Hay
Date
June 16, 2025, 7:07 a.m.

Environment
qemu-arm64
qemu-x86_64

[   22.730525] ==================================================================
[   22.730604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   22.730684] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.730753] 
[   22.730804] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.731236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.731444] Hardware name: linux,dummy-virt (DT)
[   22.731660] Call trace:
[   22.731697]  show_stack+0x20/0x38 (C)
[   22.731865]  dump_stack_lvl+0x8c/0xd0
[   22.732114]  print_report+0x118/0x608
[   22.732295]  kasan_report+0xdc/0x128
[   22.732371]  kasan_check_range+0x100/0x1a8
[   22.732437]  __kasan_check_write+0x20/0x30
[   22.732496]  kasan_atomics_helper+0xe44/0x4858
[   22.732552]  kasan_atomics+0x198/0x2e0
[   22.732605]  kunit_try_run_case+0x170/0x3f0
[   22.732659]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.732719]  kthread+0x328/0x630
[   22.732768]  ret_from_fork+0x10/0x20
[   22.733248] 
[   22.733281] Allocated by task 274:
[   22.733320]  kasan_save_stack+0x3c/0x68
[   22.733506]  kasan_save_track+0x20/0x40
[   22.733561]  kasan_save_alloc_info+0x40/0x58
[   22.733769]  __kasan_kmalloc+0xd4/0xd8
[   22.733843]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.733905]  kasan_atomics+0xb8/0x2e0
[   22.733955]  kunit_try_run_case+0x170/0x3f0
[   22.734005]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.734214]  kthread+0x328/0x630
[   22.734436]  ret_from_fork+0x10/0x20
[   22.734503] 
[   22.734534] The buggy address belongs to the object at fff00000c63bc080
[   22.734534]  which belongs to the cache kmalloc-64 of size 64
[   22.734617] The buggy address is located 0 bytes to the right of
[   22.734617]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.734702] 
[   22.734732] The buggy address belongs to the physical page:
[   22.734773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.734849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.734916] page_type: f5(slab)
[   22.734968] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.735384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.735451] page dumped because: kasan: bad access detected
[   22.735618] 
[   22.735648] Memory state around the buggy address:
[   22.735693]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.735985]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.736118] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.736195]                                      ^
[   22.736460]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.736573]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.736625] ==================================================================
[   22.780148] ==================================================================
[   22.780233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   22.780417] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.780546] 
[   22.780593] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.780913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.781039] Hardware name: linux,dummy-virt (DT)
[   22.781081] Call trace:
[   22.781114]  show_stack+0x20/0x38 (C)
[   22.781172]  dump_stack_lvl+0x8c/0xd0
[   22.781333]  print_report+0x118/0x608
[   22.781436]  kasan_report+0xdc/0x128
[   22.781505]  kasan_check_range+0x100/0x1a8
[   22.781561]  __kasan_check_write+0x20/0x30
[   22.781612]  kasan_atomics_helper+0x1190/0x4858
[   22.781715]  kasan_atomics+0x198/0x2e0
[   22.781807]  kunit_try_run_case+0x170/0x3f0
[   22.781887]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.781951]  kthread+0x328/0x630
[   22.782181]  ret_from_fork+0x10/0x20
[   22.782259] 
[   22.782295] Allocated by task 274:
[   22.782333]  kasan_save_stack+0x3c/0x68
[   22.782385]  kasan_save_track+0x20/0x40
[   22.782431]  kasan_save_alloc_info+0x40/0x58
[   22.782548]  __kasan_kmalloc+0xd4/0xd8
[   22.782760]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.782966]  kasan_atomics+0xb8/0x2e0
[   22.783029]  kunit_try_run_case+0x170/0x3f0
[   22.783521]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.783671]  kthread+0x328/0x630
[   22.783785]  ret_from_fork+0x10/0x20
[   22.783858] 
[   22.783888] The buggy address belongs to the object at fff00000c63bc080
[   22.783888]  which belongs to the cache kmalloc-64 of size 64
[   22.783958] The buggy address is located 0 bytes to the right of
[   22.783958]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.784031] 
[   22.784059] The buggy address belongs to the physical page:
[   22.784100] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.784505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.784753] page_type: f5(slab)
[   22.784904] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.784967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.785093] page dumped because: kasan: bad access detected
[   22.785287] 
[   22.785424] Memory state around the buggy address:
[   22.785624]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.785849]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.786087] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.786168]                                      ^
[   22.786215]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.786285]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.786425] ==================================================================
[   22.744842] ==================================================================
[   22.744896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   22.744957] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.745016] 
[   22.745061] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.745241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.745277] Hardware name: linux,dummy-virt (DT)
[   22.745316] Call trace:
[   22.745373]  show_stack+0x20/0x38 (C)
[   22.745490]  dump_stack_lvl+0x8c/0xd0
[   22.745545]  print_report+0x118/0x608
[   22.745601]  kasan_report+0xdc/0x128
[   22.745656]  kasan_check_range+0x100/0x1a8
[   22.745717]  __kasan_check_write+0x20/0x30
[   22.745774]  kasan_atomics_helper+0xf20/0x4858
[   22.745856]  kasan_atomics+0x198/0x2e0
[   22.745920]  kunit_try_run_case+0x170/0x3f0
[   22.745981]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.746047]  kthread+0x328/0x630
[   22.746102]  ret_from_fork+0x10/0x20
[   22.746190] 
[   22.746217] Allocated by task 274:
[   22.746264]  kasan_save_stack+0x3c/0x68
[   22.746320]  kasan_save_track+0x20/0x40
[   22.746371]  kasan_save_alloc_info+0x40/0x58
[   22.746420]  __kasan_kmalloc+0xd4/0xd8
[   22.746468]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.746520]  kasan_atomics+0xb8/0x2e0
[   22.746565]  kunit_try_run_case+0x170/0x3f0
[   22.746615]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.746669]  kthread+0x328/0x630
[   22.746710]  ret_from_fork+0x10/0x20
[   22.746758] 
[   22.746788] The buggy address belongs to the object at fff00000c63bc080
[   22.746788]  which belongs to the cache kmalloc-64 of size 64
[   22.746884] The buggy address is located 0 bytes to the right of
[   22.746884]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.746960] 
[   22.746989] The buggy address belongs to the physical page:
[   22.747086] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.747162] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.747361] page_type: f5(slab)
[   22.747417] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.747483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.747736] page dumped because: kasan: bad access detected
[   22.747821] 
[   22.747922] Memory state around the buggy address:
[   22.747977]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.748040]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.748386] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.748456]                                      ^
[   22.748508]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.748577]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.748766] ==================================================================
[   22.794459] ==================================================================
[   22.794561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   22.794907] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.795046] 
[   22.795127] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.795312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.795373] Hardware name: linux,dummy-virt (DT)
[   22.795450] Call trace:
[   22.795480]  show_stack+0x20/0x38 (C)
[   22.795540]  dump_stack_lvl+0x8c/0xd0
[   22.795592]  print_report+0x118/0x608
[   22.795647]  kasan_report+0xdc/0x128
[   22.795701]  kasan_check_range+0x100/0x1a8
[   22.795754]  __kasan_check_write+0x20/0x30
[   22.795806]  kasan_atomics_helper+0x126c/0x4858
[   22.795876]  kasan_atomics+0x198/0x2e0
[   22.795930]  kunit_try_run_case+0x170/0x3f0
[   22.795986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.796047]  kthread+0x328/0x630
[   22.796107]  ret_from_fork+0x10/0x20
[   22.796204] 
[   22.796260] Allocated by task 274:
[   22.796297]  kasan_save_stack+0x3c/0x68
[   22.796347]  kasan_save_track+0x20/0x40
[   22.796393]  kasan_save_alloc_info+0x40/0x58
[   22.796438]  __kasan_kmalloc+0xd4/0xd8
[   22.796482]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.796528]  kasan_atomics+0xb8/0x2e0
[   22.796571]  kunit_try_run_case+0x170/0x3f0
[   22.796616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.796666]  kthread+0x328/0x630
[   22.796706]  ret_from_fork+0x10/0x20
[   22.796749] 
[   22.796777] The buggy address belongs to the object at fff00000c63bc080
[   22.796777]  which belongs to the cache kmalloc-64 of size 64
[   22.796852] The buggy address is located 0 bytes to the right of
[   22.796852]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.796928] 
[   22.796954] The buggy address belongs to the physical page:
[   22.796993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.797053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.797153] page_type: f5(slab)
[   22.797391] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.797655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.797949] page dumped because: kasan: bad access detected
[   22.798075] 
[   22.798191] Memory state around the buggy address:
[   22.798300]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.798359]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.798643] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.798731]                                      ^
[   22.798775]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.798889]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.798954] ==================================================================
[   22.764417] ==================================================================
[   22.764497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   22.764571] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.765029] 
[   22.765151] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.765340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.765461] Hardware name: linux,dummy-virt (DT)
[   22.765509] Call trace:
[   22.765677]  show_stack+0x20/0x38 (C)
[   22.765758]  dump_stack_lvl+0x8c/0xd0
[   22.765900]  print_report+0x118/0x608
[   22.765969]  kasan_report+0xdc/0x128
[   22.766031]  kasan_check_range+0x100/0x1a8
[   22.766093]  __kasan_check_write+0x20/0x30
[   22.766150]  kasan_atomics_helper+0x1058/0x4858
[   22.766210]  kasan_atomics+0x198/0x2e0
[   22.766269]  kunit_try_run_case+0x170/0x3f0
[   22.766329]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.766394]  kthread+0x328/0x630
[   22.766445]  ret_from_fork+0x10/0x20
[   22.766506] 
[   22.766535] Allocated by task 274:
[   22.766576]  kasan_save_stack+0x3c/0x68
[   22.766634]  kasan_save_track+0x20/0x40
[   22.766684]  kasan_save_alloc_info+0x40/0x58
[   22.766731]  __kasan_kmalloc+0xd4/0xd8
[   22.766779]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.766831]  kasan_atomics+0xb8/0x2e0
[   22.766911]  kunit_try_run_case+0x170/0x3f0
[   22.766963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.767020]  kthread+0x328/0x630
[   22.767086]  ret_from_fork+0x10/0x20
[   22.767174] 
[   22.767237] The buggy address belongs to the object at fff00000c63bc080
[   22.767237]  which belongs to the cache kmalloc-64 of size 64
[   22.767309] The buggy address is located 0 bytes to the right of
[   22.767309]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.767382] 
[   22.767410] The buggy address belongs to the physical page:
[   22.767449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.767507] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.767561] page_type: f5(slab)
[   22.767610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.767692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.767797] page dumped because: kasan: bad access detected
[   22.767856] 
[   22.767887] Memory state around the buggy address:
[   22.767932]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.767998]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.768093] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.768199]                                      ^
[   22.768259]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.768357]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.768419] ==================================================================
[   22.849915] ==================================================================
[   22.849992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   22.850068] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.850134] 
[   22.850183] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.850292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.850332] Hardware name: linux,dummy-virt (DT)
[   22.850374] Call trace:
[   22.850408]  show_stack+0x20/0x38 (C)
[   22.850471]  dump_stack_lvl+0x8c/0xd0
[   22.850531]  print_report+0x118/0x608
[   22.850592]  kasan_report+0xdc/0x128
[   22.850650]  __asan_report_load8_noabort+0x20/0x30
[   22.850712]  kasan_atomics_helper+0x3db0/0x4858
[   22.850775]  kasan_atomics+0x198/0x2e0
[   22.850833]  kunit_try_run_case+0x170/0x3f0
[   22.851622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.852191]  kthread+0x328/0x630
[   22.852307]  ret_from_fork+0x10/0x20
[   22.852630] 
[   22.852906] Allocated by task 274:
[   22.852961]  kasan_save_stack+0x3c/0x68
[   22.853020]  kasan_save_track+0x20/0x40
[   22.853163]  kasan_save_alloc_info+0x40/0x58
[   22.853213]  __kasan_kmalloc+0xd4/0xd8
[   22.853261]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.853349]  kasan_atomics+0xb8/0x2e0
[   22.853449]  kunit_try_run_case+0x170/0x3f0
[   22.853695]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.853815]  kthread+0x328/0x630
[   22.853910]  ret_from_fork+0x10/0x20
[   22.853965] 
[   22.853996] The buggy address belongs to the object at fff00000c63bc080
[   22.853996]  which belongs to the cache kmalloc-64 of size 64
[   22.854074] The buggy address is located 0 bytes to the right of
[   22.854074]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.854165] 
[   22.854195] The buggy address belongs to the physical page:
[   22.854240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.854309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.854370] page_type: f5(slab)
[   22.854426] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.854490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.854546] page dumped because: kasan: bad access detected
[   22.854590] 
[   22.854617] Memory state around the buggy address:
[   22.854661]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.854729]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.854803] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.854870]                                      ^
[   22.854936]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.855000]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.855052] ==================================================================
[   22.758637] ==================================================================
[   22.758715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   22.758785] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.758859] 
[   22.758903] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.759003] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.759035] Hardware name: linux,dummy-virt (DT)
[   22.759075] Call trace:
[   22.759106]  show_stack+0x20/0x38 (C)
[   22.759164]  dump_stack_lvl+0x8c/0xd0
[   22.759216]  print_report+0x118/0x608
[   22.759270]  kasan_report+0xdc/0x128
[   22.759322]  kasan_check_range+0x100/0x1a8
[   22.759379]  __kasan_check_write+0x20/0x30
[   22.759430]  kasan_atomics_helper+0xff0/0x4858
[   22.759485]  kasan_atomics+0x198/0x2e0
[   22.759537]  kunit_try_run_case+0x170/0x3f0
[   22.759592]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.759650]  kthread+0x328/0x630
[   22.759698]  ret_from_fork+0x10/0x20
[   22.759751] 
[   22.759778] Allocated by task 274:
[   22.759821]  kasan_save_stack+0x3c/0x68
[   22.760586]  kasan_save_track+0x20/0x40
[   22.760697]  kasan_save_alloc_info+0x40/0x58
[   22.760745]  __kasan_kmalloc+0xd4/0xd8
[   22.760790]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.761129]  kasan_atomics+0xb8/0x2e0
[   22.761206]  kunit_try_run_case+0x170/0x3f0
[   22.761445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.761535]  kthread+0x328/0x630
[   22.761585]  ret_from_fork+0x10/0x20
[   22.761632] 
[   22.761681] The buggy address belongs to the object at fff00000c63bc080
[   22.761681]  which belongs to the cache kmalloc-64 of size 64
[   22.761753] The buggy address is located 0 bytes to the right of
[   22.761753]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.761846] 
[   22.761881] The buggy address belongs to the physical page:
[   22.761926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.761993] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.762259] page_type: f5(slab)
[   22.762518] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.762598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.762659] page dumped because: kasan: bad access detected
[   22.762848] 
[   22.763078] Memory state around the buggy address:
[   22.763129]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.763188]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.763290] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.763345]                                      ^
[   22.763397]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.763615]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.763716] ==================================================================
[   22.749918] ==================================================================
[   22.749998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   22.750074] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.750164] 
[   22.750211] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.750530] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.750582] Hardware name: linux,dummy-virt (DT)
[   22.750622] Call trace:
[   22.750692]  show_stack+0x20/0x38 (C)
[   22.750811]  dump_stack_lvl+0x8c/0xd0
[   22.751231]  print_report+0x118/0x608
[   22.751294]  kasan_report+0xdc/0x128
[   22.751557]  kasan_check_range+0x100/0x1a8
[   22.751648]  __kasan_check_write+0x20/0x30
[   22.751711]  kasan_atomics_helper+0xf88/0x4858
[   22.751769]  kasan_atomics+0x198/0x2e0
[   22.751823]  kunit_try_run_case+0x170/0x3f0
[   22.751894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.751955]  kthread+0x328/0x630
[   22.752006]  ret_from_fork+0x10/0x20
[   22.752064] 
[   22.752090] Allocated by task 274:
[   22.752128]  kasan_save_stack+0x3c/0x68
[   22.752181]  kasan_save_track+0x20/0x40
[   22.752228]  kasan_save_alloc_info+0x40/0x58
[   22.752273]  __kasan_kmalloc+0xd4/0xd8
[   22.752318]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.752364]  kasan_atomics+0xb8/0x2e0
[   22.752408]  kunit_try_run_case+0x170/0x3f0
[   22.752455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.752504]  kthread+0x328/0x630
[   22.752544]  ret_from_fork+0x10/0x20
[   22.752587] 
[   22.752613] The buggy address belongs to the object at fff00000c63bc080
[   22.752613]  which belongs to the cache kmalloc-64 of size 64
[   22.754224] The buggy address is located 0 bytes to the right of
[   22.754224]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.754924] 
[   22.754967] The buggy address belongs to the physical page:
[   22.755429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.755515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.756009] page_type: f5(slab)
[   22.756168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.756545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.756603] page dumped because: kasan: bad access detected
[   22.756645] 
[   22.756674] Memory state around the buggy address:
[   22.756715]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.756769]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.756822] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.756886]                                      ^
[   22.756932]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.756985]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.757032] ==================================================================
[   22.787416] ==================================================================
[   22.787489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   22.787558] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.787618] 
[   22.787659] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.787761] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.787796] Hardware name: linux,dummy-virt (DT)
[   22.787845] Call trace:
[   22.787878]  show_stack+0x20/0x38 (C)
[   22.787938]  dump_stack_lvl+0x8c/0xd0
[   22.787990]  print_report+0x118/0x608
[   22.788045]  kasan_report+0xdc/0x128
[   22.788100]  kasan_check_range+0x100/0x1a8
[   22.788154]  __kasan_check_write+0x20/0x30
[   22.788206]  kasan_atomics_helper+0x11f8/0x4858
[   22.788263]  kasan_atomics+0x198/0x2e0
[   22.788313]  kunit_try_run_case+0x170/0x3f0
[   22.788368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.789130]  kthread+0x328/0x630
[   22.789376]  ret_from_fork+0x10/0x20
[   22.789476] 
[   22.789660] Allocated by task 274:
[   22.789749]  kasan_save_stack+0x3c/0x68
[   22.790000]  kasan_save_track+0x20/0x40
[   22.790299]  kasan_save_alloc_info+0x40/0x58
[   22.790553]  __kasan_kmalloc+0xd4/0xd8
[   22.790897]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.790951]  kasan_atomics+0xb8/0x2e0
[   22.790997]  kunit_try_run_case+0x170/0x3f0
[   22.791707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.791764]  kthread+0x328/0x630
[   22.792024]  ret_from_fork+0x10/0x20
[   22.792075] 
[   22.792104] The buggy address belongs to the object at fff00000c63bc080
[   22.792104]  which belongs to the cache kmalloc-64 of size 64
[   22.792171] The buggy address is located 0 bytes to the right of
[   22.792171]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.792243] 
[   22.792268] The buggy address belongs to the physical page:
[   22.792315] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.792416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.792469] page_type: f5(slab)
[   22.792517] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.792609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.792703] page dumped because: kasan: bad access detected
[   22.792770] 
[   22.792795] Memory state around the buggy address:
[   22.792842]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.792901]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.792952] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.792996]                                      ^
[   22.793035]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.793089]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.793133] ==================================================================
[   22.843941] ==================================================================
[   22.844019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   22.844093] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.844158] 
[   22.844206] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.844312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.844349] Hardware name: linux,dummy-virt (DT)
[   22.844389] Call trace:
[   22.844423]  show_stack+0x20/0x38 (C)
[   22.844483]  dump_stack_lvl+0x8c/0xd0
[   22.844540]  print_report+0x118/0x608
[   22.844598]  kasan_report+0xdc/0x128
[   22.844649]  kasan_check_range+0x100/0x1a8
[   22.844704]  __kasan_check_write+0x20/0x30
[   22.844757]  kasan_atomics_helper+0x15b4/0x4858
[   22.844832]  kasan_atomics+0x198/0x2e0
[   22.844902]  kunit_try_run_case+0x170/0x3f0
[   22.844958]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.845021]  kthread+0x328/0x630
[   22.845069]  ret_from_fork+0x10/0x20
[   22.845126] 
[   22.845154] Allocated by task 274:
[   22.845189]  kasan_save_stack+0x3c/0x68
[   22.845242]  kasan_save_track+0x20/0x40
[   22.845290]  kasan_save_alloc_info+0x40/0x58
[   22.845335]  __kasan_kmalloc+0xd4/0xd8
[   22.845380]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.845428]  kasan_atomics+0xb8/0x2e0
[   22.845474]  kunit_try_run_case+0x170/0x3f0
[   22.845522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.845577]  kthread+0x328/0x630
[   22.845619]  ret_from_fork+0x10/0x20
[   22.845666] 
[   22.845693] The buggy address belongs to the object at fff00000c63bc080
[   22.845693]  which belongs to the cache kmalloc-64 of size 64
[   22.845764] The buggy address is located 0 bytes to the right of
[   22.845764]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.846556] 
[   22.846610] The buggy address belongs to the physical page:
[   22.846668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.846952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.847200] page_type: f5(slab)
[   22.847256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.847324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.847377] page dumped because: kasan: bad access detected
[   22.847548] 
[   22.847597] Memory state around the buggy address:
[   22.847646]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.847977]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.848226] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.848283]                                      ^
[   22.848642]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.848898]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.848982] ==================================================================
[   22.894814] ==================================================================
[   22.894882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   22.894993] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.895097] 
[   22.895177] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.895347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.895407] Hardware name: linux,dummy-virt (DT)
[   22.895457] Call trace:
[   22.895487]  show_stack+0x20/0x38 (C)
[   22.895541]  dump_stack_lvl+0x8c/0xd0
[   22.895595]  print_report+0x118/0x608
[   22.895646]  kasan_report+0xdc/0x128
[   22.895697]  kasan_check_range+0x100/0x1a8
[   22.895750]  __kasan_check_write+0x20/0x30
[   22.895802]  kasan_atomics_helper+0x17ec/0x4858
[   22.895865]  kasan_atomics+0x198/0x2e0
[   22.895918]  kunit_try_run_case+0x170/0x3f0
[   22.895971]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.896102]  kthread+0x328/0x630
[   22.896161]  ret_from_fork+0x10/0x20
[   22.896217] 
[   22.896244] Allocated by task 274:
[   22.896279]  kasan_save_stack+0x3c/0x68
[   22.896328]  kasan_save_track+0x20/0x40
[   22.896374]  kasan_save_alloc_info+0x40/0x58
[   22.896416]  __kasan_kmalloc+0xd4/0xd8
[   22.896474]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.896553]  kasan_atomics+0xb8/0x2e0
[   22.896653]  kunit_try_run_case+0x170/0x3f0
[   22.896784]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.897028]  kthread+0x328/0x630
[   22.897070]  ret_from_fork+0x10/0x20
[   22.897113] 
[   22.897141] The buggy address belongs to the object at fff00000c63bc080
[   22.897141]  which belongs to the cache kmalloc-64 of size 64
[   22.897439] The buggy address is located 0 bytes to the right of
[   22.897439]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.897844] 
[   22.897893] The buggy address belongs to the physical page:
[   22.897940] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.898006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.898068] page_type: f5(slab)
[   22.898467] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.898636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.898798] page dumped because: kasan: bad access detected
[   22.898856] 
[   22.898895] Memory state around the buggy address:
[   22.899091]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.899364]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.899508] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.899561]                                      ^
[   22.899607]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.899815]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.899876] ==================================================================
[   22.875210] ==================================================================
[   22.875270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   22.875338] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.875415] 
[   22.875488] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.875663] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.875724] Hardware name: linux,dummy-virt (DT)
[   22.875777] Call trace:
[   22.875808]  show_stack+0x20/0x38 (C)
[   22.875887]  dump_stack_lvl+0x8c/0xd0
[   22.876000]  print_report+0x118/0x608
[   22.876052]  kasan_report+0xdc/0x128
[   22.876105]  __asan_report_load8_noabort+0x20/0x30
[   22.876159]  kasan_atomics_helper+0x3e10/0x4858
[   22.876211]  kasan_atomics+0x198/0x2e0
[   22.876264]  kunit_try_run_case+0x170/0x3f0
[   22.876318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.876385]  kthread+0x328/0x630
[   22.876476]  ret_from_fork+0x10/0x20
[   22.876563] 
[   22.876589] Allocated by task 274:
[   22.876625]  kasan_save_stack+0x3c/0x68
[   22.876718]  kasan_save_track+0x20/0x40
[   22.876850]  kasan_save_alloc_info+0x40/0x58
[   22.877130]  __kasan_kmalloc+0xd4/0xd8
[   22.877380]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.877441]  kasan_atomics+0xb8/0x2e0
[   22.877484]  kunit_try_run_case+0x170/0x3f0
[   22.877528]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.877578]  kthread+0x328/0x630
[   22.877941]  ret_from_fork+0x10/0x20
[   22.878002] 
[   22.878420] The buggy address belongs to the object at fff00000c63bc080
[   22.878420]  which belongs to the cache kmalloc-64 of size 64
[   22.878548] The buggy address is located 0 bytes to the right of
[   22.878548]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.878644] 
[   22.878676] The buggy address belongs to the physical page:
[   22.878715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.878775] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.878832] page_type: f5(slab)
[   22.878893] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.878952] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.879423] page dumped because: kasan: bad access detected
[   22.879479] 
[   22.879907] Memory state around the buggy address:
[   22.879996]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.880057]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.880308] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.880703]                                      ^
[   22.880761]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.880859]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.881033] ==================================================================
[   22.698185] ==================================================================
[   22.698262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   22.698344] Read of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.698413] 
[   22.698463] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.698575] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.698614] Hardware name: linux,dummy-virt (DT)
[   22.698658] Call trace:
[   22.698691]  show_stack+0x20/0x38 (C)
[   22.698757]  dump_stack_lvl+0x8c/0xd0
[   22.698817]  print_report+0x118/0x608
[   22.700508]  kasan_report+0xdc/0x128
[   22.701056]  __asan_report_load4_noabort+0x20/0x30
[   22.701565]  kasan_atomics_helper+0x3e04/0x4858
[   22.701910]  kasan_atomics+0x198/0x2e0
[   22.702497]  kunit_try_run_case+0x170/0x3f0
[   22.702597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.702673]  kthread+0x328/0x630
[   22.702729]  ret_from_fork+0x10/0x20
[   22.702794] 
[   22.702823] Allocated by task 274:
[   22.702882]  kasan_save_stack+0x3c/0x68
[   22.704295]  kasan_save_track+0x20/0x40
[   22.704368]  kasan_save_alloc_info+0x40/0x58
[   22.704418]  __kasan_kmalloc+0xd4/0xd8
[   22.704466]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.704517]  kasan_atomics+0xb8/0x2e0
[   22.704561]  kunit_try_run_case+0x170/0x3f0
[   22.704604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.704654]  kthread+0x328/0x630
[   22.704695]  ret_from_fork+0x10/0x20
[   22.704736] 
[   22.704766] The buggy address belongs to the object at fff00000c63bc080
[   22.704766]  which belongs to the cache kmalloc-64 of size 64
[   22.706393] The buggy address is located 0 bytes to the right of
[   22.706393]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.707073] 
[   22.707193] The buggy address belongs to the physical page:
[   22.707281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.707470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.707545] page_type: f5(slab)
[   22.707605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.707674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.707724] page dumped because: kasan: bad access detected
[   22.707762] 
[   22.707790] Memory state around the buggy address:
[   22.707828]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.707897]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.707950] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.707998]                                      ^
[   22.709560]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.710004]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.710067] ==================================================================
[   22.579748] ==================================================================
[   22.579822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   22.580216] Read of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.580293] 
[   22.580566] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.580691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.580943] Hardware name: linux,dummy-virt (DT)
[   22.581007] Call trace:
[   22.581039]  show_stack+0x20/0x38 (C)
[   22.581144]  dump_stack_lvl+0x8c/0xd0
[   22.581241]  print_report+0x118/0x608
[   22.581401]  kasan_report+0xdc/0x128
[   22.581623]  __asan_report_load4_noabort+0x20/0x30
[   22.581693]  kasan_atomics_helper+0x42d8/0x4858
[   22.581767]  kasan_atomics+0x198/0x2e0
[   22.582024]  kunit_try_run_case+0x170/0x3f0
[   22.582095]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.582207]  kthread+0x328/0x630
[   22.582263]  ret_from_fork+0x10/0x20
[   22.582362] 
[   22.582396] Allocated by task 274:
[   22.582436]  kasan_save_stack+0x3c/0x68
[   22.582494]  kasan_save_track+0x20/0x40
[   22.582545]  kasan_save_alloc_info+0x40/0x58
[   22.583879]  ret_from_fork+0x10/0x20
[   22.584227] 
[   22.584370] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.585165] Memory state around the buggy address:
[   22.585949]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.587807] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.588950]  __kasan_check_write+0x20/0x30
[   22.590333]  kasan_save_stack+0x3c/0x68
[   22.590683]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.590736]  kasan_atomics+0xb8/0x2e0
[   22.590784]  kunit_try_run_case+0x170/0x3f0
[   22.590847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.590911]  kthread+0x328/0x630
[   22.590956]  ret_from_fork+0x10/0x20
[   22.591028] 
[   22.591058] The buggy address belongs to the object at fff00000c63bc080
[   22.591058]  which belongs to the cache kmalloc-64 of size 64
[   22.591149] The buggy address is located 0 bytes to the right of
[   22.591149]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.591234] 
[   22.591275] The buggy address belongs to the physical page:
[   22.591324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.591391] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.591461] page_type: f5(slab)
[   22.591529] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.591594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.591647] page dumped because: kasan: bad access detected
[   22.591691] 
[   22.591725] Memory state around the buggy address:
[   22.591774]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.591830]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.591925] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.591974]                                      ^
[   22.592019]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.592458]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.592535] ==================================================================
[   22.741423] ==================================================================
[   22.741481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   22.741548] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.741609] 
[   22.741652] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.741759] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.741795] Hardware name: linux,dummy-virt (DT)
[   22.741860] Call trace:
[   22.741896]  show_stack+0x20/0x38 (C)
[   22.741959]  dump_stack_lvl+0x8c/0xd0
[   22.742021]  print_report+0x118/0x608
[   22.742081]  kasan_report+0xdc/0x128
[   22.742140]  kasan_check_range+0x100/0x1a8
[   22.742201]  __kasan_check_write+0x20/0x30
[   22.742260]  kasan_atomics_helper+0xeb8/0x4858
[   22.742320]  kasan_atomics+0x198/0x2e0
[   22.742375]  kunit_try_run_case+0x170/0x3f0
[   22.742434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.742498]  kthread+0x328/0x630
[   22.742547]  ret_from_fork+0x10/0x20
[   22.742608] 
[   22.742635] Allocated by task 274:
[   22.742674]  kasan_save_stack+0x3c/0x68
[   22.742730]  kasan_save_track+0x20/0x40
[   22.742781]  kasan_save_alloc_info+0x40/0x58
[   22.742832]  __kasan_kmalloc+0xd4/0xd8
[   22.742928]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.742982]  kasan_atomics+0xb8/0x2e0
[   22.743243]  kunit_try_run_case+0x170/0x3f0
[   22.743304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.743361]  kthread+0x328/0x630
[   22.743405]  ret_from_fork+0x10/0x20
[   22.743452] 
[   22.743480] The buggy address belongs to the object at fff00000c63bc080
[   22.743480]  which belongs to the cache kmalloc-64 of size 64
[   22.743552] The buggy address is located 0 bytes to the right of
[   22.743552]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.743629] 
[   22.743657] The buggy address belongs to the physical page:
[   22.743751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.743821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.743896] page_type: f5(slab)
[   22.743948] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.744050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.744144] page dumped because: kasan: bad access detected
[   22.744219] 
[   22.744275] Memory state around the buggy address:
[   22.744342]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.744451]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.744507] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.744557]                                      ^
[   22.744600]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.744657]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.744706] ==================================================================
[   22.737776] ==================================================================
[   22.737881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   22.737964] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.738033] 
[   22.738082] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.738189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.738229] Hardware name: linux,dummy-virt (DT)
[   22.738274] Call trace:
[   22.738307]  show_stack+0x20/0x38 (C)
[   22.738373]  dump_stack_lvl+0x8c/0xd0
[   22.738435]  print_report+0x118/0x608
[   22.738496]  kasan_report+0xdc/0x128
[   22.738563]  __asan_report_store8_noabort+0x20/0x30
[   22.738678]  kasan_atomics_helper+0x3e5c/0x4858
[   22.738786]  kasan_atomics+0x198/0x2e0
[   22.738919]  kunit_try_run_case+0x170/0x3f0
[   22.738983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.739049]  kthread+0x328/0x630
[   22.739104]  ret_from_fork+0x10/0x20
[   22.739167] 
[   22.739194] Allocated by task 274:
[   22.739237]  kasan_save_stack+0x3c/0x68
[   22.739292]  kasan_save_track+0x20/0x40
[   22.739339]  kasan_save_alloc_info+0x40/0x58
[   22.739384]  __kasan_kmalloc+0xd4/0xd8
[   22.739436]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.739520]  kasan_atomics+0xb8/0x2e0
[   22.739564]  kunit_try_run_case+0x170/0x3f0
[   22.739610]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.739701]  kthread+0x328/0x630
[   22.739777]  ret_from_fork+0x10/0x20
[   22.739859] 
[   22.739887] The buggy address belongs to the object at fff00000c63bc080
[   22.739887]  which belongs to the cache kmalloc-64 of size 64
[   22.739955] The buggy address is located 0 bytes to the right of
[   22.739955]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.740026] 
[   22.740052] The buggy address belongs to the physical page:
[   22.740092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.740153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.740213] page_type: f5(slab)
[   22.740311] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.740377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.740427] page dumped because: kasan: bad access detected
[   22.740467] 
[   22.740490] Memory state around the buggy address:
[   22.740532]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.740597]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.740675] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.740722]                                      ^
[   22.740765]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.740871]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.740922] ==================================================================
[   22.594200] ==================================================================
[   22.594283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   22.594358] Write of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.594422] 
[   22.594467] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.594574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.594609] Hardware name: linux,dummy-virt (DT)
[   22.594651] Call trace:
[   22.594685]  show_stack+0x20/0x38 (C)
[   22.594747]  dump_stack_lvl+0x8c/0xd0
[   22.594805]  print_report+0x118/0x608
[   22.594882]  kasan_report+0xdc/0x128
[   22.596118]  kasan_check_range+0x100/0x1a8
[   22.596230]  __kasan_check_write+0x20/0x30
[   22.596511]  kasan_atomics_helper+0x99c/0x4858
[   22.596611]  kasan_atomics+0x198/0x2e0
[   22.596677]  kunit_try_run_case+0x170/0x3f0
[   22.596955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.597057]  kthread+0x328/0x630
[   22.597144]  ret_from_fork+0x10/0x20
[   22.597211] 
[   22.597455] Allocated by task 274:
[   22.597519]  kasan_save_stack+0x3c/0x68
[   22.597589]  kasan_save_track+0x20/0x40
[   22.597652]  kasan_save_alloc_info+0x40/0x58
[   22.597699]  __kasan_kmalloc+0xd4/0xd8
[   22.597754]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.597803]  kasan_atomics+0xb8/0x2e0
[   22.598106]  kunit_try_run_case+0x170/0x3f0
[   22.598208]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.598481]  kthread+0x328/0x630
[   22.598539]  ret_from_fork+0x10/0x20
[   22.598846] 
[   22.598975] The buggy address belongs to the object at fff00000c63bc080
[   22.598975]  which belongs to the cache kmalloc-64 of size 64
[   22.599072] The buggy address is located 0 bytes to the right of
[   22.599072]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.599146] 
[   22.599305] The buggy address belongs to the physical page:
[   22.599502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.600441]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.600802]                                      ^
[   22.601134]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.603470] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.604628]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.606851] The buggy address is located 0 bytes to the right of
[   22.606851]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.607000] 
[   22.607032] The buggy address belongs to the physical page:
[   22.607614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.608137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.608276] page_type: f5(slab)
[   22.608441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.608523] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.608576] page dumped because: kasan: bad access detected
[   22.608617] 
[   22.608642] Memory state around the buggy address:
[   22.608945]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.609139]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.609223] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.609275]                                      ^
[   22.609469]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.609530]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.609582] ==================================================================
[   22.723352] ==================================================================
[   22.723429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   22.723499] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.723561] 
[   22.723613] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.723712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.723747] Hardware name: linux,dummy-virt (DT)
[   22.723787] Call trace:
[   22.723818]  show_stack+0x20/0x38 (C)
[   22.723898]  dump_stack_lvl+0x8c/0xd0
[   22.723957]  print_report+0x118/0x608
[   22.724013]  kasan_report+0xdc/0x128
[   22.724070]  __asan_report_load8_noabort+0x20/0x30
[   22.724595]  kasan_atomics_helper+0x3f58/0x4858
[   22.724939]  kasan_atomics+0x198/0x2e0
[   22.725016]  kunit_try_run_case+0x170/0x3f0
[   22.725122]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.725337]  kthread+0x328/0x630
[   22.725406]  ret_from_fork+0x10/0x20
[   22.725659] 
[   22.725695] Allocated by task 274:
[   22.725743]  kasan_save_stack+0x3c/0x68
[   22.725822]  kasan_save_track+0x20/0x40
[   22.725892]  kasan_save_alloc_info+0x40/0x58
[   22.725944]  __kasan_kmalloc+0xd4/0xd8
[   22.726104]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.726207]  kasan_atomics+0xb8/0x2e0
[   22.726475]  kunit_try_run_case+0x170/0x3f0
[   22.726616]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.726715]  kthread+0x328/0x630
[   22.726762]  ret_from_fork+0x10/0x20
[   22.726808] 
[   22.726889] The buggy address belongs to the object at fff00000c63bc080
[   22.726889]  which belongs to the cache kmalloc-64 of size 64
[   22.726967] The buggy address is located 0 bytes to the right of
[   22.726967]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.727047] 
[   22.727080] The buggy address belongs to the physical page:
[   22.727225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.727520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.727587] page_type: f5(slab)
[   22.727689] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.727815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.727922] page dumped because: kasan: bad access detected
[   22.727998] 
[   22.728044] Memory state around the buggy address:
[   22.728089]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.728147]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.728204] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.728254]                                      ^
[   22.728554]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.728633]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.728753] ==================================================================
[   22.863314] ==================================================================
[   22.863384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   22.863454] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.863515] 
[   22.863561] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.863661] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.863695] Hardware name: linux,dummy-virt (DT)
[   22.863736] Call trace:
[   22.863766]  show_stack+0x20/0x38 (C)
[   22.863826]  dump_stack_lvl+0x8c/0xd0
[   22.864954]  print_report+0x118/0x608
[   22.865087]  kasan_report+0xdc/0x128
[   22.865149]  __asan_report_load8_noabort+0x20/0x30
[   22.865205]  kasan_atomics_helper+0x3df4/0x4858
[   22.865274]  kasan_atomics+0x198/0x2e0
[   22.865353]  kunit_try_run_case+0x170/0x3f0
[   22.865425]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.865519]  kthread+0x328/0x630
[   22.865592]  ret_from_fork+0x10/0x20
[   22.865654] 
[   22.865749] Allocated by task 274:
[   22.865792]  kasan_save_stack+0x3c/0x68
[   22.865872]  kasan_save_track+0x20/0x40
[   22.865936]  kasan_save_alloc_info+0x40/0x58
[   22.866002]  __kasan_kmalloc+0xd4/0xd8
[   22.866059]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.866194]  kasan_atomics+0xb8/0x2e0
[   22.866248]  kunit_try_run_case+0x170/0x3f0
[   22.866298]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.866354]  kthread+0x328/0x630
[   22.866398]  ret_from_fork+0x10/0x20
[   22.866444] 
[   22.866473] The buggy address belongs to the object at fff00000c63bc080
[   22.866473]  which belongs to the cache kmalloc-64 of size 64
[   22.867426] The buggy address is located 0 bytes to the right of
[   22.867426]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.867542] 
[   22.867722] The buggy address belongs to the physical page:
[   22.867886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.868008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.868221] page_type: f5(slab)
[   22.868341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.868819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.868887] page dumped because: kasan: bad access detected
[   22.869014] 
[   22.869111] Memory state around the buggy address:
[   22.869326]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.869386]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.869439] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.869485]                                      ^
[   22.869527]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.869599]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.869644] ==================================================================
[   22.822688] ==================================================================
[   22.822978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   22.823060] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.823320] 
[   22.823580] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.823979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.824022] Hardware name: linux,dummy-virt (DT)
[   22.824068] Call trace:
[   22.824254]  show_stack+0x20/0x38 (C)
[   22.824343]  dump_stack_lvl+0x8c/0xd0
[   22.824492]  print_report+0x118/0x608
[   22.824549]  kasan_report+0xdc/0x128
[   22.824798]  kasan_check_range+0x100/0x1a8
[   22.824969]  __kasan_check_write+0x20/0x30
[   22.825030]  kasan_atomics_helper+0x147c/0x4858
[   22.825376]  kasan_atomics+0x198/0x2e0
[   22.825469]  kunit_try_run_case+0x170/0x3f0
[   22.825530]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.825639]  kthread+0x328/0x630
[   22.825709]  ret_from_fork+0x10/0x20
[   22.825771] 
[   22.825801] Allocated by task 274:
[   22.825862]  kasan_save_stack+0x3c/0x68
[   22.825929]  kasan_save_track+0x20/0x40
[   22.825982]  kasan_save_alloc_info+0x40/0x58
[   22.826032]  __kasan_kmalloc+0xd4/0xd8
[   22.826083]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.826175]  kasan_atomics+0xb8/0x2e0
[   22.826251]  kunit_try_run_case+0x170/0x3f0
[   22.826317]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.826374]  kthread+0x328/0x630
[   22.826417]  ret_from_fork+0x10/0x20
[   22.826463] 
[   22.827985] The buggy address belongs to the object at fff00000c63bc080
[   22.827985]  which belongs to the cache kmalloc-64 of size 64
[   22.828175] The buggy address is located 0 bytes to the right of
[   22.828175]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.828539] 
[   22.828873] The buggy address belongs to the physical page:
[   22.829018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.829098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.829356] page_type: f5(slab)
[   22.829513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.829596] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.829653] page dumped because: kasan: bad access detected
[   22.829698] 
[   22.829725] Memory state around the buggy address:
[   22.829769]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.829899]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.830294] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.830442]                                      ^
[   22.830497]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.830631]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.830696] ==================================================================
[   22.679674] ==================================================================
[   22.679744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   22.681588] Write of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.682492] 
[   22.682787] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.683415] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.683592] Hardware name: linux,dummy-virt (DT)
[   22.683866] Call trace:
[   22.684172]  show_stack+0x20/0x38 (C)
[   22.684311]  dump_stack_lvl+0x8c/0xd0
[   22.684374]  print_report+0x118/0x608
[   22.685318]  kasan_report+0xdc/0x128
[   22.685574]  kasan_check_range+0x100/0x1a8
[   22.685646]  __kasan_check_write+0x20/0x30
[   22.685707]  kasan_atomics_helper+0xd3c/0x4858
[   22.685770]  kasan_atomics+0x198/0x2e0
[   22.686892]  kunit_try_run_case+0x170/0x3f0
[   22.687058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.687130]  kthread+0x328/0x630
[   22.687187]  ret_from_fork+0x10/0x20
[   22.687248] 
[   22.687279] Allocated by task 274:
[   22.688413]  kasan_save_stack+0x3c/0x68
[   22.688494]  kasan_save_track+0x20/0x40
[   22.688549]  kasan_save_alloc_info+0x40/0x58
[   22.689245]  __kasan_kmalloc+0xd4/0xd8
[   22.689333]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.689400]  kasan_atomics+0xb8/0x2e0
[   22.690063]  kunit_try_run_case+0x170/0x3f0
[   22.690268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.690329]  kthread+0x328/0x630
[   22.690377]  ret_from_fork+0x10/0x20
[   22.690426] 
[   22.691134] The buggy address belongs to the object at fff00000c63bc080
[   22.691134]  which belongs to the cache kmalloc-64 of size 64
[   22.691382] The buggy address is located 0 bytes to the right of
[   22.691382]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.691950] 
[   22.692347] The buggy address belongs to the physical page:
[   22.692455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.692661] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.692973] page_type: f5(slab)
[   22.693236] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.693511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.693705] page dumped because: kasan: bad access detected
[   22.693991] 
[   22.694149] Memory state around the buggy address:
[   22.694235]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.694303]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.694689] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.695212]                                      ^
[   22.695324]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.695386]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.695445] ==================================================================
[   22.711958] ==================================================================
[   22.712042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   22.712116] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.712182] 
[   22.712231] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.712342] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.712381] Hardware name: linux,dummy-virt (DT)
[   22.712424] Call trace:
[   22.712458]  show_stack+0x20/0x38 (C)
[   22.712523]  dump_stack_lvl+0x8c/0xd0
[   22.712585]  print_report+0x118/0x608
[   22.712642]  kasan_report+0xdc/0x128
[   22.712700]  kasan_check_range+0x100/0x1a8
[   22.712762]  __kasan_check_read+0x20/0x30
[   22.712818]  kasan_atomics_helper+0xdd4/0x4858
[   22.714746]  kasan_atomics+0x198/0x2e0
[   22.714822]  kunit_try_run_case+0x170/0x3f0
[   22.715494]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.715974]  kthread+0x328/0x630
[   22.716286]  ret_from_fork+0x10/0x20
[   22.716915] 
[   22.717231] Allocated by task 274:
[   22.717711]  kasan_save_stack+0x3c/0x68
[   22.718574]  kasan_save_track+0x20/0x40
[   22.718789]  kasan_save_alloc_info+0x40/0x58
[   22.719273]  __kasan_kmalloc+0xd4/0xd8
[   22.719363]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.719455]  kasan_atomics+0xb8/0x2e0
[   22.719698]  kunit_try_run_case+0x170/0x3f0
[   22.719916]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.719972]  kthread+0x328/0x630
[   22.720135]  ret_from_fork+0x10/0x20
[   22.720267] 
[   22.720341] The buggy address belongs to the object at fff00000c63bc080
[   22.720341]  which belongs to the cache kmalloc-64 of size 64
[   22.720414] The buggy address is located 0 bytes to the right of
[   22.720414]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.720485] 
[   22.720513] The buggy address belongs to the physical page:
[   22.720555] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.720616] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.720675] page_type: f5(slab)
[   22.720726] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.720938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.721004] page dumped because: kasan: bad access detected
[   22.721046] 
[   22.721178] Memory state around the buggy address:
[   22.721257]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.721416]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.721473] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.721663]                                      ^
[   22.721718]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.721932]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.722006] ==================================================================
[   22.807589] ==================================================================
[   22.807664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   22.807735] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.807982] 
[   22.808058] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.808186] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.808224] Hardware name: linux,dummy-virt (DT)
[   22.808268] Call trace:
[   22.808301]  show_stack+0x20/0x38 (C)
[   22.808374]  dump_stack_lvl+0x8c/0xd0
[   22.808432]  print_report+0x118/0x608
[   22.808491]  kasan_report+0xdc/0x128
[   22.808547]  kasan_check_range+0x100/0x1a8
[   22.808606]  __kasan_check_write+0x20/0x30
[   22.808663]  kasan_atomics_helper+0x1384/0x4858
[   22.808722]  kasan_atomics+0x198/0x2e0
[   22.808782]  kunit_try_run_case+0x170/0x3f0
[   22.808858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.808925]  kthread+0x328/0x630
[   22.808973]  ret_from_fork+0x10/0x20
[   22.809032] 
[   22.809061] Allocated by task 274:
[   22.809096]  kasan_save_stack+0x3c/0x68
[   22.809150]  kasan_save_track+0x20/0x40
[   22.809197]  kasan_save_alloc_info+0x40/0x58
[   22.809241]  __kasan_kmalloc+0xd4/0xd8
[   22.809286]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.809333]  kasan_atomics+0xb8/0x2e0
[   22.809379]  kunit_try_run_case+0x170/0x3f0
[   22.809426]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.809477]  kthread+0x328/0x630
[   22.809520]  ret_from_fork+0x10/0x20
[   22.809565] 
[   22.809591] The buggy address belongs to the object at fff00000c63bc080
[   22.809591]  which belongs to the cache kmalloc-64 of size 64
[   22.809660] The buggy address is located 0 bytes to the right of
[   22.809660]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.809739] 
[   22.809767] The buggy address belongs to the physical page:
[   22.810324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.810407] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.810591] page_type: f5(slab)
[   22.810657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.810981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.811048] page dumped because: kasan: bad access detected
[   22.811092] 
[   22.811262] Memory state around the buggy address:
[   22.811313]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.811370]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.811423] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.811512]                                      ^
[   22.811567]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.811618]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.811663] ==================================================================
[   22.817251] ==================================================================
[   22.817457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   22.817528] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.817609] 
[   22.817654] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.817751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.817782] Hardware name: linux,dummy-virt (DT)
[   22.817844] Call trace:
[   22.817881]  show_stack+0x20/0x38 (C)
[   22.818175]  dump_stack_lvl+0x8c/0xd0
[   22.818255]  print_report+0x118/0x608
[   22.818317]  kasan_report+0xdc/0x128
[   22.818752]  kasan_check_range+0x100/0x1a8
[   22.818865]  __kasan_check_write+0x20/0x30
[   22.818936]  kasan_atomics_helper+0x1414/0x4858
[   22.818998]  kasan_atomics+0x198/0x2e0
[   22.819050]  kunit_try_run_case+0x170/0x3f0
[   22.819106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.819165]  kthread+0x328/0x630
[   22.819214]  ret_from_fork+0x10/0x20
[   22.819270] 
[   22.819298] Allocated by task 274:
[   22.819333]  kasan_save_stack+0x3c/0x68
[   22.819384]  kasan_save_track+0x20/0x40
[   22.819430]  kasan_save_alloc_info+0x40/0x58
[   22.819474]  __kasan_kmalloc+0xd4/0xd8
[   22.819517]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.819562]  kasan_atomics+0xb8/0x2e0
[   22.819604]  kunit_try_run_case+0x170/0x3f0
[   22.819650]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.819701]  kthread+0x328/0x630
[   22.819740]  ret_from_fork+0x10/0x20
[   22.819783] 
[   22.819808] The buggy address belongs to the object at fff00000c63bc080
[   22.819808]  which belongs to the cache kmalloc-64 of size 64
[   22.819886] The buggy address is located 0 bytes to the right of
[   22.819886]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.819960] 
[   22.819986] The buggy address belongs to the physical page:
[   22.820026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.820083] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.820138] page_type: f5(slab)
[   22.820185] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.820247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.820295] page dumped because: kasan: bad access detected
[   22.820334] 
[   22.820358] Memory state around the buggy address:
[   22.820398]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.820450]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.820500] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.820545]                                      ^
[   22.820588]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.820640]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.820686] ==================================================================
[   22.870856] ==================================================================
[   22.870983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   22.871065] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.871130] 
[   22.871175] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.871276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.871311] Hardware name: linux,dummy-virt (DT)
[   22.871349] Call trace:
[   22.871382]  show_stack+0x20/0x38 (C)
[   22.871440]  dump_stack_lvl+0x8c/0xd0
[   22.871495]  print_report+0x118/0x608
[   22.871549]  kasan_report+0xdc/0x128
[   22.871603]  kasan_check_range+0x100/0x1a8
[   22.871660]  __kasan_check_write+0x20/0x30
[   22.871711]  kasan_atomics_helper+0x16d0/0x4858
[   22.871768]  kasan_atomics+0x198/0x2e0
[   22.871824]  kunit_try_run_case+0x170/0x3f0
[   22.871943]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.872211]  kthread+0x328/0x630
[   22.872296]  ret_from_fork+0x10/0x20
[   22.872358] 
[   22.872386] Allocated by task 274:
[   22.872423]  kasan_save_stack+0x3c/0x68
[   22.872475]  kasan_save_track+0x20/0x40
[   22.872521]  kasan_save_alloc_info+0x40/0x58
[   22.872564]  __kasan_kmalloc+0xd4/0xd8
[   22.872607]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.872653]  kasan_atomics+0xb8/0x2e0
[   22.872695]  kunit_try_run_case+0x170/0x3f0
[   22.872738]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.872788]  kthread+0x328/0x630
[   22.872825]  ret_from_fork+0x10/0x20
[   22.872887] 
[   22.872913] The buggy address belongs to the object at fff00000c63bc080
[   22.872913]  which belongs to the cache kmalloc-64 of size 64
[   22.872978] The buggy address is located 0 bytes to the right of
[   22.872978]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.873047] 
[   22.873075] The buggy address belongs to the physical page:
[   22.873112] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.873171] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.873226] page_type: f5(slab)
[   22.873270] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.873327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.873375] page dumped because: kasan: bad access detected
[   22.873413] 
[   22.873436] Memory state around the buggy address:
[   22.873474]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.873523]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.873692] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.873884]                                      ^
[   22.873946]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.874004]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.874604] ==================================================================
[   22.836736] ==================================================================
[   22.836866] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   22.836952] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.837017] 
[   22.837063] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.837981] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.838023] Hardware name: linux,dummy-virt (DT)
[   22.838066] Call trace:
[   22.838102]  show_stack+0x20/0x38 (C)
[   22.838168]  dump_stack_lvl+0x8c/0xd0
[   22.838229]  print_report+0x118/0x608
[   22.838290]  kasan_report+0xdc/0x128
[   22.838348]  kasan_check_range+0x100/0x1a8
[   22.838409]  __kasan_check_write+0x20/0x30
[   22.838468]  kasan_atomics_helper+0x154c/0x4858
[   22.838530]  kasan_atomics+0x198/0x2e0
[   22.838590]  kunit_try_run_case+0x170/0x3f0
[   22.838652]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.838720]  kthread+0x328/0x630
[   22.838773]  ret_from_fork+0x10/0x20
[   22.838852] 
[   22.838889] Allocated by task 274:
[   22.838930]  kasan_save_stack+0x3c/0x68
[   22.838990]  kasan_save_track+0x20/0x40
[   22.839043]  kasan_save_alloc_info+0x40/0x58
[   22.839162]  __kasan_kmalloc+0xd4/0xd8
[   22.839477]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.839590]  kasan_atomics+0xb8/0x2e0
[   22.839645]  kunit_try_run_case+0x170/0x3f0
[   22.839700]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.839758]  kthread+0x328/0x630
[   22.839805]  ret_from_fork+0x10/0x20
[   22.839868] 
[   22.839900] The buggy address belongs to the object at fff00000c63bc080
[   22.839900]  which belongs to the cache kmalloc-64 of size 64
[   22.839976] The buggy address is located 0 bytes to the right of
[   22.839976]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.840969] 
[   22.841013] The buggy address belongs to the physical page:
[   22.841063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.841142] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.841514] page_type: f5(slab)
[   22.841613] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.841877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.841977] page dumped because: kasan: bad access detected
[   22.842035] 
[   22.842067] Memory state around the buggy address:
[   22.842151]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.842333]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.842454] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.842506]                                      ^
[   22.842738]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.842816]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.842883] ==================================================================
[   22.888082] ==================================================================
[   22.888206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   22.888334] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.888394] 
[   22.888435] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.888532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.888564] Hardware name: linux,dummy-virt (DT)
[   22.888603] Call trace:
[   22.888631]  show_stack+0x20/0x38 (C)
[   22.888692]  dump_stack_lvl+0x8c/0xd0
[   22.888742]  print_report+0x118/0x608
[   22.888817]  kasan_report+0xdc/0x128
[   22.888884]  __asan_report_load8_noabort+0x20/0x30
[   22.888941]  kasan_atomics_helper+0x3e20/0x4858
[   22.889227]  kasan_atomics+0x198/0x2e0
[   22.889342]  kunit_try_run_case+0x170/0x3f0
[   22.889414]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.889607]  kthread+0x328/0x630
[   22.889690]  ret_from_fork+0x10/0x20
[   22.889799] 
[   22.889891] Allocated by task 274:
[   22.889938]  kasan_save_stack+0x3c/0x68
[   22.889995]  kasan_save_track+0x20/0x40
[   22.890043]  kasan_save_alloc_info+0x40/0x58
[   22.890088]  __kasan_kmalloc+0xd4/0xd8
[   22.890142]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.890189]  kasan_atomics+0xb8/0x2e0
[   22.890460]  kunit_try_run_case+0x170/0x3f0
[   22.890517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.890568]  kthread+0x328/0x630
[   22.890655]  ret_from_fork+0x10/0x20
[   22.890743] 
[   22.890772] The buggy address belongs to the object at fff00000c63bc080
[   22.890772]  which belongs to the cache kmalloc-64 of size 64
[   22.890860] The buggy address is located 0 bytes to the right of
[   22.890860]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.890999] 
[   22.891036] The buggy address belongs to the physical page:
[   22.891073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.891348] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.891593] page_type: f5(slab)
[   22.891642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.892169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.892439] page dumped because: kasan: bad access detected
[   22.892489] 
[   22.892961] Memory state around the buggy address:
[   22.893175]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.893334]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.893739] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.893948]                                      ^
[   22.894002]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.894058]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.894109] ==================================================================
[   22.611167] ==================================================================
[   22.611245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   22.611318] Write of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.611381] 
[   22.611977] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.612312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.612381] Hardware name: linux,dummy-virt (DT)
[   22.612576] Call trace:
[   22.612617]  show_stack+0x20/0x38 (C)
[   22.612686]  dump_stack_lvl+0x8c/0xd0
[   22.612746]  print_report+0x118/0x608
[   22.612814]  kasan_report+0xdc/0x128
[   22.612883]  kasan_check_range+0x100/0x1a8
[   22.613213]  __kasan_check_write+0x20/0x30
[   22.613557]  kasan_atomics_helper+0xa6c/0x4858
[   22.613633]  kasan_atomics+0x198/0x2e0
[   22.613757]  kunit_try_run_case+0x170/0x3f0
[   22.613879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.614018]  kthread+0x328/0x630
[   22.614080]  ret_from_fork+0x10/0x20
[   22.614427] 
[   22.614460] Allocated by task 274:
[   22.614511]  kasan_save_stack+0x3c/0x68
[   22.614624]  kasan_save_track+0x20/0x40
[   22.614712]  kasan_save_alloc_info+0x40/0x58
[   22.614767]  __kasan_kmalloc+0xd4/0xd8
[   22.614979]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.615194]  kasan_atomics+0xb8/0x2e0
[   22.615253]  kunit_try_run_case+0x170/0x3f0
[   22.615377]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.615442]  kthread+0x328/0x630
[   22.615769]  ret_from_fork+0x10/0x20
[   22.615862] 
[   22.615905] The buggy address belongs to the object at fff00000c63bc080
[   22.615905]  which belongs to the cache kmalloc-64 of size 64
[   22.615977] The buggy address is located 0 bytes to the right of
[   22.615977]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.616597] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.616661] page_type: f5(slab)
[   22.616726] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.616970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.617180] page dumped because: kasan: bad access detected
[   22.617236] 
[   22.618230]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.620681] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.623978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.624337] page_type: f5(slab)
[   22.624426] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.624489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.624540] page dumped because: kasan: bad access detected
[   22.624593] 
[   22.624643] Memory state around the buggy address:
[   22.624687]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.624741]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.625246]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.626359] 
[   22.626510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.627720]  __asan_report_load4_noabort+0x20/0x30
[   22.628989]  __kasan_kmalloc+0xd4/0xd8
[   22.629580] 
[   22.629764] page_type: f5(slab)
[   22.629858] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.630256] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.631602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   22.632621] Call trace:
[   22.634498]  kthread+0x328/0x630
[   22.636171] The buggy address belongs to the object at fff00000c63bc080
[   22.636171]  which belongs to the cache kmalloc-64 of size 64
[   22.637790]                                      ^
[   22.639848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.641000]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.641973]  kthread+0x328/0x630
[   22.642552] page_type: f5(slab)
[   22.642608] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.642926]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.643119]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.643756] 
[   22.644006] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.644388]  kasan_report+0xdc/0x128
[   22.644960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.645925]  ret_from_fork+0x10/0x20
[   22.646393] page_type: f5(slab)
[   22.646439] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.646499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.646801]                                      ^
[   22.647669] ==================================================================
[   22.881792] ==================================================================
[   22.882008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   22.882217] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.882327] 
[   22.882540] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.882691] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.882767] Hardware name: linux,dummy-virt (DT)
[   22.882915] Call trace:
[   22.882949]  show_stack+0x20/0x38 (C)
[   22.883010]  dump_stack_lvl+0x8c/0xd0
[   22.883142]  print_report+0x118/0x608
[   22.883411]  kasan_report+0xdc/0x128
[   22.883555]  kasan_check_range+0x100/0x1a8
[   22.883638]  __kasan_check_write+0x20/0x30
[   22.883807]  kasan_atomics_helper+0x175c/0x4858
[   22.883880]  kasan_atomics+0x198/0x2e0
[   22.883994]  kunit_try_run_case+0x170/0x3f0
[   22.884154]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.884265]  kthread+0x328/0x630
[   22.884313]  ret_from_fork+0x10/0x20
[   22.884369] 
[   22.884396] Allocated by task 274:
[   22.884432]  kasan_save_stack+0x3c/0x68
[   22.884483]  kasan_save_track+0x20/0x40
[   22.884528]  kasan_save_alloc_info+0x40/0x58
[   22.884571]  __kasan_kmalloc+0xd4/0xd8
[   22.884612]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.884658]  kasan_atomics+0xb8/0x2e0
[   22.884698]  kunit_try_run_case+0x170/0x3f0
[   22.884983]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.885050]  kthread+0x328/0x630
[   22.885091]  ret_from_fork+0x10/0x20
[   22.885182] 
[   22.885209] The buggy address belongs to the object at fff00000c63bc080
[   22.885209]  which belongs to the cache kmalloc-64 of size 64
[   22.885275] The buggy address is located 0 bytes to the right of
[   22.885275]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.885346] 
[   22.885374] The buggy address belongs to the physical page:
[   22.885411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.885470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.885592] page_type: f5(slab)
[   22.885645] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.885861] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.886161] page dumped because: kasan: bad access detected
[   22.886220] 
[   22.886557] Memory state around the buggy address:
[   22.886625]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.886683]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.886737] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.886860]                                      ^
[   22.887059]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.887225]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.887278] ==================================================================
[   22.666756] ==================================================================
[   22.666847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   22.666928] Read of size 4 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.666995] 
[   22.667042] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.667149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.667188] Hardware name: linux,dummy-virt (DT)
[   22.667232] Call trace:
[   22.667265]  show_stack+0x20/0x38 (C)
[   22.667327]  dump_stack_lvl+0x8c/0xd0
[   22.667388]  print_report+0x118/0x608
[   22.667448]  kasan_report+0xdc/0x128
[   22.667508]  __asan_report_load4_noabort+0x20/0x30
[   22.667566]  kasan_atomics_helper+0x3dd8/0x4858
[   22.667625]  kasan_atomics+0x198/0x2e0
[   22.667677]  kunit_try_run_case+0x170/0x3f0
[   22.667735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.670692]  kthread+0x328/0x630
[   22.671646]  ret_from_fork+0x10/0x20
[   22.672493] 
[   22.672573] Allocated by task 274:
[   22.673092]  kasan_save_stack+0x3c/0x68
[   22.673282]  kasan_save_track+0x20/0x40
[   22.673413]  kasan_save_alloc_info+0x40/0x58
[   22.673462]  __kasan_kmalloc+0xd4/0xd8
[   22.673507]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.673554]  kasan_atomics+0xb8/0x2e0
[   22.674341]  kunit_try_run_case+0x170/0x3f0
[   22.674612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.674682]  kthread+0x328/0x630
[   22.675112]  ret_from_fork+0x10/0x20
[   22.675244] 
[   22.675275] The buggy address belongs to the object at fff00000c63bc080
[   22.675275]  which belongs to the cache kmalloc-64 of size 64
[   22.675345] The buggy address is located 0 bytes to the right of
[   22.675345]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.675422] 
[   22.675450] The buggy address belongs to the physical page:
[   22.675488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.675558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.675617] page_type: f5(slab)
[   22.675666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.675727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.675776] page dumped because: kasan: bad access detected
[   22.675817] 
[   22.677058] Memory state around the buggy address:
[   22.677486]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.677669]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.678042] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.678498]                                      ^
[   22.678871]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.678939]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.678993] ==================================================================
[   22.774812] ==================================================================
[   22.774901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   22.774971] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.775033] 
[   22.775230] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.775377] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.775418] Hardware name: linux,dummy-virt (DT)
[   22.775459] Call trace:
[   22.775491]  show_stack+0x20/0x38 (C)
[   22.775557]  dump_stack_lvl+0x8c/0xd0
[   22.775612]  print_report+0x118/0x608
[   22.775669]  kasan_report+0xdc/0x128
[   22.775722]  kasan_check_range+0x100/0x1a8
[   22.775780]  __kasan_check_write+0x20/0x30
[   22.775831]  kasan_atomics_helper+0x1128/0x4858
[   22.775901]  kasan_atomics+0x198/0x2e0
[   22.775956]  kunit_try_run_case+0x170/0x3f0
[   22.776012]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.776074]  kthread+0x328/0x630
[   22.776122]  ret_from_fork+0x10/0x20
[   22.776181] 
[   22.776209] Allocated by task 274:
[   22.776247]  kasan_save_stack+0x3c/0x68
[   22.776300]  kasan_save_track+0x20/0x40
[   22.776345]  kasan_save_alloc_info+0x40/0x58
[   22.776391]  __kasan_kmalloc+0xd4/0xd8
[   22.776437]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.776484]  kasan_atomics+0xb8/0x2e0
[   22.776527]  kunit_try_run_case+0x170/0x3f0
[   22.776572]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.776624]  kthread+0x328/0x630
[   22.776664]  ret_from_fork+0x10/0x20
[   22.776706] 
[   22.776731] The buggy address belongs to the object at fff00000c63bc080
[   22.776731]  which belongs to the cache kmalloc-64 of size 64
[   22.776796] The buggy address is located 0 bytes to the right of
[   22.776796]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.777511] 
[   22.777599] The buggy address belongs to the physical page:
[   22.777644] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.777709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.777764] page_type: f5(slab)
[   22.777823] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.777903] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.777961] page dumped because: kasan: bad access detected
[   22.778004] 
[   22.778032] Memory state around the buggy address:
[   22.778074]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.778204]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.778433] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.778488]                                      ^
[   22.778826]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.778899]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.779091] ==================================================================
[   22.769697] ==================================================================
[   22.769772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   22.769901] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.769967] 
[   22.770010] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.770107] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.770139] Hardware name: linux,dummy-virt (DT)
[   22.770177] Call trace:
[   22.770206]  show_stack+0x20/0x38 (C)
[   22.770260]  dump_stack_lvl+0x8c/0xd0
[   22.770317]  print_report+0x118/0x608
[   22.770368]  kasan_report+0xdc/0x128
[   22.770417]  kasan_check_range+0x100/0x1a8
[   22.770471]  __kasan_check_write+0x20/0x30
[   22.770522]  kasan_atomics_helper+0x10c0/0x4858
[   22.770577]  kasan_atomics+0x198/0x2e0
[   22.770627]  kunit_try_run_case+0x170/0x3f0
[   22.770682]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.770740]  kthread+0x328/0x630
[   22.770788]  ret_from_fork+0x10/0x20
[   22.770852] 
[   22.770879] Allocated by task 274:
[   22.770914]  kasan_save_stack+0x3c/0x68
[   22.770966]  kasan_save_track+0x20/0x40
[   22.771013]  kasan_save_alloc_info+0x40/0x58
[   22.771056]  __kasan_kmalloc+0xd4/0xd8
[   22.771097]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.771144]  kasan_atomics+0xb8/0x2e0
[   22.771186]  kunit_try_run_case+0x170/0x3f0
[   22.771450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.771719]  kthread+0x328/0x630
[   22.772145]  ret_from_fork+0x10/0x20
[   22.772202] 
[   22.772229] The buggy address belongs to the object at fff00000c63bc080
[   22.772229]  which belongs to the cache kmalloc-64 of size 64
[   22.772304] The buggy address is located 0 bytes to the right of
[   22.772304]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.772511] 
[   22.772539] The buggy address belongs to the physical page:
[   22.772578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.772644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.772703] page_type: f5(slab)
[   22.772747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.772983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.773190] page dumped because: kasan: bad access detected
[   22.773311] 
[   22.773339] Memory state around the buggy address:
[   22.773384]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.773437]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.773486] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.773534]                                      ^
[   22.773576]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.773626]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.773858] ==================================================================
[   22.799628] ==================================================================
[   22.799772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   22.799856] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.799919] 
[   22.799961] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.800162] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.800198] Hardware name: linux,dummy-virt (DT)
[   22.800241] Call trace:
[   22.800270]  show_stack+0x20/0x38 (C)
[   22.800328]  dump_stack_lvl+0x8c/0xd0
[   22.800461]  print_report+0x118/0x608
[   22.800528]  kasan_report+0xdc/0x128
[   22.800583]  kasan_check_range+0x100/0x1a8
[   22.800636]  __kasan_check_write+0x20/0x30
[   22.800688]  kasan_atomics_helper+0x12d8/0x4858
[   22.800744]  kasan_atomics+0x198/0x2e0
[   22.801313]  kunit_try_run_case+0x170/0x3f0
[   22.801407]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.801472]  kthread+0x328/0x630
[   22.801522]  ret_from_fork+0x10/0x20
[   22.801746] 
[   22.801779] Allocated by task 274:
[   22.801849]  kasan_save_stack+0x3c/0x68
[   22.802356]  kasan_save_track+0x20/0x40
[   22.802606]  kasan_save_alloc_info+0x40/0x58
[   22.802693]  __kasan_kmalloc+0xd4/0xd8
[   22.802899]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.802961]  kasan_atomics+0xb8/0x2e0
[   22.803009]  kunit_try_run_case+0x170/0x3f0
[   22.803058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.803387]  kthread+0x328/0x630
[   22.803802]  ret_from_fork+0x10/0x20
[   22.803903] 
[   22.804031] The buggy address belongs to the object at fff00000c63bc080
[   22.804031]  which belongs to the cache kmalloc-64 of size 64
[   22.804327] The buggy address is located 0 bytes to the right of
[   22.804327]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.804598] 
[   22.804632] The buggy address belongs to the physical page:
[   22.804681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.804742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.805005] page_type: f5(slab)
[   22.805091] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.805162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.805381] page dumped because: kasan: bad access detected
[   22.805429] 
[   22.805465] Memory state around the buggy address:
[   22.805702]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.805786]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.806121] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.806299]                                      ^
[   22.806368]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.806620]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.806692] ==================================================================
[   22.832226] ==================================================================
[   22.832317] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   22.832434] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.832540] 
[   22.832594] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.832860] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.832944] Hardware name: linux,dummy-virt (DT)
[   22.832985] Call trace:
[   22.833020]  show_stack+0x20/0x38 (C)
[   22.833086]  dump_stack_lvl+0x8c/0xd0
[   22.833147]  print_report+0x118/0x608
[   22.833206]  kasan_report+0xdc/0x128
[   22.833262]  kasan_check_range+0x100/0x1a8
[   22.833336]  __kasan_check_write+0x20/0x30
[   22.833403]  kasan_atomics_helper+0x14e4/0x4858
[   22.833511]  kasan_atomics+0x198/0x2e0
[   22.833611]  kunit_try_run_case+0x170/0x3f0
[   22.833670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.833735]  kthread+0x328/0x630
[   22.833787]  ret_from_fork+0x10/0x20
[   22.833875] 
[   22.833908] Allocated by task 274:
[   22.833947]  kasan_save_stack+0x3c/0x68
[   22.834006]  kasan_save_track+0x20/0x40
[   22.834057]  kasan_save_alloc_info+0x40/0x58
[   22.834115]  __kasan_kmalloc+0xd4/0xd8
[   22.834197]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.834248]  kasan_atomics+0xb8/0x2e0
[   22.834295]  kunit_try_run_case+0x170/0x3f0
[   22.834344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.834409]  kthread+0x328/0x630
[   22.834476]  ret_from_fork+0x10/0x20
[   22.834523] 
[   22.834551] The buggy address belongs to the object at fff00000c63bc080
[   22.834551]  which belongs to the cache kmalloc-64 of size 64
[   22.834692] The buggy address is located 0 bytes to the right of
[   22.834692]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.834823] 
[   22.834866] The buggy address belongs to the physical page:
[   22.834912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.834976] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.835038] page_type: f5(slab)
[   22.835089] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.835154] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.835206] page dumped because: kasan: bad access detected
[   22.835516] 
[   22.835577] Memory state around the buggy address:
[   22.835817]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.835893]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.835953] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.836004]                                      ^
[   22.836052]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.836108]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.836157] ==================================================================
[   22.855638] ==================================================================
[   22.855706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   22.855776] Write of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.856081] 
[   22.856138] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.856252] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.856288] Hardware name: linux,dummy-virt (DT)
[   22.856331] Call trace:
[   22.856362]  show_stack+0x20/0x38 (C)
[   22.856656]  dump_stack_lvl+0x8c/0xd0
[   22.856734]  print_report+0x118/0x608
[   22.857036]  kasan_report+0xdc/0x128
[   22.857129]  kasan_check_range+0x100/0x1a8
[   22.857204]  __kasan_check_write+0x20/0x30
[   22.857262]  kasan_atomics_helper+0x1644/0x4858
[   22.857321]  kasan_atomics+0x198/0x2e0
[   22.857375]  kunit_try_run_case+0x170/0x3f0
[   22.857433]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.857494]  kthread+0x328/0x630
[   22.857544]  ret_from_fork+0x10/0x20
[   22.857601] 
[   22.857630] Allocated by task 274:
[   22.858075]  kasan_save_stack+0x3c/0x68
[   22.858341]  kasan_save_track+0x20/0x40
[   22.858973]  kasan_save_alloc_info+0x40/0x58
[   22.859354]  __kasan_kmalloc+0xd4/0xd8
[   22.859777]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.859968]  kasan_atomics+0xb8/0x2e0
[   22.860026]  kunit_try_run_case+0x170/0x3f0
[   22.860586]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.860667]  kthread+0x328/0x630
[   22.860711]  ret_from_fork+0x10/0x20
[   22.860756] 
[   22.861040] The buggy address belongs to the object at fff00000c63bc080
[   22.861040]  which belongs to the cache kmalloc-64 of size 64
[   22.861213] The buggy address is located 0 bytes to the right of
[   22.861213]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.861526] 
[   22.861565] The buggy address belongs to the physical page:
[   22.861607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.861701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.861775] page_type: f5(slab)
[   22.861937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.862016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.862253] page dumped because: kasan: bad access detected
[   22.862299] 
[   22.862326] Memory state around the buggy address:
[   22.862378]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.862436]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.862489] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.862537]                                      ^
[   22.862578]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.862632]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.862679] ==================================================================
[   22.812132] ==================================================================
[   22.812229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   22.812319] Read of size 8 at addr fff00000c63bc0b0 by task kunit_try_catch/274
[   22.812398] 
[   22.812478] CPU: 0 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT 
[   22.812607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.812643] Hardware name: linux,dummy-virt (DT)
[   22.812681] Call trace:
[   22.812712]  show_stack+0x20/0x38 (C)
[   22.812769]  dump_stack_lvl+0x8c/0xd0
[   22.812823]  print_report+0x118/0x608
[   22.812894]  kasan_report+0xdc/0x128
[   22.812951]  __asan_report_load8_noabort+0x20/0x30
[   22.813009]  kasan_atomics_helper+0x3f04/0x4858
[   22.813066]  kasan_atomics+0x198/0x2e0
[   22.813117]  kunit_try_run_case+0x170/0x3f0
[   22.813174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.813238]  kthread+0x328/0x630
[   22.813290]  ret_from_fork+0x10/0x20
[   22.813357] 
[   22.813412] Allocated by task 274:
[   22.813477]  kasan_save_stack+0x3c/0x68
[   22.813566]  kasan_save_track+0x20/0x40
[   22.813653]  kasan_save_alloc_info+0x40/0x58
[   22.813736]  __kasan_kmalloc+0xd4/0xd8
[   22.813822]  __kmalloc_cache_noprof+0x16c/0x3c0
[   22.813945]  kasan_atomics+0xb8/0x2e0
[   22.814176]  kunit_try_run_case+0x170/0x3f0
[   22.814455]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   22.814529]  kthread+0x328/0x630
[   22.814574]  ret_from_fork+0x10/0x20
[   22.814633] 
[   22.814680] The buggy address belongs to the object at fff00000c63bc080
[   22.814680]  which belongs to the cache kmalloc-64 of size 64
[   22.814757] The buggy address is located 0 bytes to the right of
[   22.814757]  allocated 48-byte region [fff00000c63bc080, fff00000c63bc0b0)
[   22.814922] 
[   22.814956] The buggy address belongs to the physical page:
[   22.815018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063bc
[   22.815139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   22.815198] page_type: f5(slab)
[   22.815251] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   22.815311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.815444] page dumped because: kasan: bad access detected
[   22.815491] 
[   22.815526] Memory state around the buggy address:
[   22.815602]  fff00000c63bbf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.815661]  fff00000c63bc000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.815715] >fff00000c63bc080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.815774]                                      ^
[   22.815856]  fff00000c63bc100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.815914]  fff00000c63bc180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.815962] ==================================================================

[   14.585893] ==================================================================
[   14.586525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   14.586959] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.587429] 
[   14.587536] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.587581] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.587593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.587613] Call Trace:
[   14.587627]  <TASK>
[   14.587642]  dump_stack_lvl+0x73/0xb0
[   14.587667]  print_report+0xd1/0x650
[   14.587689]  ? __virt_addr_valid+0x1db/0x2d0
[   14.587711]  ? kasan_atomics_helper+0x1217/0x5450
[   14.587732]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.587755]  ? kasan_atomics_helper+0x1217/0x5450
[   14.587776]  kasan_report+0x141/0x180
[   14.587798]  ? kasan_atomics_helper+0x1217/0x5450
[   14.587824]  kasan_check_range+0x10c/0x1c0
[   14.587848]  __kasan_check_write+0x18/0x20
[   14.587867]  kasan_atomics_helper+0x1217/0x5450
[   14.587890]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.587970]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.588056]  ? kasan_atomics+0x152/0x310
[   14.588083]  kasan_atomics+0x1dc/0x310
[   14.588106]  ? __pfx_kasan_atomics+0x10/0x10
[   14.588130]  ? __pfx_read_tsc+0x10/0x10
[   14.588151]  ? ktime_get_ts64+0x86/0x230
[   14.588177]  kunit_try_run_case+0x1a5/0x480
[   14.588201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.588222]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.588244]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.588267]  ? __kthread_parkme+0x82/0x180
[   14.588287]  ? preempt_count_sub+0x50/0x80
[   14.588309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.588333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.588356]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.588378]  kthread+0x337/0x6f0
[   14.588400]  ? trace_preempt_on+0x20/0xc0
[   14.588424]  ? __pfx_kthread+0x10/0x10
[   14.588445]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.588466]  ? calculate_sigpending+0x7b/0xa0
[   14.588490]  ? __pfx_kthread+0x10/0x10
[   14.588512]  ret_from_fork+0x116/0x1d0
[   14.588531]  ? __pfx_kthread+0x10/0x10
[   14.588551]  ret_from_fork_asm+0x1a/0x30
[   14.588582]  </TASK>
[   14.588593] 
[   14.596417] Allocated by task 290:
[   14.596544]  kasan_save_stack+0x45/0x70
[   14.596720]  kasan_save_track+0x18/0x40
[   14.596910]  kasan_save_alloc_info+0x3b/0x50
[   14.597175]  __kasan_kmalloc+0xb7/0xc0
[   14.597360]  __kmalloc_cache_noprof+0x189/0x420
[   14.597578]  kasan_atomics+0x95/0x310
[   14.597766]  kunit_try_run_case+0x1a5/0x480
[   14.597981]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.598196]  kthread+0x337/0x6f0
[   14.598311]  ret_from_fork+0x116/0x1d0
[   14.598563]  ret_from_fork_asm+0x1a/0x30
[   14.598809] 
[   14.598900] The buggy address belongs to the object at ffff8881028d8d80
[   14.598900]  which belongs to the cache kmalloc-64 of size 64
[   14.599492] The buggy address is located 0 bytes to the right of
[   14.599492]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.599852] 
[   14.599922] The buggy address belongs to the physical page:
[   14.600099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.600466] flags: 0x200000000000000(node=0|zone=2)
[   14.600750] page_type: f5(slab)
[   14.600916] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.601268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.601673] page dumped because: kasan: bad access detected
[   14.602047] 
[   14.602166] Memory state around the buggy address:
[   14.602457]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.602864]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.603199] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.603555]                                      ^
[   14.603826]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.604078]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.604341] ==================================================================
[   15.277148] ==================================================================
[   15.277842] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   15.278530] Read of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   15.279172] 
[   15.279351] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   15.279422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.279434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.279457] Call Trace:
[   15.279476]  <TASK>
[   15.279505]  dump_stack_lvl+0x73/0xb0
[   15.279534]  print_report+0xd1/0x650
[   15.279557]  ? __virt_addr_valid+0x1db/0x2d0
[   15.279592]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.279614]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.279636]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.279658]  kasan_report+0x141/0x180
[   15.279680]  ? kasan_atomics_helper+0x4fb2/0x5450
[   15.279706]  __asan_report_load8_noabort+0x18/0x20
[   15.279730]  kasan_atomics_helper+0x4fb2/0x5450
[   15.279753]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.279775]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.279799]  ? kasan_atomics+0x152/0x310
[   15.279826]  kasan_atomics+0x1dc/0x310
[   15.279848]  ? __pfx_kasan_atomics+0x10/0x10
[   15.279873]  ? __pfx_read_tsc+0x10/0x10
[   15.279895]  ? ktime_get_ts64+0x86/0x230
[   15.279921]  kunit_try_run_case+0x1a5/0x480
[   15.279954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.279977]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.280000]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.280023]  ? __kthread_parkme+0x82/0x180
[   15.280044]  ? preempt_count_sub+0x50/0x80
[   15.280068]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.280092]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.280115]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.280138]  kthread+0x337/0x6f0
[   15.280158]  ? trace_preempt_on+0x20/0xc0
[   15.280183]  ? __pfx_kthread+0x10/0x10
[   15.280204]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.280226]  ? calculate_sigpending+0x7b/0xa0
[   15.280250]  ? __pfx_kthread+0x10/0x10
[   15.280272]  ret_from_fork+0x116/0x1d0
[   15.280291]  ? __pfx_kthread+0x10/0x10
[   15.280311]  ret_from_fork_asm+0x1a/0x30
[   15.280343]  </TASK>
[   15.280355] 
[   15.292051] Allocated by task 290:
[   15.292412]  kasan_save_stack+0x45/0x70
[   15.292719]  kasan_save_track+0x18/0x40
[   15.292854]  kasan_save_alloc_info+0x3b/0x50
[   15.293008]  __kasan_kmalloc+0xb7/0xc0
[   15.293135]  __kmalloc_cache_noprof+0x189/0x420
[   15.293281]  kasan_atomics+0x95/0x310
[   15.293501]  kunit_try_run_case+0x1a5/0x480
[   15.293886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.294403]  kthread+0x337/0x6f0
[   15.294712]  ret_from_fork+0x116/0x1d0
[   15.295063]  ret_from_fork_asm+0x1a/0x30
[   15.295439] 
[   15.295601] The buggy address belongs to the object at ffff8881028d8d80
[   15.295601]  which belongs to the cache kmalloc-64 of size 64
[   15.296664] The buggy address is located 0 bytes to the right of
[   15.296664]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   15.297580] 
[   15.297652] The buggy address belongs to the physical page:
[   15.297826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   15.298072] flags: 0x200000000000000(node=0|zone=2)
[   15.298228] page_type: f5(slab)
[   15.298346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.299036] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.299699] page dumped because: kasan: bad access detected
[   15.300181] 
[   15.300350] Memory state around the buggy address:
[   15.300787]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.301417]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.302044] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.302659]                                      ^
[   15.302964]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.303174]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.303401] ==================================================================
[   14.407889] ==================================================================
[   14.408149] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   14.408380] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.408659] 
[   14.408746] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.408794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.408807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.408831] Call Trace:
[   14.408851]  <TASK>
[   14.408872]  dump_stack_lvl+0x73/0xb0
[   14.408900]  print_report+0xd1/0x650
[   14.408922]  ? __virt_addr_valid+0x1db/0x2d0
[   14.408956]  ? kasan_atomics_helper+0xde0/0x5450
[   14.408977]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.409000]  ? kasan_atomics_helper+0xde0/0x5450
[   14.409024]  kasan_report+0x141/0x180
[   14.409047]  ? kasan_atomics_helper+0xde0/0x5450
[   14.409075]  kasan_check_range+0x10c/0x1c0
[   14.409098]  __kasan_check_write+0x18/0x20
[   14.409118]  kasan_atomics_helper+0xde0/0x5450
[   14.409140]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.409162]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.409188]  ? kasan_atomics+0x152/0x310
[   14.409215]  kasan_atomics+0x1dc/0x310
[   14.409238]  ? __pfx_kasan_atomics+0x10/0x10
[   14.409263]  ? __pfx_read_tsc+0x10/0x10
[   14.409285]  ? ktime_get_ts64+0x86/0x230
[   14.409312]  kunit_try_run_case+0x1a5/0x480
[   14.409338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.409360]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.409383]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.409419]  ? __kthread_parkme+0x82/0x180
[   14.409440]  ? preempt_count_sub+0x50/0x80
[   14.409465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.409500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.409523]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.409549]  kthread+0x337/0x6f0
[   14.409568]  ? trace_preempt_on+0x20/0xc0
[   14.409603]  ? __pfx_kthread+0x10/0x10
[   14.409624]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.409646]  ? calculate_sigpending+0x7b/0xa0
[   14.409685]  ? __pfx_kthread+0x10/0x10
[   14.409707]  ret_from_fork+0x116/0x1d0
[   14.409726]  ? __pfx_kthread+0x10/0x10
[   14.409747]  ret_from_fork_asm+0x1a/0x30
[   14.409778]  </TASK>
[   14.409790] 
[   14.417371] Allocated by task 290:
[   14.417500]  kasan_save_stack+0x45/0x70
[   14.417639]  kasan_save_track+0x18/0x40
[   14.417780]  kasan_save_alloc_info+0x3b/0x50
[   14.418030]  __kasan_kmalloc+0xb7/0xc0
[   14.418209]  __kmalloc_cache_noprof+0x189/0x420
[   14.418425]  kasan_atomics+0x95/0x310
[   14.418686]  kunit_try_run_case+0x1a5/0x480
[   14.418898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.419077]  kthread+0x337/0x6f0
[   14.419192]  ret_from_fork+0x116/0x1d0
[   14.419352]  ret_from_fork_asm+0x1a/0x30
[   14.419557] 
[   14.419649] The buggy address belongs to the object at ffff8881028d8d80
[   14.419649]  which belongs to the cache kmalloc-64 of size 64
[   14.420206] The buggy address is located 0 bytes to the right of
[   14.420206]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.420805] 
[   14.420874] The buggy address belongs to the physical page:
[   14.421052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.421286] flags: 0x200000000000000(node=0|zone=2)
[   14.421493] page_type: f5(slab)
[   14.421654] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.422039] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.422354] page dumped because: kasan: bad access detected
[   14.422518] 
[   14.422582] Memory state around the buggy address:
[   14.422727]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.422943]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.423199] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.423671]                                      ^
[   14.423899]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.424784]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.425274] ==================================================================
[   14.509297] ==================================================================
[   14.509820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   14.510153] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.510546] 
[   14.510712] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.510757] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.510769] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.510789] Call Trace:
[   14.510803]  <TASK>
[   14.510818]  dump_stack_lvl+0x73/0xb0
[   14.510844]  print_report+0xd1/0x650
[   14.510866]  ? __virt_addr_valid+0x1db/0x2d0
[   14.510888]  ? kasan_atomics_helper+0x1079/0x5450
[   14.510909]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.510942]  ? kasan_atomics_helper+0x1079/0x5450
[   14.510965]  kasan_report+0x141/0x180
[   14.510986]  ? kasan_atomics_helper+0x1079/0x5450
[   14.511012]  kasan_check_range+0x10c/0x1c0
[   14.511036]  __kasan_check_write+0x18/0x20
[   14.511055]  kasan_atomics_helper+0x1079/0x5450
[   14.511078]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.511100]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.511125]  ? kasan_atomics+0x152/0x310
[   14.511152]  kasan_atomics+0x1dc/0x310
[   14.511174]  ? __pfx_kasan_atomics+0x10/0x10
[   14.511199]  ? __pfx_read_tsc+0x10/0x10
[   14.511219]  ? ktime_get_ts64+0x86/0x230
[   14.511243]  kunit_try_run_case+0x1a5/0x480
[   14.511267]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.511290]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.511311]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.511335]  ? __kthread_parkme+0x82/0x180
[   14.511355]  ? preempt_count_sub+0x50/0x80
[   14.511378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.511402]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.511425]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.511448]  kthread+0x337/0x6f0
[   14.511468]  ? trace_preempt_on+0x20/0xc0
[   14.511491]  ? __pfx_kthread+0x10/0x10
[   14.511525]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.511546]  ? calculate_sigpending+0x7b/0xa0
[   14.511570]  ? __pfx_kthread+0x10/0x10
[   14.511591]  ret_from_fork+0x116/0x1d0
[   14.511610]  ? __pfx_kthread+0x10/0x10
[   14.511631]  ret_from_fork_asm+0x1a/0x30
[   14.511663]  </TASK>
[   14.511673] 
[   14.518807] Allocated by task 290:
[   14.518990]  kasan_save_stack+0x45/0x70
[   14.519187]  kasan_save_track+0x18/0x40
[   14.519371]  kasan_save_alloc_info+0x3b/0x50
[   14.519586]  __kasan_kmalloc+0xb7/0xc0
[   14.519746]  __kmalloc_cache_noprof+0x189/0x420
[   14.519951]  kasan_atomics+0x95/0x310
[   14.520129]  kunit_try_run_case+0x1a5/0x480
[   14.520310]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.520557]  kthread+0x337/0x6f0
[   14.520709]  ret_from_fork+0x116/0x1d0
[   14.520848]  ret_from_fork_asm+0x1a/0x30
[   14.521037] 
[   14.521126] The buggy address belongs to the object at ffff8881028d8d80
[   14.521126]  which belongs to the cache kmalloc-64 of size 64
[   14.521608] The buggy address is located 0 bytes to the right of
[   14.521608]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.521975] 
[   14.522042] The buggy address belongs to the physical page:
[   14.522206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.522476] flags: 0x200000000000000(node=0|zone=2)
[   14.522696] page_type: f5(slab)
[   14.522876] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.523214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.523656] page dumped because: kasan: bad access detected
[   14.523893] 
[   14.524038] Memory state around the buggy address:
[   14.524202]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.524475]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.524789] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.525113]                                      ^
[   14.525321]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.525607]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.525852] ==================================================================
[   14.605175] ==================================================================
[   14.605523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   14.605921] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.606153] 
[   14.606234] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.606280] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.606292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.606313] Call Trace:
[   14.606333]  <TASK>
[   14.606351]  dump_stack_lvl+0x73/0xb0
[   14.606379]  print_report+0xd1/0x650
[   14.606402]  ? __virt_addr_valid+0x1db/0x2d0
[   14.606425]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.606456]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.606479]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.606501]  kasan_report+0x141/0x180
[   14.606523]  ? kasan_atomics_helper+0x49e8/0x5450
[   14.606549]  __asan_report_load4_noabort+0x18/0x20
[   14.606573]  kasan_atomics_helper+0x49e8/0x5450
[   14.606596]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.606617]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.606643]  ? kasan_atomics+0x152/0x310
[   14.606669]  kasan_atomics+0x1dc/0x310
[   14.606691]  ? __pfx_kasan_atomics+0x10/0x10
[   14.606715]  ? __pfx_read_tsc+0x10/0x10
[   14.606736]  ? ktime_get_ts64+0x86/0x230
[   14.606762]  kunit_try_run_case+0x1a5/0x480
[   14.606787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.606809]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.606870]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.606893]  ? __kthread_parkme+0x82/0x180
[   14.606914]  ? preempt_count_sub+0x50/0x80
[   14.606959]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.606983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.607006]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.607030]  kthread+0x337/0x6f0
[   14.607079]  ? trace_preempt_on+0x20/0xc0
[   14.607105]  ? __pfx_kthread+0x10/0x10
[   14.607126]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.607158]  ? calculate_sigpending+0x7b/0xa0
[   14.607184]  ? __pfx_kthread+0x10/0x10
[   14.607205]  ret_from_fork+0x116/0x1d0
[   14.607224]  ? __pfx_kthread+0x10/0x10
[   14.607245]  ret_from_fork_asm+0x1a/0x30
[   14.607276]  </TASK>
[   14.607287] 
[   14.615378] Allocated by task 290:
[   14.615642]  kasan_save_stack+0x45/0x70
[   14.615871]  kasan_save_track+0x18/0x40
[   14.616059]  kasan_save_alloc_info+0x3b/0x50
[   14.616206]  __kasan_kmalloc+0xb7/0xc0
[   14.616334]  __kmalloc_cache_noprof+0x189/0x420
[   14.616756]  kasan_atomics+0x95/0x310
[   14.616949]  kunit_try_run_case+0x1a5/0x480
[   14.617189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.617567]  kthread+0x337/0x6f0
[   14.617791]  ret_from_fork+0x116/0x1d0
[   14.618052]  ret_from_fork_asm+0x1a/0x30
[   14.618268] 
[   14.618369] The buggy address belongs to the object at ffff8881028d8d80
[   14.618369]  which belongs to the cache kmalloc-64 of size 64
[   14.618800] The buggy address is located 0 bytes to the right of
[   14.618800]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.619257] 
[   14.619354] The buggy address belongs to the physical page:
[   14.619652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.620082] flags: 0x200000000000000(node=0|zone=2)
[   14.620266] page_type: f5(slab)
[   14.620386] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.620720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.621033] page dumped because: kasan: bad access detected
[   14.621214] 
[   14.621277] Memory state around the buggy address:
[   14.621553]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.621896]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.622216] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.622519]                                      ^
[   14.622789]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.623153]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.623463] ==================================================================
[   14.965203] ==================================================================
[   14.965856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   14.966510] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.966981] 
[   14.967063] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.967108] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.967120] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.967142] Call Trace:
[   14.967158]  <TASK>
[   14.967174]  dump_stack_lvl+0x73/0xb0
[   14.967202]  print_report+0xd1/0x650
[   14.967223]  ? __virt_addr_valid+0x1db/0x2d0
[   14.967245]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.967267]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.967289]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.967311]  kasan_report+0x141/0x180
[   14.967333]  ? kasan_atomics_helper+0x1a7f/0x5450
[   14.967358]  kasan_check_range+0x10c/0x1c0
[   14.967408]  __kasan_check_write+0x18/0x20
[   14.967429]  kasan_atomics_helper+0x1a7f/0x5450
[   14.967452]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.967473]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.967498]  ? kasan_atomics+0x152/0x310
[   14.967524]  kasan_atomics+0x1dc/0x310
[   14.967548]  ? __pfx_kasan_atomics+0x10/0x10
[   14.967572]  ? __pfx_read_tsc+0x10/0x10
[   14.967593]  ? ktime_get_ts64+0x86/0x230
[   14.967618]  kunit_try_run_case+0x1a5/0x480
[   14.967642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.967664]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.967686]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.967709]  ? __kthread_parkme+0x82/0x180
[   14.967728]  ? preempt_count_sub+0x50/0x80
[   14.967751]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.967774]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.967797]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.967820]  kthread+0x337/0x6f0
[   14.967841]  ? trace_preempt_on+0x20/0xc0
[   14.967865]  ? __pfx_kthread+0x10/0x10
[   14.967886]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.967907]  ? calculate_sigpending+0x7b/0xa0
[   14.967939]  ? __pfx_kthread+0x10/0x10
[   14.967962]  ret_from_fork+0x116/0x1d0
[   14.967981]  ? __pfx_kthread+0x10/0x10
[   14.968001]  ret_from_fork_asm+0x1a/0x30
[   14.968032]  </TASK>
[   14.968044] 
[   14.979916] Allocated by task 290:
[   14.980048]  kasan_save_stack+0x45/0x70
[   14.980184]  kasan_save_track+0x18/0x40
[   14.980312]  kasan_save_alloc_info+0x3b/0x50
[   14.980642]  __kasan_kmalloc+0xb7/0xc0
[   14.980983]  __kmalloc_cache_noprof+0x189/0x420
[   14.981365]  kasan_atomics+0x95/0x310
[   14.981735]  kunit_try_run_case+0x1a5/0x480
[   14.982107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.982590]  kthread+0x337/0x6f0
[   14.982888]  ret_from_fork+0x116/0x1d0
[   14.983229]  ret_from_fork_asm+0x1a/0x30
[   14.983593] 
[   14.983750] The buggy address belongs to the object at ffff8881028d8d80
[   14.983750]  which belongs to the cache kmalloc-64 of size 64
[   14.984788] The buggy address is located 0 bytes to the right of
[   14.984788]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.985237] 
[   14.985305] The buggy address belongs to the physical page:
[   14.985478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.985720] flags: 0x200000000000000(node=0|zone=2)
[   14.985875] page_type: f5(slab)
[   14.986107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.986776] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.987505] page dumped because: kasan: bad access detected
[   14.988028] 
[   14.988176] Memory state around the buggy address:
[   14.988572]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.989187]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.990412] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.990763]                                      ^
[   14.991006]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.991316]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.991637] ==================================================================
[   15.372715] ==================================================================
[   15.373067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   15.373404] Read of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   15.373812] 
[   15.373918] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   15.373975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.373988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.374009] Call Trace:
[   15.374026]  <TASK>
[   15.374044]  dump_stack_lvl+0x73/0xb0
[   15.374073]  print_report+0xd1/0x650
[   15.374096]  ? __virt_addr_valid+0x1db/0x2d0
[   15.374120]  ? kasan_atomics_helper+0x5115/0x5450
[   15.374141]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.374164]  ? kasan_atomics_helper+0x5115/0x5450
[   15.374185]  kasan_report+0x141/0x180
[   15.374208]  ? kasan_atomics_helper+0x5115/0x5450
[   15.374234]  __asan_report_load8_noabort+0x18/0x20
[   15.374259]  kasan_atomics_helper+0x5115/0x5450
[   15.374282]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.374304]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.374328]  ? kasan_atomics+0x152/0x310
[   15.374354]  kasan_atomics+0x1dc/0x310
[   15.374377]  ? __pfx_kasan_atomics+0x10/0x10
[   15.374401]  ? __pfx_read_tsc+0x10/0x10
[   15.374423]  ? ktime_get_ts64+0x86/0x230
[   15.374449]  kunit_try_run_case+0x1a5/0x480
[   15.374473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.374495]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.374519]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.374542]  ? __kthread_parkme+0x82/0x180
[   15.374563]  ? preempt_count_sub+0x50/0x80
[   15.374587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.374621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.374644]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.374668]  kthread+0x337/0x6f0
[   15.374688]  ? trace_preempt_on+0x20/0xc0
[   15.374712]  ? __pfx_kthread+0x10/0x10
[   15.374733]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.374754]  ? calculate_sigpending+0x7b/0xa0
[   15.374779]  ? __pfx_kthread+0x10/0x10
[   15.374801]  ret_from_fork+0x116/0x1d0
[   15.374819]  ? __pfx_kthread+0x10/0x10
[   15.374840]  ret_from_fork_asm+0x1a/0x30
[   15.374871]  </TASK>
[   15.374883] 
[   15.381744] Allocated by task 290:
[   15.381918]  kasan_save_stack+0x45/0x70
[   15.382118]  kasan_save_track+0x18/0x40
[   15.382304]  kasan_save_alloc_info+0x3b/0x50
[   15.382503]  __kasan_kmalloc+0xb7/0xc0
[   15.382681]  __kmalloc_cache_noprof+0x189/0x420
[   15.383029]  kasan_atomics+0x95/0x310
[   15.383157]  kunit_try_run_case+0x1a5/0x480
[   15.383298]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.383694]  kthread+0x337/0x6f0
[   15.383855]  ret_from_fork+0x116/0x1d0
[   15.384042]  ret_from_fork_asm+0x1a/0x30
[   15.384222] 
[   15.384288] The buggy address belongs to the object at ffff8881028d8d80
[   15.384288]  which belongs to the cache kmalloc-64 of size 64
[   15.384882] The buggy address is located 0 bytes to the right of
[   15.384882]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   15.385245] 
[   15.385312] The buggy address belongs to the physical page:
[   15.385476] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   15.385711] flags: 0x200000000000000(node=0|zone=2)
[   15.385863] page_type: f5(slab)
[   15.386006] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.386361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.386691] page dumped because: kasan: bad access detected
[   15.386942] 
[   15.387032] Memory state around the buggy address:
[   15.387252]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.387800]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.388073] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.388278]                                      ^
[   15.388529]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.388845]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.389170] ==================================================================
[   14.852910] ==================================================================
[   14.853268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   14.853874] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.854112] 
[   14.854196] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.854242] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.854255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.854277] Call Trace:
[   14.854296]  <TASK>
[   14.854316]  dump_stack_lvl+0x73/0xb0
[   14.854347]  print_report+0xd1/0x650
[   14.854369]  ? __virt_addr_valid+0x1db/0x2d0
[   14.854403]  ? kasan_atomics_helper+0x177f/0x5450
[   14.854425]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.854448]  ? kasan_atomics_helper+0x177f/0x5450
[   14.854470]  kasan_report+0x141/0x180
[   14.854492]  ? kasan_atomics_helper+0x177f/0x5450
[   14.854518]  kasan_check_range+0x10c/0x1c0
[   14.854543]  __kasan_check_write+0x18/0x20
[   14.854562]  kasan_atomics_helper+0x177f/0x5450
[   14.854585]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.854608]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.854632]  ? kasan_atomics+0x152/0x310
[   14.854659]  kasan_atomics+0x1dc/0x310
[   14.854682]  ? __pfx_kasan_atomics+0x10/0x10
[   14.854707]  ? __pfx_read_tsc+0x10/0x10
[   14.854728]  ? ktime_get_ts64+0x86/0x230
[   14.854755]  kunit_try_run_case+0x1a5/0x480
[   14.854779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.854802]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.854825]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.854848]  ? __kthread_parkme+0x82/0x180
[   14.854869]  ? preempt_count_sub+0x50/0x80
[   14.854893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.854917]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.854952]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.854976]  kthread+0x337/0x6f0
[   14.854996]  ? trace_preempt_on+0x20/0xc0
[   14.855021]  ? __pfx_kthread+0x10/0x10
[   14.855044]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.855065]  ? calculate_sigpending+0x7b/0xa0
[   14.855090]  ? __pfx_kthread+0x10/0x10
[   14.855111]  ret_from_fork+0x116/0x1d0
[   14.855130]  ? __pfx_kthread+0x10/0x10
[   14.855150]  ret_from_fork_asm+0x1a/0x30
[   14.855181]  </TASK>
[   14.855194] 
[   14.862692] Allocated by task 290:
[   14.862837]  kasan_save_stack+0x45/0x70
[   14.862983]  kasan_save_track+0x18/0x40
[   14.863114]  kasan_save_alloc_info+0x3b/0x50
[   14.863255]  __kasan_kmalloc+0xb7/0xc0
[   14.863381]  __kmalloc_cache_noprof+0x189/0x420
[   14.863600]  kasan_atomics+0x95/0x310
[   14.863785]  kunit_try_run_case+0x1a5/0x480
[   14.863996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.864387]  kthread+0x337/0x6f0
[   14.864553]  ret_from_fork+0x116/0x1d0
[   14.864739]  ret_from_fork_asm+0x1a/0x30
[   14.864923] 
[   14.865027] The buggy address belongs to the object at ffff8881028d8d80
[   14.865027]  which belongs to the cache kmalloc-64 of size 64
[   14.865426] The buggy address is located 0 bytes to the right of
[   14.865426]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.865992] 
[   14.866074] The buggy address belongs to the physical page:
[   14.866298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.866613] flags: 0x200000000000000(node=0|zone=2)
[   14.866835] page_type: f5(slab)
[   14.866993] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.867287] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.867614] page dumped because: kasan: bad access detected
[   14.867821] 
[   14.867908] Memory state around the buggy address:
[   14.868109]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.868401]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.868664] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.868940]                                      ^
[   14.869129]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.869335]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.869628] ==================================================================
[   14.526300] ==================================================================
[   14.526702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   14.527021] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.527236] 
[   14.527310] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.527350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.527362] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.527382] Call Trace:
[   14.527403]  <TASK>
[   14.527419]  dump_stack_lvl+0x73/0xb0
[   14.527444]  print_report+0xd1/0x650
[   14.527466]  ? __virt_addr_valid+0x1db/0x2d0
[   14.527488]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.527509]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.527531]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.527553]  kasan_report+0x141/0x180
[   14.527575]  ? kasan_atomics_helper+0x4a1c/0x5450
[   14.527601]  __asan_report_load4_noabort+0x18/0x20
[   14.527626]  kasan_atomics_helper+0x4a1c/0x5450
[   14.527649]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.527671]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.527695]  ? kasan_atomics+0x152/0x310
[   14.527722]  kasan_atomics+0x1dc/0x310
[   14.527744]  ? __pfx_kasan_atomics+0x10/0x10
[   14.527768]  ? __pfx_read_tsc+0x10/0x10
[   14.527789]  ? ktime_get_ts64+0x86/0x230
[   14.527815]  kunit_try_run_case+0x1a5/0x480
[   14.527838]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.527860]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.527883]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.527906]  ? __kthread_parkme+0x82/0x180
[   14.527926]  ? preempt_count_sub+0x50/0x80
[   14.527959]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.527983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.528008]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.528031]  kthread+0x337/0x6f0
[   14.528051]  ? trace_preempt_on+0x20/0xc0
[   14.528075]  ? __pfx_kthread+0x10/0x10
[   14.528095]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.528116]  ? calculate_sigpending+0x7b/0xa0
[   14.528140]  ? __pfx_kthread+0x10/0x10
[   14.528162]  ret_from_fork+0x116/0x1d0
[   14.528181]  ? __pfx_kthread+0x10/0x10
[   14.528201]  ret_from_fork_asm+0x1a/0x30
[   14.528232]  </TASK>
[   14.528242] 
[   14.535284] Allocated by task 290:
[   14.535449]  kasan_save_stack+0x45/0x70
[   14.535666]  kasan_save_track+0x18/0x40
[   14.535859]  kasan_save_alloc_info+0x3b/0x50
[   14.536071]  __kasan_kmalloc+0xb7/0xc0
[   14.536257]  __kmalloc_cache_noprof+0x189/0x420
[   14.536526]  kasan_atomics+0x95/0x310
[   14.536654]  kunit_try_run_case+0x1a5/0x480
[   14.536793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.537040]  kthread+0x337/0x6f0
[   14.537226]  ret_from_fork+0x116/0x1d0
[   14.537437]  ret_from_fork_asm+0x1a/0x30
[   14.537600] 
[   14.537666] The buggy address belongs to the object at ffff8881028d8d80
[   14.537666]  which belongs to the cache kmalloc-64 of size 64
[   14.538025] The buggy address is located 0 bytes to the right of
[   14.538025]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.538379] 
[   14.538475] The buggy address belongs to the physical page:
[   14.538719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.539070] flags: 0x200000000000000(node=0|zone=2)
[   14.539319] page_type: f5(slab)
[   14.539601] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.539941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.540263] page dumped because: kasan: bad access detected
[   14.540582] 
[   14.540648] Memory state around the buggy address:
[   14.540796]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.541018]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.541227] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.541557]                                      ^
[   14.541786]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.542155]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.542553] ==================================================================
[   14.253562] ==================================================================
[   14.253829] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   14.254429] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.255230] 
[   14.255410] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.255481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.255494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.255516] Call Trace:
[   14.255547]  <TASK>
[   14.255564]  dump_stack_lvl+0x73/0xb0
[   14.255595]  print_report+0xd1/0x650
[   14.255617]  ? __virt_addr_valid+0x1db/0x2d0
[   14.255641]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.255663]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.255698]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.255721]  kasan_report+0x141/0x180
[   14.255743]  ? kasan_atomics_helper+0xa2b/0x5450
[   14.255769]  kasan_check_range+0x10c/0x1c0
[   14.255793]  __kasan_check_write+0x18/0x20
[   14.255813]  kasan_atomics_helper+0xa2b/0x5450
[   14.255836]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.255858]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.255883]  ? kasan_atomics+0x152/0x310
[   14.255910]  kasan_atomics+0x1dc/0x310
[   14.255944]  ? __pfx_kasan_atomics+0x10/0x10
[   14.255968]  ? __pfx_read_tsc+0x10/0x10
[   14.255990]  ? ktime_get_ts64+0x86/0x230
[   14.256017]  kunit_try_run_case+0x1a5/0x480
[   14.256041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.256063]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.256086]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.256109]  ? __kthread_parkme+0x82/0x180
[   14.256130]  ? preempt_count_sub+0x50/0x80
[   14.256153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.256179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.256202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.256226]  kthread+0x337/0x6f0
[   14.256246]  ? trace_preempt_on+0x20/0xc0
[   14.256270]  ? __pfx_kthread+0x10/0x10
[   14.256291]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.256312]  ? calculate_sigpending+0x7b/0xa0
[   14.256337]  ? __pfx_kthread+0x10/0x10
[   14.256359]  ret_from_fork+0x116/0x1d0
[   14.256378]  ? __pfx_kthread+0x10/0x10
[   14.256469]  ret_from_fork_asm+0x1a/0x30
[   14.256503]  </TASK>
[   14.256514] 
[   14.267301] Allocated by task 290:
[   14.267468]  kasan_save_stack+0x45/0x70
[   14.267692]  kasan_save_track+0x18/0x40
[   14.268039]  kasan_save_alloc_info+0x3b/0x50
[   14.268309]  __kasan_kmalloc+0xb7/0xc0
[   14.268483]  __kmalloc_cache_noprof+0x189/0x420
[   14.268730]  kasan_atomics+0x95/0x310
[   14.268899]  kunit_try_run_case+0x1a5/0x480
[   14.269142]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.269521]  kthread+0x337/0x6f0
[   14.269841]  ret_from_fork+0x116/0x1d0
[   14.270095]  ret_from_fork_asm+0x1a/0x30
[   14.270291] 
[   14.270382] The buggy address belongs to the object at ffff8881028d8d80
[   14.270382]  which belongs to the cache kmalloc-64 of size 64
[   14.270910] The buggy address is located 0 bytes to the right of
[   14.270910]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.271379] 
[   14.271451] The buggy address belongs to the physical page:
[   14.271618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.272094] flags: 0x200000000000000(node=0|zone=2)
[   14.272377] page_type: f5(slab)
[   14.272617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.272969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.273225] page dumped because: kasan: bad access detected
[   14.273676] 
[   14.273784] Memory state around the buggy address:
[   14.274065]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.274391]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.274714] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.275067]                                      ^
[   14.275277]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.275774]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.276280] ==================================================================
[   14.344882] ==================================================================
[   14.345668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   14.346104] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.346330] 
[   14.346641] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.346698] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.346711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.346733] Call Trace:
[   14.346749]  <TASK>
[   14.346765]  dump_stack_lvl+0x73/0xb0
[   14.346793]  print_report+0xd1/0x650
[   14.346815]  ? __virt_addr_valid+0x1db/0x2d0
[   14.346838]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.346859]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.346882]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.346903]  kasan_report+0x141/0x180
[   14.346925]  ? kasan_atomics_helper+0x4a84/0x5450
[   14.347227]  __asan_report_load4_noabort+0x18/0x20
[   14.347254]  kasan_atomics_helper+0x4a84/0x5450
[   14.347290]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.347313]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.347394]  ? kasan_atomics+0x152/0x310
[   14.347422]  kasan_atomics+0x1dc/0x310
[   14.347445]  ? __pfx_kasan_atomics+0x10/0x10
[   14.347468]  ? __pfx_read_tsc+0x10/0x10
[   14.347490]  ? ktime_get_ts64+0x86/0x230
[   14.347515]  kunit_try_run_case+0x1a5/0x480
[   14.347539]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.347561]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.347584]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.347606]  ? __kthread_parkme+0x82/0x180
[   14.347626]  ? preempt_count_sub+0x50/0x80
[   14.347649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.347673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.347695]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.347719]  kthread+0x337/0x6f0
[   14.347739]  ? trace_preempt_on+0x20/0xc0
[   14.347762]  ? __pfx_kthread+0x10/0x10
[   14.347783]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.347803]  ? calculate_sigpending+0x7b/0xa0
[   14.347826]  ? __pfx_kthread+0x10/0x10
[   14.347848]  ret_from_fork+0x116/0x1d0
[   14.347867]  ? __pfx_kthread+0x10/0x10
[   14.347888]  ret_from_fork_asm+0x1a/0x30
[   14.347919]  </TASK>
[   14.347941] 
[   14.363905] Allocated by task 290:
[   14.364406]  kasan_save_stack+0x45/0x70
[   14.364771]  kasan_save_track+0x18/0x40
[   14.364915]  kasan_save_alloc_info+0x3b/0x50
[   14.365071]  __kasan_kmalloc+0xb7/0xc0
[   14.365200]  __kmalloc_cache_noprof+0x189/0x420
[   14.365349]  kasan_atomics+0x95/0x310
[   14.366181]  kunit_try_run_case+0x1a5/0x480
[   14.366785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.367493]  kthread+0x337/0x6f0
[   14.367948]  ret_from_fork+0x116/0x1d0
[   14.368506]  ret_from_fork_asm+0x1a/0x30
[   14.369018] 
[   14.369322] The buggy address belongs to the object at ffff8881028d8d80
[   14.369322]  which belongs to the cache kmalloc-64 of size 64
[   14.370831] The buggy address is located 0 bytes to the right of
[   14.370831]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.372406] 
[   14.372798] The buggy address belongs to the physical page:
[   14.373231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.373993] flags: 0x200000000000000(node=0|zone=2)
[   14.374563] page_type: f5(slab)
[   14.374693] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.374920] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.375172] page dumped because: kasan: bad access detected
[   14.375531] 
[   14.375696] Memory state around the buggy address:
[   14.376014]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.376355]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.376990] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.377432]                                      ^
[   14.377810]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.378214]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.378549] ==================================================================
[   14.870366] ==================================================================
[   14.870703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   14.870993] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.871318] 
[   14.871406] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.871453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.871465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.871487] Call Trace:
[   14.871505]  <TASK>
[   14.871524]  dump_stack_lvl+0x73/0xb0
[   14.871553]  print_report+0xd1/0x650
[   14.871575]  ? __virt_addr_valid+0x1db/0x2d0
[   14.871598]  ? kasan_atomics_helper+0x1818/0x5450
[   14.871619]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.871641]  ? kasan_atomics_helper+0x1818/0x5450
[   14.871663]  kasan_report+0x141/0x180
[   14.871685]  ? kasan_atomics_helper+0x1818/0x5450
[   14.871712]  kasan_check_range+0x10c/0x1c0
[   14.871735]  __kasan_check_write+0x18/0x20
[   14.871755]  kasan_atomics_helper+0x1818/0x5450
[   14.871777]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.871799]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.871823]  ? kasan_atomics+0x152/0x310
[   14.871849]  kasan_atomics+0x1dc/0x310
[   14.871872]  ? __pfx_kasan_atomics+0x10/0x10
[   14.871896]  ? __pfx_read_tsc+0x10/0x10
[   14.871917]  ? ktime_get_ts64+0x86/0x230
[   14.871955]  kunit_try_run_case+0x1a5/0x480
[   14.871980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.872002]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.872025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.872048]  ? __kthread_parkme+0x82/0x180
[   14.872069]  ? preempt_count_sub+0x50/0x80
[   14.872093]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.872116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.872139]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.872163]  kthread+0x337/0x6f0
[   14.872182]  ? trace_preempt_on+0x20/0xc0
[   14.872207]  ? __pfx_kthread+0x10/0x10
[   14.872227]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.872248]  ? calculate_sigpending+0x7b/0xa0
[   14.872273]  ? __pfx_kthread+0x10/0x10
[   14.872295]  ret_from_fork+0x116/0x1d0
[   14.872314]  ? __pfx_kthread+0x10/0x10
[   14.872334]  ret_from_fork_asm+0x1a/0x30
[   14.872365]  </TASK>
[   14.872377] 
[   14.879617] Allocated by task 290:
[   14.879742]  kasan_save_stack+0x45/0x70
[   14.879880]  kasan_save_track+0x18/0x40
[   14.880021]  kasan_save_alloc_info+0x3b/0x50
[   14.880167]  __kasan_kmalloc+0xb7/0xc0
[   14.880292]  __kmalloc_cache_noprof+0x189/0x420
[   14.880479]  kasan_atomics+0x95/0x310
[   14.880665]  kunit_try_run_case+0x1a5/0x480
[   14.880863]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.881114]  kthread+0x337/0x6f0
[   14.881277]  ret_from_fork+0x116/0x1d0
[   14.881455]  ret_from_fork_asm+0x1a/0x30
[   14.881643] 
[   14.881738] The buggy address belongs to the object at ffff8881028d8d80
[   14.881738]  which belongs to the cache kmalloc-64 of size 64
[   14.882184] The buggy address is located 0 bytes to the right of
[   14.882184]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.882539] 
[   14.882606] The buggy address belongs to the physical page:
[   14.882769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.883900] flags: 0x200000000000000(node=0|zone=2)
[   14.884156] page_type: f5(slab)
[   14.884318] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.884983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.885320] page dumped because: kasan: bad access detected
[   14.885847] 
[   14.886095] Memory state around the buggy address:
[   14.886332]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.886893]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.887210] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.887662]                                      ^
[   14.888106]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.888597]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.888880] ==================================================================
[   14.796874] ==================================================================
[   14.797195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   14.797518] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.797823] 
[   14.797905] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.797961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.797973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.797995] Call Trace:
[   14.798013]  <TASK>
[   14.798030]  dump_stack_lvl+0x73/0xb0
[   14.798058]  print_report+0xd1/0x650
[   14.798079]  ? __virt_addr_valid+0x1db/0x2d0
[   14.798102]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.798123]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.798146]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.798168]  kasan_report+0x141/0x180
[   14.798190]  ? kasan_atomics_helper+0x15b6/0x5450
[   14.798217]  kasan_check_range+0x10c/0x1c0
[   14.798240]  __kasan_check_write+0x18/0x20
[   14.798260]  kasan_atomics_helper+0x15b6/0x5450
[   14.798282]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.798304]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.798330]  ? kasan_atomics+0x152/0x310
[   14.798356]  kasan_atomics+0x1dc/0x310
[   14.798379]  ? __pfx_kasan_atomics+0x10/0x10
[   14.798404]  ? __pfx_read_tsc+0x10/0x10
[   14.798427]  ? ktime_get_ts64+0x86/0x230
[   14.798453]  kunit_try_run_case+0x1a5/0x480
[   14.798478]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.798501]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.798524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.798558]  ? __kthread_parkme+0x82/0x180
[   14.798579]  ? preempt_count_sub+0x50/0x80
[   14.798603]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.798627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.798650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.798673]  kthread+0x337/0x6f0
[   14.798693]  ? trace_preempt_on+0x20/0xc0
[   14.798718]  ? __pfx_kthread+0x10/0x10
[   14.798739]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.798760]  ? calculate_sigpending+0x7b/0xa0
[   14.798785]  ? __pfx_kthread+0x10/0x10
[   14.798806]  ret_from_fork+0x116/0x1d0
[   14.798826]  ? __pfx_kthread+0x10/0x10
[   14.798847]  ret_from_fork_asm+0x1a/0x30
[   14.798878]  </TASK>
[   14.798889] 
[   14.805878] Allocated by task 290:
[   14.806016]  kasan_save_stack+0x45/0x70
[   14.806152]  kasan_save_track+0x18/0x40
[   14.806334]  kasan_save_alloc_info+0x3b/0x50
[   14.806528]  __kasan_kmalloc+0xb7/0xc0
[   14.806705]  __kmalloc_cache_noprof+0x189/0x420
[   14.806914]  kasan_atomics+0x95/0x310
[   14.807293]  kunit_try_run_case+0x1a5/0x480
[   14.807494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.807732]  kthread+0x337/0x6f0
[   14.807864]  ret_from_fork+0x116/0x1d0
[   14.807998]  ret_from_fork_asm+0x1a/0x30
[   14.808127] 
[   14.808193] The buggy address belongs to the object at ffff8881028d8d80
[   14.808193]  which belongs to the cache kmalloc-64 of size 64
[   14.808620] The buggy address is located 0 bytes to the right of
[   14.808620]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.809174] 
[   14.809270] The buggy address belongs to the physical page:
[   14.809523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.809836] flags: 0x200000000000000(node=0|zone=2)
[   14.810051] page_type: f5(slab)
[   14.810200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.810509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.810800] page dumped because: kasan: bad access detected
[   14.810969] 
[   14.811033] Memory state around the buggy address:
[   14.811178]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.811380]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.811681] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.811989]                                      ^
[   14.812206]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.812682]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.812916] ==================================================================
[   15.134119] ==================================================================
[   15.134893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   15.135316] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   15.135693] 
[   15.135873] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   15.136052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.136068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.136091] Call Trace:
[   15.136161]  <TASK>
[   15.136182]  dump_stack_lvl+0x73/0xb0
[   15.136214]  print_report+0xd1/0x650
[   15.136237]  ? __virt_addr_valid+0x1db/0x2d0
[   15.136261]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.136282]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.136305]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.136327]  kasan_report+0x141/0x180
[   15.136349]  ? kasan_atomics_helper+0x1eaa/0x5450
[   15.136375]  kasan_check_range+0x10c/0x1c0
[   15.136399]  __kasan_check_write+0x18/0x20
[   15.136419]  kasan_atomics_helper+0x1eaa/0x5450
[   15.136441]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.136463]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.136487]  ? kasan_atomics+0x152/0x310
[   15.136513]  kasan_atomics+0x1dc/0x310
[   15.136535]  ? __pfx_kasan_atomics+0x10/0x10
[   15.136559]  ? __pfx_read_tsc+0x10/0x10
[   15.136581]  ? ktime_get_ts64+0x86/0x230
[   15.136608]  kunit_try_run_case+0x1a5/0x480
[   15.136632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.136654]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.136677]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.136699]  ? __kthread_parkme+0x82/0x180
[   15.136719]  ? preempt_count_sub+0x50/0x80
[   15.136743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.136766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.136789]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.136812]  kthread+0x337/0x6f0
[   15.136833]  ? trace_preempt_on+0x20/0xc0
[   15.136858]  ? __pfx_kthread+0x10/0x10
[   15.136879]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.136900]  ? calculate_sigpending+0x7b/0xa0
[   15.136924]  ? __pfx_kthread+0x10/0x10
[   15.136957]  ret_from_fork+0x116/0x1d0
[   15.136976]  ? __pfx_kthread+0x10/0x10
[   15.136998]  ret_from_fork_asm+0x1a/0x30
[   15.137028]  </TASK>
[   15.137040] 
[   15.146452] Allocated by task 290:
[   15.146644]  kasan_save_stack+0x45/0x70
[   15.146830]  kasan_save_track+0x18/0x40
[   15.146993]  kasan_save_alloc_info+0x3b/0x50
[   15.147206]  __kasan_kmalloc+0xb7/0xc0
[   15.147378]  __kmalloc_cache_noprof+0x189/0x420
[   15.147565]  kasan_atomics+0x95/0x310
[   15.147748]  kunit_try_run_case+0x1a5/0x480
[   15.148631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.148867]  kthread+0x337/0x6f0
[   15.149011]  ret_from_fork+0x116/0x1d0
[   15.149330]  ret_from_fork_asm+0x1a/0x30
[   15.149560] 
[   15.149740] The buggy address belongs to the object at ffff8881028d8d80
[   15.149740]  which belongs to the cache kmalloc-64 of size 64
[   15.150345] The buggy address is located 0 bytes to the right of
[   15.150345]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   15.151054] 
[   15.151220] The buggy address belongs to the physical page:
[   15.151533] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   15.152001] flags: 0x200000000000000(node=0|zone=2)
[   15.152286] page_type: f5(slab)
[   15.152419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.152982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.153355] page dumped because: kasan: bad access detected
[   15.153642] 
[   15.153940] Memory state around the buggy address:
[   15.154137]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.154565]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.154868] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.155279]                                      ^
[   15.155583]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.155836]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.156247] ==================================================================
[   14.057940] ==================================================================
[   14.058298] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   14.058733] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.059214] 
[   14.059325] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.059458] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.059476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.059498] Call Trace:
[   14.059520]  <TASK>
[   14.059542]  dump_stack_lvl+0x73/0xb0
[   14.059598]  print_report+0xd1/0x650
[   14.059624]  ? __virt_addr_valid+0x1db/0x2d0
[   14.059647]  ? kasan_atomics_helper+0x565/0x5450
[   14.059668]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.059691]  ? kasan_atomics_helper+0x565/0x5450
[   14.059712]  kasan_report+0x141/0x180
[   14.059735]  ? kasan_atomics_helper+0x565/0x5450
[   14.059760]  kasan_check_range+0x10c/0x1c0
[   14.059785]  __kasan_check_write+0x18/0x20
[   14.059805]  kasan_atomics_helper+0x565/0x5450
[   14.059827]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.059851]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.059877]  ? kasan_atomics+0x152/0x310
[   14.059903]  kasan_atomics+0x1dc/0x310
[   14.059940]  ? __pfx_kasan_atomics+0x10/0x10
[   14.059965]  ? __pfx_read_tsc+0x10/0x10
[   14.059987]  ? ktime_get_ts64+0x86/0x230
[   14.060013]  kunit_try_run_case+0x1a5/0x480
[   14.060038]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.060062]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.060084]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.060107]  ? __kthread_parkme+0x82/0x180
[   14.060129]  ? preempt_count_sub+0x50/0x80
[   14.060173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.060197]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.060220]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.060244]  kthread+0x337/0x6f0
[   14.060264]  ? trace_preempt_on+0x20/0xc0
[   14.060289]  ? __pfx_kthread+0x10/0x10
[   14.060310]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.060331]  ? calculate_sigpending+0x7b/0xa0
[   14.060355]  ? __pfx_kthread+0x10/0x10
[   14.060593]  ret_from_fork+0x116/0x1d0
[   14.060626]  ? __pfx_kthread+0x10/0x10
[   14.060649]  ret_from_fork_asm+0x1a/0x30
[   14.060681]  </TASK>
[   14.060693] 
[   14.074259] Allocated by task 290:
[   14.074661]  kasan_save_stack+0x45/0x70
[   14.075036]  kasan_save_track+0x18/0x40
[   14.075367]  kasan_save_alloc_info+0x3b/0x50
[   14.075824]  __kasan_kmalloc+0xb7/0xc0
[   14.076172]  __kmalloc_cache_noprof+0x189/0x420
[   14.076413]  kasan_atomics+0x95/0x310
[   14.076542]  kunit_try_run_case+0x1a5/0x480
[   14.077252]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.077803]  kthread+0x337/0x6f0
[   14.078127]  ret_from_fork+0x116/0x1d0
[   14.078432]  ret_from_fork_asm+0x1a/0x30
[   14.078738] 
[   14.078810] The buggy address belongs to the object at ffff8881028d8d80
[   14.078810]  which belongs to the cache kmalloc-64 of size 64
[   14.079170] The buggy address is located 0 bytes to the right of
[   14.079170]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.079865] 
[   14.080036] The buggy address belongs to the physical page:
[   14.080709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.081398] flags: 0x200000000000000(node=0|zone=2)
[   14.081877] page_type: f5(slab)
[   14.082297] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.083021] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.083747] page dumped because: kasan: bad access detected
[   14.084226] 
[   14.084385] Memory state around the buggy address:
[   14.084882]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.085218]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.085660] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.086278]                                      ^
[   14.086717]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.087461]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.087835] ==================================================================
[   14.665897] ==================================================================
[   14.666559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   14.667184] Read of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.667793] 
[   14.667970] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.668017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.668029] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.668051] Call Trace:
[   14.668069]  <TASK>
[   14.668087]  dump_stack_lvl+0x73/0xb0
[   14.668118]  print_report+0xd1/0x650
[   14.668140]  ? __virt_addr_valid+0x1db/0x2d0
[   14.668163]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.668184]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.668206]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.668228]  kasan_report+0x141/0x180
[   14.668250]  ? kasan_atomics_helper+0x13b5/0x5450
[   14.668276]  kasan_check_range+0x10c/0x1c0
[   14.668301]  __kasan_check_read+0x15/0x20
[   14.668320]  kasan_atomics_helper+0x13b5/0x5450
[   14.668343]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.668364]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.668411]  ? kasan_atomics+0x152/0x310
[   14.668438]  kasan_atomics+0x1dc/0x310
[   14.668460]  ? __pfx_kasan_atomics+0x10/0x10
[   14.668484]  ? __pfx_read_tsc+0x10/0x10
[   14.668506]  ? ktime_get_ts64+0x86/0x230
[   14.668531]  kunit_try_run_case+0x1a5/0x480
[   14.668555]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.668577]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.668600]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.668622]  ? __kthread_parkme+0x82/0x180
[   14.668643]  ? preempt_count_sub+0x50/0x80
[   14.668666]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.668690]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.668713]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.668737]  kthread+0x337/0x6f0
[   14.668756]  ? trace_preempt_on+0x20/0xc0
[   14.668781]  ? __pfx_kthread+0x10/0x10
[   14.668803]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.668824]  ? calculate_sigpending+0x7b/0xa0
[   14.668848]  ? __pfx_kthread+0x10/0x10
[   14.668870]  ret_from_fork+0x116/0x1d0
[   14.668890]  ? __pfx_kthread+0x10/0x10
[   14.668910]  ret_from_fork_asm+0x1a/0x30
[   14.668952]  </TASK>
[   14.668963] 
[   14.681190] Allocated by task 290:
[   14.681527]  kasan_save_stack+0x45/0x70
[   14.681894]  kasan_save_track+0x18/0x40
[   14.682247]  kasan_save_alloc_info+0x3b/0x50
[   14.682545]  __kasan_kmalloc+0xb7/0xc0
[   14.682676]  __kmalloc_cache_noprof+0x189/0x420
[   14.682825]  kasan_atomics+0x95/0x310
[   14.682963]  kunit_try_run_case+0x1a5/0x480
[   14.683107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.683275]  kthread+0x337/0x6f0
[   14.683450]  ret_from_fork+0x116/0x1d0
[   14.683778]  ret_from_fork_asm+0x1a/0x30
[   14.684127] 
[   14.684279] The buggy address belongs to the object at ffff8881028d8d80
[   14.684279]  which belongs to the cache kmalloc-64 of size 64
[   14.685323] The buggy address is located 0 bytes to the right of
[   14.685323]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.686427] 
[   14.686583] The buggy address belongs to the physical page:
[   14.687064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.687741] flags: 0x200000000000000(node=0|zone=2)
[   14.688179] page_type: f5(slab)
[   14.688488] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.689129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.689356] page dumped because: kasan: bad access detected
[   14.689860] 
[   14.690017] Memory state around the buggy address:
[   14.690448]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.690816]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.691256] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.691856]                                      ^
[   14.692267]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.692577]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.692789] ==================================================================
[   15.223344] ==================================================================
[   15.223623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   15.223899] Read of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   15.224386] 
[   15.224516] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   15.224565] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.224578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.224600] Call Trace:
[   15.224621]  <TASK>
[   15.224642]  dump_stack_lvl+0x73/0xb0
[   15.224671]  print_report+0xd1/0x650
[   15.224693]  ? __virt_addr_valid+0x1db/0x2d0
[   15.224716]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.224737]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.224759]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.224781]  kasan_report+0x141/0x180
[   15.224803]  ? kasan_atomics_helper+0x4f98/0x5450
[   15.224830]  __asan_report_load8_noabort+0x18/0x20
[   15.224854]  kasan_atomics_helper+0x4f98/0x5450
[   15.224876]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.224899]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.224924]  ? kasan_atomics+0x152/0x310
[   15.224961]  kasan_atomics+0x1dc/0x310
[   15.224984]  ? __pfx_kasan_atomics+0x10/0x10
[   15.225008]  ? __pfx_read_tsc+0x10/0x10
[   15.225030]  ? ktime_get_ts64+0x86/0x230
[   15.225123]  kunit_try_run_case+0x1a5/0x480
[   15.225160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.225182]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.225205]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.225228]  ? __kthread_parkme+0x82/0x180
[   15.225249]  ? preempt_count_sub+0x50/0x80
[   15.225273]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.225297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.225321]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.225344]  kthread+0x337/0x6f0
[   15.225424]  ? trace_preempt_on+0x20/0xc0
[   15.225462]  ? __pfx_kthread+0x10/0x10
[   15.225484]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.225505]  ? calculate_sigpending+0x7b/0xa0
[   15.225578]  ? __pfx_kthread+0x10/0x10
[   15.225600]  ret_from_fork+0x116/0x1d0
[   15.225629]  ? __pfx_kthread+0x10/0x10
[   15.225651]  ret_from_fork_asm+0x1a/0x30
[   15.225686]  </TASK>
[   15.225698] 
[   15.234606] Allocated by task 290:
[   15.235262]  kasan_save_stack+0x45/0x70
[   15.236043]  kasan_save_track+0x18/0x40
[   15.236200]  kasan_save_alloc_info+0x3b/0x50
[   15.236506]  __kasan_kmalloc+0xb7/0xc0
[   15.236971]  __kmalloc_cache_noprof+0x189/0x420
[   15.237182]  kasan_atomics+0x95/0x310
[   15.237489]  kunit_try_run_case+0x1a5/0x480
[   15.237722]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.238185]  kthread+0x337/0x6f0
[   15.238457]  ret_from_fork+0x116/0x1d0
[   15.238735]  ret_from_fork_asm+0x1a/0x30
[   15.239029] 
[   15.239241] The buggy address belongs to the object at ffff8881028d8d80
[   15.239241]  which belongs to the cache kmalloc-64 of size 64
[   15.240082] The buggy address is located 0 bytes to the right of
[   15.240082]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   15.240822] 
[   15.240943] The buggy address belongs to the physical page:
[   15.241359] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   15.241807] flags: 0x200000000000000(node=0|zone=2)
[   15.242119] page_type: f5(slab)
[   15.242319] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.242866] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.243312] page dumped because: kasan: bad access detected
[   15.243773] 
[   15.243859] Memory state around the buggy address:
[   15.244242]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.244780]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.245188] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.245650]                                      ^
[   15.245888]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.246297]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.246682] ==================================================================
[   15.247317] ==================================================================
[   15.247610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   15.248505] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   15.248879] 
[   15.249110] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   15.249160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.249173] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.249294] Call Trace:
[   15.249313]  <TASK>
[   15.249330]  dump_stack_lvl+0x73/0xb0
[   15.249360]  print_report+0xd1/0x650
[   15.249384]  ? __virt_addr_valid+0x1db/0x2d0
[   15.249407]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.249428]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.249450]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.249472]  kasan_report+0x141/0x180
[   15.249494]  ? kasan_atomics_helper+0x20c8/0x5450
[   15.249520]  kasan_check_range+0x10c/0x1c0
[   15.249544]  __kasan_check_write+0x18/0x20
[   15.249564]  kasan_atomics_helper+0x20c8/0x5450
[   15.249586]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.249608]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.249633]  ? kasan_atomics+0x152/0x310
[   15.249662]  kasan_atomics+0x1dc/0x310
[   15.249693]  ? __pfx_kasan_atomics+0x10/0x10
[   15.249718]  ? __pfx_read_tsc+0x10/0x10
[   15.249739]  ? ktime_get_ts64+0x86/0x230
[   15.249765]  kunit_try_run_case+0x1a5/0x480
[   15.249790]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.249812]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.249835]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.249858]  ? __kthread_parkme+0x82/0x180
[   15.249879]  ? preempt_count_sub+0x50/0x80
[   15.249903]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.249926]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.249960]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.249984]  kthread+0x337/0x6f0
[   15.250004]  ? trace_preempt_on+0x20/0xc0
[   15.250028]  ? __pfx_kthread+0x10/0x10
[   15.250049]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.250070]  ? calculate_sigpending+0x7b/0xa0
[   15.250095]  ? __pfx_kthread+0x10/0x10
[   15.250117]  ret_from_fork+0x116/0x1d0
[   15.250135]  ? __pfx_kthread+0x10/0x10
[   15.250156]  ret_from_fork_asm+0x1a/0x30
[   15.250187]  </TASK>
[   15.250197] 
[   15.263827] Allocated by task 290:
[   15.264369]  kasan_save_stack+0x45/0x70
[   15.264904]  kasan_save_track+0x18/0x40
[   15.265440]  kasan_save_alloc_info+0x3b/0x50
[   15.265996]  __kasan_kmalloc+0xb7/0xc0
[   15.266483]  __kmalloc_cache_noprof+0x189/0x420
[   15.266648]  kasan_atomics+0x95/0x310
[   15.266776]  kunit_try_run_case+0x1a5/0x480
[   15.266913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.267087]  kthread+0x337/0x6f0
[   15.267201]  ret_from_fork+0x116/0x1d0
[   15.267322]  ret_from_fork_asm+0x1a/0x30
[   15.267792] 
[   15.267961] The buggy address belongs to the object at ffff8881028d8d80
[   15.267961]  which belongs to the cache kmalloc-64 of size 64
[   15.269107] The buggy address is located 0 bytes to the right of
[   15.269107]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   15.270209] 
[   15.270411] The buggy address belongs to the physical page:
[   15.270891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   15.271508] flags: 0x200000000000000(node=0|zone=2)
[   15.271798] page_type: f5(slab)
[   15.272108] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.272332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.272985] page dumped because: kasan: bad access detected
[   15.273490] 
[   15.273666] Memory state around the buggy address:
[   15.273997]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.274559]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.274898] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.275546]                                      ^
[   15.275877]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.276088]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.276287] ==================================================================
[   13.921563] ==================================================================
[   13.921792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   13.922042] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   13.922602] 
[   13.922789] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   13.922832] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.922843] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.922862] Call Trace:
[   13.922876]  <TASK>
[   13.922890]  dump_stack_lvl+0x73/0xb0
[   13.922927]  print_report+0xd1/0x650
[   13.922959]  ? __virt_addr_valid+0x1db/0x2d0
[   13.922980]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.923000]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.923021]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.923043]  kasan_report+0x141/0x180
[   13.923075]  ? kasan_atomics_helper+0x4b88/0x5450
[   13.923100]  __asan_report_load4_noabort+0x18/0x20
[   13.923135]  kasan_atomics_helper+0x4b88/0x5450
[   13.923157]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.923178]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.923201]  ? kasan_atomics+0x152/0x310
[   13.923226]  kasan_atomics+0x1dc/0x310
[   13.923248]  ? __pfx_kasan_atomics+0x10/0x10
[   13.923271]  ? __pfx_read_tsc+0x10/0x10
[   13.923290]  ? ktime_get_ts64+0x86/0x230
[   13.923315]  kunit_try_run_case+0x1a5/0x480
[   13.923337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.923359]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.923380]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.923410]  ? __kthread_parkme+0x82/0x180
[   13.923440]  ? preempt_count_sub+0x50/0x80
[   13.923463]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.923486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.923519]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.923542]  kthread+0x337/0x6f0
[   13.923560]  ? trace_preempt_on+0x20/0xc0
[   13.923583]  ? __pfx_kthread+0x10/0x10
[   13.923603]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.923623]  ? calculate_sigpending+0x7b/0xa0
[   13.923645]  ? __pfx_kthread+0x10/0x10
[   13.923666]  ret_from_fork+0x116/0x1d0
[   13.923685]  ? __pfx_kthread+0x10/0x10
[   13.923810]  ret_from_fork_asm+0x1a/0x30
[   13.923842]  </TASK>
[   13.923889] 
[   13.931951] Allocated by task 290:
[   13.932126]  kasan_save_stack+0x45/0x70
[   13.932264]  kasan_save_track+0x18/0x40
[   13.932394]  kasan_save_alloc_info+0x3b/0x50
[   13.932803]  __kasan_kmalloc+0xb7/0xc0
[   13.932942]  __kmalloc_cache_noprof+0x189/0x420
[   13.933202]  kasan_atomics+0x95/0x310
[   13.933555]  kunit_try_run_case+0x1a5/0x480
[   13.933755]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.934000]  kthread+0x337/0x6f0
[   13.934164]  ret_from_fork+0x116/0x1d0
[   13.934313]  ret_from_fork_asm+0x1a/0x30
[   13.934652] 
[   13.934754] The buggy address belongs to the object at ffff8881028d8d80
[   13.934754]  which belongs to the cache kmalloc-64 of size 64
[   13.935236] The buggy address is located 0 bytes to the right of
[   13.935236]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   13.935784] 
[   13.935876] The buggy address belongs to the physical page:
[   13.936136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   13.936551] flags: 0x200000000000000(node=0|zone=2)
[   13.936754] page_type: f5(slab)
[   13.936911] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.937227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.937594] page dumped because: kasan: bad access detected
[   13.937901] 
[   13.937976] Memory state around the buggy address:
[   13.938192]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.938539]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.938750] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.938964]                                      ^
[   13.939112]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.939319]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.939523] ==================================================================
[   14.721479] ==================================================================
[   14.722299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   14.722948] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.723621] 
[   14.723794] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.723839] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.723851] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.723872] Call Trace:
[   14.723889]  <TASK>
[   14.723905]  dump_stack_lvl+0x73/0xb0
[   14.723979]  print_report+0xd1/0x650
[   14.724002]  ? __virt_addr_valid+0x1db/0x2d0
[   14.724024]  ? kasan_atomics_helper+0x1467/0x5450
[   14.724045]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.724067]  ? kasan_atomics_helper+0x1467/0x5450
[   14.724089]  kasan_report+0x141/0x180
[   14.724111]  ? kasan_atomics_helper+0x1467/0x5450
[   14.724138]  kasan_check_range+0x10c/0x1c0
[   14.724162]  __kasan_check_write+0x18/0x20
[   14.724181]  kasan_atomics_helper+0x1467/0x5450
[   14.724204]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.724227]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.724252]  ? kasan_atomics+0x152/0x310
[   14.724278]  kasan_atomics+0x1dc/0x310
[   14.724300]  ? __pfx_kasan_atomics+0x10/0x10
[   14.724325]  ? __pfx_read_tsc+0x10/0x10
[   14.724345]  ? ktime_get_ts64+0x86/0x230
[   14.724370]  kunit_try_run_case+0x1a5/0x480
[   14.724415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.724437]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.724459]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.724482]  ? __kthread_parkme+0x82/0x180
[   14.724502]  ? preempt_count_sub+0x50/0x80
[   14.724526]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.724549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.724572]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.724596]  kthread+0x337/0x6f0
[   14.724616]  ? trace_preempt_on+0x20/0xc0
[   14.724640]  ? __pfx_kthread+0x10/0x10
[   14.724661]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.724682]  ? calculate_sigpending+0x7b/0xa0
[   14.724706]  ? __pfx_kthread+0x10/0x10
[   14.724729]  ret_from_fork+0x116/0x1d0
[   14.724748]  ? __pfx_kthread+0x10/0x10
[   14.724769]  ret_from_fork_asm+0x1a/0x30
[   14.724800]  </TASK>
[   14.724811] 
[   14.740086] Allocated by task 290:
[   14.740222]  kasan_save_stack+0x45/0x70
[   14.740370]  kasan_save_track+0x18/0x40
[   14.740510]  kasan_save_alloc_info+0x3b/0x50
[   14.740652]  __kasan_kmalloc+0xb7/0xc0
[   14.740779]  __kmalloc_cache_noprof+0x189/0x420
[   14.740927]  kasan_atomics+0x95/0x310
[   14.741510]  kunit_try_run_case+0x1a5/0x480
[   14.741879]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.742461]  kthread+0x337/0x6f0
[   14.742822]  ret_from_fork+0x116/0x1d0
[   14.743218]  ret_from_fork_asm+0x1a/0x30
[   14.743644] 
[   14.743803] The buggy address belongs to the object at ffff8881028d8d80
[   14.743803]  which belongs to the cache kmalloc-64 of size 64
[   14.744995] The buggy address is located 0 bytes to the right of
[   14.744995]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.746096] 
[   14.746173] The buggy address belongs to the physical page:
[   14.746344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.746893] flags: 0x200000000000000(node=0|zone=2)
[   14.747377] page_type: f5(slab)
[   14.747764] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.748487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.749166] page dumped because: kasan: bad access detected
[   14.749355] 
[   14.749435] Memory state around the buggy address:
[   14.749728]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.750199]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.750428] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.750836]                                      ^
[   14.751193]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.751679]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.751889] ==================================================================
[   15.156924] ==================================================================
[   15.157296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   15.157945] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   15.158308] 
[   15.158397] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   15.158442] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.158455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.158476] Call Trace:
[   15.158492]  <TASK>
[   15.158509]  dump_stack_lvl+0x73/0xb0
[   15.158538]  print_report+0xd1/0x650
[   15.158561]  ? __virt_addr_valid+0x1db/0x2d0
[   15.158586]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.158607]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.158630]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.158652]  kasan_report+0x141/0x180
[   15.158675]  ? kasan_atomics_helper+0x1f43/0x5450
[   15.158702]  kasan_check_range+0x10c/0x1c0
[   15.158726]  __kasan_check_write+0x18/0x20
[   15.158746]  kasan_atomics_helper+0x1f43/0x5450
[   15.158769]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.158791]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.158816]  ? kasan_atomics+0x152/0x310
[   15.158843]  kasan_atomics+0x1dc/0x310
[   15.158865]  ? __pfx_kasan_atomics+0x10/0x10
[   15.158889]  ? __pfx_read_tsc+0x10/0x10
[   15.158910]  ? ktime_get_ts64+0x86/0x230
[   15.158947]  kunit_try_run_case+0x1a5/0x480
[   15.158971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.158993]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.159016]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.159038]  ? __kthread_parkme+0x82/0x180
[   15.159059]  ? preempt_count_sub+0x50/0x80
[   15.159083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.159106]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.159129]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.159152]  kthread+0x337/0x6f0
[   15.159172]  ? trace_preempt_on+0x20/0xc0
[   15.159198]  ? __pfx_kthread+0x10/0x10
[   15.159220]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.159240]  ? calculate_sigpending+0x7b/0xa0
[   15.159264]  ? __pfx_kthread+0x10/0x10
[   15.159285]  ret_from_fork+0x116/0x1d0
[   15.159304]  ? __pfx_kthread+0x10/0x10
[   15.159324]  ret_from_fork_asm+0x1a/0x30
[   15.159356]  </TASK>
[   15.159366] 
[   15.166758] Allocated by task 290:
[   15.166917]  kasan_save_stack+0x45/0x70
[   15.167065]  kasan_save_track+0x18/0x40
[   15.167193]  kasan_save_alloc_info+0x3b/0x50
[   15.167387]  __kasan_kmalloc+0xb7/0xc0
[   15.167578]  __kmalloc_cache_noprof+0x189/0x420
[   15.167793]  kasan_atomics+0x95/0x310
[   15.167983]  kunit_try_run_case+0x1a5/0x480
[   15.168185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.168449]  kthread+0x337/0x6f0
[   15.168568]  ret_from_fork+0x116/0x1d0
[   15.168695]  ret_from_fork_asm+0x1a/0x30
[   15.168826] 
[   15.168892] The buggy address belongs to the object at ffff8881028d8d80
[   15.168892]  which belongs to the cache kmalloc-64 of size 64
[   15.170316] The buggy address is located 0 bytes to the right of
[   15.170316]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   15.171714] 
[   15.171812] The buggy address belongs to the physical page:
[   15.171993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   15.172450] flags: 0x200000000000000(node=0|zone=2)
[   15.172721] page_type: f5(slab)
[   15.172842] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.173072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.173285] page dumped because: kasan: bad access detected
[   15.173452] 
[   15.173516] Memory state around the buggy address:
[   15.173660]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.173870]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.174621] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.175376]                                      ^
[   15.175812]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.176434]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.177100] ==================================================================
[   14.890264] ==================================================================
[   14.890651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   14.891496] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.891730] 
[   14.891811] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.891856] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.891870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.891890] Call Trace:
[   14.891907]  <TASK>
[   14.891923]  dump_stack_lvl+0x73/0xb0
[   14.891965]  print_report+0xd1/0x650
[   14.891988]  ? __virt_addr_valid+0x1db/0x2d0
[   14.892011]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.892033]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.892054]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.892076]  kasan_report+0x141/0x180
[   14.892098]  ? kasan_atomics_helper+0x18b1/0x5450
[   14.892124]  kasan_check_range+0x10c/0x1c0
[   14.892147]  __kasan_check_write+0x18/0x20
[   14.892166]  kasan_atomics_helper+0x18b1/0x5450
[   14.892189]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.892211]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.892235]  ? kasan_atomics+0x152/0x310
[   14.892262]  kasan_atomics+0x1dc/0x310
[   14.892284]  ? __pfx_kasan_atomics+0x10/0x10
[   14.892307]  ? __pfx_read_tsc+0x10/0x10
[   14.892328]  ? ktime_get_ts64+0x86/0x230
[   14.892355]  kunit_try_run_case+0x1a5/0x480
[   14.892408]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.892431]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.892454]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.892537]  ? __kthread_parkme+0x82/0x180
[   14.892560]  ? preempt_count_sub+0x50/0x80
[   14.892585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.892609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.892632]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.892655]  kthread+0x337/0x6f0
[   14.892675]  ? trace_preempt_on+0x20/0xc0
[   14.892700]  ? __pfx_kthread+0x10/0x10
[   14.892721]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.892742]  ? calculate_sigpending+0x7b/0xa0
[   14.892767]  ? __pfx_kthread+0x10/0x10
[   14.892788]  ret_from_fork+0x116/0x1d0
[   14.892807]  ? __pfx_kthread+0x10/0x10
[   14.892829]  ret_from_fork_asm+0x1a/0x30
[   14.892861]  </TASK>
[   14.892874] 
[   14.905709] Allocated by task 290:
[   14.906079]  kasan_save_stack+0x45/0x70
[   14.906491]  kasan_save_track+0x18/0x40
[   14.906869]  kasan_save_alloc_info+0x3b/0x50
[   14.907280]  __kasan_kmalloc+0xb7/0xc0
[   14.907663]  __kmalloc_cache_noprof+0x189/0x420
[   14.908103]  kasan_atomics+0x95/0x310
[   14.908282]  kunit_try_run_case+0x1a5/0x480
[   14.908579]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.909095]  kthread+0x337/0x6f0
[   14.909374]  ret_from_fork+0x116/0x1d0
[   14.909517]  ret_from_fork_asm+0x1a/0x30
[   14.909888] 
[   14.910090] The buggy address belongs to the object at ffff8881028d8d80
[   14.910090]  which belongs to the cache kmalloc-64 of size 64
[   14.910700] The buggy address is located 0 bytes to the right of
[   14.910700]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.911308] 
[   14.911482] The buggy address belongs to the physical page:
[   14.911999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.912815] flags: 0x200000000000000(node=0|zone=2)
[   14.913228] page_type: f5(slab)
[   14.913347] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.913617] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.914300] page dumped because: kasan: bad access detected
[   14.914837] 
[   14.915064] Memory state around the buggy address:
[   14.915522]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.916154]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.916619] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.916831]                                      ^
[   14.916991]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.917196]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.917413] ==================================================================
[   13.903784] ==================================================================
[   13.904144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   13.904404] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   13.904740] 
[   13.904820] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   13.904873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.904884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.904904] Call Trace:
[   13.904939]  <TASK>
[   13.904954]  dump_stack_lvl+0x73/0xb0
[   13.904980]  print_report+0xd1/0x650
[   13.905001]  ? __virt_addr_valid+0x1db/0x2d0
[   13.905023]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.905043]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.905064]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.905084]  kasan_report+0x141/0x180
[   13.905125]  ? kasan_atomics_helper+0x4ba2/0x5450
[   13.905152]  __asan_report_store4_noabort+0x1b/0x30
[   13.905175]  kasan_atomics_helper+0x4ba2/0x5450
[   13.905197]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.905218]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.905242]  ? kasan_atomics+0x152/0x310
[   13.905267]  kasan_atomics+0x1dc/0x310
[   13.905289]  ? __pfx_kasan_atomics+0x10/0x10
[   13.905312]  ? __pfx_read_tsc+0x10/0x10
[   13.905332]  ? ktime_get_ts64+0x86/0x230
[   13.905356]  kunit_try_run_case+0x1a5/0x480
[   13.905379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.905400]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.905422]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.905444]  ? __kthread_parkme+0x82/0x180
[   13.905463]  ? preempt_count_sub+0x50/0x80
[   13.905486]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.905518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.905541]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.905564]  kthread+0x337/0x6f0
[   13.905594]  ? trace_preempt_on+0x20/0xc0
[   13.905618]  ? __pfx_kthread+0x10/0x10
[   13.905638]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.905667]  ? calculate_sigpending+0x7b/0xa0
[   13.905696]  ? __pfx_kthread+0x10/0x10
[   13.905718]  ret_from_fork+0x116/0x1d0
[   13.905746]  ? __pfx_kthread+0x10/0x10
[   13.905766]  ret_from_fork_asm+0x1a/0x30
[   13.905795]  </TASK>
[   13.905806] 
[   13.913617] Allocated by task 290:
[   13.913743]  kasan_save_stack+0x45/0x70
[   13.913877]  kasan_save_track+0x18/0x40
[   13.914016]  kasan_save_alloc_info+0x3b/0x50
[   13.914159]  __kasan_kmalloc+0xb7/0xc0
[   13.914346]  __kmalloc_cache_noprof+0x189/0x420
[   13.914578]  kasan_atomics+0x95/0x310
[   13.914756]  kunit_try_run_case+0x1a5/0x480
[   13.914958]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.915196]  kthread+0x337/0x6f0
[   13.915353]  ret_from_fork+0x116/0x1d0
[   13.915562]  ret_from_fork_asm+0x1a/0x30
[   13.915750] 
[   13.915837] The buggy address belongs to the object at ffff8881028d8d80
[   13.915837]  which belongs to the cache kmalloc-64 of size 64
[   13.916192] The buggy address is located 0 bytes to the right of
[   13.916192]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   13.917142] 
[   13.917269] The buggy address belongs to the physical page:
[   13.917562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   13.917833] flags: 0x200000000000000(node=0|zone=2)
[   13.918114] page_type: f5(slab)
[   13.918286] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.918709] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.918976] page dumped because: kasan: bad access detected
[   13.919223] 
[   13.919309] Memory state around the buggy address:
[   13.919653]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.919883]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.920101] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.920304]                                      ^
[   13.920483]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.920810]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.921120] ==================================================================
[   13.970155] ==================================================================
[   13.971150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   13.972073] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   13.972898] 
[   13.973119] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   13.973180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.973193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.973215] Call Trace:
[   13.973236]  <TASK>
[   13.973254]  dump_stack_lvl+0x73/0xb0
[   13.973285]  print_report+0xd1/0x650
[   13.973309]  ? __virt_addr_valid+0x1db/0x2d0
[   13.973333]  ? kasan_atomics_helper+0x3df/0x5450
[   13.973354]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.973376]  ? kasan_atomics_helper+0x3df/0x5450
[   13.973399]  kasan_report+0x141/0x180
[   13.973422]  ? kasan_atomics_helper+0x3df/0x5450
[   13.973447]  kasan_check_range+0x10c/0x1c0
[   13.973471]  __kasan_check_read+0x15/0x20
[   13.973490]  kasan_atomics_helper+0x3df/0x5450
[   13.973512]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.973572]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.973598]  ? kasan_atomics+0x152/0x310
[   13.973635]  kasan_atomics+0x1dc/0x310
[   13.973658]  ? __pfx_kasan_atomics+0x10/0x10
[   13.973688]  ? __pfx_read_tsc+0x10/0x10
[   13.973710]  ? ktime_get_ts64+0x86/0x230
[   13.973737]  kunit_try_run_case+0x1a5/0x480
[   13.973761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.973783]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.973806]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.973829]  ? __kthread_parkme+0x82/0x180
[   13.973849]  ? preempt_count_sub+0x50/0x80
[   13.973873]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.973897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.973920]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.973953]  kthread+0x337/0x6f0
[   13.973973]  ? trace_preempt_on+0x20/0xc0
[   13.973998]  ? __pfx_kthread+0x10/0x10
[   13.974019]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.974040]  ? calculate_sigpending+0x7b/0xa0
[   13.974065]  ? __pfx_kthread+0x10/0x10
[   13.974086]  ret_from_fork+0x116/0x1d0
[   13.974105]  ? __pfx_kthread+0x10/0x10
[   13.974126]  ret_from_fork_asm+0x1a/0x30
[   13.974158]  </TASK>
[   13.974169] 
[   13.988419] Allocated by task 290:
[   13.988854]  kasan_save_stack+0x45/0x70
[   13.989099]  kasan_save_track+0x18/0x40
[   13.989230]  kasan_save_alloc_info+0x3b/0x50
[   13.989370]  __kasan_kmalloc+0xb7/0xc0
[   13.989998]  __kmalloc_cache_noprof+0x189/0x420
[   13.990432]  kasan_atomics+0x95/0x310
[   13.990859]  kunit_try_run_case+0x1a5/0x480
[   13.991303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.991891]  kthread+0x337/0x6f0
[   13.992094]  ret_from_fork+0x116/0x1d0
[   13.992224]  ret_from_fork_asm+0x1a/0x30
[   13.992358] 
[   13.992512] The buggy address belongs to the object at ffff8881028d8d80
[   13.992512]  which belongs to the cache kmalloc-64 of size 64
[   13.993851] The buggy address is located 0 bytes to the right of
[   13.993851]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   13.994952] 
[   13.995024] The buggy address belongs to the physical page:
[   13.995186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   13.995423] flags: 0x200000000000000(node=0|zone=2)
[   13.995625] page_type: f5(slab)
[   13.995811] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.996156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.996403] page dumped because: kasan: bad access detected
[   13.996664] 
[   13.996753] Memory state around the buggy address:
[   13.997071]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.997292]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.997828] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.998318]                                      ^
[   13.998512]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.998792]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.999237] ==================================================================
[   14.992796] ==================================================================
[   14.993583] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   14.994660] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.995361] 
[   14.995564] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.995613] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.995627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.995647] Call Trace:
[   14.995665]  <TASK>
[   14.995682]  dump_stack_lvl+0x73/0xb0
[   14.995713]  print_report+0xd1/0x650
[   14.995737]  ? __virt_addr_valid+0x1db/0x2d0
[   14.995760]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.995781]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.995804]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.995825]  kasan_report+0x141/0x180
[   14.995848]  ? kasan_atomics_helper+0x1b22/0x5450
[   14.995874]  kasan_check_range+0x10c/0x1c0
[   14.995897]  __kasan_check_write+0x18/0x20
[   14.995917]  kasan_atomics_helper+0x1b22/0x5450
[   14.995958]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.995980]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.996005]  ? kasan_atomics+0x152/0x310
[   14.996032]  kasan_atomics+0x1dc/0x310
[   14.996054]  ? __pfx_kasan_atomics+0x10/0x10
[   14.996079]  ? __pfx_read_tsc+0x10/0x10
[   14.996100]  ? ktime_get_ts64+0x86/0x230
[   14.996126]  kunit_try_run_case+0x1a5/0x480
[   14.996151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.996172]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.996195]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.996217]  ? __kthread_parkme+0x82/0x180
[   14.996238]  ? preempt_count_sub+0x50/0x80
[   14.996263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.996287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.996309]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.996333]  kthread+0x337/0x6f0
[   14.996352]  ? trace_preempt_on+0x20/0xc0
[   14.996376]  ? __pfx_kthread+0x10/0x10
[   14.996397]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.996419]  ? calculate_sigpending+0x7b/0xa0
[   14.996443]  ? __pfx_kthread+0x10/0x10
[   14.996465]  ret_from_fork+0x116/0x1d0
[   14.996483]  ? __pfx_kthread+0x10/0x10
[   14.996504]  ret_from_fork_asm+0x1a/0x30
[   14.996534]  </TASK>
[   14.996545] 
[   15.008913] Allocated by task 290:
[   15.009066]  kasan_save_stack+0x45/0x70
[   15.009214]  kasan_save_track+0x18/0x40
[   15.009396]  kasan_save_alloc_info+0x3b/0x50
[   15.009671]  __kasan_kmalloc+0xb7/0xc0
[   15.009859]  __kmalloc_cache_noprof+0x189/0x420
[   15.010065]  kasan_atomics+0x95/0x310
[   15.010193]  kunit_try_run_case+0x1a5/0x480
[   15.010369]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.010744]  kthread+0x337/0x6f0
[   15.010872]  ret_from_fork+0x116/0x1d0
[   15.011010]  ret_from_fork_asm+0x1a/0x30
[   15.011180] 
[   15.011272] The buggy address belongs to the object at ffff8881028d8d80
[   15.011272]  which belongs to the cache kmalloc-64 of size 64
[   15.011777] The buggy address is located 0 bytes to the right of
[   15.011777]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   15.012420] 
[   15.012517] The buggy address belongs to the physical page:
[   15.012729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   15.012984] flags: 0x200000000000000(node=0|zone=2)
[   15.013214] page_type: f5(slab)
[   15.013387] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.013729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.014820] page dumped because: kasan: bad access detected
[   15.015159] 
[   15.015252] Memory state around the buggy address:
[   15.015488]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.015805]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.016111] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.016385]                                      ^
[   15.016829]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.017178]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.017609] ==================================================================
[   15.202399] ==================================================================
[   15.203091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   15.203533] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   15.203790] 
[   15.204100] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   15.204150] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.204249] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.204273] Call Trace:
[   15.204288]  <TASK>
[   15.204304]  dump_stack_lvl+0x73/0xb0
[   15.204335]  print_report+0xd1/0x650
[   15.204357]  ? __virt_addr_valid+0x1db/0x2d0
[   15.204379]  ? kasan_atomics_helper+0x2006/0x5450
[   15.204420]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.204442]  ? kasan_atomics_helper+0x2006/0x5450
[   15.204464]  kasan_report+0x141/0x180
[   15.204487]  ? kasan_atomics_helper+0x2006/0x5450
[   15.204514]  kasan_check_range+0x10c/0x1c0
[   15.204538]  __kasan_check_write+0x18/0x20
[   15.204558]  kasan_atomics_helper+0x2006/0x5450
[   15.204581]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.204603]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.204628]  ? kasan_atomics+0x152/0x310
[   15.204654]  kasan_atomics+0x1dc/0x310
[   15.204677]  ? __pfx_kasan_atomics+0x10/0x10
[   15.204701]  ? __pfx_read_tsc+0x10/0x10
[   15.204722]  ? ktime_get_ts64+0x86/0x230
[   15.204748]  kunit_try_run_case+0x1a5/0x480
[   15.204771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.204794]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.204817]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.204840]  ? __kthread_parkme+0x82/0x180
[   15.204860]  ? preempt_count_sub+0x50/0x80
[   15.204882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.204906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.204940]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.204963]  kthread+0x337/0x6f0
[   15.204983]  ? trace_preempt_on+0x20/0xc0
[   15.205007]  ? __pfx_kthread+0x10/0x10
[   15.205029]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.205051]  ? calculate_sigpending+0x7b/0xa0
[   15.205075]  ? __pfx_kthread+0x10/0x10
[   15.205096]  ret_from_fork+0x116/0x1d0
[   15.205115]  ? __pfx_kthread+0x10/0x10
[   15.205135]  ret_from_fork_asm+0x1a/0x30
[   15.205165]  </TASK>
[   15.205176] 
[   15.214106] Allocated by task 290:
[   15.214250]  kasan_save_stack+0x45/0x70
[   15.214444]  kasan_save_track+0x18/0x40
[   15.214634]  kasan_save_alloc_info+0x3b/0x50
[   15.214800]  __kasan_kmalloc+0xb7/0xc0
[   15.214978]  __kmalloc_cache_noprof+0x189/0x420
[   15.215174]  kasan_atomics+0x95/0x310
[   15.215357]  kunit_try_run_case+0x1a5/0x480
[   15.216138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.216340]  kthread+0x337/0x6f0
[   15.216466]  ret_from_fork+0x116/0x1d0
[   15.216597]  ret_from_fork_asm+0x1a/0x30
[   15.216731] 
[   15.216799] The buggy address belongs to the object at ffff8881028d8d80
[   15.216799]  which belongs to the cache kmalloc-64 of size 64
[   15.217207] The buggy address is located 0 bytes to the right of
[   15.217207]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   15.218113] 
[   15.218205] The buggy address belongs to the physical page:
[   15.218417] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   15.218855] flags: 0x200000000000000(node=0|zone=2)
[   15.219086] page_type: f5(slab)
[   15.219298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.219705] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.220025] page dumped because: kasan: bad access detected
[   15.220261] 
[   15.220351] Memory state around the buggy address:
[   15.220726]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.221050]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.221326] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.221828]                                      ^
[   15.222027]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.222341]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.222743] ==================================================================
[   15.332278] ==================================================================
[   15.332799] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   15.333589] Read of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   15.334287] 
[   15.334455] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   15.334500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.334512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.334534] Call Trace:
[   15.334552]  <TASK>
[   15.334569]  dump_stack_lvl+0x73/0xb0
[   15.334597]  print_report+0xd1/0x650
[   15.334620]  ? __virt_addr_valid+0x1db/0x2d0
[   15.334643]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.334665]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.334687]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.334709]  kasan_report+0x141/0x180
[   15.334732]  ? kasan_atomics_helper+0x4fa5/0x5450
[   15.334758]  __asan_report_load8_noabort+0x18/0x20
[   15.334782]  kasan_atomics_helper+0x4fa5/0x5450
[   15.334805]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.334828]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.334853]  ? kasan_atomics+0x152/0x310
[   15.334880]  kasan_atomics+0x1dc/0x310
[   15.334902]  ? __pfx_kasan_atomics+0x10/0x10
[   15.334926]  ? __pfx_read_tsc+0x10/0x10
[   15.334960]  ? ktime_get_ts64+0x86/0x230
[   15.334986]  kunit_try_run_case+0x1a5/0x480
[   15.335010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.335033]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.335056]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.335079]  ? __kthread_parkme+0x82/0x180
[   15.335100]  ? preempt_count_sub+0x50/0x80
[   15.335125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.335149]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.335172]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.335195]  kthread+0x337/0x6f0
[   15.335215]  ? trace_preempt_on+0x20/0xc0
[   15.335240]  ? __pfx_kthread+0x10/0x10
[   15.335261]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.335283]  ? calculate_sigpending+0x7b/0xa0
[   15.335307]  ? __pfx_kthread+0x10/0x10
[   15.335329]  ret_from_fork+0x116/0x1d0
[   15.335348]  ? __pfx_kthread+0x10/0x10
[   15.335369]  ret_from_fork_asm+0x1a/0x30
[   15.335410]  </TASK>
[   15.335421] 
[   15.344890] Allocated by task 290:
[   15.345024]  kasan_save_stack+0x45/0x70
[   15.345164]  kasan_save_track+0x18/0x40
[   15.345293]  kasan_save_alloc_info+0x3b/0x50
[   15.345434]  __kasan_kmalloc+0xb7/0xc0
[   15.345560]  __kmalloc_cache_noprof+0x189/0x420
[   15.345887]  kasan_atomics+0x95/0x310
[   15.346217]  kunit_try_run_case+0x1a5/0x480
[   15.346639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.347093]  kthread+0x337/0x6f0
[   15.347380]  ret_from_fork+0x116/0x1d0
[   15.347835]  ret_from_fork_asm+0x1a/0x30
[   15.348182] 
[   15.348336] The buggy address belongs to the object at ffff8881028d8d80
[   15.348336]  which belongs to the cache kmalloc-64 of size 64
[   15.349461] The buggy address is located 0 bytes to the right of
[   15.349461]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   15.350558] 
[   15.350713] The buggy address belongs to the physical page:
[   15.351188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   15.351857] flags: 0x200000000000000(node=0|zone=2)
[   15.352290] page_type: f5(slab)
[   15.352600] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.353240] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.353605] page dumped because: kasan: bad access detected
[   15.353777] 
[   15.353841] Memory state around the buggy address:
[   15.354001]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.354211]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.354427] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.354643]                                      ^
[   15.354833]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.355146]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.355350] ==================================================================
[   14.492089] ==================================================================
[   14.492360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   14.492705] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.493745] 
[   14.493874] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.493941] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.493956] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.493978] Call Trace:
[   14.493996]  <TASK>
[   14.494013]  dump_stack_lvl+0x73/0xb0
[   14.494044]  print_report+0xd1/0x650
[   14.494067]  ? __virt_addr_valid+0x1db/0x2d0
[   14.494090]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.494111]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.494134]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.494155]  kasan_report+0x141/0x180
[   14.494178]  ? kasan_atomics_helper+0x4a36/0x5450
[   14.494204]  __asan_report_load4_noabort+0x18/0x20
[   14.494229]  kasan_atomics_helper+0x4a36/0x5450
[   14.494252]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.494274]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.494299]  ? kasan_atomics+0x152/0x310
[   14.494325]  kasan_atomics+0x1dc/0x310
[   14.494347]  ? __pfx_kasan_atomics+0x10/0x10
[   14.494372]  ? __pfx_read_tsc+0x10/0x10
[   14.494497]  ? ktime_get_ts64+0x86/0x230
[   14.494532]  kunit_try_run_case+0x1a5/0x480
[   14.494557]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.494580]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.494603]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.494626]  ? __kthread_parkme+0x82/0x180
[   14.494655]  ? preempt_count_sub+0x50/0x80
[   14.494680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.494703]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.494726]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.494750]  kthread+0x337/0x6f0
[   14.494770]  ? trace_preempt_on+0x20/0xc0
[   14.494795]  ? __pfx_kthread+0x10/0x10
[   14.494817]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.494838]  ? calculate_sigpending+0x7b/0xa0
[   14.494863]  ? __pfx_kthread+0x10/0x10
[   14.494885]  ret_from_fork+0x116/0x1d0
[   14.494904]  ? __pfx_kthread+0x10/0x10
[   14.494926]  ret_from_fork_asm+0x1a/0x30
[   14.494969]  </TASK>
[   14.494980] 
[   14.501763] Allocated by task 290:
[   14.501906]  kasan_save_stack+0x45/0x70
[   14.502079]  kasan_save_track+0x18/0x40
[   14.502209]  kasan_save_alloc_info+0x3b/0x50
[   14.502350]  __kasan_kmalloc+0xb7/0xc0
[   14.502503]  __kmalloc_cache_noprof+0x189/0x420
[   14.502721]  kasan_atomics+0x95/0x310
[   14.502904]  kunit_try_run_case+0x1a5/0x480
[   14.503172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.503470]  kthread+0x337/0x6f0
[   14.503630]  ret_from_fork+0x116/0x1d0
[   14.503808]  ret_from_fork_asm+0x1a/0x30
[   14.503982] 
[   14.504059] The buggy address belongs to the object at ffff8881028d8d80
[   14.504059]  which belongs to the cache kmalloc-64 of size 64
[   14.504510] The buggy address is located 0 bytes to the right of
[   14.504510]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.505015] 
[   14.505106] The buggy address belongs to the physical page:
[   14.505317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.505641] flags: 0x200000000000000(node=0|zone=2)
[   14.505835] page_type: f5(slab)
[   14.505958] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.506180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.506405] page dumped because: kasan: bad access detected
[   14.506703] 
[   14.506791] Memory state around the buggy address:
[   14.507014]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.507310]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.507519] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.507724]                                      ^
[   14.507871]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.508442]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.508754] ==================================================================
[   14.116205] ==================================================================
[   14.116541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   14.117151] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.117483] 
[   14.117564] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.117612] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.117625] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.117646] Call Trace:
[   14.117662]  <TASK>
[   14.117679]  dump_stack_lvl+0x73/0xb0
[   14.117716]  print_report+0xd1/0x650
[   14.117738]  ? __virt_addr_valid+0x1db/0x2d0
[   14.117762]  ? kasan_atomics_helper+0x697/0x5450
[   14.117782]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.117807]  ? kasan_atomics_helper+0x697/0x5450
[   14.117829]  kasan_report+0x141/0x180
[   14.117850]  ? kasan_atomics_helper+0x697/0x5450
[   14.117876]  kasan_check_range+0x10c/0x1c0
[   14.117899]  __kasan_check_write+0x18/0x20
[   14.117919]  kasan_atomics_helper+0x697/0x5450
[   14.117951]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.117974]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.117999]  ? kasan_atomics+0x152/0x310
[   14.118025]  kasan_atomics+0x1dc/0x310
[   14.118048]  ? __pfx_kasan_atomics+0x10/0x10
[   14.118073]  ? __pfx_read_tsc+0x10/0x10
[   14.118094]  ? ktime_get_ts64+0x86/0x230
[   14.118120]  kunit_try_run_case+0x1a5/0x480
[   14.118143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.118166]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.118188]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.118211]  ? __kthread_parkme+0x82/0x180
[   14.118232]  ? preempt_count_sub+0x50/0x80
[   14.118255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.118278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.118302]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.118325]  kthread+0x337/0x6f0
[   14.118344]  ? trace_preempt_on+0x20/0xc0
[   14.118369]  ? __pfx_kthread+0x10/0x10
[   14.118404]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.118425]  ? calculate_sigpending+0x7b/0xa0
[   14.118450]  ? __pfx_kthread+0x10/0x10
[   14.118472]  ret_from_fork+0x116/0x1d0
[   14.118491]  ? __pfx_kthread+0x10/0x10
[   14.118512]  ret_from_fork_asm+0x1a/0x30
[   14.118543]  </TASK>
[   14.118554] 
[   14.126141] Allocated by task 290:
[   14.126272]  kasan_save_stack+0x45/0x70
[   14.126484]  kasan_save_track+0x18/0x40
[   14.126714]  kasan_save_alloc_info+0x3b/0x50
[   14.126924]  __kasan_kmalloc+0xb7/0xc0
[   14.127117]  __kmalloc_cache_noprof+0x189/0x420
[   14.127336]  kasan_atomics+0x95/0x310
[   14.127520]  kunit_try_run_case+0x1a5/0x480
[   14.127818]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.128165]  kthread+0x337/0x6f0
[   14.128305]  ret_from_fork+0x116/0x1d0
[   14.128546]  ret_from_fork_asm+0x1a/0x30
[   14.128680] 
[   14.128773] The buggy address belongs to the object at ffff8881028d8d80
[   14.128773]  which belongs to the cache kmalloc-64 of size 64
[   14.129267] The buggy address is located 0 bytes to the right of
[   14.129267]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.129728] 
[   14.129814] The buggy address belongs to the physical page:
[   14.129987] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.130265] flags: 0x200000000000000(node=0|zone=2)
[   14.130635] page_type: f5(slab)
[   14.130880] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.131214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.131426] page dumped because: kasan: bad access detected
[   14.131586] 
[   14.131647] Memory state around the buggy address:
[   14.131790]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.132063]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.132576] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.132936]                                      ^
[   14.133092]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.133387]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.133640] ==================================================================
[   14.448654] ==================================================================
[   14.449019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   14.449359] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.449877] 
[   14.450016] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.450065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.450078] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.450099] Call Trace:
[   14.450115]  <TASK>
[   14.450133]  dump_stack_lvl+0x73/0xb0
[   14.450163]  print_report+0xd1/0x650
[   14.450187]  ? __virt_addr_valid+0x1db/0x2d0
[   14.450210]  ? kasan_atomics_helper+0xf10/0x5450
[   14.450231]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.450253]  ? kasan_atomics_helper+0xf10/0x5450
[   14.450275]  kasan_report+0x141/0x180
[   14.450297]  ? kasan_atomics_helper+0xf10/0x5450
[   14.450323]  kasan_check_range+0x10c/0x1c0
[   14.450347]  __kasan_check_write+0x18/0x20
[   14.450379]  kasan_atomics_helper+0xf10/0x5450
[   14.450412]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.450446]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.450471]  ? kasan_atomics+0x152/0x310
[   14.450506]  kasan_atomics+0x1dc/0x310
[   14.450529]  ? __pfx_kasan_atomics+0x10/0x10
[   14.450554]  ? __pfx_read_tsc+0x10/0x10
[   14.450586]  ? ktime_get_ts64+0x86/0x230
[   14.450612]  kunit_try_run_case+0x1a5/0x480
[   14.450636]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.450659]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.450681]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.450704]  ? __kthread_parkme+0x82/0x180
[   14.450724]  ? preempt_count_sub+0x50/0x80
[   14.450748]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.450772]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.450796]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.450820]  kthread+0x337/0x6f0
[   14.450840]  ? trace_preempt_on+0x20/0xc0
[   14.450864]  ? __pfx_kthread+0x10/0x10
[   14.450886]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.450907]  ? calculate_sigpending+0x7b/0xa0
[   14.450942]  ? __pfx_kthread+0x10/0x10
[   14.450964]  ret_from_fork+0x116/0x1d0
[   14.450992]  ? __pfx_kthread+0x10/0x10
[   14.451012]  ret_from_fork_asm+0x1a/0x30
[   14.451054]  </TASK>
[   14.451065] 
[   14.458828] Allocated by task 290:
[   14.458965]  kasan_save_stack+0x45/0x70
[   14.459166]  kasan_save_track+0x18/0x40
[   14.459354]  kasan_save_alloc_info+0x3b/0x50
[   14.459599]  __kasan_kmalloc+0xb7/0xc0
[   14.459809]  __kmalloc_cache_noprof+0x189/0x420
[   14.460002]  kasan_atomics+0x95/0x310
[   14.460173]  kunit_try_run_case+0x1a5/0x480
[   14.460365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.460612]  kthread+0x337/0x6f0
[   14.460783]  ret_from_fork+0x116/0x1d0
[   14.460971]  ret_from_fork_asm+0x1a/0x30
[   14.461153] 
[   14.461245] The buggy address belongs to the object at ffff8881028d8d80
[   14.461245]  which belongs to the cache kmalloc-64 of size 64
[   14.461790] The buggy address is located 0 bytes to the right of
[   14.461790]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.462307] 
[   14.462436] The buggy address belongs to the physical page:
[   14.462617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.462853] flags: 0x200000000000000(node=0|zone=2)
[   14.463065] page_type: f5(slab)
[   14.463250] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.463576] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.463899] page dumped because: kasan: bad access detected
[   14.464170] 
[   14.464235] Memory state around the buggy address:
[   14.464407]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.464746]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.465056] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.465344]                                      ^
[   14.465579]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.465886]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.466192] ==================================================================
[   14.181027] ==================================================================
[   14.181673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   14.182410] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.182741] 
[   14.183121] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.183175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.183188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.183209] Call Trace:
[   14.183227]  <TASK>
[   14.183243]  dump_stack_lvl+0x73/0xb0
[   14.183273]  print_report+0xd1/0x650
[   14.183295]  ? __virt_addr_valid+0x1db/0x2d0
[   14.183319]  ? kasan_atomics_helper+0x860/0x5450
[   14.183340]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.183362]  ? kasan_atomics_helper+0x860/0x5450
[   14.183384]  kasan_report+0x141/0x180
[   14.183422]  ? kasan_atomics_helper+0x860/0x5450
[   14.183449]  kasan_check_range+0x10c/0x1c0
[   14.183473]  __kasan_check_write+0x18/0x20
[   14.183492]  kasan_atomics_helper+0x860/0x5450
[   14.183515]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.183537]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.183562]  ? kasan_atomics+0x152/0x310
[   14.183587]  kasan_atomics+0x1dc/0x310
[   14.183610]  ? __pfx_kasan_atomics+0x10/0x10
[   14.183633]  ? __pfx_read_tsc+0x10/0x10
[   14.183655]  ? ktime_get_ts64+0x86/0x230
[   14.183682]  kunit_try_run_case+0x1a5/0x480
[   14.183707]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.183729]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.183751]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.183774]  ? __kthread_parkme+0x82/0x180
[   14.183794]  ? preempt_count_sub+0x50/0x80
[   14.183818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.183843]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.183866]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.183890]  kthread+0x337/0x6f0
[   14.183909]  ? trace_preempt_on+0x20/0xc0
[   14.183945]  ? __pfx_kthread+0x10/0x10
[   14.183966]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.183987]  ? calculate_sigpending+0x7b/0xa0
[   14.184011]  ? __pfx_kthread+0x10/0x10
[   14.184033]  ret_from_fork+0x116/0x1d0
[   14.184052]  ? __pfx_kthread+0x10/0x10
[   14.184072]  ret_from_fork_asm+0x1a/0x30
[   14.184103]  </TASK>
[   14.184114] 
[   14.192395] Allocated by task 290:
[   14.192608]  kasan_save_stack+0x45/0x70
[   14.193046]  kasan_save_track+0x18/0x40
[   14.193248]  kasan_save_alloc_info+0x3b/0x50
[   14.193690]  __kasan_kmalloc+0xb7/0xc0
[   14.193906]  __kmalloc_cache_noprof+0x189/0x420
[   14.194149]  kasan_atomics+0x95/0x310
[   14.194334]  kunit_try_run_case+0x1a5/0x480
[   14.194609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.194914]  kthread+0x337/0x6f0
[   14.195087]  ret_from_fork+0x116/0x1d0
[   14.195214]  ret_from_fork_asm+0x1a/0x30
[   14.195347] 
[   14.195524] The buggy address belongs to the object at ffff8881028d8d80
[   14.195524]  which belongs to the cache kmalloc-64 of size 64
[   14.196068] The buggy address is located 0 bytes to the right of
[   14.196068]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.196724] 
[   14.196799] The buggy address belongs to the physical page:
[   14.196983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.197332] flags: 0x200000000000000(node=0|zone=2)
[   14.197730] page_type: f5(slab)
[   14.197846] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.198719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.198996] page dumped because: kasan: bad access detected
[   14.199166] 
[   14.199231] Memory state around the buggy address:
[   14.199380]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.199689]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.200010] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.200783]                                      ^
[   14.201030]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.201365]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.201782] ==================================================================
[   14.779664] ==================================================================
[   14.780201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   14.780598] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.780881] 
[   14.780999] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.781050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.781063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.781085] Call Trace:
[   14.781108]  <TASK>
[   14.781130]  dump_stack_lvl+0x73/0xb0
[   14.781160]  print_report+0xd1/0x650
[   14.781184]  ? __virt_addr_valid+0x1db/0x2d0
[   14.781207]  ? kasan_atomics_helper+0x151d/0x5450
[   14.781230]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.781252]  ? kasan_atomics_helper+0x151d/0x5450
[   14.781274]  kasan_report+0x141/0x180
[   14.781296]  ? kasan_atomics_helper+0x151d/0x5450
[   14.781322]  kasan_check_range+0x10c/0x1c0
[   14.781346]  __kasan_check_write+0x18/0x20
[   14.781365]  kasan_atomics_helper+0x151d/0x5450
[   14.781388]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.781411]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.781437]  ? kasan_atomics+0x152/0x310
[   14.781463]  kasan_atomics+0x1dc/0x310
[   14.781486]  ? __pfx_kasan_atomics+0x10/0x10
[   14.781511]  ? __pfx_read_tsc+0x10/0x10
[   14.781534]  ? ktime_get_ts64+0x86/0x230
[   14.781561]  kunit_try_run_case+0x1a5/0x480
[   14.781586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.781608]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.781632]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.781654]  ? __kthread_parkme+0x82/0x180
[   14.781675]  ? preempt_count_sub+0x50/0x80
[   14.781705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.781728]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.781751]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.781774]  kthread+0x337/0x6f0
[   14.781793]  ? trace_preempt_on+0x20/0xc0
[   14.781819]  ? __pfx_kthread+0x10/0x10
[   14.781840]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.781861]  ? calculate_sigpending+0x7b/0xa0
[   14.781885]  ? __pfx_kthread+0x10/0x10
[   14.781907]  ret_from_fork+0x116/0x1d0
[   14.781925]  ? __pfx_kthread+0x10/0x10
[   14.781956]  ret_from_fork_asm+0x1a/0x30
[   14.781989]  </TASK>
[   14.782003] 
[   14.788990] Allocated by task 290:
[   14.789113]  kasan_save_stack+0x45/0x70
[   14.789246]  kasan_save_track+0x18/0x40
[   14.789620]  kasan_save_alloc_info+0x3b/0x50
[   14.789834]  __kasan_kmalloc+0xb7/0xc0
[   14.789997]  __kmalloc_cache_noprof+0x189/0x420
[   14.790213]  kasan_atomics+0x95/0x310
[   14.790393]  kunit_try_run_case+0x1a5/0x480
[   14.790602]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.790860]  kthread+0x337/0x6f0
[   14.791003]  ret_from_fork+0x116/0x1d0
[   14.791126]  ret_from_fork_asm+0x1a/0x30
[   14.791291] 
[   14.791381] The buggy address belongs to the object at ffff8881028d8d80
[   14.791381]  which belongs to the cache kmalloc-64 of size 64
[   14.791875] The buggy address is located 0 bytes to the right of
[   14.791875]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.792346] 
[   14.792477] The buggy address belongs to the physical page:
[   14.792678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.792950] flags: 0x200000000000000(node=0|zone=2)
[   14.793102] page_type: f5(slab)
[   14.793212] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.793425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.793713] page dumped because: kasan: bad access detected
[   14.793960] 
[   14.794047] Memory state around the buggy address:
[   14.794261]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.794712]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.794975] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.795174]                                      ^
[   14.795316]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.795838]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.796160] ==================================================================
[   15.063995] ==================================================================
[   15.064275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   15.064522] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   15.065368] 
[   15.065492] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   15.065538] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.065551] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.065573] Call Trace:
[   15.065591]  <TASK>
[   15.065606]  dump_stack_lvl+0x73/0xb0
[   15.065837]  print_report+0xd1/0x650
[   15.065862]  ? __virt_addr_valid+0x1db/0x2d0
[   15.065886]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.065907]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.065943]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.065965]  kasan_report+0x141/0x180
[   15.065987]  ? kasan_atomics_helper+0x1ce1/0x5450
[   15.066013]  kasan_check_range+0x10c/0x1c0
[   15.066037]  __kasan_check_write+0x18/0x20
[   15.066058]  kasan_atomics_helper+0x1ce1/0x5450
[   15.066080]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.066103]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.066127]  ? kasan_atomics+0x152/0x310
[   15.066153]  kasan_atomics+0x1dc/0x310
[   15.066176]  ? __pfx_kasan_atomics+0x10/0x10
[   15.066200]  ? __pfx_read_tsc+0x10/0x10
[   15.066221]  ? ktime_get_ts64+0x86/0x230
[   15.066247]  kunit_try_run_case+0x1a5/0x480
[   15.066270]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.066292]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.066315]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.066338]  ? __kthread_parkme+0x82/0x180
[   15.066358]  ? preempt_count_sub+0x50/0x80
[   15.066381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.066420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.066443]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.066467]  kthread+0x337/0x6f0
[   15.066486]  ? trace_preempt_on+0x20/0xc0
[   15.066510]  ? __pfx_kthread+0x10/0x10
[   15.066531]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.066551]  ? calculate_sigpending+0x7b/0xa0
[   15.066576]  ? __pfx_kthread+0x10/0x10
[   15.066597]  ret_from_fork+0x116/0x1d0
[   15.066615]  ? __pfx_kthread+0x10/0x10
[   15.066636]  ret_from_fork_asm+0x1a/0x30
[   15.066666]  </TASK>
[   15.066678] 
[   15.077008] Allocated by task 290:
[   15.077374]  kasan_save_stack+0x45/0x70
[   15.077698]  kasan_save_track+0x18/0x40
[   15.077879]  kasan_save_alloc_info+0x3b/0x50
[   15.078091]  __kasan_kmalloc+0xb7/0xc0
[   15.078268]  __kmalloc_cache_noprof+0x189/0x420
[   15.078688]  kasan_atomics+0x95/0x310
[   15.078973]  kunit_try_run_case+0x1a5/0x480
[   15.079189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.079580]  kthread+0x337/0x6f0
[   15.079827]  ret_from_fork+0x116/0x1d0
[   15.079980]  ret_from_fork_asm+0x1a/0x30
[   15.080176] 
[   15.080267] The buggy address belongs to the object at ffff8881028d8d80
[   15.080267]  which belongs to the cache kmalloc-64 of size 64
[   15.081090] The buggy address is located 0 bytes to the right of
[   15.081090]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   15.081798] 
[   15.081896] The buggy address belongs to the physical page:
[   15.082140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   15.082659] flags: 0x200000000000000(node=0|zone=2)
[   15.082871] page_type: f5(slab)
[   15.083027] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.083341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.083939] page dumped because: kasan: bad access detected
[   15.084246] 
[   15.084346] Memory state around the buggy address:
[   15.084738]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.085045]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.085445] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.085800]                                      ^
[   15.086166]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.086502]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.086852] ==================================================================
[   14.020480] ==================================================================
[   14.020887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   14.021168] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.021581] 
[   14.021678] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.021733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.021745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.021768] Call Trace:
[   14.021789]  <TASK>
[   14.021810]  dump_stack_lvl+0x73/0xb0
[   14.021839]  print_report+0xd1/0x650
[   14.021863]  ? __virt_addr_valid+0x1db/0x2d0
[   14.021887]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.021907]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.021942]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.021967]  kasan_report+0x141/0x180
[   14.021990]  ? kasan_atomics_helper+0x4a0/0x5450
[   14.022017]  kasan_check_range+0x10c/0x1c0
[   14.022041]  __kasan_check_write+0x18/0x20
[   14.022061]  kasan_atomics_helper+0x4a0/0x5450
[   14.022083]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.022104]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.022130]  ? kasan_atomics+0x152/0x310
[   14.022156]  kasan_atomics+0x1dc/0x310
[   14.022178]  ? __pfx_kasan_atomics+0x10/0x10
[   14.022203]  ? __pfx_read_tsc+0x10/0x10
[   14.022227]  ? ktime_get_ts64+0x86/0x230
[   14.022253]  kunit_try_run_case+0x1a5/0x480
[   14.022280]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.022303]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.022326]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.022349]  ? __kthread_parkme+0x82/0x180
[   14.022370]  ? preempt_count_sub+0x50/0x80
[   14.022394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.022418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.022441]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.022464]  kthread+0x337/0x6f0
[   14.022484]  ? trace_preempt_on+0x20/0xc0
[   14.022509]  ? __pfx_kthread+0x10/0x10
[   14.022530]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.022551]  ? calculate_sigpending+0x7b/0xa0
[   14.022576]  ? __pfx_kthread+0x10/0x10
[   14.022598]  ret_from_fork+0x116/0x1d0
[   14.022617]  ? __pfx_kthread+0x10/0x10
[   14.022638]  ret_from_fork_asm+0x1a/0x30
[   14.022669]  </TASK>
[   14.022681] 
[   14.030278] Allocated by task 290:
[   14.030540]  kasan_save_stack+0x45/0x70
[   14.030750]  kasan_save_track+0x18/0x40
[   14.030940]  kasan_save_alloc_info+0x3b/0x50
[   14.031124]  __kasan_kmalloc+0xb7/0xc0
[   14.031251]  __kmalloc_cache_noprof+0x189/0x420
[   14.031639]  kasan_atomics+0x95/0x310
[   14.031838]  kunit_try_run_case+0x1a5/0x480
[   14.032052]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.032293]  kthread+0x337/0x6f0
[   14.032410]  ret_from_fork+0x116/0x1d0
[   14.032616]  ret_from_fork_asm+0x1a/0x30
[   14.032779] 
[   14.032873] The buggy address belongs to the object at ffff8881028d8d80
[   14.032873]  which belongs to the cache kmalloc-64 of size 64
[   14.033398] The buggy address is located 0 bytes to the right of
[   14.033398]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.034034] 
[   14.034117] The buggy address belongs to the physical page:
[   14.034329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.034725] flags: 0x200000000000000(node=0|zone=2)
[   14.034927] page_type: f5(slab)
[   14.035095] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.035320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.035813] page dumped because: kasan: bad access detected
[   14.036099] 
[   14.036192] Memory state around the buggy address:
[   14.036423]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.036818]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.037044] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.037285]                                      ^
[   14.037569]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.037901]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.038219] ==================================================================
[   15.040451] ==================================================================
[   15.040706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   15.041006] Read of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   15.041828] 
[   15.042023] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   15.042074] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.042087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.042108] Call Trace:
[   15.042126]  <TASK>
[   15.042143]  dump_stack_lvl+0x73/0xb0
[   15.042172]  print_report+0xd1/0x650
[   15.042343]  ? __virt_addr_valid+0x1db/0x2d0
[   15.042368]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.042401]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.042424]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.042447]  kasan_report+0x141/0x180
[   15.042469]  ? kasan_atomics_helper+0x4f30/0x5450
[   15.042495]  __asan_report_load8_noabort+0x18/0x20
[   15.042519]  kasan_atomics_helper+0x4f30/0x5450
[   15.042541]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.042564]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.042589]  ? kasan_atomics+0x152/0x310
[   15.042615]  kasan_atomics+0x1dc/0x310
[   15.042638]  ? __pfx_kasan_atomics+0x10/0x10
[   15.042661]  ? __pfx_read_tsc+0x10/0x10
[   15.042683]  ? ktime_get_ts64+0x86/0x230
[   15.042710]  kunit_try_run_case+0x1a5/0x480
[   15.042734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.042756]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.042779]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.042801]  ? __kthread_parkme+0x82/0x180
[   15.042822]  ? preempt_count_sub+0x50/0x80
[   15.042846]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.042870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.042893]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.042916]  kthread+0x337/0x6f0
[   15.042948]  ? trace_preempt_on+0x20/0xc0
[   15.042973]  ? __pfx_kthread+0x10/0x10
[   15.042994]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.043015]  ? calculate_sigpending+0x7b/0xa0
[   15.043038]  ? __pfx_kthread+0x10/0x10
[   15.043060]  ret_from_fork+0x116/0x1d0
[   15.043079]  ? __pfx_kthread+0x10/0x10
[   15.043099]  ret_from_fork_asm+0x1a/0x30
[   15.043130]  </TASK>
[   15.043142] 
[   15.053119] Allocated by task 290:
[   15.053277]  kasan_save_stack+0x45/0x70
[   15.053719]  kasan_save_track+0x18/0x40
[   15.053909]  kasan_save_alloc_info+0x3b/0x50
[   15.054263]  __kasan_kmalloc+0xb7/0xc0
[   15.054578]  __kmalloc_cache_noprof+0x189/0x420
[   15.054841]  kasan_atomics+0x95/0x310
[   15.055021]  kunit_try_run_case+0x1a5/0x480
[   15.055210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.055658]  kthread+0x337/0x6f0
[   15.055910]  ret_from_fork+0x116/0x1d0
[   15.056079]  ret_from_fork_asm+0x1a/0x30
[   15.056405] 
[   15.056507] The buggy address belongs to the object at ffff8881028d8d80
[   15.056507]  which belongs to the cache kmalloc-64 of size 64
[   15.057223] The buggy address is located 0 bytes to the right of
[   15.057223]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   15.057942] 
[   15.058031] The buggy address belongs to the physical page:
[   15.058361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   15.058688] flags: 0x200000000000000(node=0|zone=2)
[   15.058911] page_type: f5(slab)
[   15.059076] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.059711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.060014] page dumped because: kasan: bad access detected
[   15.060346] 
[   15.060433] Memory state around the buggy address:
[   15.060841]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.061277]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.061697] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.062083]                                      ^
[   15.062316]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.062801]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.063225] ==================================================================
[   14.752551] ==================================================================
[   14.753216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   14.753888] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.754570] 
[   14.754756] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.754802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.754821] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.754841] Call Trace:
[   14.754859]  <TASK>
[   14.754876]  dump_stack_lvl+0x73/0xb0
[   14.754904]  print_report+0xd1/0x650
[   14.754926]  ? __virt_addr_valid+0x1db/0x2d0
[   14.754957]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.754980]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.755002]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.755024]  kasan_report+0x141/0x180
[   14.755047]  ? kasan_atomics_helper+0x50d4/0x5450
[   14.755074]  __asan_report_store8_noabort+0x1b/0x30
[   14.755099]  kasan_atomics_helper+0x50d4/0x5450
[   14.755122]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.755143]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.755168]  ? kasan_atomics+0x152/0x310
[   14.755195]  kasan_atomics+0x1dc/0x310
[   14.755217]  ? __pfx_kasan_atomics+0x10/0x10
[   14.755241]  ? __pfx_read_tsc+0x10/0x10
[   14.755262]  ? ktime_get_ts64+0x86/0x230
[   14.755289]  kunit_try_run_case+0x1a5/0x480
[   14.755313]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.755335]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.755358]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.755381]  ? __kthread_parkme+0x82/0x180
[   14.755421]  ? preempt_count_sub+0x50/0x80
[   14.755445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.755468]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.755492]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.755515]  kthread+0x337/0x6f0
[   14.755535]  ? trace_preempt_on+0x20/0xc0
[   14.755559]  ? __pfx_kthread+0x10/0x10
[   14.755580]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.755601]  ? calculate_sigpending+0x7b/0xa0
[   14.755625]  ? __pfx_kthread+0x10/0x10
[   14.755646]  ret_from_fork+0x116/0x1d0
[   14.755665]  ? __pfx_kthread+0x10/0x10
[   14.755685]  ret_from_fork_asm+0x1a/0x30
[   14.755716]  </TASK>
[   14.755728] 
[   14.768149] Allocated by task 290:
[   14.768492]  kasan_save_stack+0x45/0x70
[   14.768849]  kasan_save_track+0x18/0x40
[   14.769206]  kasan_save_alloc_info+0x3b/0x50
[   14.769619]  __kasan_kmalloc+0xb7/0xc0
[   14.769976]  __kmalloc_cache_noprof+0x189/0x420
[   14.770384]  kasan_atomics+0x95/0x310
[   14.770575]  kunit_try_run_case+0x1a5/0x480
[   14.770710]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.770871]  kthread+0x337/0x6f0
[   14.770993]  ret_from_fork+0x116/0x1d0
[   14.771119]  ret_from_fork_asm+0x1a/0x30
[   14.771250] 
[   14.771314] The buggy address belongs to the object at ffff8881028d8d80
[   14.771314]  which belongs to the cache kmalloc-64 of size 64
[   14.772250] The buggy address is located 0 bytes to the right of
[   14.772250]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.773492] 
[   14.773650] The buggy address belongs to the physical page:
[   14.774134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.774993] flags: 0x200000000000000(node=0|zone=2)
[   14.775414] page_type: f5(slab)
[   14.775734] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.776376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.776944] page dumped because: kasan: bad access detected
[   14.777106] 
[   14.777169] Memory state around the buggy address:
[   14.777314]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.777592]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.777943] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.778198]                                      ^
[   14.778360]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.778689]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.778968] ==================================================================
[   14.038653] ==================================================================
[   14.039017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   14.039363] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.039679] 
[   14.039785] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.039834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.039845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.039867] Call Trace:
[   14.040105]  <TASK>
[   14.040135]  dump_stack_lvl+0x73/0xb0
[   14.040169]  print_report+0xd1/0x650
[   14.040192]  ? __virt_addr_valid+0x1db/0x2d0
[   14.040216]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.040236]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.040259]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.040280]  kasan_report+0x141/0x180
[   14.040302]  ? kasan_atomics_helper+0x4b3a/0x5450
[   14.040328]  __asan_report_store4_noabort+0x1b/0x30
[   14.040353]  kasan_atomics_helper+0x4b3a/0x5450
[   14.040447]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.040473]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.040500]  ? kasan_atomics+0x152/0x310
[   14.040526]  kasan_atomics+0x1dc/0x310
[   14.040549]  ? __pfx_kasan_atomics+0x10/0x10
[   14.040574]  ? __pfx_read_tsc+0x10/0x10
[   14.040595]  ? ktime_get_ts64+0x86/0x230
[   14.040622]  kunit_try_run_case+0x1a5/0x480
[   14.040646]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.040669]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.040692]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.040715]  ? __kthread_parkme+0x82/0x180
[   14.040737]  ? preempt_count_sub+0x50/0x80
[   14.040760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.040784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.040808]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.040831]  kthread+0x337/0x6f0
[   14.040850]  ? trace_preempt_on+0x20/0xc0
[   14.040875]  ? __pfx_kthread+0x10/0x10
[   14.040897]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.040918]  ? calculate_sigpending+0x7b/0xa0
[   14.040955]  ? __pfx_kthread+0x10/0x10
[   14.040978]  ret_from_fork+0x116/0x1d0
[   14.040997]  ? __pfx_kthread+0x10/0x10
[   14.041018]  ret_from_fork_asm+0x1a/0x30
[   14.041050]  </TASK>
[   14.041062] 
[   14.048882] Allocated by task 290:
[   14.049041]  kasan_save_stack+0x45/0x70
[   14.049252]  kasan_save_track+0x18/0x40
[   14.049460]  kasan_save_alloc_info+0x3b/0x50
[   14.049726]  __kasan_kmalloc+0xb7/0xc0
[   14.049953]  __kmalloc_cache_noprof+0x189/0x420
[   14.050134]  kasan_atomics+0x95/0x310
[   14.050312]  kunit_try_run_case+0x1a5/0x480
[   14.050528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.050725]  kthread+0x337/0x6f0
[   14.050916]  ret_from_fork+0x116/0x1d0
[   14.051108]  ret_from_fork_asm+0x1a/0x30
[   14.051303] 
[   14.051396] The buggy address belongs to the object at ffff8881028d8d80
[   14.051396]  which belongs to the cache kmalloc-64 of size 64
[   14.052032] The buggy address is located 0 bytes to the right of
[   14.052032]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.052684] 
[   14.052796] The buggy address belongs to the physical page:
[   14.053082] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.053555] flags: 0x200000000000000(node=0|zone=2)
[   14.053830] page_type: f5(slab)
[   14.054006] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.054379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.054705] page dumped because: kasan: bad access detected
[   14.054962] 
[   14.055071] Memory state around the buggy address:
[   14.055281]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.055564]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.055826] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.056170]                                      ^
[   14.056397]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.057055]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.057305] ==================================================================
[   14.276801] ==================================================================
[   14.277152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   14.277479] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.277763] 
[   14.277843] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.278219] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.278240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.278262] Call Trace:
[   14.278281]  <TASK>
[   14.278298]  dump_stack_lvl+0x73/0xb0
[   14.278329]  print_report+0xd1/0x650
[   14.278352]  ? __virt_addr_valid+0x1db/0x2d0
[   14.278375]  ? kasan_atomics_helper+0xac7/0x5450
[   14.278396]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.278419]  ? kasan_atomics_helper+0xac7/0x5450
[   14.278441]  kasan_report+0x141/0x180
[   14.278485]  ? kasan_atomics_helper+0xac7/0x5450
[   14.278526]  kasan_check_range+0x10c/0x1c0
[   14.278563]  __kasan_check_write+0x18/0x20
[   14.278596]  kasan_atomics_helper+0xac7/0x5450
[   14.278619]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.278641]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.278680]  ? kasan_atomics+0x152/0x310
[   14.278721]  kasan_atomics+0x1dc/0x310
[   14.278805]  ? __pfx_kasan_atomics+0x10/0x10
[   14.278831]  ? __pfx_read_tsc+0x10/0x10
[   14.278853]  ? ktime_get_ts64+0x86/0x230
[   14.278880]  kunit_try_run_case+0x1a5/0x480
[   14.278904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.278926]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.278965]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.278990]  ? __kthread_parkme+0x82/0x180
[   14.279011]  ? preempt_count_sub+0x50/0x80
[   14.279035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.279060]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.279084]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.279108]  kthread+0x337/0x6f0
[   14.279128]  ? trace_preempt_on+0x20/0xc0
[   14.279152]  ? __pfx_kthread+0x10/0x10
[   14.279173]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.279194]  ? calculate_sigpending+0x7b/0xa0
[   14.279218]  ? __pfx_kthread+0x10/0x10
[   14.279240]  ret_from_fork+0x116/0x1d0
[   14.279259]  ? __pfx_kthread+0x10/0x10
[   14.279280]  ret_from_fork_asm+0x1a/0x30
[   14.279312]  </TASK>
[   14.279324] 
[   14.287942] Allocated by task 290:
[   14.288069]  kasan_save_stack+0x45/0x70
[   14.288224]  kasan_save_track+0x18/0x40
[   14.288461]  kasan_save_alloc_info+0x3b/0x50
[   14.288717]  __kasan_kmalloc+0xb7/0xc0
[   14.288924]  __kmalloc_cache_noprof+0x189/0x420
[   14.289190]  kasan_atomics+0x95/0x310
[   14.289389]  kunit_try_run_case+0x1a5/0x480
[   14.289599]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.289853]  kthread+0x337/0x6f0
[   14.289978]  ret_from_fork+0x116/0x1d0
[   14.290106]  ret_from_fork_asm+0x1a/0x30
[   14.290264] 
[   14.290352] The buggy address belongs to the object at ffff8881028d8d80
[   14.290352]  which belongs to the cache kmalloc-64 of size 64
[   14.291025] The buggy address is located 0 bytes to the right of
[   14.291025]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.291787] 
[   14.291865] The buggy address belongs to the physical page:
[   14.292044] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.292342] flags: 0x200000000000000(node=0|zone=2)
[   14.292594] page_type: f5(slab)
[   14.292777] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.293206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.293640] page dumped because: kasan: bad access detected
[   14.293813] 
[   14.293879] Memory state around the buggy address:
[   14.294129]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.294494]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.294998] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.295297]                                      ^
[   14.295624]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.296002]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.296435] ==================================================================
[   14.939586] ==================================================================
[   14.940179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   14.940545] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.940867] 
[   14.940980] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.941025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.941037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.941057] Call Trace:
[   14.941072]  <TASK>
[   14.941088]  dump_stack_lvl+0x73/0xb0
[   14.941133]  print_report+0xd1/0x650
[   14.941156]  ? __virt_addr_valid+0x1db/0x2d0
[   14.941178]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.941199]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.941222]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.941254]  kasan_report+0x141/0x180
[   14.941276]  ? kasan_atomics_helper+0x19e3/0x5450
[   14.941302]  kasan_check_range+0x10c/0x1c0
[   14.941326]  __kasan_check_write+0x18/0x20
[   14.941345]  kasan_atomics_helper+0x19e3/0x5450
[   14.941367]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.941389]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.941414]  ? kasan_atomics+0x152/0x310
[   14.941441]  kasan_atomics+0x1dc/0x310
[   14.941463]  ? __pfx_kasan_atomics+0x10/0x10
[   14.941487]  ? __pfx_read_tsc+0x10/0x10
[   14.941509]  ? ktime_get_ts64+0x86/0x230
[   14.941535]  kunit_try_run_case+0x1a5/0x480
[   14.941558]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.941581]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.941603]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.941626]  ? __kthread_parkme+0x82/0x180
[   14.941646]  ? preempt_count_sub+0x50/0x80
[   14.941669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.941697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.941720]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.941744]  kthread+0x337/0x6f0
[   14.941763]  ? trace_preempt_on+0x20/0xc0
[   14.941788]  ? __pfx_kthread+0x10/0x10
[   14.941809]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.941830]  ? calculate_sigpending+0x7b/0xa0
[   14.941854]  ? __pfx_kthread+0x10/0x10
[   14.941876]  ret_from_fork+0x116/0x1d0
[   14.941894]  ? __pfx_kthread+0x10/0x10
[   14.941915]  ret_from_fork_asm+0x1a/0x30
[   14.941968]  </TASK>
[   14.941979] 
[   14.949796] Allocated by task 290:
[   14.950651]  kasan_save_stack+0x45/0x70
[   14.951543]  kasan_save_track+0x18/0x40
[   14.951693]  kasan_save_alloc_info+0x3b/0x50
[   14.951839]  __kasan_kmalloc+0xb7/0xc0
[   14.952206]  __kmalloc_cache_noprof+0x189/0x420
[   14.952766]  kasan_atomics+0x95/0x310
[   14.953244]  kunit_try_run_case+0x1a5/0x480
[   14.953727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.953922]  kthread+0x337/0x6f0
[   14.954425]  ret_from_fork+0x116/0x1d0
[   14.954907]  ret_from_fork_asm+0x1a/0x30
[   14.955365] 
[   14.955679] The buggy address belongs to the object at ffff8881028d8d80
[   14.955679]  which belongs to the cache kmalloc-64 of size 64
[   14.956047] The buggy address is located 0 bytes to the right of
[   14.956047]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.956719] 
[   14.957137] The buggy address belongs to the physical page:
[   14.957818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.958708] flags: 0x200000000000000(node=0|zone=2)
[   14.959327] page_type: f5(slab)
[   14.959784] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.960306] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.961105] page dumped because: kasan: bad access detected
[   14.961581] 
[   14.961657] Memory state around the buggy address:
[   14.961814]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.962039]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.962250] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.962653]                                      ^
[   14.963076]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.963691]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.964273] ==================================================================
[   13.939902] ==================================================================
[   13.940528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   13.940893] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   13.941221] 
[   13.941321] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   13.941364] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.941376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.941397] Call Trace:
[   13.941412]  <TASK>
[   13.941427]  dump_stack_lvl+0x73/0xb0
[   13.941454]  print_report+0xd1/0x650
[   13.941476]  ? __virt_addr_valid+0x1db/0x2d0
[   13.941498]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.941520]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.941543]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.941565]  kasan_report+0x141/0x180
[   13.941587]  ? kasan_atomics_helper+0x4b6e/0x5450
[   13.941613]  __asan_report_store4_noabort+0x1b/0x30
[   13.941638]  kasan_atomics_helper+0x4b6e/0x5450
[   13.941661]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.941688]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.941713]  ? kasan_atomics+0x152/0x310
[   13.941739]  kasan_atomics+0x1dc/0x310
[   13.941762]  ? __pfx_kasan_atomics+0x10/0x10
[   13.941786]  ? __pfx_read_tsc+0x10/0x10
[   13.941807]  ? ktime_get_ts64+0x86/0x230
[   13.941833]  kunit_try_run_case+0x1a5/0x480
[   13.941857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.941879]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.941902]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.941925]  ? __kthread_parkme+0x82/0x180
[   13.941957]  ? preempt_count_sub+0x50/0x80
[   13.941980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.942004]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.942029]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.942052]  kthread+0x337/0x6f0
[   13.942072]  ? trace_preempt_on+0x20/0xc0
[   13.942096]  ? __pfx_kthread+0x10/0x10
[   13.942117]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.942138]  ? calculate_sigpending+0x7b/0xa0
[   13.942162]  ? __pfx_kthread+0x10/0x10
[   13.942185]  ret_from_fork+0x116/0x1d0
[   13.942204]  ? __pfx_kthread+0x10/0x10
[   13.942226]  ret_from_fork_asm+0x1a/0x30
[   13.942259]  </TASK>
[   13.942270] 
[   13.950772] Allocated by task 290:
[   13.950900]  kasan_save_stack+0x45/0x70
[   13.951049]  kasan_save_track+0x18/0x40
[   13.953201]  kasan_save_alloc_info+0x3b/0x50
[   13.954515]  __kasan_kmalloc+0xb7/0xc0
[   13.955672]  __kmalloc_cache_noprof+0x189/0x420
[   13.956515]  kasan_atomics+0x95/0x310
[   13.956744]  kunit_try_run_case+0x1a5/0x480
[   13.956884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.957851]  kthread+0x337/0x6f0
[   13.959113]  ret_from_fork+0x116/0x1d0
[   13.959289]  ret_from_fork_asm+0x1a/0x30
[   13.959877] 
[   13.960099] The buggy address belongs to the object at ffff8881028d8d80
[   13.960099]  which belongs to the cache kmalloc-64 of size 64
[   13.961752] The buggy address is located 0 bytes to the right of
[   13.961752]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   13.962222] 
[   13.962320] The buggy address belongs to the physical page:
[   13.962647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   13.963041] flags: 0x200000000000000(node=0|zone=2)
[   13.963548] page_type: f5(slab)
[   13.963760] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.964120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.964691] page dumped because: kasan: bad access detected
[   13.964961] 
[   13.965057] Memory state around the buggy address:
[   13.965354]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.965763]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.966134] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.967013]                                      ^
[   13.967623]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.968302]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.969169] ==================================================================
[   14.813726] ==================================================================
[   14.814093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   14.814475] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.814783] 
[   14.814879] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.814939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.814952] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.814975] Call Trace:
[   14.814996]  <TASK>
[   14.815016]  dump_stack_lvl+0x73/0xb0
[   14.815045]  print_report+0xd1/0x650
[   14.815069]  ? __virt_addr_valid+0x1db/0x2d0
[   14.815093]  ? kasan_atomics_helper+0x164f/0x5450
[   14.815114]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.815136]  ? kasan_atomics_helper+0x164f/0x5450
[   14.815158]  kasan_report+0x141/0x180
[   14.815180]  ? kasan_atomics_helper+0x164f/0x5450
[   14.815207]  kasan_check_range+0x10c/0x1c0
[   14.815231]  __kasan_check_write+0x18/0x20
[   14.815252]  kasan_atomics_helper+0x164f/0x5450
[   14.815274]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.815296]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.815322]  ? kasan_atomics+0x152/0x310
[   14.815348]  kasan_atomics+0x1dc/0x310
[   14.815371]  ? __pfx_kasan_atomics+0x10/0x10
[   14.815395]  ? __pfx_read_tsc+0x10/0x10
[   14.815417]  ? ktime_get_ts64+0x86/0x230
[   14.815445]  kunit_try_run_case+0x1a5/0x480
[   14.815470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.815492]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.815516]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.815539]  ? __kthread_parkme+0x82/0x180
[   14.815561]  ? preempt_count_sub+0x50/0x80
[   14.815586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.815610]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.815633]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.815657]  kthread+0x337/0x6f0
[   14.815677]  ? trace_preempt_on+0x20/0xc0
[   14.815702]  ? __pfx_kthread+0x10/0x10
[   14.815724]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.815746]  ? calculate_sigpending+0x7b/0xa0
[   14.815770]  ? __pfx_kthread+0x10/0x10
[   14.815792]  ret_from_fork+0x116/0x1d0
[   14.815811]  ? __pfx_kthread+0x10/0x10
[   14.815833]  ret_from_fork_asm+0x1a/0x30
[   14.815863]  </TASK>
[   14.815875] 
[   14.824007] Allocated by task 290:
[   14.824385]  kasan_save_stack+0x45/0x70
[   14.824690]  kasan_save_track+0x18/0x40
[   14.825031]  kasan_save_alloc_info+0x3b/0x50
[   14.825224]  __kasan_kmalloc+0xb7/0xc0
[   14.825538]  __kmalloc_cache_noprof+0x189/0x420
[   14.826309]  kasan_atomics+0x95/0x310
[   14.826504]  kunit_try_run_case+0x1a5/0x480
[   14.826721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.826961]  kthread+0x337/0x6f0
[   14.827099]  ret_from_fork+0x116/0x1d0
[   14.827281]  ret_from_fork_asm+0x1a/0x30
[   14.827948] 
[   14.828041] The buggy address belongs to the object at ffff8881028d8d80
[   14.828041]  which belongs to the cache kmalloc-64 of size 64
[   14.828756] The buggy address is located 0 bytes to the right of
[   14.828756]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.829359] 
[   14.829544] The buggy address belongs to the physical page:
[   14.829889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.830249] flags: 0x200000000000000(node=0|zone=2)
[   14.830614] page_type: f5(slab)
[   14.830746] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.831153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.831622] page dumped because: kasan: bad access detected
[   14.831835] 
[   14.832004] Memory state around the buggy address:
[   14.832340]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.832715]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.833067] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.833420]                                      ^
[   14.833581]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.833900]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.834193] ==================================================================
[   14.088282] ==================================================================
[   14.088921] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   14.089627] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.090252] 
[   14.090424] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.090473] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.090486] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.090508] Call Trace:
[   14.090528]  <TASK>
[   14.090548]  dump_stack_lvl+0x73/0xb0
[   14.090590]  print_report+0xd1/0x650
[   14.090613]  ? __virt_addr_valid+0x1db/0x2d0
[   14.090636]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.090657]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.090680]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.090701]  kasan_report+0x141/0x180
[   14.090724]  ? kasan_atomics_helper+0x5fe/0x5450
[   14.090749]  kasan_check_range+0x10c/0x1c0
[   14.090773]  __kasan_check_write+0x18/0x20
[   14.090792]  kasan_atomics_helper+0x5fe/0x5450
[   14.090814]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.090837]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.090863]  ? kasan_atomics+0x152/0x310
[   14.090888]  kasan_atomics+0x1dc/0x310
[   14.090911]  ? __pfx_kasan_atomics+0x10/0x10
[   14.090943]  ? __pfx_read_tsc+0x10/0x10
[   14.090966]  ? ktime_get_ts64+0x86/0x230
[   14.090992]  kunit_try_run_case+0x1a5/0x480
[   14.091017]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.091039]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.091062]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.091085]  ? __kthread_parkme+0x82/0x180
[   14.091105]  ? preempt_count_sub+0x50/0x80
[   14.091129]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.091153]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.091175]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.091198]  kthread+0x337/0x6f0
[   14.091218]  ? trace_preempt_on+0x20/0xc0
[   14.091243]  ? __pfx_kthread+0x10/0x10
[   14.091264]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.091285]  ? calculate_sigpending+0x7b/0xa0
[   14.091309]  ? __pfx_kthread+0x10/0x10
[   14.091331]  ret_from_fork+0x116/0x1d0
[   14.091350]  ? __pfx_kthread+0x10/0x10
[   14.091370]  ret_from_fork_asm+0x1a/0x30
[   14.091456]  </TASK>
[   14.091471] 
[   14.104681] Allocated by task 290:
[   14.105021]  kasan_save_stack+0x45/0x70
[   14.105377]  kasan_save_track+0x18/0x40
[   14.105792]  kasan_save_alloc_info+0x3b/0x50
[   14.106176]  __kasan_kmalloc+0xb7/0xc0
[   14.106525]  __kmalloc_cache_noprof+0x189/0x420
[   14.106993]  kasan_atomics+0x95/0x310
[   14.107329]  kunit_try_run_case+0x1a5/0x480
[   14.107758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.108046]  kthread+0x337/0x6f0
[   14.108164]  ret_from_fork+0x116/0x1d0
[   14.108291]  ret_from_fork_asm+0x1a/0x30
[   14.108671] 
[   14.108897] The buggy address belongs to the object at ffff8881028d8d80
[   14.108897]  which belongs to the cache kmalloc-64 of size 64
[   14.110057] The buggy address is located 0 bytes to the right of
[   14.110057]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.111323] 
[   14.111588] The buggy address belongs to the physical page:
[   14.111764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.112010] flags: 0x200000000000000(node=0|zone=2)
[   14.112169] page_type: f5(slab)
[   14.112283] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.112515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.113186] page dumped because: kasan: bad access detected
[   14.113434] 
[   14.113508] Memory state around the buggy address:
[   14.113654]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.114058]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.114362] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.114902]                                      ^
[   14.115070]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.115388]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.115757] ==================================================================
[   14.565333] ==================================================================
[   14.565861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   14.566237] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.566589] 
[   14.566793] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.566874] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.566887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.566907] Call Trace:
[   14.566922]  <TASK>
[   14.566947]  dump_stack_lvl+0x73/0xb0
[   14.566976]  print_report+0xd1/0x650
[   14.567000]  ? __virt_addr_valid+0x1db/0x2d0
[   14.567023]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.567044]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.567067]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.567089]  kasan_report+0x141/0x180
[   14.567111]  ? kasan_atomics_helper+0x4a02/0x5450
[   14.567180]  __asan_report_load4_noabort+0x18/0x20
[   14.567206]  kasan_atomics_helper+0x4a02/0x5450
[   14.567248]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.567312]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.567410]  ? kasan_atomics+0x152/0x310
[   14.567440]  kasan_atomics+0x1dc/0x310
[   14.567508]  ? __pfx_kasan_atomics+0x10/0x10
[   14.567535]  ? __pfx_read_tsc+0x10/0x10
[   14.567557]  ? ktime_get_ts64+0x86/0x230
[   14.567595]  kunit_try_run_case+0x1a5/0x480
[   14.567619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.567641]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.567664]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.567687]  ? __kthread_parkme+0x82/0x180
[   14.567707]  ? preempt_count_sub+0x50/0x80
[   14.567730]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.567755]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.567778]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.567801]  kthread+0x337/0x6f0
[   14.567821]  ? trace_preempt_on+0x20/0xc0
[   14.567845]  ? __pfx_kthread+0x10/0x10
[   14.567866]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.567887]  ? calculate_sigpending+0x7b/0xa0
[   14.567911]  ? __pfx_kthread+0x10/0x10
[   14.567940]  ret_from_fork+0x116/0x1d0
[   14.567959]  ? __pfx_kthread+0x10/0x10
[   14.567979]  ret_from_fork_asm+0x1a/0x30
[   14.568011]  </TASK>
[   14.568022] 
[   14.576339] Allocated by task 290:
[   14.576572]  kasan_save_stack+0x45/0x70
[   14.576851]  kasan_save_track+0x18/0x40
[   14.577050]  kasan_save_alloc_info+0x3b/0x50
[   14.577254]  __kasan_kmalloc+0xb7/0xc0
[   14.577384]  __kmalloc_cache_noprof+0x189/0x420
[   14.577671]  kasan_atomics+0x95/0x310
[   14.577803]  kunit_try_run_case+0x1a5/0x480
[   14.577996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.578321]  kthread+0x337/0x6f0
[   14.578610]  ret_from_fork+0x116/0x1d0
[   14.578965]  ret_from_fork_asm+0x1a/0x30
[   14.579142] 
[   14.579264] The buggy address belongs to the object at ffff8881028d8d80
[   14.579264]  which belongs to the cache kmalloc-64 of size 64
[   14.579939] The buggy address is located 0 bytes to the right of
[   14.579939]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.580563] 
[   14.580650] The buggy address belongs to the physical page:
[   14.580972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.581368] flags: 0x200000000000000(node=0|zone=2)
[   14.581604] page_type: f5(slab)
[   14.581728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.581970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.582312] page dumped because: kasan: bad access detected
[   14.582807] 
[   14.582878] Memory state around the buggy address:
[   14.583110]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.583573]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.583921] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.584275]                                      ^
[   14.584525]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.584881]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.585198] ==================================================================
[   14.693356] ==================================================================
[   14.694105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   14.694850] Read of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.695498] 
[   14.695673] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.695726] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.695740] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.695761] Call Trace:
[   14.695779]  <TASK>
[   14.695798]  dump_stack_lvl+0x73/0xb0
[   14.695828]  print_report+0xd1/0x650
[   14.695850]  ? __virt_addr_valid+0x1db/0x2d0
[   14.695872]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.695893]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.695916]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.695946]  kasan_report+0x141/0x180
[   14.695967]  ? kasan_atomics_helper+0x4eae/0x5450
[   14.695994]  __asan_report_load8_noabort+0x18/0x20
[   14.696017]  kasan_atomics_helper+0x4eae/0x5450
[   14.696040]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.696063]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.696088]  ? kasan_atomics+0x152/0x310
[   14.696114]  kasan_atomics+0x1dc/0x310
[   14.696138]  ? __pfx_kasan_atomics+0x10/0x10
[   14.696162]  ? __pfx_read_tsc+0x10/0x10
[   14.696184]  ? ktime_get_ts64+0x86/0x230
[   14.696210]  kunit_try_run_case+0x1a5/0x480
[   14.696234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.696260]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.696283]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.696306]  ? __kthread_parkme+0x82/0x180
[   14.696327]  ? preempt_count_sub+0x50/0x80
[   14.696351]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.696395]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.696419]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.696443]  kthread+0x337/0x6f0
[   14.696463]  ? trace_preempt_on+0x20/0xc0
[   14.696488]  ? __pfx_kthread+0x10/0x10
[   14.696510]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.696531]  ? calculate_sigpending+0x7b/0xa0
[   14.696556]  ? __pfx_kthread+0x10/0x10
[   14.696578]  ret_from_fork+0x116/0x1d0
[   14.696596]  ? __pfx_kthread+0x10/0x10
[   14.696617]  ret_from_fork_asm+0x1a/0x30
[   14.696649]  </TASK>
[   14.696660] 
[   14.709008] Allocated by task 290:
[   14.709315]  kasan_save_stack+0x45/0x70
[   14.709711]  kasan_save_track+0x18/0x40
[   14.710064]  kasan_save_alloc_info+0x3b/0x50
[   14.710215]  __kasan_kmalloc+0xb7/0xc0
[   14.710343]  __kmalloc_cache_noprof+0x189/0x420
[   14.710762]  kasan_atomics+0x95/0x310
[   14.711097]  kunit_try_run_case+0x1a5/0x480
[   14.711489]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.711972]  kthread+0x337/0x6f0
[   14.712135]  ret_from_fork+0x116/0x1d0
[   14.712262]  ret_from_fork_asm+0x1a/0x30
[   14.712458] 
[   14.712610] The buggy address belongs to the object at ffff8881028d8d80
[   14.712610]  which belongs to the cache kmalloc-64 of size 64
[   14.713652] The buggy address is located 0 bytes to the right of
[   14.713652]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.714498] 
[   14.714652] The buggy address belongs to the physical page:
[   14.715050] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.715280] flags: 0x200000000000000(node=0|zone=2)
[   14.715591] page_type: f5(slab)
[   14.715875] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.716522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.717159] page dumped because: kasan: bad access detected
[   14.717646] 
[   14.717734] Memory state around the buggy address:
[   14.717885]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.718104]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.718313] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.718848]                                      ^
[   14.719277]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.719890]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.720498] ==================================================================
[   14.835592] ==================================================================
[   14.835904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   14.836242] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.837020] 
[   14.837142] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.837193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.837206] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.837228] Call Trace:
[   14.837247]  <TASK>
[   14.837265]  dump_stack_lvl+0x73/0xb0
[   14.837299]  print_report+0xd1/0x650
[   14.837322]  ? __virt_addr_valid+0x1db/0x2d0
[   14.837346]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.837368]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.837391]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.837413]  kasan_report+0x141/0x180
[   14.837435]  ? kasan_atomics_helper+0x16e7/0x5450
[   14.837462]  kasan_check_range+0x10c/0x1c0
[   14.837494]  __kasan_check_write+0x18/0x20
[   14.837514]  kasan_atomics_helper+0x16e7/0x5450
[   14.837537]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.837559]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.837584]  ? kasan_atomics+0x152/0x310
[   14.837611]  kasan_atomics+0x1dc/0x310
[   14.837634]  ? __pfx_kasan_atomics+0x10/0x10
[   14.837658]  ? __pfx_read_tsc+0x10/0x10
[   14.837685]  ? ktime_get_ts64+0x86/0x230
[   14.837711]  kunit_try_run_case+0x1a5/0x480
[   14.837735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.837758]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.837781]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.837804]  ? __kthread_parkme+0x82/0x180
[   14.837825]  ? preempt_count_sub+0x50/0x80
[   14.837849]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.837873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.837896]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.837919]  kthread+0x337/0x6f0
[   14.837950]  ? trace_preempt_on+0x20/0xc0
[   14.837977]  ? __pfx_kthread+0x10/0x10
[   14.837998]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.838019]  ? calculate_sigpending+0x7b/0xa0
[   14.838044]  ? __pfx_kthread+0x10/0x10
[   14.838066]  ret_from_fork+0x116/0x1d0
[   14.838086]  ? __pfx_kthread+0x10/0x10
[   14.838107]  ret_from_fork_asm+0x1a/0x30
[   14.838139]  </TASK>
[   14.838150] 
[   14.845069] Allocated by task 290:
[   14.845255]  kasan_save_stack+0x45/0x70
[   14.845401]  kasan_save_track+0x18/0x40
[   14.845589]  kasan_save_alloc_info+0x3b/0x50
[   14.845789]  __kasan_kmalloc+0xb7/0xc0
[   14.845916]  __kmalloc_cache_noprof+0x189/0x420
[   14.846075]  kasan_atomics+0x95/0x310
[   14.846248]  kunit_try_run_case+0x1a5/0x480
[   14.846447]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.846690]  kthread+0x337/0x6f0
[   14.847027]  ret_from_fork+0x116/0x1d0
[   14.847186]  ret_from_fork_asm+0x1a/0x30
[   14.847319] 
[   14.847387] The buggy address belongs to the object at ffff8881028d8d80
[   14.847387]  which belongs to the cache kmalloc-64 of size 64
[   14.847899] The buggy address is located 0 bytes to the right of
[   14.847899]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.848315] 
[   14.848385] The buggy address belongs to the physical page:
[   14.848554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.848790] flags: 0x200000000000000(node=0|zone=2)
[   14.849035] page_type: f5(slab)
[   14.849202] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.849567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.849910] page dumped because: kasan: bad access detected
[   14.850154] 
[   14.850228] Memory state around the buggy address:
[   14.850466]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.850750]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.851036] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.851306]                                      ^
[   14.851453]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.851662]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.852226] ==================================================================
[   13.999760] ==================================================================
[   14.000172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   14.000536] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.000902] 
[   14.001026] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.001104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.001116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.001139] Call Trace:
[   14.001173]  <TASK>
[   14.001194]  dump_stack_lvl+0x73/0xb0
[   14.001223]  print_report+0xd1/0x650
[   14.001245]  ? __virt_addr_valid+0x1db/0x2d0
[   14.001269]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.001290]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.001340]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.001363]  kasan_report+0x141/0x180
[   14.001385]  ? kasan_atomics_helper+0x4b54/0x5450
[   14.001435]  __asan_report_load4_noabort+0x18/0x20
[   14.001486]  kasan_atomics_helper+0x4b54/0x5450
[   14.001511]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.001533]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.001570]  ? kasan_atomics+0x152/0x310
[   14.001597]  kasan_atomics+0x1dc/0x310
[   14.001619]  ? __pfx_kasan_atomics+0x10/0x10
[   14.001643]  ? __pfx_read_tsc+0x10/0x10
[   14.001665]  ? ktime_get_ts64+0x86/0x230
[   14.001700]  kunit_try_run_case+0x1a5/0x480
[   14.001752]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.001774]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.001825]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.001848]  ? __kthread_parkme+0x82/0x180
[   14.001870]  ? preempt_count_sub+0x50/0x80
[   14.001895]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.001919]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.001952]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.001975]  kthread+0x337/0x6f0
[   14.001995]  ? trace_preempt_on+0x20/0xc0
[   14.002019]  ? __pfx_kthread+0x10/0x10
[   14.002040]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.002061]  ? calculate_sigpending+0x7b/0xa0
[   14.002086]  ? __pfx_kthread+0x10/0x10
[   14.002107]  ret_from_fork+0x116/0x1d0
[   14.002126]  ? __pfx_kthread+0x10/0x10
[   14.002147]  ret_from_fork_asm+0x1a/0x30
[   14.002178]  </TASK>
[   14.002190] 
[   14.010833] Allocated by task 290:
[   14.010985]  kasan_save_stack+0x45/0x70
[   14.011131]  kasan_save_track+0x18/0x40
[   14.011260]  kasan_save_alloc_info+0x3b/0x50
[   14.011413]  __kasan_kmalloc+0xb7/0xc0
[   14.011592]  __kmalloc_cache_noprof+0x189/0x420
[   14.012018]  kasan_atomics+0x95/0x310
[   14.012203]  kunit_try_run_case+0x1a5/0x480
[   14.012405]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.012649]  kthread+0x337/0x6f0
[   14.012779]  ret_from_fork+0x116/0x1d0
[   14.013053]  ret_from_fork_asm+0x1a/0x30
[   14.013190] 
[   14.013258] The buggy address belongs to the object at ffff8881028d8d80
[   14.013258]  which belongs to the cache kmalloc-64 of size 64
[   14.013901] The buggy address is located 0 bytes to the right of
[   14.013901]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.014639] 
[   14.014724] The buggy address belongs to the physical page:
[   14.015501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.015885] flags: 0x200000000000000(node=0|zone=2)
[   14.016857] page_type: f5(slab)
[   14.017010] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.017239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.017602] page dumped because: kasan: bad access detected
[   14.017780] 
[   14.017846] Memory state around the buggy address:
[   14.018009]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.018251]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.018492] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.018806]                                      ^
[   14.019091]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.019590]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.019924] ==================================================================
[   15.018811] ==================================================================
[   15.019094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   15.019326] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   15.019583] 
[   15.019891] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   15.019954] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.019967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.019988] Call Trace:
[   15.020006]  <TASK>
[   15.020024]  dump_stack_lvl+0x73/0xb0
[   15.020054]  print_report+0xd1/0x650
[   15.020077]  ? __virt_addr_valid+0x1db/0x2d0
[   15.020100]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.020122]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.020144]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.020166]  kasan_report+0x141/0x180
[   15.020188]  ? kasan_atomics_helper+0x1c18/0x5450
[   15.020214]  kasan_check_range+0x10c/0x1c0
[   15.020238]  __kasan_check_write+0x18/0x20
[   15.020259]  kasan_atomics_helper+0x1c18/0x5450
[   15.020282]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.020304]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.020329]  ? kasan_atomics+0x152/0x310
[   15.020355]  kasan_atomics+0x1dc/0x310
[   15.020377]  ? __pfx_kasan_atomics+0x10/0x10
[   15.020552]  ? __pfx_read_tsc+0x10/0x10
[   15.020575]  ? ktime_get_ts64+0x86/0x230
[   15.020602]  kunit_try_run_case+0x1a5/0x480
[   15.020626]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.020648]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.020671]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.020694]  ? __kthread_parkme+0x82/0x180
[   15.020714]  ? preempt_count_sub+0x50/0x80
[   15.020738]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.020762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.020785]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.020808]  kthread+0x337/0x6f0
[   15.020828]  ? trace_preempt_on+0x20/0xc0
[   15.020854]  ? __pfx_kthread+0x10/0x10
[   15.020875]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.020895]  ? calculate_sigpending+0x7b/0xa0
[   15.020919]  ? __pfx_kthread+0x10/0x10
[   15.020953]  ret_from_fork+0x116/0x1d0
[   15.020972]  ? __pfx_kthread+0x10/0x10
[   15.020993]  ret_from_fork_asm+0x1a/0x30
[   15.021024]  </TASK>
[   15.021035] 
[   15.030136] Allocated by task 290:
[   15.030320]  kasan_save_stack+0x45/0x70
[   15.030507]  kasan_save_track+0x18/0x40
[   15.031161]  kasan_save_alloc_info+0x3b/0x50
[   15.031371]  __kasan_kmalloc+0xb7/0xc0
[   15.031533]  __kmalloc_cache_noprof+0x189/0x420
[   15.031866]  kasan_atomics+0x95/0x310
[   15.032074]  kunit_try_run_case+0x1a5/0x480
[   15.032371]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.032619]  kthread+0x337/0x6f0
[   15.032902]  ret_from_fork+0x116/0x1d0
[   15.033104]  ret_from_fork_asm+0x1a/0x30
[   15.033409] 
[   15.033484] The buggy address belongs to the object at ffff8881028d8d80
[   15.033484]  which belongs to the cache kmalloc-64 of size 64
[   15.033973] The buggy address is located 0 bytes to the right of
[   15.033973]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   15.034499] 
[   15.034579] The buggy address belongs to the physical page:
[   15.034810] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   15.035526] flags: 0x200000000000000(node=0|zone=2)
[   15.035766] page_type: f5(slab)
[   15.036060] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.036501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.036875] page dumped because: kasan: bad access detected
[   15.037232] 
[   15.037328] Memory state around the buggy address:
[   15.037627]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.037990]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.038351] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.038767]                                      ^
[   15.039104]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.039563]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.039858] ==================================================================
[   15.178254] ==================================================================
[   15.179472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   15.180247] Read of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   15.180968] 
[   15.181162] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   15.181210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.181223] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.181244] Call Trace:
[   15.181263]  <TASK>
[   15.181281]  dump_stack_lvl+0x73/0xb0
[   15.181330]  print_report+0xd1/0x650
[   15.181353]  ? __virt_addr_valid+0x1db/0x2d0
[   15.181376]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.181408]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.181431]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.181454]  kasan_report+0x141/0x180
[   15.181476]  ? kasan_atomics_helper+0x4f71/0x5450
[   15.181502]  __asan_report_load8_noabort+0x18/0x20
[   15.181526]  kasan_atomics_helper+0x4f71/0x5450
[   15.181549]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.181571]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.181596]  ? kasan_atomics+0x152/0x310
[   15.181623]  kasan_atomics+0x1dc/0x310
[   15.181645]  ? __pfx_kasan_atomics+0x10/0x10
[   15.181670]  ? __pfx_read_tsc+0x10/0x10
[   15.181697]  ? ktime_get_ts64+0x86/0x230
[   15.181724]  kunit_try_run_case+0x1a5/0x480
[   15.181749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.181770]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.181793]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.181816]  ? __kthread_parkme+0x82/0x180
[   15.181836]  ? preempt_count_sub+0x50/0x80
[   15.181860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.181883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.181906]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.181941]  kthread+0x337/0x6f0
[   15.181961]  ? trace_preempt_on+0x20/0xc0
[   15.181985]  ? __pfx_kthread+0x10/0x10
[   15.182006]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.182026]  ? calculate_sigpending+0x7b/0xa0
[   15.182051]  ? __pfx_kthread+0x10/0x10
[   15.182072]  ret_from_fork+0x116/0x1d0
[   15.182091]  ? __pfx_kthread+0x10/0x10
[   15.182112]  ret_from_fork_asm+0x1a/0x30
[   15.182142]  </TASK>
[   15.182153] 
[   15.192578] Allocated by task 290:
[   15.192761]  kasan_save_stack+0x45/0x70
[   15.193154]  kasan_save_track+0x18/0x40
[   15.193299]  kasan_save_alloc_info+0x3b/0x50
[   15.193644]  __kasan_kmalloc+0xb7/0xc0
[   15.193821]  __kmalloc_cache_noprof+0x189/0x420
[   15.194014]  kasan_atomics+0x95/0x310
[   15.194172]  kunit_try_run_case+0x1a5/0x480
[   15.194346]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.194577]  kthread+0x337/0x6f0
[   15.195057]  ret_from_fork+0x116/0x1d0
[   15.195211]  ret_from_fork_asm+0x1a/0x30
[   15.195412] 
[   15.195583] The buggy address belongs to the object at ffff8881028d8d80
[   15.195583]  which belongs to the cache kmalloc-64 of size 64
[   15.196209] The buggy address is located 0 bytes to the right of
[   15.196209]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   15.196891] 
[   15.197121] The buggy address belongs to the physical page:
[   15.197347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   15.197839] flags: 0x200000000000000(node=0|zone=2)
[   15.198124] page_type: f5(slab)
[   15.198284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.198762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.199138] page dumped because: kasan: bad access detected
[   15.199369] 
[   15.199548] Memory state around the buggy address:
[   15.199860]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.200213]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.200611] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.200965]                                      ^
[   15.201181]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.201590]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.201837] ==================================================================
[   15.087634] ==================================================================
[   15.087985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   15.088294] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   15.089055] 
[   15.089159] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   15.089347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.089363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.089386] Call Trace:
[   15.089413]  <TASK>
[   15.089430]  dump_stack_lvl+0x73/0xb0
[   15.089460]  print_report+0xd1/0x650
[   15.089482]  ? __virt_addr_valid+0x1db/0x2d0
[   15.089505]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.089527]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.089549]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.089573]  kasan_report+0x141/0x180
[   15.089594]  ? kasan_atomics_helper+0x1d7a/0x5450
[   15.089621]  kasan_check_range+0x10c/0x1c0
[   15.089647]  __kasan_check_write+0x18/0x20
[   15.089666]  kasan_atomics_helper+0x1d7a/0x5450
[   15.089695]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.089718]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.089742]  ? kasan_atomics+0x152/0x310
[   15.089768]  kasan_atomics+0x1dc/0x310
[   15.089791]  ? __pfx_kasan_atomics+0x10/0x10
[   15.089814]  ? __pfx_read_tsc+0x10/0x10
[   15.089836]  ? ktime_get_ts64+0x86/0x230
[   15.089861]  kunit_try_run_case+0x1a5/0x480
[   15.089885]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.089908]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.089942]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.089965]  ? __kthread_parkme+0x82/0x180
[   15.089985]  ? preempt_count_sub+0x50/0x80
[   15.090008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.090032]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.090055]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.090078]  kthread+0x337/0x6f0
[   15.090097]  ? trace_preempt_on+0x20/0xc0
[   15.090121]  ? __pfx_kthread+0x10/0x10
[   15.090142]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.090163]  ? calculate_sigpending+0x7b/0xa0
[   15.090187]  ? __pfx_kthread+0x10/0x10
[   15.090208]  ret_from_fork+0x116/0x1d0
[   15.090226]  ? __pfx_kthread+0x10/0x10
[   15.090247]  ret_from_fork_asm+0x1a/0x30
[   15.090277]  </TASK>
[   15.090289] 
[   15.100103] Allocated by task 290:
[   15.100238]  kasan_save_stack+0x45/0x70
[   15.100685]  kasan_save_track+0x18/0x40
[   15.100964]  kasan_save_alloc_info+0x3b/0x50
[   15.101146]  __kasan_kmalloc+0xb7/0xc0
[   15.101454]  __kmalloc_cache_noprof+0x189/0x420
[   15.101747]  kasan_atomics+0x95/0x310
[   15.101940]  kunit_try_run_case+0x1a5/0x480
[   15.102268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.102643]  kthread+0x337/0x6f0
[   15.102806]  ret_from_fork+0x116/0x1d0
[   15.103132]  ret_from_fork_asm+0x1a/0x30
[   15.103400] 
[   15.103502] The buggy address belongs to the object at ffff8881028d8d80
[   15.103502]  which belongs to the cache kmalloc-64 of size 64
[   15.104206] The buggy address is located 0 bytes to the right of
[   15.104206]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   15.104958] 
[   15.105058] The buggy address belongs to the physical page:
[   15.105428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   15.105918] flags: 0x200000000000000(node=0|zone=2)
[   15.106219] page_type: f5(slab)
[   15.106355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.106873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.107284] page dumped because: kasan: bad access detected
[   15.107624] 
[   15.107720] Memory state around the buggy address:
[   15.107942]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.108254]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.108796] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.109055]                                      ^
[   15.109386]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.109833]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.110247] ==================================================================
[   15.356181] ==================================================================
[   15.356555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   15.356794] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   15.357129] 
[   15.357231] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   15.357277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.357288] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.357310] Call Trace:
[   15.357327]  <TASK>
[   15.357343]  dump_stack_lvl+0x73/0xb0
[   15.357371]  print_report+0xd1/0x650
[   15.357393]  ? __virt_addr_valid+0x1db/0x2d0
[   15.357415]  ? kasan_atomics_helper+0x224c/0x5450
[   15.357436]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.357459]  ? kasan_atomics_helper+0x224c/0x5450
[   15.357491]  kasan_report+0x141/0x180
[   15.357513]  ? kasan_atomics_helper+0x224c/0x5450
[   15.357540]  kasan_check_range+0x10c/0x1c0
[   15.357563]  __kasan_check_write+0x18/0x20
[   15.357584]  kasan_atomics_helper+0x224c/0x5450
[   15.357606]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.357628]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.357653]  ? kasan_atomics+0x152/0x310
[   15.357679]  kasan_atomics+0x1dc/0x310
[   15.357707]  ? __pfx_kasan_atomics+0x10/0x10
[   15.357731]  ? __pfx_read_tsc+0x10/0x10
[   15.357753]  ? ktime_get_ts64+0x86/0x230
[   15.357780]  kunit_try_run_case+0x1a5/0x480
[   15.357804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.357827]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.357851]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.357874]  ? __kthread_parkme+0x82/0x180
[   15.357895]  ? preempt_count_sub+0x50/0x80
[   15.357919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.357954]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.357978]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.358001]  kthread+0x337/0x6f0
[   15.358021]  ? trace_preempt_on+0x20/0xc0
[   15.358046]  ? __pfx_kthread+0x10/0x10
[   15.358067]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.358088]  ? calculate_sigpending+0x7b/0xa0
[   15.358113]  ? __pfx_kthread+0x10/0x10
[   15.358134]  ret_from_fork+0x116/0x1d0
[   15.358153]  ? __pfx_kthread+0x10/0x10
[   15.358174]  ret_from_fork_asm+0x1a/0x30
[   15.358205]  </TASK>
[   15.358216] 
[   15.365126] Allocated by task 290:
[   15.365253]  kasan_save_stack+0x45/0x70
[   15.365390]  kasan_save_track+0x18/0x40
[   15.365585]  kasan_save_alloc_info+0x3b/0x50
[   15.365798]  __kasan_kmalloc+0xb7/0xc0
[   15.365990]  __kmalloc_cache_noprof+0x189/0x420
[   15.366205]  kasan_atomics+0x95/0x310
[   15.366331]  kunit_try_run_case+0x1a5/0x480
[   15.366469]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.366635]  kthread+0x337/0x6f0
[   15.366749]  ret_from_fork+0x116/0x1d0
[   15.367076]  ret_from_fork_asm+0x1a/0x30
[   15.367419] 
[   15.367510] The buggy address belongs to the object at ffff8881028d8d80
[   15.367510]  which belongs to the cache kmalloc-64 of size 64
[   15.368053] The buggy address is located 0 bytes to the right of
[   15.368053]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   15.368496] 
[   15.368596] The buggy address belongs to the physical page:
[   15.368809] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   15.369063] flags: 0x200000000000000(node=0|zone=2)
[   15.369295] page_type: f5(slab)
[   15.369462] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.369880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.370141] page dumped because: kasan: bad access detected
[   15.370385] 
[   15.370489] Memory state around the buggy address:
[   15.370685]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.371031]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.371249] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.371490]                                      ^
[   15.371705]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.372024]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.372290] ==================================================================
[   13.874520] ==================================================================
[   13.875380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   13.876619] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   13.877139] 
[   13.877239] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   13.877291] Tainted: [B]=BAD_PAGE, [N]=TEST
[   13.877303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   13.877324] Call Trace:
[   13.877338]  <TASK>
[   13.877356]  dump_stack_lvl+0x73/0xb0
[   13.877388]  print_report+0xd1/0x650
[   13.877565]  ? __virt_addr_valid+0x1db/0x2d0
[   13.877846]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.877871]  ? kasan_complete_mode_report_info+0x2a/0x200
[   13.877893]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.877915]  kasan_report+0x141/0x180
[   13.877949]  ? kasan_atomics_helper+0x4bbc/0x5450
[   13.877974]  __asan_report_load4_noabort+0x18/0x20
[   13.877998]  kasan_atomics_helper+0x4bbc/0x5450
[   13.878019]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   13.878040]  ? __kmalloc_cache_noprof+0x189/0x420
[   13.878064]  ? kasan_atomics+0x152/0x310
[   13.878090]  kasan_atomics+0x1dc/0x310
[   13.878111]  ? __pfx_kasan_atomics+0x10/0x10
[   13.878134]  ? __pfx_read_tsc+0x10/0x10
[   13.878155]  ? ktime_get_ts64+0x86/0x230
[   13.878181]  kunit_try_run_case+0x1a5/0x480
[   13.878204]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.878225]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   13.878248]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   13.878269]  ? __kthread_parkme+0x82/0x180
[   13.878289]  ? preempt_count_sub+0x50/0x80
[   13.878312]  ? __pfx_kunit_try_run_case+0x10/0x10
[   13.878335]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.878357]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   13.878380]  kthread+0x337/0x6f0
[   13.878414]  ? trace_preempt_on+0x20/0xc0
[   13.878439]  ? __pfx_kthread+0x10/0x10
[   13.878460]  ? _raw_spin_unlock_irq+0x47/0x80
[   13.878479]  ? calculate_sigpending+0x7b/0xa0
[   13.878503]  ? __pfx_kthread+0x10/0x10
[   13.878524]  ret_from_fork+0x116/0x1d0
[   13.878541]  ? __pfx_kthread+0x10/0x10
[   13.878561]  ret_from_fork_asm+0x1a/0x30
[   13.878593]  </TASK>
[   13.878605] 
[   13.892120] Allocated by task 290:
[   13.892529]  kasan_save_stack+0x45/0x70
[   13.892961]  kasan_save_track+0x18/0x40
[   13.893322]  kasan_save_alloc_info+0x3b/0x50
[   13.893792]  __kasan_kmalloc+0xb7/0xc0
[   13.894198]  __kmalloc_cache_noprof+0x189/0x420
[   13.894637]  kasan_atomics+0x95/0x310
[   13.895102]  kunit_try_run_case+0x1a5/0x480
[   13.895573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   13.895861]  kthread+0x337/0x6f0
[   13.896185]  ret_from_fork+0x116/0x1d0
[   13.896578]  ret_from_fork_asm+0x1a/0x30
[   13.896965] 
[   13.897145] The buggy address belongs to the object at ffff8881028d8d80
[   13.897145]  which belongs to the cache kmalloc-64 of size 64
[   13.897730] The buggy address is located 0 bytes to the right of
[   13.897730]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   13.898536] 
[   13.898740] The buggy address belongs to the physical page:
[   13.899265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   13.899938] flags: 0x200000000000000(node=0|zone=2)
[   13.900103] page_type: f5(slab)
[   13.900221] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   13.900498] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   13.901078] page dumped because: kasan: bad access detected
[   13.901245] 
[   13.901307] Memory state around the buggy address:
[   13.901475]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.901700]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   13.901906] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   13.902164]                                      ^
[   13.902310]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.902788]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   13.903060] ==================================================================
[   14.202224] ==================================================================
[   14.202685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   14.203218] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.203513] 
[   14.203594] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.203640] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.203652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.203673] Call Trace:
[   14.203691]  <TASK>
[   14.203707]  dump_stack_lvl+0x73/0xb0
[   14.203736]  print_report+0xd1/0x650
[   14.203759]  ? __virt_addr_valid+0x1db/0x2d0
[   14.203781]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.203802]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.203825]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.203849]  kasan_report+0x141/0x180
[   14.203872]  ? kasan_atomics_helper+0x8f9/0x5450
[   14.203898]  kasan_check_range+0x10c/0x1c0
[   14.203922]  __kasan_check_write+0x18/0x20
[   14.204058]  kasan_atomics_helper+0x8f9/0x5450
[   14.204082]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.204105]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.204160]  ? kasan_atomics+0x152/0x310
[   14.204211]  kasan_atomics+0x1dc/0x310
[   14.204235]  ? __pfx_kasan_atomics+0x10/0x10
[   14.204259]  ? __pfx_read_tsc+0x10/0x10
[   14.204281]  ? ktime_get_ts64+0x86/0x230
[   14.204308]  kunit_try_run_case+0x1a5/0x480
[   14.204331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.204353]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.204376]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.204610]  ? __kthread_parkme+0x82/0x180
[   14.204637]  ? preempt_count_sub+0x50/0x80
[   14.204661]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.204685]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.204741]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.204766]  kthread+0x337/0x6f0
[   14.204786]  ? trace_preempt_on+0x20/0xc0
[   14.204812]  ? __pfx_kthread+0x10/0x10
[   14.204834]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.204855]  ? calculate_sigpending+0x7b/0xa0
[   14.204879]  ? __pfx_kthread+0x10/0x10
[   14.204901]  ret_from_fork+0x116/0x1d0
[   14.204919]  ? __pfx_kthread+0x10/0x10
[   14.204951]  ret_from_fork_asm+0x1a/0x30
[   14.204983]  </TASK>
[   14.204995] 
[   14.215570] Allocated by task 290:
[   14.215704]  kasan_save_stack+0x45/0x70
[   14.215845]  kasan_save_track+0x18/0x40
[   14.216634]  kasan_save_alloc_info+0x3b/0x50
[   14.216800]  __kasan_kmalloc+0xb7/0xc0
[   14.217844]  __kmalloc_cache_noprof+0x189/0x420
[   14.218681]  kasan_atomics+0x95/0x310
[   14.219543]  kunit_try_run_case+0x1a5/0x480
[   14.220156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.220351]  kthread+0x337/0x6f0
[   14.221269]  ret_from_fork+0x116/0x1d0
[   14.222086]  ret_from_fork_asm+0x1a/0x30
[   14.222258] 
[   14.222563] The buggy address belongs to the object at ffff8881028d8d80
[   14.222563]  which belongs to the cache kmalloc-64 of size 64
[   14.223106] The buggy address is located 0 bytes to the right of
[   14.223106]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.223768] 
[   14.223870] The buggy address belongs to the physical page:
[   14.224084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.224436] flags: 0x200000000000000(node=0|zone=2)
[   14.224793] page_type: f5(slab)
[   14.224986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.225324] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.225874] page dumped because: kasan: bad access detected
[   14.226137] 
[   14.226231] Memory state around the buggy address:
[   14.226561]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.226826]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.227165] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.227551]                                      ^
[   14.227783]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.228089]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.228438] ==================================================================
[   14.379591] ==================================================================
[   14.379994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   14.380996] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.381542] 
[   14.381728] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.381794] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.381807] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.381828] Call Trace:
[   14.381848]  <TASK>
[   14.381866]  dump_stack_lvl+0x73/0xb0
[   14.381904]  print_report+0xd1/0x650
[   14.381942]  ? __virt_addr_valid+0x1db/0x2d0
[   14.381966]  ? kasan_atomics_helper+0xd47/0x5450
[   14.381987]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.382009]  ? kasan_atomics_helper+0xd47/0x5450
[   14.382030]  kasan_report+0x141/0x180
[   14.382052]  ? kasan_atomics_helper+0xd47/0x5450
[   14.382079]  kasan_check_range+0x10c/0x1c0
[   14.382103]  __kasan_check_write+0x18/0x20
[   14.382122]  kasan_atomics_helper+0xd47/0x5450
[   14.382146]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.382168]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.382193]  ? kasan_atomics+0x152/0x310
[   14.382220]  kasan_atomics+0x1dc/0x310
[   14.382243]  ? __pfx_kasan_atomics+0x10/0x10
[   14.382267]  ? __pfx_read_tsc+0x10/0x10
[   14.382288]  ? ktime_get_ts64+0x86/0x230
[   14.382314]  kunit_try_run_case+0x1a5/0x480
[   14.382337]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.382359]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.382403]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.382426]  ? __kthread_parkme+0x82/0x180
[   14.382446]  ? preempt_count_sub+0x50/0x80
[   14.382470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.382494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.382517]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.382540]  kthread+0x337/0x6f0
[   14.382559]  ? trace_preempt_on+0x20/0xc0
[   14.382584]  ? __pfx_kthread+0x10/0x10
[   14.382605]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.382625]  ? calculate_sigpending+0x7b/0xa0
[   14.382650]  ? __pfx_kthread+0x10/0x10
[   14.382671]  ret_from_fork+0x116/0x1d0
[   14.382690]  ? __pfx_kthread+0x10/0x10
[   14.382710]  ret_from_fork_asm+0x1a/0x30
[   14.382743]  </TASK>
[   14.382754] 
[   14.393904] Allocated by task 290:
[   14.394264]  kasan_save_stack+0x45/0x70
[   14.394661]  kasan_save_track+0x18/0x40
[   14.395017]  kasan_save_alloc_info+0x3b/0x50
[   14.395425]  __kasan_kmalloc+0xb7/0xc0
[   14.395777]  __kmalloc_cache_noprof+0x189/0x420
[   14.396193]  kasan_atomics+0x95/0x310
[   14.396541]  kunit_try_run_case+0x1a5/0x480
[   14.397014]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.397500]  kthread+0x337/0x6f0
[   14.397804]  ret_from_fork+0x116/0x1d0
[   14.398170]  ret_from_fork_asm+0x1a/0x30
[   14.398547] 
[   14.398711] The buggy address belongs to the object at ffff8881028d8d80
[   14.398711]  which belongs to the cache kmalloc-64 of size 64
[   14.399257] The buggy address is located 0 bytes to the right of
[   14.399257]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.399894] 
[   14.400066] The buggy address belongs to the physical page:
[   14.400662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.401468] flags: 0x200000000000000(node=0|zone=2)
[   14.401908] page_type: f5(slab)
[   14.402228] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.402727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.402961] page dumped because: kasan: bad access detected
[   14.403126] 
[   14.403190] Memory state around the buggy address:
[   14.403338]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.403903]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.404545] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.405188]                                      ^
[   14.405699]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.406335]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.407027] ==================================================================
[   14.642069] ==================================================================
[   14.642432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   14.642757] Read of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.643087] 
[   14.643180] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.643226] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.643238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.643260] Call Trace:
[   14.643277]  <TASK>
[   14.643294]  dump_stack_lvl+0x73/0xb0
[   14.643321]  print_report+0xd1/0x650
[   14.643345]  ? __virt_addr_valid+0x1db/0x2d0
[   14.643368]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.643389]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.643426]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.643448]  kasan_report+0x141/0x180
[   14.643470]  ? kasan_atomics_helper+0x49ce/0x5450
[   14.643496]  __asan_report_load4_noabort+0x18/0x20
[   14.643521]  kasan_atomics_helper+0x49ce/0x5450
[   14.643545]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.643567]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.643602]  ? kasan_atomics+0x152/0x310
[   14.643628]  kasan_atomics+0x1dc/0x310
[   14.643652]  ? __pfx_kasan_atomics+0x10/0x10
[   14.643687]  ? __pfx_read_tsc+0x10/0x10
[   14.643709]  ? ktime_get_ts64+0x86/0x230
[   14.643734]  kunit_try_run_case+0x1a5/0x480
[   14.643759]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.643780]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.643804]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.643827]  ? __kthread_parkme+0x82/0x180
[   14.643847]  ? preempt_count_sub+0x50/0x80
[   14.643871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.643895]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.643918]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.643950]  kthread+0x337/0x6f0
[   14.643970]  ? trace_preempt_on+0x20/0xc0
[   14.643995]  ? __pfx_kthread+0x10/0x10
[   14.644017]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.644038]  ? calculate_sigpending+0x7b/0xa0
[   14.644062]  ? __pfx_kthread+0x10/0x10
[   14.644084]  ret_from_fork+0x116/0x1d0
[   14.644103]  ? __pfx_kthread+0x10/0x10
[   14.644134]  ret_from_fork_asm+0x1a/0x30
[   14.644164]  </TASK>
[   14.644176] 
[   14.652196] Allocated by task 290:
[   14.652324]  kasan_save_stack+0x45/0x70
[   14.653311]  kasan_save_track+0x18/0x40
[   14.654068]  kasan_save_alloc_info+0x3b/0x50
[   14.654871]  __kasan_kmalloc+0xb7/0xc0
[   14.655677]  __kmalloc_cache_noprof+0x189/0x420
[   14.655862]  kasan_atomics+0x95/0x310
[   14.656011]  kunit_try_run_case+0x1a5/0x480
[   14.656156]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.656326]  kthread+0x337/0x6f0
[   14.656455]  ret_from_fork+0x116/0x1d0
[   14.656583]  ret_from_fork_asm+0x1a/0x30
[   14.656717] 
[   14.656787] The buggy address belongs to the object at ffff8881028d8d80
[   14.656787]  which belongs to the cache kmalloc-64 of size 64
[   14.657144] The buggy address is located 0 bytes to the right of
[   14.657144]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.657500] 
[   14.657569] The buggy address belongs to the physical page:
[   14.657740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.658152] flags: 0x200000000000000(node=0|zone=2)
[   14.658704] page_type: f5(slab)
[   14.659011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.659694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.660313] page dumped because: kasan: bad access detected
[   14.660886] 
[   14.661065] Memory state around the buggy address:
[   14.661504]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.662133]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.662755] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.663364]                                      ^
[   14.663781]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.664366]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.664979] ==================================================================
[   14.543074] ==================================================================
[   14.543521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   14.543842] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.544115] 
[   14.544195] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.544238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.544251] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.544272] Call Trace:
[   14.544288]  <TASK>
[   14.544303]  dump_stack_lvl+0x73/0xb0
[   14.544329]  print_report+0xd1/0x650
[   14.544350]  ? __virt_addr_valid+0x1db/0x2d0
[   14.544373]  ? kasan_atomics_helper+0x1148/0x5450
[   14.544393]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.544416]  ? kasan_atomics_helper+0x1148/0x5450
[   14.544437]  kasan_report+0x141/0x180
[   14.544460]  ? kasan_atomics_helper+0x1148/0x5450
[   14.544486]  kasan_check_range+0x10c/0x1c0
[   14.544510]  __kasan_check_write+0x18/0x20
[   14.544530]  kasan_atomics_helper+0x1148/0x5450
[   14.544553]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.544575]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.544599]  ? kasan_atomics+0x152/0x310
[   14.544625]  kasan_atomics+0x1dc/0x310
[   14.544648]  ? __pfx_kasan_atomics+0x10/0x10
[   14.544673]  ? __pfx_read_tsc+0x10/0x10
[   14.544693]  ? ktime_get_ts64+0x86/0x230
[   14.544718]  kunit_try_run_case+0x1a5/0x480
[   14.544742]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.544764]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.544786]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.544808]  ? __kthread_parkme+0x82/0x180
[   14.544829]  ? preempt_count_sub+0x50/0x80
[   14.544852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.544876]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.544899]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.544923]  kthread+0x337/0x6f0
[   14.544954]  ? trace_preempt_on+0x20/0xc0
[   14.544978]  ? __pfx_kthread+0x10/0x10
[   14.544999]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.545020]  ? calculate_sigpending+0x7b/0xa0
[   14.545044]  ? __pfx_kthread+0x10/0x10
[   14.545065]  ret_from_fork+0x116/0x1d0
[   14.545084]  ? __pfx_kthread+0x10/0x10
[   14.545116]  ret_from_fork_asm+0x1a/0x30
[   14.545168]  </TASK>
[   14.545179] 
[   14.552518] Allocated by task 290:
[   14.552650]  kasan_save_stack+0x45/0x70
[   14.552787]  kasan_save_track+0x18/0x40
[   14.552915]  kasan_save_alloc_info+0x3b/0x50
[   14.553078]  __kasan_kmalloc+0xb7/0xc0
[   14.553284]  __kmalloc_cache_noprof+0x189/0x420
[   14.553662]  kasan_atomics+0x95/0x310
[   14.553854]  kunit_try_run_case+0x1a5/0x480
[   14.554067]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.554257]  kthread+0x337/0x6f0
[   14.554372]  ret_from_fork+0x116/0x1d0
[   14.554570]  ret_from_fork_asm+0x1a/0x30
[   14.554779] 
[   14.554868] The buggy address belongs to the object at ffff8881028d8d80
[   14.554868]  which belongs to the cache kmalloc-64 of size 64
[   14.555248] The buggy address is located 0 bytes to the right of
[   14.555248]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.556142] 
[   14.556245] The buggy address belongs to the physical page:
[   14.556627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.558220] flags: 0x200000000000000(node=0|zone=2)
[   14.558812] page_type: f5(slab)
[   14.559064] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.560066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.560784] page dumped because: kasan: bad access detected
[   14.561403] 
[   14.561591] Memory state around the buggy address:
[   14.561943]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.562235]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.562950] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.563438]                                      ^
[   14.563906]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.564586]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.564872] ==================================================================
[   14.296912] ==================================================================
[   14.297268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   14.297665] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.297947] 
[   14.298048] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.298113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.298126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.298146] Call Trace:
[   14.298180]  <TASK>
[   14.298195]  dump_stack_lvl+0x73/0xb0
[   14.298224]  print_report+0xd1/0x650
[   14.298246]  ? __virt_addr_valid+0x1db/0x2d0
[   14.298268]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.298289]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.298312]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.298349]  kasan_report+0x141/0x180
[   14.298386]  ? kasan_atomics_helper+0xb6a/0x5450
[   14.298561]  kasan_check_range+0x10c/0x1c0
[   14.298585]  __kasan_check_write+0x18/0x20
[   14.298605]  kasan_atomics_helper+0xb6a/0x5450
[   14.298628]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.298649]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.298674]  ? kasan_atomics+0x152/0x310
[   14.298701]  kasan_atomics+0x1dc/0x310
[   14.298723]  ? __pfx_kasan_atomics+0x10/0x10
[   14.298777]  ? __pfx_read_tsc+0x10/0x10
[   14.298799]  ? ktime_get_ts64+0x86/0x230
[   14.298825]  kunit_try_run_case+0x1a5/0x480
[   14.298867]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.298891]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.298913]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.298947]  ? __kthread_parkme+0x82/0x180
[   14.298968]  ? preempt_count_sub+0x50/0x80
[   14.298992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.299015]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.299038]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.299062]  kthread+0x337/0x6f0
[   14.299082]  ? trace_preempt_on+0x20/0xc0
[   14.299106]  ? __pfx_kthread+0x10/0x10
[   14.299128]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.299149]  ? calculate_sigpending+0x7b/0xa0
[   14.299191]  ? __pfx_kthread+0x10/0x10
[   14.299213]  ret_from_fork+0x116/0x1d0
[   14.299232]  ? __pfx_kthread+0x10/0x10
[   14.299253]  ret_from_fork_asm+0x1a/0x30
[   14.299284]  </TASK>
[   14.299295] 
[   14.307678] Allocated by task 290:
[   14.307837]  kasan_save_stack+0x45/0x70
[   14.308086]  kasan_save_track+0x18/0x40
[   14.308320]  kasan_save_alloc_info+0x3b/0x50
[   14.308533]  __kasan_kmalloc+0xb7/0xc0
[   14.308717]  __kmalloc_cache_noprof+0x189/0x420
[   14.308938]  kasan_atomics+0x95/0x310
[   14.309095]  kunit_try_run_case+0x1a5/0x480
[   14.309336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.309498]  kthread+0x337/0x6f0
[   14.309687]  ret_from_fork+0x116/0x1d0
[   14.309916]  ret_from_fork_asm+0x1a/0x30
[   14.310144] 
[   14.310256] The buggy address belongs to the object at ffff8881028d8d80
[   14.310256]  which belongs to the cache kmalloc-64 of size 64
[   14.310918] The buggy address is located 0 bytes to the right of
[   14.310918]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.311543] 
[   14.311620] The buggy address belongs to the physical page:
[   14.311805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.312060] flags: 0x200000000000000(node=0|zone=2)
[   14.312307] page_type: f5(slab)
[   14.312489] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.313085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.313486] page dumped because: kasan: bad access detected
[   14.313749] 
[   14.313836] Memory state around the buggy address:
[   14.314067]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.314401]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.314711] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.315028]                                      ^
[   14.315300]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.315500]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.315697] ==================================================================
[   14.157949] ==================================================================
[   14.158196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   14.158421] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.158742] 
[   14.158848] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.158895] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.158907] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.158939] Call Trace:
[   14.158958]  <TASK>
[   14.158975]  dump_stack_lvl+0x73/0xb0
[   14.159003]  print_report+0xd1/0x650
[   14.159025]  ? __virt_addr_valid+0x1db/0x2d0
[   14.159048]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.159069]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.159090]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.159111]  kasan_report+0x141/0x180
[   14.159133]  ? kasan_atomics_helper+0x7c7/0x5450
[   14.159158]  kasan_check_range+0x10c/0x1c0
[   14.159182]  __kasan_check_write+0x18/0x20
[   14.159201]  kasan_atomics_helper+0x7c7/0x5450
[   14.159223]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.159244]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.159292]  ? kasan_atomics+0x152/0x310
[   14.159318]  kasan_atomics+0x1dc/0x310
[   14.159340]  ? __pfx_kasan_atomics+0x10/0x10
[   14.159365]  ? __pfx_read_tsc+0x10/0x10
[   14.159386]  ? ktime_get_ts64+0x86/0x230
[   14.159413]  kunit_try_run_case+0x1a5/0x480
[   14.159437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.159470]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.159493]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.159515]  ? __kthread_parkme+0x82/0x180
[   14.159536]  ? preempt_count_sub+0x50/0x80
[   14.159560]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.159584]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.159607]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.159630]  kthread+0x337/0x6f0
[   14.159650]  ? trace_preempt_on+0x20/0xc0
[   14.159674]  ? __pfx_kthread+0x10/0x10
[   14.159695]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.159716]  ? calculate_sigpending+0x7b/0xa0
[   14.159741]  ? __pfx_kthread+0x10/0x10
[   14.159762]  ret_from_fork+0x116/0x1d0
[   14.159780]  ? __pfx_kthread+0x10/0x10
[   14.159800]  ret_from_fork_asm+0x1a/0x30
[   14.159833]  </TASK>
[   14.159844] 
[   14.170065] Allocated by task 290:
[   14.170248]  kasan_save_stack+0x45/0x70
[   14.170780]  kasan_save_track+0x18/0x40
[   14.170927]  kasan_save_alloc_info+0x3b/0x50
[   14.171082]  __kasan_kmalloc+0xb7/0xc0
[   14.171208]  __kmalloc_cache_noprof+0x189/0x420
[   14.171525]  kasan_atomics+0x95/0x310
[   14.171727]  kunit_try_run_case+0x1a5/0x480
[   14.171943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.172191]  kthread+0x337/0x6f0
[   14.172348]  ret_from_fork+0x116/0x1d0
[   14.172536]  ret_from_fork_asm+0x1a/0x30
[   14.172731] 
[   14.172824] The buggy address belongs to the object at ffff8881028d8d80
[   14.172824]  which belongs to the cache kmalloc-64 of size 64
[   14.173967] The buggy address is located 0 bytes to the right of
[   14.173967]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.174652] 
[   14.174761] The buggy address belongs to the physical page:
[   14.175168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.175703] flags: 0x200000000000000(node=0|zone=2)
[   14.176113] page_type: f5(slab)
[   14.176516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.177119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.177347] page dumped because: kasan: bad access detected
[   14.177514] 
[   14.177598] Memory state around the buggy address:
[   14.178238]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.178690]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.179001] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.179337]                                      ^
[   14.179690]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.180190]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.180558] ==================================================================
[   14.318115] ==================================================================
[   14.318503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   14.318809] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.319118] 
[   14.319222] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.319265] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.319277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.319319] Call Trace:
[   14.319333]  <TASK>
[   14.319349]  dump_stack_lvl+0x73/0xb0
[   14.319376]  print_report+0xd1/0x650
[   14.319420]  ? __virt_addr_valid+0x1db/0x2d0
[   14.319443]  ? kasan_atomics_helper+0xc70/0x5450
[   14.319465]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.319487]  ? kasan_atomics_helper+0xc70/0x5450
[   14.319509]  kasan_report+0x141/0x180
[   14.319531]  ? kasan_atomics_helper+0xc70/0x5450
[   14.319558]  kasan_check_range+0x10c/0x1c0
[   14.319582]  __kasan_check_write+0x18/0x20
[   14.319601]  kasan_atomics_helper+0xc70/0x5450
[   14.319624]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.319646]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.319670]  ? kasan_atomics+0x152/0x310
[   14.319697]  kasan_atomics+0x1dc/0x310
[   14.319720]  ? __pfx_kasan_atomics+0x10/0x10
[   14.319744]  ? __pfx_read_tsc+0x10/0x10
[   14.319765]  ? ktime_get_ts64+0x86/0x230
[   14.319809]  kunit_try_run_case+0x1a5/0x480
[   14.319834]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.319856]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.319879]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.319901]  ? __kthread_parkme+0x82/0x180
[   14.319922]  ? preempt_count_sub+0x50/0x80
[   14.319957]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.319980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.320022]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.320045]  kthread+0x337/0x6f0
[   14.320065]  ? trace_preempt_on+0x20/0xc0
[   14.320089]  ? __pfx_kthread+0x10/0x10
[   14.320110]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.320130]  ? calculate_sigpending+0x7b/0xa0
[   14.320154]  ? __pfx_kthread+0x10/0x10
[   14.320177]  ret_from_fork+0x116/0x1d0
[   14.320195]  ? __pfx_kthread+0x10/0x10
[   14.320216]  ret_from_fork_asm+0x1a/0x30
[   14.320247]  </TASK>
[   14.320276] 
[   14.327820] Allocated by task 290:
[   14.327950]  kasan_save_stack+0x45/0x70
[   14.328145]  kasan_save_track+0x18/0x40
[   14.328326]  kasan_save_alloc_info+0x3b/0x50
[   14.328555]  __kasan_kmalloc+0xb7/0xc0
[   14.328771]  __kmalloc_cache_noprof+0x189/0x420
[   14.329490]  kasan_atomics+0x95/0x310
[   14.329945]  kunit_try_run_case+0x1a5/0x480
[   14.330120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.330318]  kthread+0x337/0x6f0
[   14.331057]  ret_from_fork+0x116/0x1d0
[   14.331223]  ret_from_fork_asm+0x1a/0x30
[   14.331363] 
[   14.331841] The buggy address belongs to the object at ffff8881028d8d80
[   14.331841]  which belongs to the cache kmalloc-64 of size 64
[   14.333211] The buggy address is located 0 bytes to the right of
[   14.333211]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.334027] 
[   14.334108] The buggy address belongs to the physical page:
[   14.334279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.334523] flags: 0x200000000000000(node=0|zone=2)
[   14.334681] page_type: f5(slab)
[   14.334796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.335741] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.336868] page dumped because: kasan: bad access detected
[   14.337515] 
[   14.337894] Memory state around the buggy address:
[   14.338740]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.339579]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.340492] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.341304]                                      ^
[   14.342050]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.342308]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.343161] ==================================================================
[   14.134016] ==================================================================
[   14.134247] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   14.134464] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.134859] 
[   14.134986] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.135048] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.135060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.135081] Call Trace:
[   14.135100]  <TASK>
[   14.135117]  dump_stack_lvl+0x73/0xb0
[   14.135146]  print_report+0xd1/0x650
[   14.135168]  ? __virt_addr_valid+0x1db/0x2d0
[   14.135192]  ? kasan_atomics_helper+0x72f/0x5450
[   14.135213]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.135236]  ? kasan_atomics_helper+0x72f/0x5450
[   14.135257]  kasan_report+0x141/0x180
[   14.135279]  ? kasan_atomics_helper+0x72f/0x5450
[   14.135306]  kasan_check_range+0x10c/0x1c0
[   14.135329]  __kasan_check_write+0x18/0x20
[   14.135348]  kasan_atomics_helper+0x72f/0x5450
[   14.135373]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.135395]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.135853]  ? kasan_atomics+0x152/0x310
[   14.135887]  kasan_atomics+0x1dc/0x310
[   14.135912]  ? __pfx_kasan_atomics+0x10/0x10
[   14.135951]  ? __pfx_read_tsc+0x10/0x10
[   14.135973]  ? ktime_get_ts64+0x86/0x230
[   14.136001]  kunit_try_run_case+0x1a5/0x480
[   14.136025]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.136047]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.136071]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.136094]  ? __kthread_parkme+0x82/0x180
[   14.136115]  ? preempt_count_sub+0x50/0x80
[   14.136140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.136164]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.136187]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.136210]  kthread+0x337/0x6f0
[   14.136230]  ? trace_preempt_on+0x20/0xc0
[   14.136255]  ? __pfx_kthread+0x10/0x10
[   14.136276]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.136296]  ? calculate_sigpending+0x7b/0xa0
[   14.136321]  ? __pfx_kthread+0x10/0x10
[   14.136343]  ret_from_fork+0x116/0x1d0
[   14.136362]  ? __pfx_kthread+0x10/0x10
[   14.136383]  ret_from_fork_asm+0x1a/0x30
[   14.136830]  </TASK>
[   14.136845] 
[   14.149460] Allocated by task 290:
[   14.149693]  kasan_save_stack+0x45/0x70
[   14.149994]  kasan_save_track+0x18/0x40
[   14.150217]  kasan_save_alloc_info+0x3b/0x50
[   14.150365]  __kasan_kmalloc+0xb7/0xc0
[   14.150571]  __kmalloc_cache_noprof+0x189/0x420
[   14.150882]  kasan_atomics+0x95/0x310
[   14.151062]  kunit_try_run_case+0x1a5/0x480
[   14.151206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.151374]  kthread+0x337/0x6f0
[   14.151535]  ret_from_fork+0x116/0x1d0
[   14.151775]  ret_from_fork_asm+0x1a/0x30
[   14.152007] 
[   14.152111] The buggy address belongs to the object at ffff8881028d8d80
[   14.152111]  which belongs to the cache kmalloc-64 of size 64
[   14.152491] The buggy address is located 0 bytes to the right of
[   14.152491]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.153329] 
[   14.153428] The buggy address belongs to the physical page:
[   14.153625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.153949] flags: 0x200000000000000(node=0|zone=2)
[   14.154164] page_type: f5(slab)
[   14.154282] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.154507] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.155143] page dumped because: kasan: bad access detected
[   14.155380] 
[   14.155484] Memory state around the buggy address:
[   14.155639]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.155848]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.156143] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.156458]                                      ^
[   14.156742]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.157064]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.157339] ==================================================================
[   15.304512] ==================================================================
[   15.305301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   15.305999] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   15.306856] 
[   15.306963] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   15.307023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.307037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.307059] Call Trace:
[   15.307089]  <TASK>
[   15.307107]  dump_stack_lvl+0x73/0xb0
[   15.307137]  print_report+0xd1/0x650
[   15.307160]  ? __virt_addr_valid+0x1db/0x2d0
[   15.307206]  ? kasan_atomics_helper+0x218a/0x5450
[   15.307228]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.307250]  ? kasan_atomics_helper+0x218a/0x5450
[   15.307272]  kasan_report+0x141/0x180
[   15.307295]  ? kasan_atomics_helper+0x218a/0x5450
[   15.307321]  kasan_check_range+0x10c/0x1c0
[   15.307345]  __kasan_check_write+0x18/0x20
[   15.307365]  kasan_atomics_helper+0x218a/0x5450
[   15.307413]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.307436]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.307473]  ? kasan_atomics+0x152/0x310
[   15.307500]  kasan_atomics+0x1dc/0x310
[   15.307522]  ? __pfx_kasan_atomics+0x10/0x10
[   15.307558]  ? __pfx_read_tsc+0x10/0x10
[   15.307580]  ? ktime_get_ts64+0x86/0x230
[   15.307606]  kunit_try_run_case+0x1a5/0x480
[   15.307629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.307652]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.307675]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.307698]  ? __kthread_parkme+0x82/0x180
[   15.307719]  ? preempt_count_sub+0x50/0x80
[   15.307743]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.307767]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.307790]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.307814]  kthread+0x337/0x6f0
[   15.307834]  ? trace_preempt_on+0x20/0xc0
[   15.307858]  ? __pfx_kthread+0x10/0x10
[   15.307879]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.307900]  ? calculate_sigpending+0x7b/0xa0
[   15.307925]  ? __pfx_kthread+0x10/0x10
[   15.307959]  ret_from_fork+0x116/0x1d0
[   15.307978]  ? __pfx_kthread+0x10/0x10
[   15.307999]  ret_from_fork_asm+0x1a/0x30
[   15.308030]  </TASK>
[   15.308042] 
[   15.320483] Allocated by task 290:
[   15.320657]  kasan_save_stack+0x45/0x70
[   15.321122]  kasan_save_track+0x18/0x40
[   15.321347]  kasan_save_alloc_info+0x3b/0x50
[   15.321816]  __kasan_kmalloc+0xb7/0xc0
[   15.321988]  __kmalloc_cache_noprof+0x189/0x420
[   15.322140]  kasan_atomics+0x95/0x310
[   15.322267]  kunit_try_run_case+0x1a5/0x480
[   15.322450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.322908]  kthread+0x337/0x6f0
[   15.323222]  ret_from_fork+0x116/0x1d0
[   15.323632]  ret_from_fork_asm+0x1a/0x30
[   15.324042] 
[   15.324195] The buggy address belongs to the object at ffff8881028d8d80
[   15.324195]  which belongs to the cache kmalloc-64 of size 64
[   15.325228] The buggy address is located 0 bytes to the right of
[   15.325228]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   15.325762] 
[   15.325831] The buggy address belongs to the physical page:
[   15.326008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   15.326243] flags: 0x200000000000000(node=0|zone=2)
[   15.326425] page_type: f5(slab)
[   15.326705] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.327328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.327993] page dumped because: kasan: bad access detected
[   15.328464] 
[   15.328624] Memory state around the buggy address:
[   15.329042]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.329662]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.330285] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.330958]                                      ^
[   15.331383]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.331634]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.331839] ==================================================================
[   15.110856] ==================================================================
[   15.111186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   15.111864] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   15.112390] 
[   15.112652] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   15.112704] Tainted: [B]=BAD_PAGE, [N]=TEST
[   15.112717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   15.112738] Call Trace:
[   15.112754]  <TASK>
[   15.112770]  dump_stack_lvl+0x73/0xb0
[   15.112801]  print_report+0xd1/0x650
[   15.112824]  ? __virt_addr_valid+0x1db/0x2d0
[   15.112848]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.112869]  ? kasan_complete_mode_report_info+0x2a/0x200
[   15.112892]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.112914]  kasan_report+0x141/0x180
[   15.112951]  ? kasan_atomics_helper+0x1e12/0x5450
[   15.112976]  kasan_check_range+0x10c/0x1c0
[   15.113000]  __kasan_check_write+0x18/0x20
[   15.113019]  kasan_atomics_helper+0x1e12/0x5450
[   15.113041]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   15.113064]  ? __kmalloc_cache_noprof+0x189/0x420
[   15.113089]  ? kasan_atomics+0x152/0x310
[   15.113114]  kasan_atomics+0x1dc/0x310
[   15.113137]  ? __pfx_kasan_atomics+0x10/0x10
[   15.113162]  ? __pfx_read_tsc+0x10/0x10
[   15.113183]  ? ktime_get_ts64+0x86/0x230
[   15.113210]  kunit_try_run_case+0x1a5/0x480
[   15.113234]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.113255]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   15.113279]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   15.113302]  ? __kthread_parkme+0x82/0x180
[   15.113322]  ? preempt_count_sub+0x50/0x80
[   15.113346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   15.113370]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.113394]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   15.113416]  kthread+0x337/0x6f0
[   15.113436]  ? trace_preempt_on+0x20/0xc0
[   15.113460]  ? __pfx_kthread+0x10/0x10
[   15.113481]  ? _raw_spin_unlock_irq+0x47/0x80
[   15.113502]  ? calculate_sigpending+0x7b/0xa0
[   15.113526]  ? __pfx_kthread+0x10/0x10
[   15.113548]  ret_from_fork+0x116/0x1d0
[   15.113566]  ? __pfx_kthread+0x10/0x10
[   15.113587]  ret_from_fork_asm+0x1a/0x30
[   15.113618]  </TASK>
[   15.113629] 
[   15.124006] Allocated by task 290:
[   15.124186]  kasan_save_stack+0x45/0x70
[   15.124333]  kasan_save_track+0x18/0x40
[   15.124662]  kasan_save_alloc_info+0x3b/0x50
[   15.124970]  __kasan_kmalloc+0xb7/0xc0
[   15.125156]  __kmalloc_cache_noprof+0x189/0x420
[   15.125515]  kasan_atomics+0x95/0x310
[   15.125794]  kunit_try_run_case+0x1a5/0x480
[   15.125993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   15.126367]  kthread+0x337/0x6f0
[   15.126620]  ret_from_fork+0x116/0x1d0
[   15.126770]  ret_from_fork_asm+0x1a/0x30
[   15.126983] 
[   15.127076] The buggy address belongs to the object at ffff8881028d8d80
[   15.127076]  which belongs to the cache kmalloc-64 of size 64
[   15.127578] The buggy address is located 0 bytes to the right of
[   15.127578]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   15.128467] 
[   15.128652] The buggy address belongs to the physical page:
[   15.128963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   15.129360] flags: 0x200000000000000(node=0|zone=2)
[   15.129585] page_type: f5(slab)
[   15.129874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   15.130281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   15.130720] page dumped because: kasan: bad access detected
[   15.131069] 
[   15.131170] Memory state around the buggy address:
[   15.131376]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.131828]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   15.132222] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   15.132532]                                      ^
[   15.132859]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.133177]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   15.133483] ==================================================================
[   14.228960] ==================================================================
[   14.229231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   14.229687] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.230043] 
[   14.230150] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.230196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.230209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.230229] Call Trace:
[   14.230246]  <TASK>
[   14.230264]  dump_stack_lvl+0x73/0xb0
[   14.230293]  print_report+0xd1/0x650
[   14.230316]  ? __virt_addr_valid+0x1db/0x2d0
[   14.230340]  ? kasan_atomics_helper+0x992/0x5450
[   14.230361]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.230408]  ? kasan_atomics_helper+0x992/0x5450
[   14.230431]  kasan_report+0x141/0x180
[   14.230455]  ? kasan_atomics_helper+0x992/0x5450
[   14.230481]  kasan_check_range+0x10c/0x1c0
[   14.230505]  __kasan_check_write+0x18/0x20
[   14.230524]  kasan_atomics_helper+0x992/0x5450
[   14.230547]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.230568]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.230594]  ? kasan_atomics+0x152/0x310
[   14.230620]  kasan_atomics+0x1dc/0x310
[   14.230642]  ? __pfx_kasan_atomics+0x10/0x10
[   14.230667]  ? __pfx_read_tsc+0x10/0x10
[   14.230689]  ? ktime_get_ts64+0x86/0x230
[   14.230717]  kunit_try_run_case+0x1a5/0x480
[   14.230741]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.230763]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.230786]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.230809]  ? __kthread_parkme+0x82/0x180
[   14.230830]  ? preempt_count_sub+0x50/0x80
[   14.230854]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.230878]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.230901]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.230926]  kthread+0x337/0x6f0
[   14.230957]  ? trace_preempt_on+0x20/0xc0
[   14.230982]  ? __pfx_kthread+0x10/0x10
[   14.231003]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.231024]  ? calculate_sigpending+0x7b/0xa0
[   14.231048]  ? __pfx_kthread+0x10/0x10
[   14.231070]  ret_from_fork+0x116/0x1d0
[   14.231089]  ? __pfx_kthread+0x10/0x10
[   14.231110]  ret_from_fork_asm+0x1a/0x30
[   14.231142]  </TASK>
[   14.231153] 
[   14.243096] Allocated by task 290:
[   14.243292]  kasan_save_stack+0x45/0x70
[   14.243552]  kasan_save_track+0x18/0x40
[   14.243732]  kasan_save_alloc_info+0x3b/0x50
[   14.243918]  __kasan_kmalloc+0xb7/0xc0
[   14.244058]  __kmalloc_cache_noprof+0x189/0x420
[   14.244207]  kasan_atomics+0x95/0x310
[   14.244397]  kunit_try_run_case+0x1a5/0x480
[   14.244690]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.244857]  kthread+0x337/0x6f0
[   14.245183]  ret_from_fork+0x116/0x1d0
[   14.245387]  ret_from_fork_asm+0x1a/0x30
[   14.245562] 
[   14.246039] The buggy address belongs to the object at ffff8881028d8d80
[   14.246039]  which belongs to the cache kmalloc-64 of size 64
[   14.246926] The buggy address is located 0 bytes to the right of
[   14.246926]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.247542] 
[   14.247638] The buggy address belongs to the physical page:
[   14.247851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.248194] flags: 0x200000000000000(node=0|zone=2)
[   14.248410] page_type: f5(slab)
[   14.248996] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.249295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.249995] page dumped because: kasan: bad access detected
[   14.250322] 
[   14.250432] Memory state around the buggy address:
[   14.251030]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.251322]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.251881] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.252168]                                      ^
[   14.252460]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.252697]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.253016] ==================================================================
[   14.426300] ==================================================================
[   14.427100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   14.427525] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.427897] 
[   14.427997] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.428263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.428278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.428299] Call Trace:
[   14.428318]  <TASK>
[   14.428335]  dump_stack_lvl+0x73/0xb0
[   14.428365]  print_report+0xd1/0x650
[   14.428399]  ? __virt_addr_valid+0x1db/0x2d0
[   14.428422]  ? kasan_atomics_helper+0xe78/0x5450
[   14.428443]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.428468]  ? kasan_atomics_helper+0xe78/0x5450
[   14.428489]  kasan_report+0x141/0x180
[   14.428511]  ? kasan_atomics_helper+0xe78/0x5450
[   14.428537]  kasan_check_range+0x10c/0x1c0
[   14.428561]  __kasan_check_write+0x18/0x20
[   14.428581]  kasan_atomics_helper+0xe78/0x5450
[   14.428603]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.428625]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.428650]  ? kasan_atomics+0x152/0x310
[   14.428676]  kasan_atomics+0x1dc/0x310
[   14.428699]  ? __pfx_kasan_atomics+0x10/0x10
[   14.428722]  ? __pfx_read_tsc+0x10/0x10
[   14.428744]  ? ktime_get_ts64+0x86/0x230
[   14.428770]  kunit_try_run_case+0x1a5/0x480
[   14.428795]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.428817]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.428839]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.428877]  ? __kthread_parkme+0x82/0x180
[   14.428898]  ? preempt_count_sub+0x50/0x80
[   14.428922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.428965]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.428989]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.429013]  kthread+0x337/0x6f0
[   14.429044]  ? trace_preempt_on+0x20/0xc0
[   14.429069]  ? __pfx_kthread+0x10/0x10
[   14.429090]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.429122]  ? calculate_sigpending+0x7b/0xa0
[   14.429146]  ? __pfx_kthread+0x10/0x10
[   14.429168]  ret_from_fork+0x116/0x1d0
[   14.429198]  ? __pfx_kthread+0x10/0x10
[   14.429218]  ret_from_fork_asm+0x1a/0x30
[   14.429273]  </TASK>
[   14.429285] 
[   14.440356] Allocated by task 290:
[   14.440559]  kasan_save_stack+0x45/0x70
[   14.440777]  kasan_save_track+0x18/0x40
[   14.441008]  kasan_save_alloc_info+0x3b/0x50
[   14.441170]  __kasan_kmalloc+0xb7/0xc0
[   14.441299]  __kmalloc_cache_noprof+0x189/0x420
[   14.441636]  kasan_atomics+0x95/0x310
[   14.441837]  kunit_try_run_case+0x1a5/0x480
[   14.442090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.442364]  kthread+0x337/0x6f0
[   14.442522]  ret_from_fork+0x116/0x1d0
[   14.442682]  ret_from_fork_asm+0x1a/0x30
[   14.442851] 
[   14.442952] The buggy address belongs to the object at ffff8881028d8d80
[   14.442952]  which belongs to the cache kmalloc-64 of size 64
[   14.443441] The buggy address is located 0 bytes to the right of
[   14.443441]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.443981] 
[   14.444058] The buggy address belongs to the physical page:
[   14.444304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.444663] flags: 0x200000000000000(node=0|zone=2)
[   14.444891] page_type: f5(slab)
[   14.445069] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.445316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.445535] page dumped because: kasan: bad access detected
[   14.445758] 
[   14.445858] Memory state around the buggy address:
[   14.446080]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.446365]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.446573] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.446778]                                      ^
[   14.447125]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.447497]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.447817] ==================================================================
[   14.918024] ==================================================================
[   14.918621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   14.918876] Write of size 8 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.919107] 
[   14.919190] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.919236] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.919248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.919270] Call Trace:
[   14.919289]  <TASK>
[   14.919308]  dump_stack_lvl+0x73/0xb0
[   14.919335]  print_report+0xd1/0x650
[   14.919357]  ? __virt_addr_valid+0x1db/0x2d0
[   14.919380]  ? kasan_atomics_helper+0x194a/0x5450
[   14.919412]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.919434]  ? kasan_atomics_helper+0x194a/0x5450
[   14.919456]  kasan_report+0x141/0x180
[   14.919478]  ? kasan_atomics_helper+0x194a/0x5450
[   14.919504]  kasan_check_range+0x10c/0x1c0
[   14.919527]  __kasan_check_write+0x18/0x20
[   14.919547]  kasan_atomics_helper+0x194a/0x5450
[   14.919569]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.919591]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.919616]  ? kasan_atomics+0x152/0x310
[   14.919642]  kasan_atomics+0x1dc/0x310
[   14.919665]  ? __pfx_kasan_atomics+0x10/0x10
[   14.919690]  ? __pfx_read_tsc+0x10/0x10
[   14.919712]  ? ktime_get_ts64+0x86/0x230
[   14.919737]  kunit_try_run_case+0x1a5/0x480
[   14.919761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.919784]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.919807]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.919829]  ? __kthread_parkme+0x82/0x180
[   14.919850]  ? preempt_count_sub+0x50/0x80
[   14.919874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.919897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.919922]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.919957]  kthread+0x337/0x6f0
[   14.919977]  ? trace_preempt_on+0x20/0xc0
[   14.920002]  ? __pfx_kthread+0x10/0x10
[   14.920023]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.920044]  ? calculate_sigpending+0x7b/0xa0
[   14.920068]  ? __pfx_kthread+0x10/0x10
[   14.920090]  ret_from_fork+0x116/0x1d0
[   14.920108]  ? __pfx_kthread+0x10/0x10
[   14.920129]  ret_from_fork_asm+0x1a/0x30
[   14.920161]  </TASK>
[   14.920172] 
[   14.932148] Allocated by task 290:
[   14.932303]  kasan_save_stack+0x45/0x70
[   14.932533]  kasan_save_track+0x18/0x40
[   14.932661]  kasan_save_alloc_info+0x3b/0x50
[   14.932802]  __kasan_kmalloc+0xb7/0xc0
[   14.933001]  __kmalloc_cache_noprof+0x189/0x420
[   14.933220]  kasan_atomics+0x95/0x310
[   14.933367]  kunit_try_run_case+0x1a5/0x480
[   14.933557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.933731]  kthread+0x337/0x6f0
[   14.933845]  ret_from_fork+0x116/0x1d0
[   14.934037]  ret_from_fork_asm+0x1a/0x30
[   14.934237] 
[   14.934330] The buggy address belongs to the object at ffff8881028d8d80
[   14.934330]  which belongs to the cache kmalloc-64 of size 64
[   14.934991] The buggy address is located 0 bytes to the right of
[   14.934991]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.935380] 
[   14.935448] The buggy address belongs to the physical page:
[   14.935692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.936045] flags: 0x200000000000000(node=0|zone=2)
[   14.936247] page_type: f5(slab)
[   14.936376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.936647] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.936913] page dumped because: kasan: bad access detected
[   14.937172] 
[   14.937261] Memory state around the buggy address:
[   14.937484]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.937752]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.938058] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.938315]                                      ^
[   14.938567]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.938836]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.939089] ==================================================================
[   14.624068] ==================================================================
[   14.624652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   14.625017] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.625345] 
[   14.625449] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.625497] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.625509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.625531] Call Trace:
[   14.625551]  <TASK>
[   14.625570]  dump_stack_lvl+0x73/0xb0
[   14.625599]  print_report+0xd1/0x650
[   14.625622]  ? __virt_addr_valid+0x1db/0x2d0
[   14.625645]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.625666]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.625694]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.625716]  kasan_report+0x141/0x180
[   14.625739]  ? kasan_atomics_helper+0x12e6/0x5450
[   14.625765]  kasan_check_range+0x10c/0x1c0
[   14.625789]  __kasan_check_write+0x18/0x20
[   14.625808]  kasan_atomics_helper+0x12e6/0x5450
[   14.625830]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.625853]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.625877]  ? kasan_atomics+0x152/0x310
[   14.625903]  kasan_atomics+0x1dc/0x310
[   14.625926]  ? __pfx_kasan_atomics+0x10/0x10
[   14.625960]  ? __pfx_read_tsc+0x10/0x10
[   14.625981]  ? ktime_get_ts64+0x86/0x230
[   14.626007]  kunit_try_run_case+0x1a5/0x480
[   14.626032]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.626066]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.626089]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.626111]  ? __kthread_parkme+0x82/0x180
[   14.626143]  ? preempt_count_sub+0x50/0x80
[   14.626167]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.626191]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.626214]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.626237]  kthread+0x337/0x6f0
[   14.626258]  ? trace_preempt_on+0x20/0xc0
[   14.626282]  ? __pfx_kthread+0x10/0x10
[   14.626303]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.626323]  ? calculate_sigpending+0x7b/0xa0
[   14.626348]  ? __pfx_kthread+0x10/0x10
[   14.626369]  ret_from_fork+0x116/0x1d0
[   14.626398]  ? __pfx_kthread+0x10/0x10
[   14.626420]  ret_from_fork_asm+0x1a/0x30
[   14.626451]  </TASK>
[   14.626462] 
[   14.634030] Allocated by task 290:
[   14.634178]  kasan_save_stack+0x45/0x70
[   14.634318]  kasan_save_track+0x18/0x40
[   14.634538]  kasan_save_alloc_info+0x3b/0x50
[   14.634798]  __kasan_kmalloc+0xb7/0xc0
[   14.634965]  __kmalloc_cache_noprof+0x189/0x420
[   14.635116]  kasan_atomics+0x95/0x310
[   14.635254]  kunit_try_run_case+0x1a5/0x480
[   14.635573]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.635871]  kthread+0x337/0x6f0
[   14.636068]  ret_from_fork+0x116/0x1d0
[   14.636276]  ret_from_fork_asm+0x1a/0x30
[   14.636496] 
[   14.636564] The buggy address belongs to the object at ffff8881028d8d80
[   14.636564]  which belongs to the cache kmalloc-64 of size 64
[   14.637069] The buggy address is located 0 bytes to the right of
[   14.637069]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.637629] 
[   14.637726] The buggy address belongs to the physical page:
[   14.637926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.638258] flags: 0x200000000000000(node=0|zone=2)
[   14.638523] page_type: f5(slab)
[   14.638682] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.639023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.639337] page dumped because: kasan: bad access detected
[   14.639580] 
[   14.639645] Memory state around the buggy address:
[   14.639794]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.640016]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.640225] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.640487]                                      ^
[   14.640742]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.641113]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.641465] ==================================================================
[   14.466959] ==================================================================
[   14.467308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   14.467651] Write of size 4 at addr ffff8881028d8db0 by task kunit_try_catch/290
[   14.467942] 
[   14.468067] CPU: 1 UID: 0 PID: 290 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250616 #1 PREEMPT(voluntary) 
[   14.468113] Tainted: [B]=BAD_PAGE, [N]=TEST
[   14.468126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   14.468148] Call Trace:
[   14.468165]  <TASK>
[   14.468182]  dump_stack_lvl+0x73/0xb0
[   14.468210]  print_report+0xd1/0x650
[   14.468232]  ? __virt_addr_valid+0x1db/0x2d0
[   14.468256]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.468277]  ? kasan_complete_mode_report_info+0x2a/0x200
[   14.468299]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.468321]  kasan_report+0x141/0x180
[   14.468343]  ? kasan_atomics_helper+0xfa9/0x5450
[   14.468369]  kasan_check_range+0x10c/0x1c0
[   14.468404]  __kasan_check_write+0x18/0x20
[   14.468424]  kasan_atomics_helper+0xfa9/0x5450
[   14.468447]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   14.468469]  ? __kmalloc_cache_noprof+0x189/0x420
[   14.468494]  ? kasan_atomics+0x152/0x310
[   14.468521]  kasan_atomics+0x1dc/0x310
[   14.468544]  ? __pfx_kasan_atomics+0x10/0x10
[   14.468579]  ? __pfx_read_tsc+0x10/0x10
[   14.468601]  ? ktime_get_ts64+0x86/0x230
[   14.468627]  kunit_try_run_case+0x1a5/0x480
[   14.468663]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.468685]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   14.468708]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   14.468731]  ? __kthread_parkme+0x82/0x180
[   14.468752]  ? preempt_count_sub+0x50/0x80
[   14.468776]  ? __pfx_kunit_try_run_case+0x10/0x10
[   14.468800]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.468823]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   14.468847]  kthread+0x337/0x6f0
[   14.468867]  ? trace_preempt_on+0x20/0xc0
[   14.468892]  ? __pfx_kthread+0x10/0x10
[   14.468921]  ? _raw_spin_unlock_irq+0x47/0x80
[   14.468952]  ? calculate_sigpending+0x7b/0xa0
[   14.468976]  ? __pfx_kthread+0x10/0x10
[   14.469009]  ret_from_fork+0x116/0x1d0
[   14.469028]  ? __pfx_kthread+0x10/0x10
[   14.469049]  ret_from_fork_asm+0x1a/0x30
[   14.469080]  </TASK>
[   14.469092] 
[   14.477836] Allocated by task 290:
[   14.479724]  kasan_save_stack+0x45/0x70
[   14.480592]  kasan_save_track+0x18/0x40
[   14.481295]  kasan_save_alloc_info+0x3b/0x50
[   14.482003]  __kasan_kmalloc+0xb7/0xc0
[   14.482741]  __kmalloc_cache_noprof+0x189/0x420
[   14.483156]  kasan_atomics+0x95/0x310
[   14.483359]  kunit_try_run_case+0x1a5/0x480
[   14.483557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   14.484002]  kthread+0x337/0x6f0
[   14.484158]  ret_from_fork+0x116/0x1d0
[   14.484465]  ret_from_fork_asm+0x1a/0x30
[   14.484662] 
[   14.484825] The buggy address belongs to the object at ffff8881028d8d80
[   14.484825]  which belongs to the cache kmalloc-64 of size 64
[   14.485450] The buggy address is located 0 bytes to the right of
[   14.485450]  allocated 48-byte region [ffff8881028d8d80, ffff8881028d8db0)
[   14.486219] 
[   14.486299] The buggy address belongs to the physical page:
[   14.486654] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028d8
[   14.487325] flags: 0x200000000000000(node=0|zone=2)
[   14.487800] page_type: f5(slab)
[   14.488099] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   14.488370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   14.489016] page dumped because: kasan: bad access detected
[   14.489497] 
[   14.489615] Memory state around the buggy address:
[   14.489771]  ffff8881028d8c80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.489990]  ffff8881028d8d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   14.490199] >ffff8881028d8d80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   14.490410]                                      ^
[   14.490559]  ffff8881028d8e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.491028]  ffff8881028d8e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   14.491276] ==================================================================