d0
[   14.280061]  ? kasan_atomics_helper+0xc70/0x5450
[   14.280082]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.280106]  ? kasan_atomics_helper+0xc70/0x5450
[   14.280128]  kasan_report+0x141/0x180
[   14.280151]  ? kasan_atomics_helper+0xc70/0x5450
[   14.280178]  kasan_check_range+0x10c/0x1c0
[   14.280203]  __kasan_check_write+0x18/0x20
[   14.280223]  kasan_atomics_helper+0xc70/0x5450
[   14.280247]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.280269]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.280294]  ? ret_from_fork_asm+0x1a/0x30
[   14.280317]  ? kasan_atomics+0x152/0x310
[   14.280344]  kasan_atomics+0x1dc/0x310
[   14.280368]  ? __pfx_kasan_atomics+0x10/0x10
[   14.280393]  ? __pfx_read_tsc+0x10/0x10
[   14.280415]  ? ktime_get_ts64+0x86/0x230
[   14.280440]  kunit_try_run_case+0x1a5/0x480
[   14.280462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.280500]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.280527]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.280553]  ? __kthread_parkme+0x82/0x180
[   14.280574]  ? preempt_count_sub+0x50/0x80
[   14.280599]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.280637]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.280673]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.280699]  kthread+0x337/0x6f0
[   14.280719]  ? trace_preempt_on+0x20/0xc0
[   14.280743]  ? __pfx_kthread+0x10/0x10
[   14.280781]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.280811]  ? calculate_sigpending+0x7b/0xa0
[   14.280836]  ? __pfx_kthread+0x10/0x10
[   14.280871]  ret_from_fork+0x116/0x1d0
[   14.280890]  ? __pfx_kthread+0x10/0x10
[   14.280934]  ret_from_fork_asm+0x1a/0x30
[   14.280976]  </TASK>
[   14.280987] 
[   14.289818] Allocated by task 282:
[   14.290064]  kasan_save_stack+0x45/0x70
[   14.290274]  kasan_save_track+0x18/0x40
[   14.290471]  kasan_save_alloc_info+0x3b/0x50
[   14.290707]  __kasan_kmalloc+0xb7/0xc0
[   14.290972]  __kmalloc_cache_noprof+0x189/0x420
[   14.291220]  kasan_atomics+0x95/0x310
[   14.291432]  kunit_try_run_case+0x1a5/0x480
[   14.291745]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.291965]  kthread+0x337/0x6f0
[   14.292137]  ret_from_fork+0x116/0x1d0
[   14.292341]  ret_from_fork_asm+0x1a/0x30
[   14.292483] 
[   14.292557] The buggy address belongs to the object at ffff888102b49680
[   14.292557]  which belongs to the cache kmalloc-64 of size 64
[   14.292970] The buggy address is located 0 bytes to the right of
[   14.292970]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.293558] 
[   14.293658] The buggy address belongs to the physical page:
[   14.294014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.294256] flags: 0x200000000000000(node=0|zone=2)
[   14.294424] page_type: f5(slab)
[   14.294550] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.294782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.295443] page dumped because: kasan: bad access detected
[   14.296013] 
[   14.296111] Memory state around the buggy address:
[   14.296335]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.296660]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.297021] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.297590]                                      ^
[   14.298055]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.298470]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.298776] ==================================================================
[   13.868197] ==================================================================
[   13.868529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   13.868970] Read of size 4 at addr ffff888102b496b0 by task kunit_try_catch/282
[   13.869331] 
[   13.869443] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   13.869485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.869496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.869515] Call Trace:
[   13.869527]  <TASK>
[   13.869539]  dump_stack_lvl+0x73/0xb0
[   13.869564]  print_report+0xd1/0x650
[   13.869606]  ? __virt_addr_valid+0x1db/0x2d0
[   13.869648]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.869669]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.869691]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.869713]  kasan_report+0x141/0x180
[   13.869735]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.869779]  __asan_report_load4_noabort+0x18/0x20
[   13.869799]  kasan_atomics_helper+0x4b88/0x5450
[   13.869821]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.869858]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.869882]  ? ret_from_fork_asm+0x1a/0x30
[   13.869913]  ? kasan_atomics+0x152/0x310
[   13.869992]  kasan_atomics+0x1dc/0x310
[   13.870017]  ? __pfx_kasan_atomics+0x10/0x10
[   13.870041]  ? __pfx_read_tsc+0x10/0x10
[   13.870062]  ? ktime_get_ts64+0x86/0x230
[   13.870086]  kunit_try_run_case+0x1a5/0x480
[   13.870128]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.870147]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.870186]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.870225]  ? __kthread_parkme+0x82/0x180
[   13.870245]  ? preempt_count_sub+0x50/0x80
[   13.870268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.870289]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.870313]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.870337]  kthread+0x337/0x6f0
[   13.870357]  ? trace_preempt_on+0x20/0xc0
[   13.870378]  ? __pfx_kthread+0x10/0x10
[   13.870399]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.870421]  ? calculate_sigpending+0x7b/0xa0
[   13.870445]  ? __pfx_kthread+0x10/0x10
[   13.870466]  ret_from_fork+0x116/0x1d0
[   13.870484]  ? __pfx_kthread+0x10/0x10
[   13.870504]  ret_from_fork_asm+0x1a/0x30
[   13.870533]  </TASK>
[   13.870559] 
[   13.879166] Allocated by task 282:
[   13.879354]  kasan_save_stack+0x45/0x70
[   13.879583]  kasan_save_track+0x18/0x40
[   13.879783]  kasan_save_alloc_info+0x3b/0x50
[   13.880006]  __kasan_kmalloc+0xb7/0xc0
[   13.880173]  __kmalloc_cache_noprof+0x189/0x420
[   13.880381]  kasan_atomics+0x95/0x310
[   13.880653]  kunit_try_run_case+0x1a5/0x480
[   13.880861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.881212]  kthread+0x337/0x6f0
[   13.881387]  ret_from_fork+0x116/0x1d0
[   13.881550]  ret_from_fork_asm+0x1a/0x30
[   13.881786] 
[   13.881907] The buggy address belongs to the object at ffff888102b49680
[   13.881907]  which belongs to the cache kmalloc-64 of size 64
[   13.882454] The buggy address is located 0 bytes to the right of
[   13.882454]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   13.883115] 
[   13.883215] The buggy address belongs to the physical page:
[   13.883453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   13.883818] flags: 0x200000000000000(node=0|zone=2)
[   13.884315] page_type: f5(slab)
[   13.884535] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.885018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.885359] page dumped because: kasan: bad access detected
[   13.885604] 
[   13.885691] Memory state around the buggy address:
[   13.885840]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.886173]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.886519] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.886913]                                      ^
[   13.887228]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.887541]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.887870] ==================================================================
[   14.977751] ==================================================================
[   14.978231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   14.978885] Write of size 8 at addr ffff888102b496b0 by task kunit_try_catch/282
[   14.979431] 
[   14.979518] CPU: 0 UID: 0 PID: 282 Comm: kunit_try_catch Tainted: G    B            N  6.15.0-next-20250605 #1 PREEMPT(voluntary) 
[   14.979562] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.979575] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.979596] Call Trace:
[   14.979613]  <TASK>
[   14.979630]  dump_stack_lvl+0x73/0xb0
[   14.979654]  print_report+0xd1/0x650
[   14.979677]  ? __virt_addr_valid+0x1db/0x2d0
[   14.979701]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.979723]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.979747]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.979770]  kasan_report+0x141/0x180
[   14.979793]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.979820]  kasan_check_range+0x10c/0x1c0
[   14.979845]  __kasan_check_write+0x18/0x20
[   14.979866]  kasan_atomics_helper+0x19e3/0x5450
[   14.979890]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.979924]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.979960]  ? ret_from_fork_asm+0x1a/0x30
[   14.979983]  ? kasan_atomics+0x152/0x310
[   14.980010]  kasan_atomics+0x1dc/0x310
[   14.980035]  ? __pfx_kasan_atomics+0x10/0x10
[   14.980060]  ? __pfx_read_tsc+0x10/0x10
[   14.980083]  ? ktime_get_ts64+0x86/0x230
[   14.980108]  kunit_try_run_case+0x1a5/0x480
[   14.980130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.980151]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.980177]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.980203]  ? __kthread_parkme+0x82/0x180
[   14.980224]  ? preempt_count_sub+0x50/0x80
[   14.980249]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.980270]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.980295]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.980320]  kthread+0x337/0x6f0
[   14.980341]  ? trace_preempt_on+0x20/0xc0
[   14.980364]  ? __pfx_kthread+0x10/0x10
[   14.980385]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.980408]  ? calculate_sigpending+0x7b/0xa0
[   14.980433]  ? __pfx_kthread+0x10/0x10
[   14.980456]  ret_from_fork+0x116/0x1d0
[   14.980475]  ? __pfx_kthread+0x10/0x10
[   14.980496]  ret_from_fork_asm+0x1a/0x30
[   14.980527]  </TASK>
[   14.980538] 
[   14.988988] Allocated by task 282:
[   14.989134]  kasan_save_stack+0x45/0x70
[   14.989302]  kasan_save_track+0x18/0x40
[   14.989439]  kasan_save_alloc_info+0x3b/0x50
[   14.989588]  __kasan_kmalloc+0xb7/0xc0
[   14.989722]  __kmalloc_cache_noprof+0x189/0x420
[   14.990153]  kasan_atomics+0x95/0x310
[   14.990331]  kunit_try_run_case+0x1a5/0x480
[   14.990496]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.990751]  kthread+0x337/0x6f0
[   14.990911]  ret_from_fork+0x116/0x1d0
[   14.991617]  ret_from_fork_asm+0x1a/0x30
[   14.991782] 
[   14.991880] The buggy address belongs to the object at ffff888102b49680
[   14.991880]  which belongs to the cache kmalloc-64 of size 64
[   14.992418] The buggy address is located 0 bytes to the right of
[   14.992418]  allocated 48-byte region [ffff888102b49680, ffff888102b496b0)
[   14.993771] 
[   14.994187] The buggy address belongs to the physical page:
[   14.995063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102b49
[   14.996137] flags: 0x200000000000000(node=0|zone=2)
[   14.996445] page_type: f5(slab)
[   14.996598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.996947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.997318] page dumped because: kasan: bad access detected
[   14.997572] 
[   14.997716] Memory state around the buggy address:
[   14.997935]  ffff888102b49580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.998348]  ffff888102b49600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.998655] >ffff888102b49680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.999012]                                      ^
[   14.999202]  ffff888102b49700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.999456]  ffff888102b49780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.999863] ==================================================================