Hay
Date
June 17, 2025, 6:35 a.m.

Environment
qemu-arm64
qemu-x86_64

[   19.780552] ==================================================================
[   19.780627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   19.781361] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.781470] 
[   19.781507] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.781609] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.781946] Hardware name: linux,dummy-virt (DT)
[   19.782127] Call trace:
[   19.782183]  show_stack+0x20/0x38 (C)
[   19.782344]  dump_stack_lvl+0x8c/0xd0
[   19.782398]  print_report+0x118/0x608
[   19.782448]  kasan_report+0xdc/0x128
[   19.782496]  kasan_check_range+0x100/0x1a8
[   19.782986]  __kasan_check_write+0x20/0x30
[   19.783417]  kasan_atomics_helper+0x1058/0x4858
[   19.783642]  kasan_atomics+0x198/0x2e0
[   19.783715]  kunit_try_run_case+0x170/0x3f0
[   19.783882]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.783976]  kthread+0x328/0x630
[   19.784045]  ret_from_fork+0x10/0x20
[   19.784097] 
[   19.784119] Allocated by task 274:
[   19.784148]  kasan_save_stack+0x3c/0x68
[   19.784194]  kasan_save_track+0x20/0x40
[   19.784301]  kasan_save_alloc_info+0x40/0x58
[   19.784353]  __kasan_kmalloc+0xd4/0xd8
[   19.784392]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.784433]  kasan_atomics+0xb8/0x2e0
[   19.784472]  kunit_try_run_case+0x170/0x3f0
[   19.784522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.784570]  kthread+0x328/0x630
[   19.784612]  ret_from_fork+0x10/0x20
[   19.784651] 
[   19.784673] The buggy address belongs to the object at fff00000c5210800
[   19.784673]  which belongs to the cache kmalloc-64 of size 64
[   19.784746] The buggy address is located 0 bytes to the right of
[   19.784746]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.784830] 
[   19.784861] The buggy address belongs to the physical page:
[   19.784912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.784985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.785039] page_type: f5(slab)
[   19.785081] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.785140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.785185] page dumped because: kasan: bad access detected
[   19.785217] 
[   19.785238] Memory state around the buggy address:
[   19.785280]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.785334]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.785388] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.785444]                                      ^
[   19.785490]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.785551]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.785602] ==================================================================
[   19.909023] ==================================================================
[   19.909079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   19.909131] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.909801] 
[   19.909853] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.910248] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.910334] Hardware name: linux,dummy-virt (DT)
[   19.910415] Call trace:
[   19.910506]  show_stack+0x20/0x38 (C)
[   19.910602]  dump_stack_lvl+0x8c/0xd0
[   19.910711]  print_report+0x118/0x608
[   19.910849]  kasan_report+0xdc/0x128
[   19.910900]  kasan_check_range+0x100/0x1a8
[   19.910965]  __kasan_check_write+0x20/0x30
[   19.911011]  kasan_atomics_helper+0x1644/0x4858
[   19.911246]  kasan_atomics+0x198/0x2e0
[   19.911706]  kunit_try_run_case+0x170/0x3f0
[   19.911835]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.911897]  kthread+0x328/0x630
[   19.911953]  ret_from_fork+0x10/0x20
[   19.912279] 
[   19.912427] Allocated by task 274:
[   19.912711]  kasan_save_stack+0x3c/0x68
[   19.912946]  kasan_save_track+0x20/0x40
[   19.913132]  kasan_save_alloc_info+0x40/0x58
[   19.913218]  __kasan_kmalloc+0xd4/0xd8
[   19.913401]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.913628]  kasan_atomics+0xb8/0x2e0
[   19.913840]  kunit_try_run_case+0x170/0x3f0
[   19.914064]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.914155]  kthread+0x328/0x630
[   19.914379]  ret_from_fork+0x10/0x20
[   19.914610] 
[   19.914781] The buggy address belongs to the object at fff00000c5210800
[   19.914781]  which belongs to the cache kmalloc-64 of size 64
[   19.914999] The buggy address is located 0 bytes to the right of
[   19.914999]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.915327] 
[   19.915532] The buggy address belongs to the physical page:
[   19.915601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.915678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.915916] page_type: f5(slab)
[   19.916250] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.916466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.916585] page dumped because: kasan: bad access detected
[   19.916667] 
[   19.916726] Memory state around the buggy address:
[   19.917073]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.917205]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.917293] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.917422]                                      ^
[   19.917501]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.917743]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.918018] ==================================================================
[   19.705026] ==================================================================
[   19.705171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   19.705342] Read of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.705604] 
[   19.705658] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.705779] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.705903] Hardware name: linux,dummy-virt (DT)
[   19.706111] Call trace:
[   19.706154]  show_stack+0x20/0x38 (C)
[   19.706553]  dump_stack_lvl+0x8c/0xd0
[   19.707021]  print_report+0x118/0x608
[   19.707419]  kasan_report+0xdc/0x128
[   19.707525]  kasan_check_range+0x100/0x1a8
[   19.707596]  __kasan_check_read+0x20/0x30
[   19.708155]  kasan_atomics_helper+0xdd4/0x4858
[   19.708315]  kasan_atomics+0x198/0x2e0
[   19.708418]  kunit_try_run_case+0x170/0x3f0
[   19.708604]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.708836]  kthread+0x328/0x630
[   19.708913]  ret_from_fork+0x10/0x20
[   19.709280] 
[   19.709336] Allocated by task 274:
[   19.709371]  kasan_save_stack+0x3c/0x68
[   19.709542]  kasan_save_track+0x20/0x40
[   19.709866]  kasan_save_alloc_info+0x40/0x58
[   19.709952]  __kasan_kmalloc+0xd4/0xd8
[   19.710006]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.710056]  kasan_atomics+0xb8/0x2e0
[   19.710107]  kunit_try_run_case+0x170/0x3f0
[   19.710149]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.710204]  kthread+0x328/0x630
[   19.710249]  ret_from_fork+0x10/0x20
[   19.710288] 
[   19.710321] The buggy address belongs to the object at fff00000c5210800
[   19.710321]  which belongs to the cache kmalloc-64 of size 64
[   19.710386] The buggy address is located 0 bytes to the right of
[   19.710386]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.710466] 
[   19.710498] The buggy address belongs to the physical page:
[   19.710553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.710620] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.710674] page_type: f5(slab)
[   19.710732] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.710796] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.710840] page dumped because: kasan: bad access detected
[   19.710895] 
[   19.710919] Memory state around the buggy address:
[   19.710962]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.711711]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.711805] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.711849]                                      ^
[   19.712357]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.712702]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.712788] ==================================================================
[   19.819425] ==================================================================
[   19.819652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   19.819905] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.820062] 
[   19.820098] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.820214] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.820256] Hardware name: linux,dummy-virt (DT)
[   19.820602] Call trace:
[   19.820660]  show_stack+0x20/0x38 (C)
[   19.820826]  dump_stack_lvl+0x8c/0xd0
[   19.820891]  print_report+0x118/0x608
[   19.821204]  kasan_report+0xdc/0x128
[   19.821288]  kasan_check_range+0x100/0x1a8
[   19.821349]  __kasan_check_write+0x20/0x30
[   19.821396]  kasan_atomics_helper+0x11f8/0x4858
[   19.821860]  kasan_atomics+0x198/0x2e0
[   19.822101]  kunit_try_run_case+0x170/0x3f0
[   19.822206]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.822265]  kthread+0x328/0x630
[   19.822486]  ret_from_fork+0x10/0x20
[   19.822667] 
[   19.822775] Allocated by task 274:
[   19.823024]  kasan_save_stack+0x3c/0x68
[   19.823174]  kasan_save_track+0x20/0x40
[   19.823350]  kasan_save_alloc_info+0x40/0x58
[   19.823586]  __kasan_kmalloc+0xd4/0xd8
[   19.824008]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.824093]  kasan_atomics+0xb8/0x2e0
[   19.824338]  kunit_try_run_case+0x170/0x3f0
[   19.824548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.824811]  kthread+0x328/0x630
[   19.824908]  ret_from_fork+0x10/0x20
[   19.825354] 
[   19.825560] The buggy address belongs to the object at fff00000c5210800
[   19.825560]  which belongs to the cache kmalloc-64 of size 64
[   19.825673] The buggy address is located 0 bytes to the right of
[   19.825673]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.825753] 
[   19.825967] The buggy address belongs to the physical page:
[   19.826015] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.826122] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.826415] page_type: f5(slab)
[   19.826706] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.826944] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.827015] page dumped because: kasan: bad access detected
[   19.827208] 
[   19.827403] Memory state around the buggy address:
[   19.827561]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.827640]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.827730] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.828113]                                      ^
[   19.828190]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.828341]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.828435] ==================================================================
[   19.740535] ==================================================================
[   19.740593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   19.740648] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.740966] 
[   19.741142] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.741277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.741388] Hardware name: linux,dummy-virt (DT)
[   19.741422] Call trace:
[   19.741449]  show_stack+0x20/0x38 (C)
[   19.741669]  dump_stack_lvl+0x8c/0xd0
[   19.741821]  print_report+0x118/0x608
[   19.741990]  kasan_report+0xdc/0x128
[   19.742435]  kasan_check_range+0x100/0x1a8
[   19.742595]  __kasan_check_write+0x20/0x30
[   19.742694]  kasan_atomics_helper+0xeb8/0x4858
[   19.742849]  kasan_atomics+0x198/0x2e0
[   19.742960]  kunit_try_run_case+0x170/0x3f0
[   19.743129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.743206]  kthread+0x328/0x630
[   19.743259]  ret_from_fork+0x10/0x20
[   19.743309] 
[   19.743331] Allocated by task 274:
[   19.743855]  kasan_save_stack+0x3c/0x68
[   19.744048]  kasan_save_track+0x20/0x40
[   19.744160]  kasan_save_alloc_info+0x40/0x58
[   19.744392]  __kasan_kmalloc+0xd4/0xd8
[   19.744998]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.745066]  kasan_atomics+0xb8/0x2e0
[   19.745294]  kunit_try_run_case+0x170/0x3f0
[   19.745771]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.745991]  kthread+0x328/0x630
[   19.746043]  ret_from_fork+0x10/0x20
[   19.746234] 
[   19.746473] The buggy address belongs to the object at fff00000c5210800
[   19.746473]  which belongs to the cache kmalloc-64 of size 64
[   19.746676] The buggy address is located 0 bytes to the right of
[   19.746676]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.746771] 
[   19.747141] The buggy address belongs to the physical page:
[   19.747247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.747525] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.747694] page_type: f5(slab)
[   19.747915] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.748233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.748396] page dumped because: kasan: bad access detected
[   19.748484] 
[   19.748595] Memory state around the buggy address:
[   19.748655]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.748713]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.748775] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.748989]                                      ^
[   19.749459]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.749558]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.749767] ==================================================================
[   19.850337] ==================================================================
[   19.850393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   19.850449] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.850503] 
[   19.850537] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.850627] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.850656] Hardware name: linux,dummy-virt (DT)
[   19.850689] Call trace:
[   19.850715]  show_stack+0x20/0x38 (C)
[   19.850766]  dump_stack_lvl+0x8c/0xd0
[   19.850816]  print_report+0x118/0x608
[   19.850863]  kasan_report+0xdc/0x128
[   19.850912]  kasan_check_range+0x100/0x1a8
[   19.850978]  __kasan_check_write+0x20/0x30
[   19.851024]  kasan_atomics_helper+0x1384/0x4858
[   19.851085]  kasan_atomics+0x198/0x2e0
[   19.851144]  kunit_try_run_case+0x170/0x3f0
[   19.851203]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.851260]  kthread+0x328/0x630
[   19.851305]  ret_from_fork+0x10/0x20
[   19.851356] 
[   19.851378] Allocated by task 274:
[   19.851419]  kasan_save_stack+0x3c/0x68
[   19.851462]  kasan_save_track+0x20/0x40
[   19.851511]  kasan_save_alloc_info+0x40/0x58
[   19.851552]  __kasan_kmalloc+0xd4/0xd8
[   19.851592]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.851634]  kasan_atomics+0xb8/0x2e0
[   19.851673]  kunit_try_run_case+0x170/0x3f0
[   19.851723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.851771]  kthread+0x328/0x630
[   19.851807]  ret_from_fork+0x10/0x20
[   19.851845] 
[   19.851866] The buggy address belongs to the object at fff00000c5210800
[   19.851866]  which belongs to the cache kmalloc-64 of size 64
[   19.851936] The buggy address is located 0 bytes to the right of
[   19.851936]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.852461] 
[   19.852873] The buggy address belongs to the physical page:
[   19.852939] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.853007] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.853449] page_type: f5(slab)
[   19.853508] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.853646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.853704] page dumped because: kasan: bad access detected
[   19.853739] 
[   19.854021] Memory state around the buggy address:
[   19.854426]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.854713]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.854767] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.854877]                                      ^
[   19.854992]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.855122]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.855251] ==================================================================
[   19.684084] ==================================================================
[   19.684939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   19.685190] Write of size 4 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.685274] 
[   19.685332] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.685471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.685520] Hardware name: linux,dummy-virt (DT)
[   19.685555] Call trace:
[   19.685588]  show_stack+0x20/0x38 (C)
[   19.685733]  dump_stack_lvl+0x8c/0xd0
[   19.685785]  print_report+0x118/0x608
[   19.685833]  kasan_report+0xdc/0x128
[   19.686166]  kasan_check_range+0x100/0x1a8
[   19.686553]  __kasan_check_write+0x20/0x30
[   19.686636]  kasan_atomics_helper+0xd3c/0x4858
[   19.686696]  kasan_atomics+0x198/0x2e0
[   19.686984]  kunit_try_run_case+0x170/0x3f0
[   19.687129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.687345]  kthread+0x328/0x630
[   19.687648]  ret_from_fork+0x10/0x20
[   19.688027] 
[   19.688120] Allocated by task 274:
[   19.688186]  kasan_save_stack+0x3c/0x68
[   19.688618]  kasan_save_track+0x20/0x40
[   19.688710]  kasan_save_alloc_info+0x40/0x58
[   19.688770]  __kasan_kmalloc+0xd4/0xd8
[   19.689105]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.689240]  kasan_atomics+0xb8/0x2e0
[   19.689284]  kunit_try_run_case+0x170/0x3f0
[   19.689356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.689571]  kthread+0x328/0x630
[   19.689833]  ret_from_fork+0x10/0x20
[   19.689887] 
[   19.689911] The buggy address belongs to the object at fff00000c5210800
[   19.689911]  which belongs to the cache kmalloc-64 of size 64
[   19.689985] The buggy address is located 0 bytes to the right of
[   19.689985]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.690051] 
[   19.690344] The buggy address belongs to the physical page:
[   19.690635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.690802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.690886] page_type: f5(slab)
[   19.691038] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.691114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.691438] page dumped because: kasan: bad access detected
[   19.691580] 
[   19.691652] Memory state around the buggy address:
[   19.691778]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.691838]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.691891] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.692186]                                      ^
[   19.692310]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.692395]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.692707] ==================================================================
[   19.895693] ==================================================================
[   19.895778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   19.895900] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.895985] 
[   19.896021] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.896161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.896192] Hardware name: linux,dummy-virt (DT)
[   19.896227] Call trace:
[   19.896251]  show_stack+0x20/0x38 (C)
[   19.896562]  dump_stack_lvl+0x8c/0xd0
[   19.896843]  print_report+0x118/0x608
[   19.897069]  kasan_report+0xdc/0x128
[   19.897139]  kasan_check_range+0x100/0x1a8
[   19.897258]  __kasan_check_write+0x20/0x30
[   19.897333]  kasan_atomics_helper+0x15b4/0x4858
[   19.897386]  kasan_atomics+0x198/0x2e0
[   19.897484]  kunit_try_run_case+0x170/0x3f0
[   19.897536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.897597]  kthread+0x328/0x630
[   19.897641]  ret_from_fork+0x10/0x20
[   19.897692] 
[   19.897714] Allocated by task 274:
[   19.897743]  kasan_save_stack+0x3c/0x68
[   19.897788]  kasan_save_track+0x20/0x40
[   19.897830]  kasan_save_alloc_info+0x40/0x58
[   19.897870]  __kasan_kmalloc+0xd4/0xd8
[   19.897911]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.897964]  kasan_atomics+0xb8/0x2e0
[   19.898685]  kunit_try_run_case+0x170/0x3f0
[   19.898789]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.898866]  kthread+0x328/0x630
[   19.899037]  ret_from_fork+0x10/0x20
[   19.899160] 
[   19.899304] The buggy address belongs to the object at fff00000c5210800
[   19.899304]  which belongs to the cache kmalloc-64 of size 64
[   19.899598] The buggy address is located 0 bytes to the right of
[   19.899598]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.899738] 
[   19.899798] The buggy address belongs to the physical page:
[   19.899845] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.899909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.900111] page_type: f5(slab)
[   19.900314] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.900593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.900670] page dumped because: kasan: bad access detected
[   19.900774] 
[   19.900825] Memory state around the buggy address:
[   19.900881]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.900946]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.901467] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.901523]                                      ^
[   19.901609]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.901733]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.901801] ==================================================================
[   19.584505] ==================================================================
[   19.584559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   19.584616] Write of size 4 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.584669] 
[   19.585169] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.585311] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.585647] Hardware name: linux,dummy-virt (DT)
[   19.585889] Call trace:
[   19.586210]  show_stack+0x20/0x38 (C)
[   19.586563]  dump_stack_lvl+0x8c/0xd0
[   19.586747]  print_report+0x118/0x608
[   19.586895]  kasan_report+0xdc/0x128
[   19.586984]  kasan_check_range+0x100/0x1a8
[   19.587102]  __kasan_check_write+0x20/0x30
[   19.587189]  kasan_atomics_helper+0x99c/0x4858
[   19.587327]  kasan_atomics+0x198/0x2e0
[   19.587424]  kunit_try_run_case+0x170/0x3f0
[   19.587801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.587984]  kthread+0x328/0x630
[   19.588070]  ret_from_fork+0x10/0x20
[   19.588164] 
[   19.588205] Allocated by task 274:
[   19.588263]  kasan_save_stack+0x3c/0x68
[   19.588418]  kasan_save_track+0x20/0x40
[   19.588671]  kasan_save_alloc_info+0x40/0x58
[   19.588850]  __kasan_kmalloc+0xd4/0xd8
[   19.588979]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.589198]  kasan_atomics+0xb8/0x2e0
[   19.589535]  kunit_try_run_case+0x170/0x3f0
[   19.589596]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.590075]  kthread+0x328/0x630
[   19.590126]  ret_from_fork+0x10/0x20
[   19.590165] 
[   19.590188] The buggy address belongs to the object at fff00000c5210800
[   19.590188]  which belongs to the cache kmalloc-64 of size 64
[   19.590250] The buggy address is located 0 bytes to the right of
[   19.590250]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.590600] 
[   19.590727] The buggy address belongs to the physical page:
[   19.590779] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.591084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.591313] page_type: f5(slab)
[   19.591559] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.591711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.591988] page dumped because: kasan: bad access detected
[   19.592119] 
[   19.592561] Memory state around the buggy address:
[   19.592671]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.593151]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.593311] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.593416]                                      ^
[   19.593693]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.593957]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.594267] ==================================================================
[   19.919100] ==================================================================
[   19.919323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   19.919388] Read of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.919905] 
[   19.920025] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.920148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.920460] Hardware name: linux,dummy-virt (DT)
[   19.920518] Call trace:
[   19.920546]  show_stack+0x20/0x38 (C)
[   19.920889]  dump_stack_lvl+0x8c/0xd0
[   19.920975]  print_report+0x118/0x608
[   19.921025]  kasan_report+0xdc/0x128
[   19.921197]  __asan_report_load8_noabort+0x20/0x30
[   19.921261]  kasan_atomics_helper+0x3df4/0x4858
[   19.921312]  kasan_atomics+0x198/0x2e0
[   19.921362]  kunit_try_run_case+0x170/0x3f0
[   19.921431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.921488]  kthread+0x328/0x630
[   19.921543]  ret_from_fork+0x10/0x20
[   19.921602] 
[   19.921630] Allocated by task 274:
[   19.921661]  kasan_save_stack+0x3c/0x68
[   19.921705]  kasan_save_track+0x20/0x40
[   19.921744]  kasan_save_alloc_info+0x40/0x58
[   19.921783]  __kasan_kmalloc+0xd4/0xd8
[   19.921833]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.921877]  kasan_atomics+0xb8/0x2e0
[   19.921917]  kunit_try_run_case+0x170/0x3f0
[   19.921969]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.922015]  kthread+0x328/0x630
[   19.922566]  ret_from_fork+0x10/0x20
[   19.922651] 
[   19.922706] The buggy address belongs to the object at fff00000c5210800
[   19.922706]  which belongs to the cache kmalloc-64 of size 64
[   19.923089] The buggy address is located 0 bytes to the right of
[   19.923089]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.923787] 
[   19.923831] The buggy address belongs to the physical page:
[   19.923886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.923996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.924050] page_type: f5(slab)
[   19.924677] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.924761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.925033] page dumped because: kasan: bad access detected
[   19.925122] 
[   19.925348] Memory state around the buggy address:
[   19.925590]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.925712]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.925798] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.925902]                                      ^
[   19.925989]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.926351]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.926514] ==================================================================
[   19.734661] ==================================================================
[   19.734720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   19.734777] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.734841] 
[   19.735136] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.735262] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.735296] Hardware name: linux,dummy-virt (DT)
[   19.735336] Call trace:
[   19.735361]  show_stack+0x20/0x38 (C)
[   19.735416]  dump_stack_lvl+0x8c/0xd0
[   19.735477]  print_report+0x118/0x608
[   19.735543]  kasan_report+0xdc/0x128
[   19.735593]  __asan_report_store8_noabort+0x20/0x30
[   19.735646]  kasan_atomics_helper+0x3e5c/0x4858
[   19.735707]  kasan_atomics+0x198/0x2e0
[   19.735757]  kunit_try_run_case+0x170/0x3f0
[   19.735807]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.735862]  kthread+0x328/0x630
[   19.735908]  ret_from_fork+0x10/0x20
[   19.735969] 
[   19.735990] Allocated by task 274:
[   19.736025]  kasan_save_stack+0x3c/0x68
[   19.736070]  kasan_save_track+0x20/0x40
[   19.736111]  kasan_save_alloc_info+0x40/0x58
[   19.736150]  __kasan_kmalloc+0xd4/0xd8
[   19.736199]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.736243]  kasan_atomics+0xb8/0x2e0
[   19.736281]  kunit_try_run_case+0x170/0x3f0
[   19.736331]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.736379]  kthread+0x328/0x630
[   19.736415]  ret_from_fork+0x10/0x20
[   19.736453] 
[   19.736473] The buggy address belongs to the object at fff00000c5210800
[   19.736473]  which belongs to the cache kmalloc-64 of size 64
[   19.736535] The buggy address is located 0 bytes to the right of
[   19.736535]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.736603] 
[   19.736624] The buggy address belongs to the physical page:
[   19.736663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.736718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.736777] page_type: f5(slab)
[   19.736821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.736874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.736919] page dumped because: kasan: bad access detected
[   19.737316] 
[   19.737723] Memory state around the buggy address:
[   19.737807]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.737859]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.737905] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.738292]                                      ^
[   19.738411]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.738916]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.739004] ==================================================================
[   19.724047] ==================================================================
[   19.724249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   19.724314] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.724367] 
[   19.724417] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.724512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.724543] Hardware name: linux,dummy-virt (DT)
[   19.724578] Call trace:
[   19.724603]  show_stack+0x20/0x38 (C)
[   19.724656]  dump_stack_lvl+0x8c/0xd0
[   19.724729]  print_report+0x118/0x608
[   19.724780]  kasan_report+0xdc/0x128
[   19.724828]  kasan_check_range+0x100/0x1a8
[   19.724880]  __kasan_check_write+0x20/0x30
[   19.724938]  kasan_atomics_helper+0xe44/0x4858
[   19.724998]  kasan_atomics+0x198/0x2e0
[   19.725046]  kunit_try_run_case+0x170/0x3f0
[   19.725339]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.726399]  kthread+0x328/0x630
[   19.726503]  ret_from_fork+0x10/0x20
[   19.726568] 
[   19.726590] Allocated by task 274:
[   19.726622]  kasan_save_stack+0x3c/0x68
[   19.726668]  kasan_save_track+0x20/0x40
[   19.726709]  kasan_save_alloc_info+0x40/0x58
[   19.726966]  __kasan_kmalloc+0xd4/0xd8
[   19.727269]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.727616]  kasan_atomics+0xb8/0x2e0
[   19.727959]  kunit_try_run_case+0x170/0x3f0
[   19.728281]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.728407]  kthread+0x328/0x630
[   19.728563]  ret_from_fork+0x10/0x20
[   19.728901] 
[   19.729016] The buggy address belongs to the object at fff00000c5210800
[   19.729016]  which belongs to the cache kmalloc-64 of size 64
[   19.729087] The buggy address is located 0 bytes to the right of
[   19.729087]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.729308] 
[   19.729364] The buggy address belongs to the physical page:
[   19.729615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.729859] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.730187] page_type: f5(slab)
[   19.730243] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.730299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.730741] page dumped because: kasan: bad access detected
[   19.730946] 
[   19.731040] Memory state around the buggy address:
[   19.731298]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.731754]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.731834] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.732060]                                      ^
[   19.732121]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.732168]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.732343] ==================================================================
[   19.856064] ==================================================================
[   19.856365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   19.856486] Read of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.856562] 
[   19.856622] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.856748] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.856776] Hardware name: linux,dummy-virt (DT)
[   19.857073] Call trace:
[   19.857124]  show_stack+0x20/0x38 (C)
[   19.857207]  dump_stack_lvl+0x8c/0xd0
[   19.857262]  print_report+0x118/0x608
[   19.857329]  kasan_report+0xdc/0x128
[   19.857501]  __asan_report_load8_noabort+0x20/0x30
[   19.857780]  kasan_atomics_helper+0x3f04/0x4858
[   19.857918]  kasan_atomics+0x198/0x2e0
[   19.857987]  kunit_try_run_case+0x170/0x3f0
[   19.858071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.858207]  kthread+0x328/0x630
[   19.858256]  ret_from_fork+0x10/0x20
[   19.858319] 
[   19.858348] Allocated by task 274:
[   19.858382]  kasan_save_stack+0x3c/0x68
[   19.858543]  kasan_save_track+0x20/0x40
[   19.859060]  kasan_save_alloc_info+0x40/0x58
[   19.859217]  __kasan_kmalloc+0xd4/0xd8
[   19.859307]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.859350]  kasan_atomics+0xb8/0x2e0
[   19.859510]  kunit_try_run_case+0x170/0x3f0
[   19.859713]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.859890]  kthread+0x328/0x630
[   19.860112]  ret_from_fork+0x10/0x20
[   19.860182] 
[   19.860285] The buggy address belongs to the object at fff00000c5210800
[   19.860285]  which belongs to the cache kmalloc-64 of size 64
[   19.860359] The buggy address is located 0 bytes to the right of
[   19.860359]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.860700] 
[   19.861056] The buggy address belongs to the physical page:
[   19.861217] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.861336] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.861481] page_type: f5(slab)
[   19.861527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.861748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.861943] page dumped because: kasan: bad access detected
[   19.862009] 
[   19.862052] Memory state around the buggy address:
[   19.862199]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.862254]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.862583] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.862982]                                      ^
[   19.863081]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.863216]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.863294] ==================================================================
[   19.864176] ==================================================================
[   19.864490] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   19.864567] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.864668] 
[   19.864705] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.864796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.864845] Hardware name: linux,dummy-virt (DT)
[   19.864880] Call trace:
[   19.864907]  show_stack+0x20/0x38 (C)
[   19.864969]  dump_stack_lvl+0x8c/0xd0
[   19.865019]  print_report+0x118/0x608
[   19.865067]  kasan_report+0xdc/0x128
[   19.865249]  kasan_check_range+0x100/0x1a8
[   19.865663]  __kasan_check_write+0x20/0x30
[   19.865829]  kasan_atomics_helper+0x1414/0x4858
[   19.865913]  kasan_atomics+0x198/0x2e0
[   19.866006]  kunit_try_run_case+0x170/0x3f0
[   19.866106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.866319]  kthread+0x328/0x630
[   19.866554]  ret_from_fork+0x10/0x20
[   19.866813] 
[   19.866873] Allocated by task 274:
[   19.867049]  kasan_save_stack+0x3c/0x68
[   19.867184]  kasan_save_track+0x20/0x40
[   19.867226]  kasan_save_alloc_info+0x40/0x58
[   19.867282]  __kasan_kmalloc+0xd4/0xd8
[   19.867575]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.867828]  kasan_atomics+0xb8/0x2e0
[   19.867965]  kunit_try_run_case+0x170/0x3f0
[   19.868304]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.868539]  kthread+0x328/0x630
[   19.868623]  ret_from_fork+0x10/0x20
[   19.868664] 
[   19.868832] The buggy address belongs to the object at fff00000c5210800
[   19.868832]  which belongs to the cache kmalloc-64 of size 64
[   19.869282] The buggy address is located 0 bytes to the right of
[   19.869282]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.869387] 
[   19.869510] The buggy address belongs to the physical page:
[   19.869562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.869779] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.870035] page_type: f5(slab)
[   19.870213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.870270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.870373] page dumped because: kasan: bad access detected
[   19.870570] 
[   19.870869] Memory state around the buggy address:
[   19.871079]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.871164]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.871300] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.871388]                                      ^
[   19.871562]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.871609]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.871729] ==================================================================
[   19.693524] ==================================================================
[   19.693589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   19.693646] Read of size 4 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.693699] 
[   19.693735] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.693823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.693853] Hardware name: linux,dummy-virt (DT)
[   19.693887] Call trace:
[   19.693911]  show_stack+0x20/0x38 (C)
[   19.694596]  dump_stack_lvl+0x8c/0xd0
[   19.694872]  print_report+0x118/0x608
[   19.695304]  kasan_report+0xdc/0x128
[   19.695812]  __asan_report_load4_noabort+0x20/0x30
[   19.696295]  kasan_atomics_helper+0x3e04/0x4858
[   19.696507]  kasan_atomics+0x198/0x2e0
[   19.696873]  kunit_try_run_case+0x170/0x3f0
[   19.697307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.697424]  kthread+0x328/0x630
[   19.697804]  ret_from_fork+0x10/0x20
[   19.697953] 
[   19.698011] Allocated by task 274:
[   19.698191]  kasan_save_stack+0x3c/0x68
[   19.698341]  kasan_save_track+0x20/0x40
[   19.698656]  kasan_save_alloc_info+0x40/0x58
[   19.698772]  __kasan_kmalloc+0xd4/0xd8
[   19.698898]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.699085]  kasan_atomics+0xb8/0x2e0
[   19.699283]  kunit_try_run_case+0x170/0x3f0
[   19.699527]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.699613]  kthread+0x328/0x630
[   19.699828]  ret_from_fork+0x10/0x20
[   19.699920] 
[   19.700249] The buggy address belongs to the object at fff00000c5210800
[   19.700249]  which belongs to the cache kmalloc-64 of size 64
[   19.700462] The buggy address is located 0 bytes to the right of
[   19.700462]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.700695] 
[   19.700826] The buggy address belongs to the physical page:
[   19.700891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.701337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.701458] page_type: f5(slab)
[   19.701583] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.701954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.702096] page dumped because: kasan: bad access detected
[   19.702172] 
[   19.702216] Memory state around the buggy address:
[   19.702332]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.702382]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.702434] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.702474]                                      ^
[   19.702510]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.702729]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.702893] ==================================================================
[   19.570819] ==================================================================
[   19.570877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   19.571263] Read of size 4 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.571335] 
[   19.571373] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.571462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.571490] Hardware name: linux,dummy-virt (DT)
[   19.571523] Call trace:
[   19.571547]  show_stack+0x20/0x38 (C)
[   19.571614]  dump_stack_lvl+0x8c/0xd0
[   19.571667]  print_report+0x118/0x608
[   19.571724]  kasan_report+0xdc/0x128
[   19.571775]  __asan_report_load4_noabort+0x20/0x30
[   19.571837]  kasan_atomics_helper+0x42d8/0x4858
[   19.571890]  kasan_atomics+0x198/0x2e0
[   19.571958]  kunit_try_run_case+0x170/0x3f0
[   19.572011]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.572065]  kthread+0x328/0x630
[   19.572108]  ret_from_fork+0x10/0x20
[   19.572160] 
[   19.572181] Allocated by task 274:
[   19.572217]  kasan_save_stack+0x3c/0x68
[   19.572262]  kasan_save_track+0x20/0x40
[   19.572303]  kasan_save_alloc_info+0x40/0x58
[   19.572351]  __kasan_kmalloc+0xd4/0xd8
[   19.572391]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.572434]  kasan_atomics+0xb8/0x2e0
[   19.572472]  kunit_try_run_case+0x170/0x3f0
[   19.572512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.572559]  kthread+0x328/0x630
[   19.572595]  ret_from_fork+0x10/0x20
[   19.572632] 
[   19.572662] The buggy address belongs to the object at fff00000c5210800
[   19.572662]  which belongs to the cache kmalloc-64 of size 64
[   19.572725] The buggy address is located 0 bytes to the right of
[   19.572725]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.572916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.574367]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.575640] Write of size 4 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.578984]  __kasan_kmalloc+0xd4/0xd8
[   19.579234]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.579465]  kasan_atomics+0xb8/0x2e0
[   19.579639]  kunit_try_run_case+0x170/0x3f0
[   19.579729]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.579873]  kthread+0x328/0x630
[   19.579911]  ret_from_fork+0x10/0x20
[   19.580004] 
[   19.580171] The buggy address belongs to the object at fff00000c5210800
[   19.580171]  which belongs to the cache kmalloc-64 of size 64
[   19.580392] The buggy address is located 0 bytes to the right of
[   19.580392]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.580679] 
[   19.580889] The buggy address belongs to the physical page:
[   19.581106] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.581211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.581419] page_type: f5(slab)
[   19.581555] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.581900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.581996] page dumped because: kasan: bad access detected
[   19.582118] 
[   19.582164] Memory state around the buggy address:
[   19.582222]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.582275]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.582320] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.582668]                                      ^
[   19.582799]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.582981]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.583089] ==================================================================
[   19.872614] ==================================================================
[   19.872671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   19.872725] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.872785] 
[   19.872818] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.872908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.872983] Hardware name: linux,dummy-virt (DT)
[   19.873021] Call trace:
[   19.873055]  show_stack+0x20/0x38 (C)
[   19.873125]  dump_stack_lvl+0x8c/0xd0
[   19.873175]  print_report+0x118/0x608
[   19.873234]  kasan_report+0xdc/0x128
[   19.873293]  kasan_check_range+0x100/0x1a8
[   19.873348]  __kasan_check_write+0x20/0x30
[   19.873395]  kasan_atomics_helper+0x147c/0x4858
[   19.873446]  kasan_atomics+0x198/0x2e0
[   19.873494]  kunit_try_run_case+0x170/0x3f0
[   19.873545]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.873612]  kthread+0x328/0x630
[   19.873668]  ret_from_fork+0x10/0x20
[   19.873720] 
[   19.873747] Allocated by task 274:
[   19.873778]  kasan_save_stack+0x3c/0x68
[   19.873823]  kasan_save_track+0x20/0x40
[   19.873863]  kasan_save_alloc_info+0x40/0x58
[   19.873904]  __kasan_kmalloc+0xd4/0xd8
[   19.873956]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.873999]  kasan_atomics+0xb8/0x2e0
[   19.874038]  kunit_try_run_case+0x170/0x3f0
[   19.874079]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.874126]  kthread+0x328/0x630
[   19.874161]  ret_from_fork+0x10/0x20
[   19.874200] 
[   19.874230] The buggy address belongs to the object at fff00000c5210800
[   19.874230]  which belongs to the cache kmalloc-64 of size 64
[   19.874292] The buggy address is located 0 bytes to the right of
[   19.874292]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.874363] 
[   19.874385] The buggy address belongs to the physical page:
[   19.874428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.874488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.874536] page_type: f5(slab)
[   19.874577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.874628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.874672] page dumped because: kasan: bad access detected
[   19.874705] 
[   19.874725] Memory state around the buggy address:
[   19.874759]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.874805]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.874850] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.874889]                                      ^
[   19.874924]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.876255]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.876325] ==================================================================
[   19.771839] ==================================================================
[   19.771901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   19.772094] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.772157] 
[   19.772192] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.772283] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.772310] Hardware name: linux,dummy-virt (DT)
[   19.772342] Call trace:
[   19.772367]  show_stack+0x20/0x38 (C)
[   19.772420]  dump_stack_lvl+0x8c/0xd0
[   19.772472]  print_report+0x118/0x608
[   19.772519]  kasan_report+0xdc/0x128
[   19.772566]  kasan_check_range+0x100/0x1a8
[   19.772616]  __kasan_check_write+0x20/0x30
[   19.772663]  kasan_atomics_helper+0xff0/0x4858
[   19.772712]  kasan_atomics+0x198/0x2e0
[   19.772760]  kunit_try_run_case+0x170/0x3f0
[   19.772809]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.772864]  kthread+0x328/0x630
[   19.772917]  ret_from_fork+0x10/0x20
[   19.773521] 
[   19.773556] Allocated by task 274:
[   19.773605]  kasan_save_stack+0x3c/0x68
[   19.773675]  kasan_save_track+0x20/0x40
[   19.773719]  kasan_save_alloc_info+0x40/0x58
[   19.773966]  __kasan_kmalloc+0xd4/0xd8
[   19.774023]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.774106]  kasan_atomics+0xb8/0x2e0
[   19.774188]  kunit_try_run_case+0x170/0x3f0
[   19.774370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.774422]  kthread+0x328/0x630
[   19.774457]  ret_from_fork+0x10/0x20
[   19.774839] 
[   19.775286] The buggy address belongs to the object at fff00000c5210800
[   19.775286]  which belongs to the cache kmalloc-64 of size 64
[   19.775474] The buggy address is located 0 bytes to the right of
[   19.775474]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.775898] 
[   19.776118] The buggy address belongs to the physical page:
[   19.776170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.777080] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.777353] page_type: f5(slab)
[   19.777651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.777740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.777900] page dumped because: kasan: bad access detected
[   19.777952] 
[   19.777974] Memory state around the buggy address:
[   19.778593]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.778670]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.778735] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.778782]                                      ^
[   19.778819]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.779101]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.779282] ==================================================================
[   19.796659] ==================================================================
[   19.797007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   19.797190] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.797336] 
[   19.797371] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.797944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.798091] Hardware name: linux,dummy-virt (DT)
[   19.798249] Call trace:
[   19.798295]  show_stack+0x20/0x38 (C)
[   19.798452]  dump_stack_lvl+0x8c/0xd0
[   19.798588]  print_report+0x118/0x608
[   19.798637]  kasan_report+0xdc/0x128
[   19.798693]  kasan_check_range+0x100/0x1a8
[   19.799166]  __kasan_check_write+0x20/0x30
[   19.799897]  kasan_atomics_helper+0x1128/0x4858
[   19.800034]  kasan_atomics+0x198/0x2e0
[   19.800297]  kunit_try_run_case+0x170/0x3f0
[   19.800380]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.800732]  kthread+0x328/0x630
[   19.801110]  ret_from_fork+0x10/0x20
[   19.801575] 
[   19.801801] Allocated by task 274:
[   19.801879]  kasan_save_stack+0x3c/0x68
[   19.802091]  kasan_save_track+0x20/0x40
[   19.802441]  kasan_save_alloc_info+0x40/0x58
[   19.802728]  __kasan_kmalloc+0xd4/0xd8
[   19.802920]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.803176]  kasan_atomics+0xb8/0x2e0
[   19.803370]  kunit_try_run_case+0x170/0x3f0
[   19.803479]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.803545]  kthread+0x328/0x630
[   19.803582]  ret_from_fork+0x10/0x20
[   19.803797] 
[   19.804535] The buggy address belongs to the object at fff00000c5210800
[   19.804535]  which belongs to the cache kmalloc-64 of size 64
[   19.804625] The buggy address is located 0 bytes to the right of
[   19.804625]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.804894] 
[   19.805033] The buggy address belongs to the physical page:
[   19.805092] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.805633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.805759] page_type: f5(slab)
[   19.805808] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.805974] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.806110] page dumped because: kasan: bad access detected
[   19.806149] 
[   19.806169] Memory state around the buggy address:
[   19.806223]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.806270]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.806332] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.806373]                                      ^
[   19.806408]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.806469]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.806520] ==================================================================
[   19.876633] ==================================================================
[   19.876861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   19.876956] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.877175] 
[   19.877265] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.877365] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.877787] Hardware name: linux,dummy-virt (DT)
[   19.877850] Call trace:
[   19.877891]  show_stack+0x20/0x38 (C)
[   19.878092]  dump_stack_lvl+0x8c/0xd0
[   19.878387]  print_report+0x118/0x608
[   19.878515]  kasan_report+0xdc/0x128
[   19.878591]  kasan_check_range+0x100/0x1a8
[   19.878747]  __kasan_check_write+0x20/0x30
[   19.878795]  kasan_atomics_helper+0x14e4/0x4858
[   19.878846]  kasan_atomics+0x198/0x2e0
[   19.879210]  kunit_try_run_case+0x170/0x3f0
[   19.879308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.879501]  kthread+0x328/0x630
[   19.879706]  ret_from_fork+0x10/0x20
[   19.880070] 
[   19.880112] Allocated by task 274:
[   19.880216]  kasan_save_stack+0x3c/0x68
[   19.880498]  kasan_save_track+0x20/0x40
[   19.880636]  kasan_save_alloc_info+0x40/0x58
[   19.880705]  __kasan_kmalloc+0xd4/0xd8
[   19.880754]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.881217]  kasan_atomics+0xb8/0x2e0
[   19.881508]  kunit_try_run_case+0x170/0x3f0
[   19.881764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.881859]  kthread+0x328/0x630
[   19.881904]  ret_from_fork+0x10/0x20
[   19.882419] 
[   19.882564] The buggy address belongs to the object at fff00000c5210800
[   19.882564]  which belongs to the cache kmalloc-64 of size 64
[   19.882789] The buggy address is located 0 bytes to the right of
[   19.882789]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.882892] 
[   19.882915] The buggy address belongs to the physical page:
[   19.883222] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.883394] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.883779] page_type: f5(slab)
[   19.884123] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.884296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.884621] page dumped because: kasan: bad access detected
[   19.884807] 
[   19.884892] Memory state around the buggy address:
[   19.885010]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.885327]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.885491] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.885583]                                      ^
[   19.885749]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.885798]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.885878] ==================================================================
[   19.759397] ==================================================================
[   19.759453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   19.759507] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.759560] 
[   19.760171] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.760281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.760819] Hardware name: linux,dummy-virt (DT)
[   19.760952] Call trace:
[   19.760998]  show_stack+0x20/0x38 (C)
[   19.761056]  dump_stack_lvl+0x8c/0xd0
[   19.761127]  print_report+0x118/0x608
[   19.761371]  kasan_report+0xdc/0x128
[   19.761434]  kasan_check_range+0x100/0x1a8
[   19.761487]  __kasan_check_write+0x20/0x30
[   19.762067]  kasan_atomics_helper+0xf88/0x4858
[   19.762162]  kasan_atomics+0x198/0x2e0
[   19.762339]  kunit_try_run_case+0x170/0x3f0
[   19.762538]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.763058]  kthread+0x328/0x630
[   19.763283]  ret_from_fork+0x10/0x20
[   19.763493] 
[   19.763559] Allocated by task 274:
[   19.763747]  kasan_save_stack+0x3c/0x68
[   19.763979]  kasan_save_track+0x20/0x40
[   19.764131]  kasan_save_alloc_info+0x40/0x58
[   19.764188]  __kasan_kmalloc+0xd4/0xd8
[   19.764254]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.764315]  kasan_atomics+0xb8/0x2e0
[   19.764586]  kunit_try_run_case+0x170/0x3f0
[   19.764671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.764980]  kthread+0x328/0x630
[   19.765267]  ret_from_fork+0x10/0x20
[   19.765600] 
[   19.765774] The buggy address belongs to the object at fff00000c5210800
[   19.765774]  which belongs to the cache kmalloc-64 of size 64
[   19.765843] The buggy address is located 0 bytes to the right of
[   19.765843]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.766511] 
[   19.766566] The buggy address belongs to the physical page:
[   19.766857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.766920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.766983] page_type: f5(slab)
[   19.767044] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.767316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.767514] page dumped because: kasan: bad access detected
[   19.767555] 
[   19.767575] Memory state around the buggy address:
[   19.768015]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.768338]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.768820] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.769130]                                      ^
[   19.769294]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.769360]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.769601] ==================================================================
[   19.935879] ==================================================================
[   19.935946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   19.936011] Read of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.936065] 
[   19.936097] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.936192] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.936220] Hardware name: linux,dummy-virt (DT)
[   19.936265] Call trace:
[   19.936297]  show_stack+0x20/0x38 (C)
[   19.936352]  dump_stack_lvl+0x8c/0xd0
[   19.936407]  print_report+0x118/0x608
[   19.936457]  kasan_report+0xdc/0x128
[   19.936505]  __asan_report_load8_noabort+0x20/0x30
[   19.936557]  kasan_atomics_helper+0x3e10/0x4858
[   19.936614]  kasan_atomics+0x198/0x2e0
[   19.936662]  kunit_try_run_case+0x170/0x3f0
[   19.936712]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.936768]  kthread+0x328/0x630
[   19.936813]  ret_from_fork+0x10/0x20
[   19.936870] 
[   19.936892] Allocated by task 274:
[   19.936941]  kasan_save_stack+0x3c/0x68
[   19.936985]  kasan_save_track+0x20/0x40
[   19.937026]  kasan_save_alloc_info+0x40/0x58
[   19.937066]  __kasan_kmalloc+0xd4/0xd8
[   19.937454]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.937524]  kasan_atomics+0xb8/0x2e0
[   19.938399]  kunit_try_run_case+0x170/0x3f0
[   19.938483]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.938554]  kthread+0x328/0x630
[   19.938609]  ret_from_fork+0x10/0x20
[   19.938670] 
[   19.938715] The buggy address belongs to the object at fff00000c5210800
[   19.938715]  which belongs to the cache kmalloc-64 of size 64
[   19.938791] The buggy address is located 0 bytes to the right of
[   19.938791]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.939598] 
[   19.939648] The buggy address belongs to the physical page:
[   19.939761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.939823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.940021] page_type: f5(slab)
[   19.940228] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.940303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.940477] page dumped because: kasan: bad access detected
[   19.940702] 
[   19.940777] Memory state around the buggy address:
[   19.940862]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.940987]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.941052] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.941375]                                      ^
[   19.941545]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.941622]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.941735] ==================================================================
[   19.942765] ==================================================================
[   19.942923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   19.943007] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.943114] 
[   19.943147] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.943237] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.943404] Hardware name: linux,dummy-virt (DT)
[   19.943593] Call trace:
[   19.943815]  show_stack+0x20/0x38 (C)
[   19.944015]  dump_stack_lvl+0x8c/0xd0
[   19.944077]  print_report+0x118/0x608
[   19.944252]  kasan_report+0xdc/0x128
[   19.944350]  kasan_check_range+0x100/0x1a8
[   19.944404]  __kasan_check_write+0x20/0x30
[   19.944453]  kasan_atomics_helper+0x175c/0x4858
[   19.944883]  kasan_atomics+0x198/0x2e0
[   19.945339]  kunit_try_run_case+0x170/0x3f0
[   19.945434]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.945774]  kthread+0x328/0x630
[   19.945836]  ret_from_fork+0x10/0x20
[   19.946012] 
[   19.946058] Allocated by task 274:
[   19.946370]  kasan_save_stack+0x3c/0x68
[   19.946777]  kasan_save_track+0x20/0x40
[   19.946881]  kasan_save_alloc_info+0x40/0x58
[   19.946934]  __kasan_kmalloc+0xd4/0xd8
[   19.946975]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.947017]  kasan_atomics+0xb8/0x2e0
[   19.947056]  kunit_try_run_case+0x170/0x3f0
[   19.947420]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.947537]  kthread+0x328/0x630
[   19.947833]  ret_from_fork+0x10/0x20
[   19.947968] 
[   19.947995] The buggy address belongs to the object at fff00000c5210800
[   19.947995]  which belongs to the cache kmalloc-64 of size 64
[   19.948379] The buggy address is located 0 bytes to the right of
[   19.948379]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.948833] 
[   19.948862] The buggy address belongs to the physical page:
[   19.949128] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.949538] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.949678] page_type: f5(slab)
[   19.949774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.949837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.950024] page dumped because: kasan: bad access detected
[   19.950081] 
[   19.950529] Memory state around the buggy address:
[   19.950595]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.950712]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.950808] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.950969]                                      ^
[   19.951156]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.951404]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.951556] ==================================================================
[   19.751537] ==================================================================
[   19.751645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   19.751721] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.751775] 
[   19.751875] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.751979] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.752023] Hardware name: linux,dummy-virt (DT)
[   19.752058] Call trace:
[   19.752384]  show_stack+0x20/0x38 (C)
[   19.752463]  dump_stack_lvl+0x8c/0xd0
[   19.752631]  print_report+0x118/0x608
[   19.752693]  kasan_report+0xdc/0x128
[   19.752856]  kasan_check_range+0x100/0x1a8
[   19.752918]  __kasan_check_write+0x20/0x30
[   19.753198]  kasan_atomics_helper+0xf20/0x4858
[   19.753416]  kasan_atomics+0x198/0x2e0
[   19.753660]  kunit_try_run_case+0x170/0x3f0
[   19.753796]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.754131]  kthread+0x328/0x630
[   19.754327]  ret_from_fork+0x10/0x20
[   19.754596] 
[   19.754694] Allocated by task 274:
[   19.754839]  kasan_save_stack+0x3c/0x68
[   19.754893]  kasan_save_track+0x20/0x40
[   19.755133]  kasan_save_alloc_info+0x40/0x58
[   19.755331]  __kasan_kmalloc+0xd4/0xd8
[   19.755582]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.755819]  kasan_atomics+0xb8/0x2e0
[   19.755916]  kunit_try_run_case+0x170/0x3f0
[   19.756087]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.756135]  kthread+0x328/0x630
[   19.756218]  ret_from_fork+0x10/0x20
[   19.756569] 
[   19.756729] The buggy address belongs to the object at fff00000c5210800
[   19.756729]  which belongs to the cache kmalloc-64 of size 64
[   19.757184] The buggy address is located 0 bytes to the right of
[   19.757184]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.757270] 
[   19.757464] The buggy address belongs to the physical page:
[   19.757523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.757592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.757650] page_type: f5(slab)
[   19.757715] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.757785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.757829] page dumped because: kasan: bad access detected
[   19.757872] 
[   19.757893] Memory state around the buggy address:
[   19.757944]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.757989]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.758042] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.758085]                                      ^
[   19.758143]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.758191]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.758232] ==================================================================
[   19.603589] ==================================================================
[   19.604174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   19.604375] Write of size 4 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.604499] 
[   19.604547] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.604801] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.604846] Hardware name: linux,dummy-virt (DT)
[   19.604892] Call trace:
[   19.604920]  show_stack+0x20/0x38 (C)
[   19.605172]  dump_stack_lvl+0x8c/0xd0
[   19.605240]  print_report+0x118/0x608
[   19.605293]  kasan_report+0xdc/0x128
[   19.605668]  kasan_check_range+0x100/0x1a8
[   19.605753]  __kasan_check_write+0x20/0x30
[   19.605954]  kasan_atomics_helper+0xa6c/0x4858
[   19.606008]  kasan_atomics+0x198/0x2e0
[   19.606132]  kunit_try_run_case+0x170/0x3f0
[   19.606567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.606668]  kthread+0x328/0x630
[   19.606989]  ret_from_fork+0x10/0x20
[   19.607186] 
[   19.607259] Allocated by task 274:
[   19.607469]  kasan_save_stack+0x3c/0x68
[   19.607697]  kasan_save_track+0x20/0x40
[   19.607814]  kasan_save_alloc_info+0x40/0x58
[   19.607984]  __kasan_kmalloc+0xd4/0xd8
[   19.608032]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.608201]  kasan_atomics+0xb8/0x2e0
[   19.608481]  kunit_try_run_case+0x170/0x3f0
[   19.608580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.608866]  kthread+0x328/0x630
[   19.609039]  ret_from_fork+0x10/0x20
[   19.609234] 
[   19.609334] The buggy address belongs to the object at fff00000c5210800
[   19.609334]  which belongs to the cache kmalloc-64 of size 64
[   19.609638] The buggy address is located 0 bytes to the right of
[   19.609638]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.609753] 
[   19.609780] The buggy address belongs to the physical page:
[   19.610191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.610405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.610492] page_type: f5(slab)
[   19.610868] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.611020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.611097] page dumped because: kasan: bad access detected
[   19.611235] 
[   19.611306] Memory state around the buggy address:
[   19.611378]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.611438]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.611544] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.611611]                                      ^
[   19.611912]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.612066]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.612209] ==================================================================
[   19.786961] ==================================================================
[   19.787049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   19.787113] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.787277] 
[   19.787344] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.787500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.787608] Hardware name: linux,dummy-virt (DT)
[   19.787644] Call trace:
[   19.787827]  show_stack+0x20/0x38 (C)
[   19.787892]  dump_stack_lvl+0x8c/0xd0
[   19.788243]  print_report+0x118/0x608
[   19.788465]  kasan_report+0xdc/0x128
[   19.789057]  kasan_check_range+0x100/0x1a8
[   19.789159]  __kasan_check_write+0x20/0x30
[   19.789306]  kasan_atomics_helper+0x10c0/0x4858
[   19.789404]  kasan_atomics+0x198/0x2e0
[   19.789456]  kunit_try_run_case+0x170/0x3f0
[   19.789599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.789690]  kthread+0x328/0x630
[   19.789752]  ret_from_fork+0x10/0x20
[   19.789813] 
[   19.789837] Allocated by task 274:
[   19.789866]  kasan_save_stack+0x3c/0x68
[   19.790369]  kasan_save_track+0x20/0x40
[   19.790641]  kasan_save_alloc_info+0x40/0x58
[   19.790780]  __kasan_kmalloc+0xd4/0xd8
[   19.790877]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.790956]  kasan_atomics+0xb8/0x2e0
[   19.791159]  kunit_try_run_case+0x170/0x3f0
[   19.791436]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.791708]  kthread+0x328/0x630
[   19.791892]  ret_from_fork+0x10/0x20
[   19.792110] 
[   19.792192] The buggy address belongs to the object at fff00000c5210800
[   19.792192]  which belongs to the cache kmalloc-64 of size 64
[   19.792594] The buggy address is located 0 bytes to the right of
[   19.792594]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.792975] 
[   19.793125] The buggy address belongs to the physical page:
[   19.793346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.793600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.793657] page_type: f5(slab)
[   19.793882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.794153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.794416] page dumped because: kasan: bad access detected
[   19.794491] 
[   19.794546] Memory state around the buggy address:
[   19.794612]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.794815]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.794991] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.795094]                                      ^
[   19.795260]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.795359]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.795449] ==================================================================
[   19.612881] ==================================================================
[   19.613355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   19.613430] Write of size 4 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.613485] 
[   19.613956] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.614204] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.614264] Hardware name: linux,dummy-virt (DT)
[   19.614415] Call trace:
[   19.614465]  show_stack+0x20/0x38 (C)
[   19.614705]  dump_stack_lvl+0x8c/0xd0
[   19.614772]  print_report+0x118/0x608
[   19.615064]  kasan_report+0xdc/0x128
[   19.615128]  kasan_check_range+0x100/0x1a8
[   19.615181]  __kasan_check_write+0x20/0x30
[   19.615228]  kasan_atomics_helper+0xad4/0x4858
[   19.615281]  kasan_atomics+0x198/0x2e0
[   19.615330]  kunit_try_run_case+0x170/0x3f0
[   19.615481]  ret_from_fork+0x10/0x20
[   19.615821]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.615955]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.616370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.616447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.616500] page_type: f5(slab)
[   19.616542] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.616596] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.616641] page dumped because: kasan: bad access detected
[   19.616676] 
[   19.616706] Memory state around the buggy address:
[   19.616750]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.616805]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.616859] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.616899]                                      ^
[   19.616998]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.617176]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.617223] ==================================================================
[   19.927291] ==================================================================
[   19.927350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   19.927578] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.927673] 
[   19.927706] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.928050] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.928176] Hardware name: linux,dummy-virt (DT)
[   19.928278] Call trace:
[   19.928304]  show_stack+0x20/0x38 (C)
[   19.928380]  dump_stack_lvl+0x8c/0xd0
[   19.928514]  print_report+0x118/0x608
[   19.928571]  kasan_report+0xdc/0x128
[   19.928784]  kasan_check_range+0x100/0x1a8
[   19.928980]  __kasan_check_write+0x20/0x30
[   19.929226]  kasan_atomics_helper+0x16d0/0x4858
[   19.929307]  kasan_atomics+0x198/0x2e0
[   19.929654]  kunit_try_run_case+0x170/0x3f0
[   19.929998]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.930075]  kthread+0x328/0x630
[   19.930134]  ret_from_fork+0x10/0x20
[   19.930498] 
[   19.930586] Allocated by task 274:
[   19.930667]  kasan_save_stack+0x3c/0x68
[   19.930962]  kasan_save_track+0x20/0x40
[   19.931072]  kasan_save_alloc_info+0x40/0x58
[   19.931118]  __kasan_kmalloc+0xd4/0xd8
[   19.931618]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.931819]  kasan_atomics+0xb8/0x2e0
[   19.931961]  kunit_try_run_case+0x170/0x3f0
[   19.932222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.932413]  kthread+0x328/0x630
[   19.932498]  ret_from_fork+0x10/0x20
[   19.932693] 
[   19.932843] The buggy address belongs to the object at fff00000c5210800
[   19.932843]  which belongs to the cache kmalloc-64 of size 64
[   19.933183] The buggy address is located 0 bytes to the right of
[   19.933183]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.933314] 
[   19.933365] The buggy address belongs to the physical page:
[   19.933723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.934095] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.934406] page_type: f5(slab)
[   19.934457] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.934512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.934554] page dumped because: kasan: bad access detected
[   19.934842] 
[   19.934910] Memory state around the buggy address:
[   19.935082]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.935132]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.935200] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.935241]                                      ^
[   19.935278]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.935345]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.935387] ==================================================================
[   19.902668] ==================================================================
[   19.902723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   19.902779] Read of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.902877] 
[   19.902912] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.903015] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.903044] Hardware name: linux,dummy-virt (DT)
[   19.903078] Call trace:
[   19.903346]  show_stack+0x20/0x38 (C)
[   19.903420]  dump_stack_lvl+0x8c/0xd0
[   19.903637]  print_report+0x118/0x608
[   19.903846]  kasan_report+0xdc/0x128
[   19.903911]  __asan_report_load8_noabort+0x20/0x30
[   19.904025]  kasan_atomics_helper+0x3db0/0x4858
[   19.904101]  kasan_atomics+0x198/0x2e0
[   19.904167]  kunit_try_run_case+0x170/0x3f0
[   19.904288]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.904363]  kthread+0x328/0x630
[   19.904578]  ret_from_fork+0x10/0x20
[   19.904851] 
[   19.904887] Allocated by task 274:
[   19.904957]  kasan_save_stack+0x3c/0x68
[   19.905145]  kasan_save_track+0x20/0x40
[   19.905191]  kasan_save_alloc_info+0x40/0x58
[   19.905231]  __kasan_kmalloc+0xd4/0xd8
[   19.905271]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.905313]  kasan_atomics+0xb8/0x2e0
[   19.905847]  kunit_try_run_case+0x170/0x3f0
[   19.906020]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.906151]  kthread+0x328/0x630
[   19.906192]  ret_from_fork+0x10/0x20
[   19.906532] 
[   19.906633] The buggy address belongs to the object at fff00000c5210800
[   19.906633]  which belongs to the cache kmalloc-64 of size 64
[   19.906702] The buggy address is located 0 bytes to the right of
[   19.906702]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.906796] 
[   19.906953] The buggy address belongs to the physical page:
[   19.906998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.907058] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.907108] page_type: f5(slab)
[   19.907196] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.907264] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.907324] page dumped because: kasan: bad access detected
[   19.907360] 
[   19.907398] Memory state around the buggy address:
[   19.907432]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.907495]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.907551] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.907600]                                      ^
[   19.907636]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.907691]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.907742] ==================================================================
[   19.951977] ==================================================================
[   19.952025] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   19.952490] Read of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.952562] 
[   19.952625] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.952922] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.952990] Hardware name: linux,dummy-virt (DT)
[   19.953025] Call trace:
[   19.953130]  show_stack+0x20/0x38 (C)
[   19.953192]  dump_stack_lvl+0x8c/0xd0
[   19.953252]  print_report+0x118/0x608
[   19.953309]  kasan_report+0xdc/0x128
[   19.953778]  __asan_report_load8_noabort+0x20/0x30
[   19.953976]  kasan_atomics_helper+0x3e20/0x4858
[   19.954051]  kasan_atomics+0x198/0x2e0
[   19.954171]  kunit_try_run_case+0x170/0x3f0
[   19.954239]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.954387]  kthread+0x328/0x630
[   19.954483]  ret_from_fork+0x10/0x20
[   19.954666] 
[   19.954692] Allocated by task 274:
[   19.954876]  kasan_save_stack+0x3c/0x68
[   19.955067]  kasan_save_track+0x20/0x40
[   19.955143]  kasan_save_alloc_info+0x40/0x58
[   19.955346]  __kasan_kmalloc+0xd4/0xd8
[   19.955548]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.955603]  kasan_atomics+0xb8/0x2e0
[   19.956002]  kunit_try_run_case+0x170/0x3f0
[   19.956197]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.956472]  kthread+0x328/0x630
[   19.956511]  ret_from_fork+0x10/0x20
[   19.956738] 
[   19.956895] The buggy address belongs to the object at fff00000c5210800
[   19.956895]  which belongs to the cache kmalloc-64 of size 64
[   19.957080] The buggy address is located 0 bytes to the right of
[   19.957080]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.957185] 
[   19.957229] The buggy address belongs to the physical page:
[   19.957263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.957442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.957520] page_type: f5(slab)
[   19.957579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.957643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.957704] page dumped because: kasan: bad access detected
[   19.957737] 
[   19.957757] Memory state around the buggy address:
[   19.957809]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.957856]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.957916] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.957969]                                      ^
[   19.958012]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.958695]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.958766] ==================================================================
[   19.809058] ==================================================================
[   19.809141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   19.809205] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.809258] 
[   19.809461] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.809561] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.809822] Hardware name: linux,dummy-virt (DT)
[   19.810091] Call trace:
[   19.810135]  show_stack+0x20/0x38 (C)
[   19.810198]  dump_stack_lvl+0x8c/0xd0
[   19.810403]  print_report+0x118/0x608
[   19.810495]  kasan_report+0xdc/0x128
[   19.810699]  kasan_check_range+0x100/0x1a8
[   19.810760]  __kasan_check_write+0x20/0x30
[   19.811019]  kasan_atomics_helper+0x1190/0x4858
[   19.811138]  kasan_atomics+0x198/0x2e0
[   19.811383]  kunit_try_run_case+0x170/0x3f0
[   19.811663]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.811770]  kthread+0x328/0x630
[   19.812030]  ret_from_fork+0x10/0x20
[   19.812137] 
[   19.812289] Allocated by task 274:
[   19.812367]  kasan_save_stack+0x3c/0x68
[   19.812816]  kasan_save_track+0x20/0x40
[   19.812893]  kasan_save_alloc_info+0x40/0x58
[   19.813107]  __kasan_kmalloc+0xd4/0xd8
[   19.813352]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.813405]  kasan_atomics+0xb8/0x2e0
[   19.813647]  kunit_try_run_case+0x170/0x3f0
[   19.813791]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.814235]  kthread+0x328/0x630
[   19.814384]  ret_from_fork+0x10/0x20
[   19.814462] 
[   19.814485] The buggy address belongs to the object at fff00000c5210800
[   19.814485]  which belongs to the cache kmalloc-64 of size 64
[   19.814745] The buggy address is located 0 bytes to the right of
[   19.814745]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.815020] 
[   19.815427] The buggy address belongs to the physical page:
[   19.815496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.815909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.816204] page_type: f5(slab)
[   19.816641] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.816736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.816819] page dumped because: kasan: bad access detected
[   19.817066] 
[   19.817194] Memory state around the buggy address:
[   19.817498]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.817565]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.817633] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.817683]                                      ^
[   19.817719]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.817770]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.817817] ==================================================================
[   19.959770] ==================================================================
[   19.959824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   19.959877] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.959941] 
[   19.960316] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.960455] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.960870] Hardware name: linux,dummy-virt (DT)
[   19.960964] Call trace:
[   19.961010]  show_stack+0x20/0x38 (C)
[   19.961426]  dump_stack_lvl+0x8c/0xd0
[   19.961506]  print_report+0x118/0x608
[   19.961653]  kasan_report+0xdc/0x128
[   19.961709]  kasan_check_range+0x100/0x1a8
[   19.961812]  __kasan_check_write+0x20/0x30
[   19.961862]  kasan_atomics_helper+0x17ec/0x4858
[   19.961947]  kasan_atomics+0x198/0x2e0
[   19.962145]  kunit_try_run_case+0x170/0x3f0
[   19.962517]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.962670]  kthread+0x328/0x630
[   19.962960]  ret_from_fork+0x10/0x20
[   19.963325] 
[   19.963469] Allocated by task 274:
[   19.963535]  kasan_save_stack+0x3c/0x68
[   19.963611]  kasan_save_track+0x20/0x40
[   19.963653]  kasan_save_alloc_info+0x40/0x58
[   19.963856]  __kasan_kmalloc+0xd4/0xd8
[   19.964433]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.964565]  kasan_atomics+0xb8/0x2e0
[   19.964608]  kunit_try_run_case+0x170/0x3f0
[   19.964684]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.964934]  kthread+0x328/0x630
[   19.965206]  ret_from_fork+0x10/0x20
[   19.965365] 
[   19.965415] The buggy address belongs to the object at fff00000c5210800
[   19.965415]  which belongs to the cache kmalloc-64 of size 64
[   19.965479] The buggy address is located 0 bytes to the right of
[   19.965479]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.965802] 
[   19.966084] The buggy address belongs to the physical page:
[   19.966191] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.966333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.966390] page_type: f5(slab)
[   19.966435] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.966488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.966532] page dumped because: kasan: bad access detected
[   19.966566] 
[   19.966586] Memory state around the buggy address:
[   19.966621]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.966667]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.966872] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.967398]                                      ^
[   19.967486]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.967624]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.967667] ==================================================================
[   19.715048] ==================================================================
[   19.715114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   19.715175] Read of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.715968] 
[   19.716036] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.716134] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.716163] Hardware name: linux,dummy-virt (DT)
[   19.716437] Call trace:
[   19.716604]  show_stack+0x20/0x38 (C)
[   19.716676]  dump_stack_lvl+0x8c/0xd0
[   19.716728]  print_report+0x118/0x608
[   19.717141]  kasan_report+0xdc/0x128
[   19.717219]  __asan_report_load8_noabort+0x20/0x30
[   19.717273]  kasan_atomics_helper+0x3f58/0x4858
[   19.717325]  kasan_atomics+0x198/0x2e0
[   19.717374]  kunit_try_run_case+0x170/0x3f0
[   19.717662]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.717742]  kthread+0x328/0x630
[   19.717787]  ret_from_fork+0x10/0x20
[   19.718154] 
[   19.718253] Allocated by task 274:
[   19.718336]  kasan_save_stack+0x3c/0x68
[   19.718415]  kasan_save_track+0x20/0x40
[   19.718495]  kasan_save_alloc_info+0x40/0x58
[   19.718540]  __kasan_kmalloc+0xd4/0xd8
[   19.718856]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.718964]  kasan_atomics+0xb8/0x2e0
[   19.719038]  kunit_try_run_case+0x170/0x3f0
[   19.719378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.719522]  kthread+0x328/0x630
[   19.719561]  ret_from_fork+0x10/0x20
[   19.719637] 
[   19.719984] The buggy address belongs to the object at fff00000c5210800
[   19.719984]  which belongs to the cache kmalloc-64 of size 64
[   19.720418] The buggy address is located 0 bytes to the right of
[   19.720418]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.720500] 
[   19.720796] The buggy address belongs to the physical page:
[   19.720985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.721216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.721333] page_type: f5(slab)
[   19.721427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.721528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.721767] page dumped because: kasan: bad access detected
[   19.721940] 
[   19.722007] Memory state around the buggy address:
[   19.722103]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.722207]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.722255] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.722327]                                      ^
[   19.722364]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.722409]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.722778] ==================================================================
[   19.838828] ==================================================================
[   19.838882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   19.838948] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.839000] 
[   19.839426] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.839905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.840092] Hardware name: linux,dummy-virt (DT)
[   19.840160] Call trace:
[   19.840209]  show_stack+0x20/0x38 (C)
[   19.840293]  dump_stack_lvl+0x8c/0xd0
[   19.840355]  print_report+0x118/0x608
[   19.840405]  kasan_report+0xdc/0x128
[   19.840645]  kasan_check_range+0x100/0x1a8
[   19.840847]  __kasan_check_write+0x20/0x30
[   19.841010]  kasan_atomics_helper+0x12d8/0x4858
[   19.841317]  kasan_atomics+0x198/0x2e0
[   19.841472]  kunit_try_run_case+0x170/0x3f0
[   19.841816]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.841895]  kthread+0x328/0x630
[   19.841951]  ret_from_fork+0x10/0x20
[   19.842213] 
[   19.842402] Allocated by task 274:
[   19.842457]  kasan_save_stack+0x3c/0x68
[   19.842672]  kasan_save_track+0x20/0x40
[   19.842807]  kasan_save_alloc_info+0x40/0x58
[   19.843107]  __kasan_kmalloc+0xd4/0xd8
[   19.843731]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.843865]  kasan_atomics+0xb8/0x2e0
[   19.843908]  kunit_try_run_case+0x170/0x3f0
[   19.844286]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.844495]  kthread+0x328/0x630
[   19.844693]  ret_from_fork+0x10/0x20
[   19.844778] 
[   19.845198] The buggy address belongs to the object at fff00000c5210800
[   19.845198]  which belongs to the cache kmalloc-64 of size 64
[   19.845428] The buggy address is located 0 bytes to the right of
[   19.845428]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.845641] 
[   19.845698] The buggy address belongs to the physical page:
[   19.845751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.846146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.846436] page_type: f5(slab)
[   19.846540] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.846640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.847088] page dumped because: kasan: bad access detected
[   19.847150] 
[   19.847205] Memory state around the buggy address:
[   19.847623]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.847800]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.847909] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.848076]                                      ^
[   19.848145]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.848217]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.848263] ==================================================================
[   19.596528] ==================================================================
[   19.596637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   19.596751] Write of size 4 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.596816] 
[   19.596881] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.596998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.597026] Hardware name: linux,dummy-virt (DT)
[   19.597063] Call trace:
[   19.597088]  show_stack+0x20/0x38 (C)
[   19.597143]  dump_stack_lvl+0x8c/0xd0
[   19.597191]  print_report+0x118/0x608
[   19.597239]  kasan_report+0xdc/0x128
[   19.597286]  kasan_check_range+0x100/0x1a8
[   19.597335]  __kasan_check_write+0x20/0x30
[   19.597381]  kasan_atomics_helper+0xa04/0x4858
[   19.597443]  kasan_atomics+0x198/0x2e0
[   19.597491]  kunit_try_run_case+0x170/0x3f0
[   19.597541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.597611]  kthread+0x328/0x630
[   19.597664]  ret_from_fork+0x10/0x20
[   19.597715] 
[   19.597752] Allocated by task 274:
[   19.597782]  kasan_save_stack+0x3c/0x68
[   19.597825]  kasan_save_track+0x20/0x40
[   19.597867]  kasan_save_alloc_info+0x40/0x58
[   19.597910]  __kasan_kmalloc+0xd4/0xd8
[   19.597960]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.598003]  kasan_atomics+0xb8/0x2e0
[   19.598327]  kunit_try_run_case+0x170/0x3f0
[   19.599488] The buggy address belongs to the object at fff00000c5210800
[   19.599488]  which belongs to the cache kmalloc-64 of size 64
[   19.599711] 
[   19.599736] The buggy address belongs to the physical page:
[   19.600072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.600309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.600570] page_type: f5(slab)
[   19.600794] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.601204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.601310] page dumped because: kasan: bad access detected
[   19.601472] 
[   19.601706] Memory state around the buggy address:
[   19.601804]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.602086]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.602269] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.602386]                                      ^
[   19.602439]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.602485]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.602535] ==================================================================
[   19.829597] ==================================================================
[   19.829660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   19.829714] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.829915] 
[   19.829963] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.830414] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.830452] Hardware name: linux,dummy-virt (DT)
[   19.830486] Call trace:
[   19.830528]  show_stack+0x20/0x38 (C)
[   19.830593]  dump_stack_lvl+0x8c/0xd0
[   19.830922]  print_report+0x118/0x608
[   19.831334]  kasan_report+0xdc/0x128
[   19.831686]  kasan_check_range+0x100/0x1a8
[   19.831942]  __kasan_check_write+0x20/0x30
[   19.832240]  kasan_atomics_helper+0x126c/0x4858
[   19.832337]  kasan_atomics+0x198/0x2e0
[   19.832426]  kunit_try_run_case+0x170/0x3f0
[   19.832598]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.832718]  kthread+0x328/0x630
[   19.832898]  ret_from_fork+0x10/0x20
[   19.833035] 
[   19.833065] Allocated by task 274:
[   19.833097]  kasan_save_stack+0x3c/0x68
[   19.833344]  kasan_save_track+0x20/0x40
[   19.833686]  kasan_save_alloc_info+0x40/0x58
[   19.834119]  __kasan_kmalloc+0xd4/0xd8
[   19.834394]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.834480]  kasan_atomics+0xb8/0x2e0
[   19.834729]  kunit_try_run_case+0x170/0x3f0
[   19.834895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.835221]  kthread+0x328/0x630
[   19.835482]  ret_from_fork+0x10/0x20
[   19.835676] 
[   19.835734] The buggy address belongs to the object at fff00000c5210800
[   19.835734]  which belongs to the cache kmalloc-64 of size 64
[   19.836077] The buggy address is located 0 bytes to the right of
[   19.836077]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.836340] 
[   19.836435] The buggy address belongs to the physical page:
[   19.836472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.836630] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.836708] page_type: f5(slab)
[   19.836768] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.836823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.836878] page dumped because: kasan: bad access detected
[   19.836913] 
[   19.836944] Memory state around the buggy address:
[   19.836977]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.837025]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.837084] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.837125]                                      ^
[   19.837170]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.837222]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.837264] ==================================================================
[   19.886470] ==================================================================
[   19.886522] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   19.886960] Write of size 8 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.887053] 
[   19.887086] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.887318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.887481] Hardware name: linux,dummy-virt (DT)
[   19.887525] Call trace:
[   19.887836]  show_stack+0x20/0x38 (C)
[   19.887947]  dump_stack_lvl+0x8c/0xd0
[   19.888001]  print_report+0x118/0x608
[   19.888112]  kasan_report+0xdc/0x128
[   19.888200]  kasan_check_range+0x100/0x1a8
[   19.888318]  __kasan_check_write+0x20/0x30
[   19.888376]  kasan_atomics_helper+0x154c/0x4858
[   19.888428]  kasan_atomics+0x198/0x2e0
[   19.888492]  kunit_try_run_case+0x170/0x3f0
[   19.888546]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.888740]  kthread+0x328/0x630
[   19.888969]  ret_from_fork+0x10/0x20
[   19.889512] 
[   19.889577] Allocated by task 274:
[   19.889612]  kasan_save_stack+0x3c/0x68
[   19.889686]  kasan_save_track+0x20/0x40
[   19.889730]  kasan_save_alloc_info+0x40/0x58
[   19.889970]  __kasan_kmalloc+0xd4/0xd8
[   19.890032]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.890897]  kasan_atomics+0xb8/0x2e0
[   19.891044]  kunit_try_run_case+0x170/0x3f0
[   19.891104]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.891160]  kthread+0x328/0x630
[   19.891311]  ret_from_fork+0x10/0x20
[   19.891561] 
[   19.891600] The buggy address belongs to the object at fff00000c5210800
[   19.891600]  which belongs to the cache kmalloc-64 of size 64
[   19.891946] The buggy address is located 0 bytes to the right of
[   19.891946]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.892074] 
[   19.892123] The buggy address belongs to the physical page:
[   19.892158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.892430] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.892562] page_type: f5(slab)
[   19.892734] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.893146] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.893394] page dumped because: kasan: bad access detected
[   19.893658] 
[   19.893823] Memory state around the buggy address:
[   19.894149]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.894234]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.894374] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.894452]                                      ^
[   19.894603]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.894670]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.894845] ==================================================================
[   19.674348] ==================================================================
[   19.674547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   19.674611] Read of size 4 at addr fff00000c5210830 by task kunit_try_catch/274
[   19.674665] 
[   19.674699] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT 
[   19.675151] Tainted: [B]=BAD_PAGE, [N]=TEST
[   19.675203] Hardware name: linux,dummy-virt (DT)
[   19.675990] Call trace:
[   19.676070]  show_stack+0x20/0x38 (C)
[   19.676412]  dump_stack_lvl+0x8c/0xd0
[   19.676487]  print_report+0x118/0x608
[   19.676538]  kasan_report+0xdc/0x128
[   19.676879]  __asan_report_load4_noabort+0x20/0x30
[   19.677225]  kasan_atomics_helper+0x3dd8/0x4858
[   19.677303]  kasan_atomics+0x198/0x2e0
[   19.677479]  kunit_try_run_case+0x170/0x3f0
[   19.677813]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.678041]  kthread+0x328/0x630
[   19.678098]  ret_from_fork+0x10/0x20
[   19.678150] 
[   19.678180] Allocated by task 274:
[   19.678273]  kasan_save_stack+0x3c/0x68
[   19.678349]  kasan_save_track+0x20/0x40
[   19.678391]  kasan_save_alloc_info+0x40/0x58
[   19.678545]  __kasan_kmalloc+0xd4/0xd8
[   19.678727]  __kmalloc_cache_noprof+0x16c/0x3c0
[   19.678816]  kasan_atomics+0xb8/0x2e0
[   19.679014]  kunit_try_run_case+0x170/0x3f0
[   19.679261]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   19.679316]  kthread+0x328/0x630
[   19.679375]  ret_from_fork+0x10/0x20
[   19.679422] 
[   19.679594] The buggy address belongs to the object at fff00000c5210800
[   19.679594]  which belongs to the cache kmalloc-64 of size 64
[   19.680011] The buggy address is located 0 bytes to the right of
[   19.680011]  allocated 48-byte region [fff00000c5210800, fff00000c5210830)
[   19.680488] 
[   19.680690] The buggy address belongs to the physical page:
[   19.680741] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105210
[   19.681052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   19.681277] page_type: f5(slab)
[   19.681524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   19.681648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   19.681716] page dumped because: kasan: bad access detected
[   19.681791] 
[   19.681853] Memory state around the buggy address:
[   19.682078]  fff00000c5210700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.682318]  fff00000c5210780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   19.682391] >fff00000c5210800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   19.682581]                                      ^
[   19.682803]  fff00000c5210880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.682896]  fff00000c5210900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   19.683055] ==================================================================

[   23.773914] ==================================================================
[   23.774793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   23.775510] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.776154] 
[   23.776476] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.776602] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.776643] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.776705] Call Trace:
[   23.776757]  <TASK>
[   23.776798]  dump_stack_lvl+0x73/0xb0
[   23.776898]  print_report+0xd1/0x650
[   23.776977]  ? __virt_addr_valid+0x1db/0x2d0
[   23.777052]  ? kasan_atomics_helper+0x19e3/0x5450
[   23.777150]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.777295]  ? kasan_atomics_helper+0x19e3/0x5450
[   23.777372]  kasan_report+0x141/0x180
[   23.777499]  ? kasan_atomics_helper+0x19e3/0x5450
[   23.777589]  kasan_check_range+0x10c/0x1c0
[   23.777675]  __kasan_check_write+0x18/0x20
[   23.777748]  kasan_atomics_helper+0x19e3/0x5450
[   23.777873]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.777953]  ? kasan_save_alloc_info+0x3b/0x50
[   23.778047]  kasan_atomics+0x1dc/0x310
[   23.778150]  ? __pfx_kasan_atomics+0x10/0x10
[   23.778303]  ? __pfx_read_tsc+0x10/0x10
[   23.778378]  ? ktime_get_ts64+0x86/0x230
[   23.778486]  kunit_try_run_case+0x1a5/0x480
[   23.778595]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.778672]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.778766]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.778894]  ? __kthread_parkme+0x82/0x180
[   23.778965]  ? preempt_count_sub+0x50/0x80
[   23.779006]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.779044]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.779081]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.779155]  kthread+0x337/0x6f0
[   23.779243]  ? trace_preempt_on+0x20/0xc0
[   23.779397]  ? __pfx_kthread+0x10/0x10
[   23.779477]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.779565]  ? calculate_sigpending+0x7b/0xa0
[   23.779694]  ? __pfx_kthread+0x10/0x10
[   23.779775]  ret_from_fork+0x116/0x1d0
[   23.779858]  ? __pfx_kthread+0x10/0x10
[   23.779898]  ret_from_fork_asm+0x1a/0x30
[   23.779945]  </TASK>
[   23.779962] 
[   23.793974] Allocated by task 292:
[   23.794270]  kasan_save_stack+0x45/0x70
[   23.794680]  kasan_save_track+0x18/0x40
[   23.795099]  kasan_save_alloc_info+0x3b/0x50
[   23.795597]  __kasan_kmalloc+0xb7/0xc0
[   23.795997]  __kmalloc_cache_noprof+0x189/0x420
[   23.796500]  kasan_atomics+0x95/0x310
[   23.796901]  kunit_try_run_case+0x1a5/0x480
[   23.797356]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.797712]  kthread+0x337/0x6f0
[   23.798066]  ret_from_fork+0x116/0x1d0
[   23.798498]  ret_from_fork_asm+0x1a/0x30
[   23.798913] 
[   23.799120] The buggy address belongs to the object at ffff88810383ae00
[   23.799120]  which belongs to the cache kmalloc-64 of size 64
[   23.800119] The buggy address is located 0 bytes to the right of
[   23.800119]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.800941] 
[   23.801150] The buggy address belongs to the physical page:
[   23.801650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.802272] flags: 0x200000000000000(node=0|zone=2)
[   23.802598] page_type: f5(slab)
[   23.802891] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.803574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.804205] page dumped because: kasan: bad access detected
[   23.804739] 
[   23.804918] Memory state around the buggy address:
[   23.805266]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.805866]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.806484] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.807067]                                      ^
[   23.807487]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.808087]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.808653] ==================================================================
[   21.875033] ==================================================================
[   21.876014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   21.877083] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   21.878479] 
[   21.878878] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.879007] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.879096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.879177] Call Trace:
[   21.879225]  <TASK>
[   21.879270]  dump_stack_lvl+0x73/0xb0
[   21.879366]  print_report+0xd1/0x650
[   21.879447]  ? __virt_addr_valid+0x1db/0x2d0
[   21.879521]  ? kasan_atomics_helper+0x4b6e/0x5450
[   21.879566]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.879600]  ? kasan_atomics_helper+0x4b6e/0x5450
[   21.879633]  kasan_report+0x141/0x180
[   21.879666]  ? kasan_atomics_helper+0x4b6e/0x5450
[   21.879700]  __asan_report_store4_noabort+0x1b/0x30
[   21.879738]  kasan_atomics_helper+0x4b6e/0x5450
[   21.879770]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.879800]  ? kasan_save_alloc_info+0x3b/0x50
[   21.879866]  kasan_atomics+0x1dc/0x310
[   21.879905]  ? __pfx_kasan_atomics+0x10/0x10
[   21.879943]  ? __pfx_read_tsc+0x10/0x10
[   21.879973]  ? ktime_get_ts64+0x86/0x230
[   21.880008]  kunit_try_run_case+0x1a5/0x480
[   21.880044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.880076]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.880106]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.880143]  ? __kthread_parkme+0x82/0x180
[   21.880171]  ? preempt_count_sub+0x50/0x80
[   21.880204]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.880284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.880358]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.880396]  kthread+0x337/0x6f0
[   21.880423]  ? trace_preempt_on+0x20/0xc0
[   21.880459]  ? __pfx_kthread+0x10/0x10
[   21.880489]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.880522]  ? calculate_sigpending+0x7b/0xa0
[   21.880558]  ? __pfx_kthread+0x10/0x10
[   21.880588]  ret_from_fork+0x116/0x1d0
[   21.880615]  ? __pfx_kthread+0x10/0x10
[   21.880643]  ret_from_fork_asm+0x1a/0x30
[   21.880686]  </TASK>
[   21.880700] 
[   21.900044] Allocated by task 292:
[   21.900578]  kasan_save_stack+0x45/0x70
[   21.900987]  kasan_save_track+0x18/0x40
[   21.901728]  kasan_save_alloc_info+0x3b/0x50
[   21.902064]  __kasan_kmalloc+0xb7/0xc0
[   21.902511]  __kmalloc_cache_noprof+0x189/0x420
[   21.903257]  kasan_atomics+0x95/0x310
[   21.903660]  kunit_try_run_case+0x1a5/0x480
[   21.904147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.904505]  kthread+0x337/0x6f0
[   21.905028]  ret_from_fork+0x116/0x1d0
[   21.905415]  ret_from_fork_asm+0x1a/0x30
[   21.906169] 
[   21.906486] The buggy address belongs to the object at ffff88810383ae00
[   21.906486]  which belongs to the cache kmalloc-64 of size 64
[   21.907217] The buggy address is located 0 bytes to the right of
[   21.907217]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   21.908799] 
[   21.909042] The buggy address belongs to the physical page:
[   21.909847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   21.910366] flags: 0x200000000000000(node=0|zone=2)
[   21.910977] page_type: f5(slab)
[   21.911503] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.912098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.912979] page dumped because: kasan: bad access detected
[   21.913344] 
[   21.913506] Memory state around the buggy address:
[   21.913912]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.914898]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.915637] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.916175]                                      ^
[   21.916937]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.917697]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.918170] ==================================================================
[   22.016417] ==================================================================
[   22.018022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   22.019847] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.021086] 
[   22.021315] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.021448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.021491] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.021554] Call Trace:
[   22.021604]  <TASK>
[   22.021641]  dump_stack_lvl+0x73/0xb0
[   22.021704]  print_report+0xd1/0x650
[   22.021776]  ? __virt_addr_valid+0x1db/0x2d0
[   22.021850]  ? kasan_atomics_helper+0x4a0/0x5450
[   22.021903]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.021956]  ? kasan_atomics_helper+0x4a0/0x5450
[   22.022006]  kasan_report+0x141/0x180
[   22.022067]  ? kasan_atomics_helper+0x4a0/0x5450
[   22.022133]  kasan_check_range+0x10c/0x1c0
[   22.022191]  __kasan_check_write+0x18/0x20
[   22.022709]  kasan_atomics_helper+0x4a0/0x5450
[   22.022796]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.022876]  ? kasan_save_alloc_info+0x3b/0x50
[   22.022947]  kasan_atomics+0x1dc/0x310
[   22.023009]  ? __pfx_kasan_atomics+0x10/0x10
[   22.023084]  ? __pfx_read_tsc+0x10/0x10
[   22.023155]  ? ktime_get_ts64+0x86/0x230
[   22.023344]  kunit_try_run_case+0x1a5/0x480
[   22.023415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.023469]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.023521]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.023594]  ? __kthread_parkme+0x82/0x180
[   22.023647]  ? preempt_count_sub+0x50/0x80
[   22.023685]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.023721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.023755]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.023790]  kthread+0x337/0x6f0
[   22.023823]  ? trace_preempt_on+0x20/0xc0
[   22.023890]  ? __pfx_kthread+0x10/0x10
[   22.023924]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.023959]  ? calculate_sigpending+0x7b/0xa0
[   22.023996]  ? __pfx_kthread+0x10/0x10
[   22.024027]  ret_from_fork+0x116/0x1d0
[   22.024056]  ? __pfx_kthread+0x10/0x10
[   22.024085]  ret_from_fork_asm+0x1a/0x30
[   22.024129]  </TASK>
[   22.024144] 
[   22.042012] Allocated by task 292:
[   22.042572]  kasan_save_stack+0x45/0x70
[   22.043036]  kasan_save_track+0x18/0x40
[   22.043610]  kasan_save_alloc_info+0x3b/0x50
[   22.044059]  __kasan_kmalloc+0xb7/0xc0
[   22.044485]  __kmalloc_cache_noprof+0x189/0x420
[   22.044960]  kasan_atomics+0x95/0x310
[   22.045659]  kunit_try_run_case+0x1a5/0x480
[   22.046126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.046764]  kthread+0x337/0x6f0
[   22.047179]  ret_from_fork+0x116/0x1d0
[   22.047524]  ret_from_fork_asm+0x1a/0x30
[   22.047848] 
[   22.048140] The buggy address belongs to the object at ffff88810383ae00
[   22.048140]  which belongs to the cache kmalloc-64 of size 64
[   22.049691] The buggy address is located 0 bytes to the right of
[   22.049691]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.050803] 
[   22.051191] The buggy address belongs to the physical page:
[   22.051778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.052671] flags: 0x200000000000000(node=0|zone=2)
[   22.053141] page_type: f5(slab)
[   22.053741] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.054483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.055565] page dumped because: kasan: bad access detected
[   22.056094] 
[   22.056304] Memory state around the buggy address:
[   22.056671]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.058146]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.058595] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.058847]                                      ^
[   22.059205]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.060470]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.061593] ==================================================================
[   22.619047] ==================================================================
[   22.619753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   22.620717] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.621712] 
[   22.622487] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.622939] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.622993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.623029] Call Trace:
[   22.623054]  <TASK>
[   22.623078]  dump_stack_lvl+0x73/0xb0
[   22.623120]  print_report+0xd1/0x650
[   22.623153]  ? __virt_addr_valid+0x1db/0x2d0
[   22.623186]  ? kasan_atomics_helper+0xc70/0x5450
[   22.623240]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.623322]  ? kasan_atomics_helper+0xc70/0x5450
[   22.623398]  kasan_report+0x141/0x180
[   22.623437]  ? kasan_atomics_helper+0xc70/0x5450
[   22.623475]  kasan_check_range+0x10c/0x1c0
[   22.623510]  __kasan_check_write+0x18/0x20
[   22.623550]  kasan_atomics_helper+0xc70/0x5450
[   22.623585]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.623617]  ? kasan_save_alloc_info+0x3b/0x50
[   22.623658]  kasan_atomics+0x1dc/0x310
[   22.623693]  ? __pfx_kasan_atomics+0x10/0x10
[   22.623728]  ? __pfx_read_tsc+0x10/0x10
[   22.623759]  ? ktime_get_ts64+0x86/0x230
[   22.623796]  kunit_try_run_case+0x1a5/0x480
[   22.623852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.623907]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.623941]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.623978]  ? __kthread_parkme+0x82/0x180
[   22.624008]  ? preempt_count_sub+0x50/0x80
[   22.624042]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.624077]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.624111]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.624146]  kthread+0x337/0x6f0
[   22.624173]  ? trace_preempt_on+0x20/0xc0
[   22.624207]  ? __pfx_kthread+0x10/0x10
[   22.624273]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.624348]  ? calculate_sigpending+0x7b/0xa0
[   22.624388]  ? __pfx_kthread+0x10/0x10
[   22.624421]  ret_from_fork+0x116/0x1d0
[   22.624448]  ? __pfx_kthread+0x10/0x10
[   22.624478]  ret_from_fork_asm+0x1a/0x30
[   22.624519]  </TASK>
[   22.624535] 
[   22.638646] Allocated by task 292:
[   22.638963]  kasan_save_stack+0x45/0x70
[   22.639746]  kasan_save_track+0x18/0x40
[   22.640171]  kasan_save_alloc_info+0x3b/0x50
[   22.640927]  __kasan_kmalloc+0xb7/0xc0
[   22.641348]  __kmalloc_cache_noprof+0x189/0x420
[   22.641789]  kasan_atomics+0x95/0x310
[   22.642186]  kunit_try_run_case+0x1a5/0x480
[   22.642666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.643075]  kthread+0x337/0x6f0
[   22.643346]  ret_from_fork+0x116/0x1d0
[   22.643639]  ret_from_fork_asm+0x1a/0x30
[   22.644114] 
[   22.644660] The buggy address belongs to the object at ffff88810383ae00
[   22.644660]  which belongs to the cache kmalloc-64 of size 64
[   22.646043] The buggy address is located 0 bytes to the right of
[   22.646043]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.647547] 
[   22.647712] The buggy address belongs to the physical page:
[   22.648127] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.649376] flags: 0x200000000000000(node=0|zone=2)
[   22.649727] page_type: f5(slab)
[   22.650075] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.651144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.651785] page dumped because: kasan: bad access detected
[   22.652546] 
[   22.652759] Memory state around the buggy address:
[   22.653105]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.653752]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.654560] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.654991]                                      ^
[   22.655309]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.655750]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.656399] ==================================================================
[   22.657472] ==================================================================
[   22.658157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   22.659160] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.660270] 
[   22.660514] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.660644] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.660690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.660753] Call Trace:
[   22.660793]  <TASK>
[   22.660852]  dump_stack_lvl+0x73/0xb0
[   22.660921]  print_report+0xd1/0x650
[   22.660996]  ? __virt_addr_valid+0x1db/0x2d0
[   22.661074]  ? kasan_atomics_helper+0x4a84/0x5450
[   22.661148]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.661225]  ? kasan_atomics_helper+0x4a84/0x5450
[   22.661302]  kasan_report+0x141/0x180
[   22.661377]  ? kasan_atomics_helper+0x4a84/0x5450
[   22.661462]  __asan_report_load4_noabort+0x18/0x20
[   22.661543]  kasan_atomics_helper+0x4a84/0x5450
[   22.661620]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.661692]  ? kasan_save_alloc_info+0x3b/0x50
[   22.661782]  kasan_atomics+0x1dc/0x310
[   22.661973]  ? __pfx_kasan_atomics+0x10/0x10
[   22.662057]  ? __pfx_read_tsc+0x10/0x10
[   22.662131]  ? ktime_get_ts64+0x86/0x230
[   22.662215]  kunit_try_run_case+0x1a5/0x480
[   22.662580]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.662657]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.662729]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.662814]  ? __kthread_parkme+0x82/0x180
[   22.662907]  ? preempt_count_sub+0x50/0x80
[   22.662992]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.663072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.663156]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.663231]  kthread+0x337/0x6f0
[   22.663433]  ? trace_preempt_on+0x20/0xc0
[   22.663512]  ? __pfx_kthread+0x10/0x10
[   22.663601]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.663683]  ? calculate_sigpending+0x7b/0xa0
[   22.663764]  ? __pfx_kthread+0x10/0x10
[   22.663852]  ret_from_fork+0x116/0x1d0
[   22.663924]  ? __pfx_kthread+0x10/0x10
[   22.663995]  ret_from_fork_asm+0x1a/0x30
[   22.664087]  </TASK>
[   22.664124] 
[   22.679156] Allocated by task 292:
[   22.679451]  kasan_save_stack+0x45/0x70
[   22.679773]  kasan_save_track+0x18/0x40
[   22.680079]  kasan_save_alloc_info+0x3b/0x50
[   22.680486]  __kasan_kmalloc+0xb7/0xc0
[   22.681200]  __kmalloc_cache_noprof+0x189/0x420
[   22.681772]  kasan_atomics+0x95/0x310
[   22.682197]  kunit_try_run_case+0x1a5/0x480
[   22.682705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.683158]  kthread+0x337/0x6f0
[   22.683579]  ret_from_fork+0x116/0x1d0
[   22.683970]  ret_from_fork_asm+0x1a/0x30
[   22.684727] 
[   22.684946] The buggy address belongs to the object at ffff88810383ae00
[   22.684946]  which belongs to the cache kmalloc-64 of size 64
[   22.685892] The buggy address is located 0 bytes to the right of
[   22.685892]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.686751] 
[   22.687040] The buggy address belongs to the physical page:
[   22.687787] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.688341] flags: 0x200000000000000(node=0|zone=2)
[   22.689103] page_type: f5(slab)
[   22.689552] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.690092] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.690524] page dumped because: kasan: bad access detected
[   22.690878] 
[   22.691073] Memory state around the buggy address:
[   22.691507]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.692146]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.693195] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.693735]                                      ^
[   22.694191]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.694812]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.695505] ==================================================================
[   22.341681] ==================================================================
[   22.342642] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   22.343884] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.344702] 
[   22.344947] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.345137] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.345184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.345247] Call Trace:
[   22.345299]  <TASK>
[   22.345349]  dump_stack_lvl+0x73/0xb0
[   22.345499]  print_report+0xd1/0x650
[   22.345585]  ? __virt_addr_valid+0x1db/0x2d0
[   22.345667]  ? kasan_atomics_helper+0x860/0x5450
[   22.345750]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.345854]  ? kasan_atomics_helper+0x860/0x5450
[   22.345935]  kasan_report+0x141/0x180
[   22.346010]  ? kasan_atomics_helper+0x860/0x5450
[   22.346053]  kasan_check_range+0x10c/0x1c0
[   22.346091]  __kasan_check_write+0x18/0x20
[   22.346120]  kasan_atomics_helper+0x860/0x5450
[   22.346152]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.346184]  ? kasan_save_alloc_info+0x3b/0x50
[   22.346240]  kasan_atomics+0x1dc/0x310
[   22.346324]  ? __pfx_kasan_atomics+0x10/0x10
[   22.346381]  ? __pfx_read_tsc+0x10/0x10
[   22.346416]  ? ktime_get_ts64+0x86/0x230
[   22.346453]  kunit_try_run_case+0x1a5/0x480
[   22.346488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.346523]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.346553]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.346592]  ? __kthread_parkme+0x82/0x180
[   22.346620]  ? preempt_count_sub+0x50/0x80
[   22.346655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.346690]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.346724]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.346758]  kthread+0x337/0x6f0
[   22.346786]  ? trace_preempt_on+0x20/0xc0
[   22.346819]  ? __pfx_kthread+0x10/0x10
[   22.346879]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.346917]  ? calculate_sigpending+0x7b/0xa0
[   22.346956]  ? __pfx_kthread+0x10/0x10
[   22.346988]  ret_from_fork+0x116/0x1d0
[   22.347014]  ? __pfx_kthread+0x10/0x10
[   22.347045]  ret_from_fork_asm+0x1a/0x30
[   22.347086]  </TASK>
[   22.347100] 
[   22.365615] Allocated by task 292:
[   22.366059]  kasan_save_stack+0x45/0x70
[   22.366722]  kasan_save_track+0x18/0x40
[   22.367276]  kasan_save_alloc_info+0x3b/0x50
[   22.367758]  __kasan_kmalloc+0xb7/0xc0
[   22.368191]  __kmalloc_cache_noprof+0x189/0x420
[   22.369171]  kasan_atomics+0x95/0x310
[   22.369628]  kunit_try_run_case+0x1a5/0x480
[   22.370972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.372022]  kthread+0x337/0x6f0
[   22.372437]  ret_from_fork+0x116/0x1d0
[   22.373151]  ret_from_fork_asm+0x1a/0x30
[   22.373933] 
[   22.374150] The buggy address belongs to the object at ffff88810383ae00
[   22.374150]  which belongs to the cache kmalloc-64 of size 64
[   22.375590] The buggy address is located 0 bytes to the right of
[   22.375590]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.376688] 
[   22.376873] The buggy address belongs to the physical page:
[   22.377264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.377813] flags: 0x200000000000000(node=0|zone=2)
[   22.378362] page_type: f5(slab)
[   22.378772] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.379612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.380175] page dumped because: kasan: bad access detected
[   22.380744] 
[   22.381001] Memory state around the buggy address:
[   22.381377]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.381799]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.382322] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.382993]                                      ^
[   22.383636]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.384274]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.385599] ==================================================================
[   24.219723] ==================================================================
[   24.220871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   24.221340] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   24.222481] 
[   24.222736] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   24.222892] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.222935] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.223003] Call Trace:
[   24.223050]  <TASK>
[   24.223097]  dump_stack_lvl+0x73/0xb0
[   24.223183]  print_report+0xd1/0x650
[   24.223306]  ? __virt_addr_valid+0x1db/0x2d0
[   24.223386]  ? kasan_atomics_helper+0x2006/0x5450
[   24.223458]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.223532]  ? kasan_atomics_helper+0x2006/0x5450
[   24.223616]  kasan_report+0x141/0x180
[   24.223693]  ? kasan_atomics_helper+0x2006/0x5450
[   24.223777]  kasan_check_range+0x10c/0x1c0
[   24.223916]  __kasan_check_write+0x18/0x20
[   24.223997]  kasan_atomics_helper+0x2006/0x5450
[   24.224121]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.224200]  ? kasan_save_alloc_info+0x3b/0x50
[   24.224401]  kasan_atomics+0x1dc/0x310
[   24.224490]  ? __pfx_kasan_atomics+0x10/0x10
[   24.224575]  ? __pfx_read_tsc+0x10/0x10
[   24.224637]  ? ktime_get_ts64+0x86/0x230
[   24.224703]  kunit_try_run_case+0x1a5/0x480
[   24.224787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.224917]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.225023]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.225164]  ? __kthread_parkme+0x82/0x180
[   24.225304]  ? preempt_count_sub+0x50/0x80
[   24.225415]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.225493]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.225571]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.225647]  kthread+0x337/0x6f0
[   24.225717]  ? trace_preempt_on+0x20/0xc0
[   24.225796]  ? __pfx_kthread+0x10/0x10
[   24.225889]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.225968]  ? calculate_sigpending+0x7b/0xa0
[   24.226047]  ? __pfx_kthread+0x10/0x10
[   24.226118]  ret_from_fork+0x116/0x1d0
[   24.226366]  ? __pfx_kthread+0x10/0x10
[   24.226439]  ret_from_fork_asm+0x1a/0x30
[   24.226531]  </TASK>
[   24.226563] 
[   24.240743] Allocated by task 292:
[   24.241096]  kasan_save_stack+0x45/0x70
[   24.241560]  kasan_save_track+0x18/0x40
[   24.241962]  kasan_save_alloc_info+0x3b/0x50
[   24.242423]  __kasan_kmalloc+0xb7/0xc0
[   24.242800]  __kmalloc_cache_noprof+0x189/0x420
[   24.243255]  kasan_atomics+0x95/0x310
[   24.243705]  kunit_try_run_case+0x1a5/0x480
[   24.244124]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.244649]  kthread+0x337/0x6f0
[   24.244999]  ret_from_fork+0x116/0x1d0
[   24.245426]  ret_from_fork_asm+0x1a/0x30
[   24.245876] 
[   24.246056] The buggy address belongs to the object at ffff88810383ae00
[   24.246056]  which belongs to the cache kmalloc-64 of size 64
[   24.247051] The buggy address is located 0 bytes to the right of
[   24.247051]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   24.248031] 
[   24.248259] The buggy address belongs to the physical page:
[   24.248685] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   24.249266] flags: 0x200000000000000(node=0|zone=2)
[   24.249701] page_type: f5(slab)
[   24.250056] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.250594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.251195] page dumped because: kasan: bad access detected
[   24.251728] 
[   24.251944] Memory state around the buggy address:
[   24.252373]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.252925]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.253402] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.253814]                                      ^
[   24.254332]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.254977]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.255646] ==================================================================
[   23.456088] ==================================================================
[   23.456720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   23.457324] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.458010] 
[   23.458218] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.458350] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.458435] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.458524] Call Trace:
[   23.458619]  <TASK>
[   23.458696]  dump_stack_lvl+0x73/0xb0
[   23.458780]  print_report+0xd1/0x650
[   23.458930]  ? __virt_addr_valid+0x1db/0x2d0
[   23.459039]  ? kasan_atomics_helper+0x151d/0x5450
[   23.459108]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.459184]  ? kasan_atomics_helper+0x151d/0x5450
[   23.459260]  kasan_report+0x141/0x180
[   23.459341]  ? kasan_atomics_helper+0x151d/0x5450
[   23.459449]  kasan_check_range+0x10c/0x1c0
[   23.459568]  __kasan_check_write+0x18/0x20
[   23.459621]  kasan_atomics_helper+0x151d/0x5450
[   23.459659]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.459696]  ? kasan_save_alloc_info+0x3b/0x50
[   23.459739]  kasan_atomics+0x1dc/0x310
[   23.459773]  ? __pfx_kasan_atomics+0x10/0x10
[   23.459810]  ? __pfx_read_tsc+0x10/0x10
[   23.459867]  ? ktime_get_ts64+0x86/0x230
[   23.459906]  kunit_try_run_case+0x1a5/0x480
[   23.459942]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.459977]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.460008]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.460047]  ? __kthread_parkme+0x82/0x180
[   23.460077]  ? preempt_count_sub+0x50/0x80
[   23.460110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.460147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.460181]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.460226]  kthread+0x337/0x6f0
[   23.460278]  ? trace_preempt_on+0x20/0xc0
[   23.460316]  ? __pfx_kthread+0x10/0x10
[   23.460348]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.460384]  ? calculate_sigpending+0x7b/0xa0
[   23.460420]  ? __pfx_kthread+0x10/0x10
[   23.460453]  ret_from_fork+0x116/0x1d0
[   23.460479]  ? __pfx_kthread+0x10/0x10
[   23.460511]  ret_from_fork_asm+0x1a/0x30
[   23.460554]  </TASK>
[   23.460571] 
[   23.477520] Allocated by task 292:
[   23.477893]  kasan_save_stack+0x45/0x70
[   23.478952]  kasan_save_track+0x18/0x40
[   23.479431]  kasan_save_alloc_info+0x3b/0x50
[   23.479761]  __kasan_kmalloc+0xb7/0xc0
[   23.480165]  __kmalloc_cache_noprof+0x189/0x420
[   23.480746]  kasan_atomics+0x95/0x310
[   23.481055]  kunit_try_run_case+0x1a5/0x480
[   23.481524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.482106]  kthread+0x337/0x6f0
[   23.482627]  ret_from_fork+0x116/0x1d0
[   23.482935]  ret_from_fork_asm+0x1a/0x30
[   23.483297] 
[   23.483549] The buggy address belongs to the object at ffff88810383ae00
[   23.483549]  which belongs to the cache kmalloc-64 of size 64
[   23.485122] The buggy address is located 0 bytes to the right of
[   23.485122]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.486564] 
[   23.486769] The buggy address belongs to the physical page:
[   23.487666] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.488648] flags: 0x200000000000000(node=0|zone=2)
[   23.489114] page_type: f5(slab)
[   23.489452] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.490320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.491201] page dumped because: kasan: bad access detected
[   23.491711] 
[   23.491944] Memory state around the buggy address:
[   23.492370]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.493096]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.493774] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.494691]                                      ^
[   23.495292]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.495792]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.496525] ==================================================================
[   23.327471] ==================================================================
[   23.328107] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   23.328699] Read of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.329147] 
[   23.329399] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.329529] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.329569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.329628] Call Trace:
[   23.329682]  <TASK>
[   23.329769]  dump_stack_lvl+0x73/0xb0
[   23.329876]  print_report+0xd1/0x650
[   23.329995]  ? __virt_addr_valid+0x1db/0x2d0
[   23.330109]  ? kasan_atomics_helper+0x4eae/0x5450
[   23.330278]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.330390]  ? kasan_atomics_helper+0x4eae/0x5450
[   23.330497]  kasan_report+0x141/0x180
[   23.330610]  ? kasan_atomics_helper+0x4eae/0x5450
[   23.330703]  __asan_report_load8_noabort+0x18/0x20
[   23.330785]  kasan_atomics_helper+0x4eae/0x5450
[   23.330880]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.330956]  ? kasan_save_alloc_info+0x3b/0x50
[   23.331049]  kasan_atomics+0x1dc/0x310
[   23.331125]  ? __pfx_kasan_atomics+0x10/0x10
[   23.331207]  ? __pfx_read_tsc+0x10/0x10
[   23.331325]  ? ktime_get_ts64+0x86/0x230
[   23.331405]  kunit_try_run_case+0x1a5/0x480
[   23.331483]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.331568]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.331623]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.331695]  ? __kthread_parkme+0x82/0x180
[   23.331762]  ? preempt_count_sub+0x50/0x80
[   23.331907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.331987]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.332069]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.332186]  kthread+0x337/0x6f0
[   23.332311]  ? trace_preempt_on+0x20/0xc0
[   23.332427]  ? __pfx_kthread+0x10/0x10
[   23.332534]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.332615]  ? calculate_sigpending+0x7b/0xa0
[   23.332731]  ? __pfx_kthread+0x10/0x10
[   23.332852]  ret_from_fork+0x116/0x1d0
[   23.332923]  ? __pfx_kthread+0x10/0x10
[   23.332998]  ret_from_fork_asm+0x1a/0x30
[   23.333095]  </TASK>
[   23.333137] 
[   23.355286] Allocated by task 292:
[   23.355817]  kasan_save_stack+0x45/0x70
[   23.356189]  kasan_save_track+0x18/0x40
[   23.356681]  kasan_save_alloc_info+0x3b/0x50
[   23.357078]  __kasan_kmalloc+0xb7/0xc0
[   23.357552]  __kmalloc_cache_noprof+0x189/0x420
[   23.357960]  kasan_atomics+0x95/0x310
[   23.358452]  kunit_try_run_case+0x1a5/0x480
[   23.358899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.359366]  kthread+0x337/0x6f0
[   23.359647]  ret_from_fork+0x116/0x1d0
[   23.359982]  ret_from_fork_asm+0x1a/0x30
[   23.360484] 
[   23.360699] The buggy address belongs to the object at ffff88810383ae00
[   23.360699]  which belongs to the cache kmalloc-64 of size 64
[   23.361789] The buggy address is located 0 bytes to the right of
[   23.361789]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.362821] 
[   23.363021] The buggy address belongs to the physical page:
[   23.363568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.364053] flags: 0x200000000000000(node=0|zone=2)
[   23.364561] page_type: f5(slab)
[   23.364952] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.365704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.366161] page dumped because: kasan: bad access detected
[   23.366616] 
[   23.366860] Memory state around the buggy address:
[   23.367346]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.368046]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.368772] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.369399]                                      ^
[   23.369864]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.370486]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.370890] ==================================================================
[   22.105877] ==================================================================
[   22.107299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   22.108070] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.109419] 
[   22.109795] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.109945] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.109987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.110052] Call Trace:
[   22.110110]  <TASK>
[   22.110278]  dump_stack_lvl+0x73/0xb0
[   22.110349]  print_report+0xd1/0x650
[   22.110389]  ? __virt_addr_valid+0x1db/0x2d0
[   22.110427]  ? kasan_atomics_helper+0x565/0x5450
[   22.110460]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.110494]  ? kasan_atomics_helper+0x565/0x5450
[   22.110526]  kasan_report+0x141/0x180
[   22.110559]  ? kasan_atomics_helper+0x565/0x5450
[   22.110622]  kasan_check_range+0x10c/0x1c0
[   22.110709]  __kasan_check_write+0x18/0x20
[   22.110761]  kasan_atomics_helper+0x565/0x5450
[   22.110797]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.110851]  ? kasan_save_alloc_info+0x3b/0x50
[   22.110902]  kasan_atomics+0x1dc/0x310
[   22.110938]  ? __pfx_kasan_atomics+0x10/0x10
[   22.110976]  ? __pfx_read_tsc+0x10/0x10
[   22.111009]  ? ktime_get_ts64+0x86/0x230
[   22.111045]  kunit_try_run_case+0x1a5/0x480
[   22.111081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.111113]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.111144]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.111182]  ? __kthread_parkme+0x82/0x180
[   22.111213]  ? preempt_count_sub+0x50/0x80
[   22.111246]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.111282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.111367]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.111443]  kthread+0x337/0x6f0
[   22.111474]  ? trace_preempt_on+0x20/0xc0
[   22.111513]  ? __pfx_kthread+0x10/0x10
[   22.111552]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.111588]  ? calculate_sigpending+0x7b/0xa0
[   22.111623]  ? __pfx_kthread+0x10/0x10
[   22.111653]  ret_from_fork+0x116/0x1d0
[   22.111678]  ? __pfx_kthread+0x10/0x10
[   22.111708]  ret_from_fork_asm+0x1a/0x30
[   22.111748]  </TASK>
[   22.111762] 
[   22.130699] Allocated by task 292:
[   22.131306]  kasan_save_stack+0x45/0x70
[   22.132725]  kasan_save_track+0x18/0x40
[   22.133158]  kasan_save_alloc_info+0x3b/0x50
[   22.133911]  __kasan_kmalloc+0xb7/0xc0
[   22.134328]  __kmalloc_cache_noprof+0x189/0x420
[   22.134711]  kasan_atomics+0x95/0x310
[   22.135185]  kunit_try_run_case+0x1a5/0x480
[   22.135762]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.136229]  kthread+0x337/0x6f0
[   22.136518]  ret_from_fork+0x116/0x1d0
[   22.137048]  ret_from_fork_asm+0x1a/0x30
[   22.137752] 
[   22.137959] The buggy address belongs to the object at ffff88810383ae00
[   22.137959]  which belongs to the cache kmalloc-64 of size 64
[   22.138976] The buggy address is located 0 bytes to the right of
[   22.138976]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.140286] 
[   22.140496] The buggy address belongs to the physical page:
[   22.141099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.142787] flags: 0x200000000000000(node=0|zone=2)
[   22.143117] page_type: f5(slab)
[   22.143700] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.144444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.145178] page dumped because: kasan: bad access detected
[   22.145784] 
[   22.146042] Memory state around the buggy address:
[   22.146480]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.147500]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.148275] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.149012]                                      ^
[   22.149634]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.150492]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.151405] ==================================================================
[   22.246641] ==================================================================
[   22.247883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   22.248797] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.250158] 
[   22.250545] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.250678] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.250712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.250746] Call Trace:
[   22.250770]  <TASK>
[   22.250794]  dump_stack_lvl+0x73/0xb0
[   22.250868]  print_report+0xd1/0x650
[   22.250954]  ? __virt_addr_valid+0x1db/0x2d0
[   22.251032]  ? kasan_atomics_helper+0x72f/0x5450
[   22.251107]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.251191]  ? kasan_atomics_helper+0x72f/0x5450
[   22.251268]  kasan_report+0x141/0x180
[   22.251349]  ? kasan_atomics_helper+0x72f/0x5450
[   22.251443]  kasan_check_range+0x10c/0x1c0
[   22.251532]  __kasan_check_write+0x18/0x20
[   22.251622]  kasan_atomics_helper+0x72f/0x5450
[   22.251702]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.251746]  ? kasan_save_alloc_info+0x3b/0x50
[   22.251789]  kasan_atomics+0x1dc/0x310
[   22.251824]  ? __pfx_kasan_atomics+0x10/0x10
[   22.251888]  ? __pfx_read_tsc+0x10/0x10
[   22.251921]  ? ktime_get_ts64+0x86/0x230
[   22.251959]  kunit_try_run_case+0x1a5/0x480
[   22.251994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.252025]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.252055]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.252092]  ? __kthread_parkme+0x82/0x180
[   22.252120]  ? preempt_count_sub+0x50/0x80
[   22.252156]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.252190]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.252235]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.252317]  kthread+0x337/0x6f0
[   22.252370]  ? trace_preempt_on+0x20/0xc0
[   22.252407]  ? __pfx_kthread+0x10/0x10
[   22.252438]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.252472]  ? calculate_sigpending+0x7b/0xa0
[   22.252506]  ? __pfx_kthread+0x10/0x10
[   22.252537]  ret_from_fork+0x116/0x1d0
[   22.252565]  ? __pfx_kthread+0x10/0x10
[   22.252595]  ret_from_fork_asm+0x1a/0x30
[   22.252637]  </TASK>
[   22.252652] 
[   22.270799] Allocated by task 292:
[   22.271703]  kasan_save_stack+0x45/0x70
[   22.272128]  kasan_save_track+0x18/0x40
[   22.272635]  kasan_save_alloc_info+0x3b/0x50
[   22.272985]  __kasan_kmalloc+0xb7/0xc0
[   22.273410]  __kmalloc_cache_noprof+0x189/0x420
[   22.273905]  kasan_atomics+0x95/0x310
[   22.274446]  kunit_try_run_case+0x1a5/0x480
[   22.274896]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.275442]  kthread+0x337/0x6f0
[   22.277385]  ret_from_fork+0x116/0x1d0
[   22.279371]  ret_from_fork_asm+0x1a/0x30
[   22.279690] 
[   22.279821] The buggy address belongs to the object at ffff88810383ae00
[   22.279821]  which belongs to the cache kmalloc-64 of size 64
[   22.281133] The buggy address is located 0 bytes to the right of
[   22.281133]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.284784] 
[   22.284974] The buggy address belongs to the physical page:
[   22.286172] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.286787] flags: 0x200000000000000(node=0|zone=2)
[   22.287083] page_type: f5(slab)
[   22.287287] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.287757] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.288713] page dumped because: kasan: bad access detected
[   22.290263] 
[   22.290408] Memory state around the buggy address:
[   22.290662]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.292360]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.293599] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.294823]                                      ^
[   22.295228]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.295818]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.296579] ==================================================================
[   23.696561] ==================================================================
[   23.697115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   23.697598] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.698262] 
[   23.698618] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.698724] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.698759] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.698819] Call Trace:
[   23.698890]  <TASK>
[   23.698933]  dump_stack_lvl+0x73/0xb0
[   23.699014]  print_report+0xd1/0x650
[   23.699089]  ? __virt_addr_valid+0x1db/0x2d0
[   23.699163]  ? kasan_atomics_helper+0x18b1/0x5450
[   23.699279]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.699356]  ? kasan_atomics_helper+0x18b1/0x5450
[   23.699429]  kasan_report+0x141/0x180
[   23.699504]  ? kasan_atomics_helper+0x18b1/0x5450
[   23.699597]  kasan_check_range+0x10c/0x1c0
[   23.699678]  __kasan_check_write+0x18/0x20
[   23.699750]  kasan_atomics_helper+0x18b1/0x5450
[   23.699823]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.699922]  ? kasan_save_alloc_info+0x3b/0x50
[   23.700012]  kasan_atomics+0x1dc/0x310
[   23.700089]  ? __pfx_kasan_atomics+0x10/0x10
[   23.700166]  ? __pfx_read_tsc+0x10/0x10
[   23.700279]  ? ktime_get_ts64+0x86/0x230
[   23.700362]  kunit_try_run_case+0x1a5/0x480
[   23.700440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.700515]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.700589]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.700667]  ? __kthread_parkme+0x82/0x180
[   23.700721]  ? preempt_count_sub+0x50/0x80
[   23.700787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.700883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.701009]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.701094]  kthread+0x337/0x6f0
[   23.701161]  ? trace_preempt_on+0x20/0xc0
[   23.701316]  ? __pfx_kthread+0x10/0x10
[   23.701397]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.701474]  ? calculate_sigpending+0x7b/0xa0
[   23.701557]  ? __pfx_kthread+0x10/0x10
[   23.701674]  ret_from_fork+0x116/0x1d0
[   23.701742]  ? __pfx_kthread+0x10/0x10
[   23.701819]  ret_from_fork_asm+0x1a/0x30
[   23.701962]  </TASK>
[   23.702008] 
[   23.716307] Allocated by task 292:
[   23.716656]  kasan_save_stack+0x45/0x70
[   23.716975]  kasan_save_track+0x18/0x40
[   23.717378]  kasan_save_alloc_info+0x3b/0x50
[   23.717821]  __kasan_kmalloc+0xb7/0xc0
[   23.718200]  __kmalloc_cache_noprof+0x189/0x420
[   23.718521]  kasan_atomics+0x95/0x310
[   23.718926]  kunit_try_run_case+0x1a5/0x480
[   23.719419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.719866]  kthread+0x337/0x6f0
[   23.720128]  ret_from_fork+0x116/0x1d0
[   23.720456]  ret_from_fork_asm+0x1a/0x30
[   23.720752] 
[   23.721003] The buggy address belongs to the object at ffff88810383ae00
[   23.721003]  which belongs to the cache kmalloc-64 of size 64
[   23.723136] The buggy address is located 0 bytes to the right of
[   23.723136]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.725149] 
[   23.725555] The buggy address belongs to the physical page:
[   23.726076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.727760] flags: 0x200000000000000(node=0|zone=2)
[   23.728363] page_type: f5(slab)
[   23.728821] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.729459] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.730152] page dumped because: kasan: bad access detected
[   23.730692] 
[   23.730897] Memory state around the buggy address:
[   23.731370]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.732015]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.732649] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.733300]                                      ^
[   23.733747]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.734373]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.734865] ==================================================================
[   23.497972] ==================================================================
[   23.499553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   23.499810] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.501082] 
[   23.501437] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.501566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.501605] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.501666] Call Trace:
[   23.501718]  <TASK>
[   23.501770]  dump_stack_lvl+0x73/0xb0
[   23.501909]  print_report+0xd1/0x650
[   23.501994]  ? __virt_addr_valid+0x1db/0x2d0
[   23.502076]  ? kasan_atomics_helper+0x15b6/0x5450
[   23.502152]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.502197]  ? kasan_atomics_helper+0x15b6/0x5450
[   23.502278]  kasan_report+0x141/0x180
[   23.502359]  ? kasan_atomics_helper+0x15b6/0x5450
[   23.502403]  kasan_check_range+0x10c/0x1c0
[   23.502440]  __kasan_check_write+0x18/0x20
[   23.502470]  kasan_atomics_helper+0x15b6/0x5450
[   23.502503]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.502535]  ? kasan_save_alloc_info+0x3b/0x50
[   23.502577]  kasan_atomics+0x1dc/0x310
[   23.502612]  ? __pfx_kasan_atomics+0x10/0x10
[   23.502649]  ? __pfx_read_tsc+0x10/0x10
[   23.502680]  ? ktime_get_ts64+0x86/0x230
[   23.502717]  kunit_try_run_case+0x1a5/0x480
[   23.502753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.502787]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.502816]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.502887]  ? __kthread_parkme+0x82/0x180
[   23.502919]  ? preempt_count_sub+0x50/0x80
[   23.502955]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.502989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.503024]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.503058]  kthread+0x337/0x6f0
[   23.503087]  ? trace_preempt_on+0x20/0xc0
[   23.503124]  ? __pfx_kthread+0x10/0x10
[   23.503156]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.503192]  ? calculate_sigpending+0x7b/0xa0
[   23.503230]  ? __pfx_kthread+0x10/0x10
[   23.503262]  ret_from_fork+0x116/0x1d0
[   23.503289]  ? __pfx_kthread+0x10/0x10
[   23.503355]  ret_from_fork_asm+0x1a/0x30
[   23.503443]  </TASK>
[   23.503464] 
[   23.520428] Allocated by task 292:
[   23.520858]  kasan_save_stack+0x45/0x70
[   23.521161]  kasan_save_track+0x18/0x40
[   23.521555]  kasan_save_alloc_info+0x3b/0x50
[   23.522055]  __kasan_kmalloc+0xb7/0xc0
[   23.522432]  __kmalloc_cache_noprof+0x189/0x420
[   23.522757]  kasan_atomics+0x95/0x310
[   23.523144]  kunit_try_run_case+0x1a5/0x480
[   23.523760]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.524199]  kthread+0x337/0x6f0
[   23.524553]  ret_from_fork+0x116/0x1d0
[   23.525010]  ret_from_fork_asm+0x1a/0x30
[   23.525318] 
[   23.525481] The buggy address belongs to the object at ffff88810383ae00
[   23.525481]  which belongs to the cache kmalloc-64 of size 64
[   23.526654] The buggy address is located 0 bytes to the right of
[   23.526654]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.527862] 
[   23.528027] The buggy address belongs to the physical page:
[   23.528513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.529400] flags: 0x200000000000000(node=0|zone=2)
[   23.529863] page_type: f5(slab)
[   23.530134] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.531195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.531797] page dumped because: kasan: bad access detected
[   23.532342] 
[   23.532586] Memory state around the buggy address:
[   23.533022]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.533688]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.534302] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.534894]                                      ^
[   23.535326]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.535956]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.536586] ==================================================================
[   23.809643] ==================================================================
[   23.810230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   23.810725] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.811324] 
[   23.811560] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.811685] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.811725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.811787] Call Trace:
[   23.812052]  <TASK>
[   23.812108]  dump_stack_lvl+0x73/0xb0
[   23.812190]  print_report+0xd1/0x650
[   23.812317]  ? __virt_addr_valid+0x1db/0x2d0
[   23.812398]  ? kasan_atomics_helper+0x1a7f/0x5450
[   23.812475]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.812552]  ? kasan_atomics_helper+0x1a7f/0x5450
[   23.812628]  kasan_report+0x141/0x180
[   23.812708]  ? kasan_atomics_helper+0x1a7f/0x5450
[   23.812797]  kasan_check_range+0x10c/0x1c0
[   23.812906]  __kasan_check_write+0x18/0x20
[   23.812978]  kasan_atomics_helper+0x1a7f/0x5450
[   23.813058]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.813134]  ? kasan_save_alloc_info+0x3b/0x50
[   23.813269]  kasan_atomics+0x1dc/0x310
[   23.813359]  ? __pfx_kasan_atomics+0x10/0x10
[   23.813439]  ? __pfx_read_tsc+0x10/0x10
[   23.813511]  ? ktime_get_ts64+0x86/0x230
[   23.813588]  kunit_try_run_case+0x1a5/0x480
[   23.813671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.813745]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.813814]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.813917]  ? __kthread_parkme+0x82/0x180
[   23.813986]  ? preempt_count_sub+0x50/0x80
[   23.814063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.814140]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.814256]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.814341]  kthread+0x337/0x6f0
[   23.814408]  ? trace_preempt_on+0x20/0xc0
[   23.814488]  ? __pfx_kthread+0x10/0x10
[   23.814557]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.814638]  ? calculate_sigpending+0x7b/0xa0
[   23.814717]  ? __pfx_kthread+0x10/0x10
[   23.814789]  ret_from_fork+0x116/0x1d0
[   23.815270]  ? __pfx_kthread+0x10/0x10
[   23.815353]  ret_from_fork_asm+0x1a/0x30
[   23.815447]  </TASK>
[   23.815486] 
[   23.833062] Allocated by task 292:
[   23.833960]  kasan_save_stack+0x45/0x70
[   23.834537]  kasan_save_track+0x18/0x40
[   23.835058]  kasan_save_alloc_info+0x3b/0x50
[   23.835750]  __kasan_kmalloc+0xb7/0xc0
[   23.836087]  __kmalloc_cache_noprof+0x189/0x420
[   23.836507]  kasan_atomics+0x95/0x310
[   23.836968]  kunit_try_run_case+0x1a5/0x480
[   23.837621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.838016]  kthread+0x337/0x6f0
[   23.838361]  ret_from_fork+0x116/0x1d0
[   23.838763]  ret_from_fork_asm+0x1a/0x30
[   23.839102] 
[   23.839345] The buggy address belongs to the object at ffff88810383ae00
[   23.839345]  which belongs to the cache kmalloc-64 of size 64
[   23.840125] The buggy address is located 0 bytes to the right of
[   23.840125]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.841082] 
[   23.841302] The buggy address belongs to the physical page:
[   23.841773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.842902] flags: 0x200000000000000(node=0|zone=2)
[   23.843328] page_type: f5(slab)
[   23.843779] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.844808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.845799] page dumped because: kasan: bad access detected
[   23.846440] 
[   23.846646] Memory state around the buggy address:
[   23.847429]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.848042]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.848926] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.849767]                                      ^
[   23.850410]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.851197]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.852306] ==================================================================
[   24.062647] ==================================================================
[   24.063268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   24.063815] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   24.064449] 
[   24.064685] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   24.064818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.064877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.064939] Call Trace:
[   24.064988]  <TASK>
[   24.065037]  dump_stack_lvl+0x73/0xb0
[   24.065118]  print_report+0xd1/0x650
[   24.065200]  ? __virt_addr_valid+0x1db/0x2d0
[   24.065326]  ? kasan_atomics_helper+0x1e12/0x5450
[   24.065401]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.065478]  ? kasan_atomics_helper+0x1e12/0x5450
[   24.065552]  kasan_report+0x141/0x180
[   24.065631]  ? kasan_atomics_helper+0x1e12/0x5450
[   24.065712]  kasan_check_range+0x10c/0x1c0
[   24.065772]  __kasan_check_write+0x18/0x20
[   24.065844]  kasan_atomics_helper+0x1e12/0x5450
[   24.065923]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.066004]  ? kasan_save_alloc_info+0x3b/0x50
[   24.066099]  kasan_atomics+0x1dc/0x310
[   24.066180]  ? __pfx_kasan_atomics+0x10/0x10
[   24.066306]  ? __pfx_read_tsc+0x10/0x10
[   24.066383]  ? ktime_get_ts64+0x86/0x230
[   24.066465]  kunit_try_run_case+0x1a5/0x480
[   24.066546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.066609]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.066645]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.066684]  ? __kthread_parkme+0x82/0x180
[   24.066712]  ? preempt_count_sub+0x50/0x80
[   24.066749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.066784]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.066819]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.066884]  kthread+0x337/0x6f0
[   24.066915]  ? trace_preempt_on+0x20/0xc0
[   24.066952]  ? __pfx_kthread+0x10/0x10
[   24.066983]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.067019]  ? calculate_sigpending+0x7b/0xa0
[   24.067055]  ? __pfx_kthread+0x10/0x10
[   24.067086]  ret_from_fork+0x116/0x1d0
[   24.067112]  ? __pfx_kthread+0x10/0x10
[   24.067142]  ret_from_fork_asm+0x1a/0x30
[   24.067185]  </TASK>
[   24.067200] 
[   24.083301] Allocated by task 292:
[   24.083592]  kasan_save_stack+0x45/0x70
[   24.083945]  kasan_save_track+0x18/0x40
[   24.084358]  kasan_save_alloc_info+0x3b/0x50
[   24.084780]  __kasan_kmalloc+0xb7/0xc0
[   24.085187]  __kmalloc_cache_noprof+0x189/0x420
[   24.085646]  kasan_atomics+0x95/0x310
[   24.086059]  kunit_try_run_case+0x1a5/0x480
[   24.086507]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.087032]  kthread+0x337/0x6f0
[   24.087500]  ret_from_fork+0x116/0x1d0
[   24.087900]  ret_from_fork_asm+0x1a/0x30
[   24.088198] 
[   24.088359] The buggy address belongs to the object at ffff88810383ae00
[   24.088359]  which belongs to the cache kmalloc-64 of size 64
[   24.089470] The buggy address is located 0 bytes to the right of
[   24.089470]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   24.090782] 
[   24.091445] The buggy address belongs to the physical page:
[   24.092820] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   24.093687] flags: 0x200000000000000(node=0|zone=2)
[   24.094080] page_type: f5(slab)
[   24.094399] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.094958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.095706] page dumped because: kasan: bad access detected
[   24.096257] 
[   24.096503] Memory state around the buggy address:
[   24.096968]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.097592]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.098250] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.098850]                                      ^
[   24.099326]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.099942]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.100576] ==================================================================
[   22.520274] ==================================================================
[   22.520752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   22.521215] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.522142] 
[   22.522386] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.522511] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.522551] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.522614] Call Trace:
[   22.522660]  <TASK>
[   22.522707]  dump_stack_lvl+0x73/0xb0
[   22.522788]  print_report+0xd1/0x650
[   22.522883]  ? __virt_addr_valid+0x1db/0x2d0
[   22.522955]  ? kasan_atomics_helper+0xac7/0x5450
[   22.523152]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.523363]  ? kasan_atomics_helper+0xac7/0x5450
[   22.523515]  kasan_report+0x141/0x180
[   22.523954]  ? kasan_atomics_helper+0xac7/0x5450
[   22.524043]  kasan_check_range+0x10c/0x1c0
[   22.524162]  __kasan_check_write+0x18/0x20
[   22.524419]  kasan_atomics_helper+0xac7/0x5450
[   22.524569]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.524645]  ? kasan_save_alloc_info+0x3b/0x50
[   22.524698]  kasan_atomics+0x1dc/0x310
[   22.524735]  ? __pfx_kasan_atomics+0x10/0x10
[   22.524770]  ? __pfx_read_tsc+0x10/0x10
[   22.524801]  ? ktime_get_ts64+0x86/0x230
[   22.524864]  kunit_try_run_case+0x1a5/0x480
[   22.524904]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.524939]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.524970]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.525006]  ? __kthread_parkme+0x82/0x180
[   22.525035]  ? preempt_count_sub+0x50/0x80
[   22.525069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.525104]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.525138]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.525172]  kthread+0x337/0x6f0
[   22.525200]  ? trace_preempt_on+0x20/0xc0
[   22.525309]  ? __pfx_kthread+0x10/0x10
[   22.525371]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.525410]  ? calculate_sigpending+0x7b/0xa0
[   22.525446]  ? __pfx_kthread+0x10/0x10
[   22.525478]  ret_from_fork+0x116/0x1d0
[   22.525511]  ? __pfx_kthread+0x10/0x10
[   22.525542]  ret_from_fork_asm+0x1a/0x30
[   22.525586]  </TASK>
[   22.525601] 
[   22.542817] Allocated by task 292:
[   22.543097]  kasan_save_stack+0x45/0x70
[   22.543380]  kasan_save_track+0x18/0x40
[   22.543651]  kasan_save_alloc_info+0x3b/0x50
[   22.544017]  __kasan_kmalloc+0xb7/0xc0
[   22.544262]  __kmalloc_cache_noprof+0x189/0x420
[   22.544557]  kasan_atomics+0x95/0x310
[   22.547162]  kunit_try_run_case+0x1a5/0x480
[   22.550262]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.552080]  kthread+0x337/0x6f0
[   22.553660]  ret_from_fork+0x116/0x1d0
[   22.554618]  ret_from_fork_asm+0x1a/0x30
[   22.555584] 
[   22.556375] The buggy address belongs to the object at ffff88810383ae00
[   22.556375]  which belongs to the cache kmalloc-64 of size 64
[   22.557434] The buggy address is located 0 bytes to the right of
[   22.557434]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.559599] 
[   22.559772] The buggy address belongs to the physical page:
[   22.561009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.561600] flags: 0x200000000000000(node=0|zone=2)
[   22.562054] page_type: f5(slab)
[   22.562604] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.563375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.564331] page dumped because: kasan: bad access detected
[   22.565127] 
[   22.565394] Memory state around the buggy address:
[   22.566058]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.566806]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.567749] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.568534]                                      ^
[   22.569296]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.570040]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.570770] ==================================================================
[   23.852988] ==================================================================
[   23.854560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   23.855119] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.855692] 
[   23.856038] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.856230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.856273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.856335] Call Trace:
[   23.856382]  <TASK>
[   23.856428]  dump_stack_lvl+0x73/0xb0
[   23.856513]  print_report+0xd1/0x650
[   23.856592]  ? __virt_addr_valid+0x1db/0x2d0
[   23.856669]  ? kasan_atomics_helper+0x1b22/0x5450
[   23.856743]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.856817]  ? kasan_atomics_helper+0x1b22/0x5450
[   23.856915]  kasan_report+0x141/0x180
[   23.856993]  ? kasan_atomics_helper+0x1b22/0x5450
[   23.857077]  kasan_check_range+0x10c/0x1c0
[   23.857156]  __kasan_check_write+0x18/0x20
[   23.857228]  kasan_atomics_helper+0x1b22/0x5450
[   23.857286]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.857322]  ? kasan_save_alloc_info+0x3b/0x50
[   23.857366]  kasan_atomics+0x1dc/0x310
[   23.857403]  ? __pfx_kasan_atomics+0x10/0x10
[   23.857440]  ? __pfx_read_tsc+0x10/0x10
[   23.857472]  ? ktime_get_ts64+0x86/0x230
[   23.857508]  kunit_try_run_case+0x1a5/0x480
[   23.857545]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.857579]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.857608]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.857647]  ? __kthread_parkme+0x82/0x180
[   23.857676]  ? preempt_count_sub+0x50/0x80
[   23.857711]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.857749]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.857784]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.857820]  kthread+0x337/0x6f0
[   23.857878]  ? trace_preempt_on+0x20/0xc0
[   23.857918]  ? __pfx_kthread+0x10/0x10
[   23.857952]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.857989]  ? calculate_sigpending+0x7b/0xa0
[   23.858025]  ? __pfx_kthread+0x10/0x10
[   23.858057]  ret_from_fork+0x116/0x1d0
[   23.858084]  ? __pfx_kthread+0x10/0x10
[   23.858115]  ret_from_fork_asm+0x1a/0x30
[   23.858160]  </TASK>
[   23.858176] 
[   23.876317] Allocated by task 292:
[   23.876573]  kasan_save_stack+0x45/0x70
[   23.878498]  kasan_save_track+0x18/0x40
[   23.879146]  kasan_save_alloc_info+0x3b/0x50
[   23.879471]  __kasan_kmalloc+0xb7/0xc0
[   23.879719]  __kmalloc_cache_noprof+0x189/0x420
[   23.881486]  kasan_atomics+0x95/0x310
[   23.882201]  kunit_try_run_case+0x1a5/0x480
[   23.882992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.883884]  kthread+0x337/0x6f0
[   23.884279]  ret_from_fork+0x116/0x1d0
[   23.884737]  ret_from_fork_asm+0x1a/0x30
[   23.885464] 
[   23.885617] The buggy address belongs to the object at ffff88810383ae00
[   23.885617]  which belongs to the cache kmalloc-64 of size 64
[   23.886690] The buggy address is located 0 bytes to the right of
[   23.886690]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.887758] 
[   23.888022] The buggy address belongs to the physical page:
[   23.888547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.889179] flags: 0x200000000000000(node=0|zone=2)
[   23.889723] page_type: f5(slab)
[   23.890194] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.890801] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.891561] page dumped because: kasan: bad access detected
[   23.892130] 
[   23.892333] Memory state around the buggy address:
[   23.892819]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.893610]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.894277] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.894812]                                      ^
[   23.895198]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.895799]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.896339] ==================================================================
[   24.022888] ==================================================================
[   24.024047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   24.024865] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   24.026693] 
[   24.026968] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   24.027339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.027387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.027447] Call Trace:
[   24.027498]  <TASK>
[   24.027551]  dump_stack_lvl+0x73/0xb0
[   24.027634]  print_report+0xd1/0x650
[   24.027696]  ? __virt_addr_valid+0x1db/0x2d0
[   24.027735]  ? kasan_atomics_helper+0x1d7a/0x5450
[   24.027768]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.027803]  ? kasan_atomics_helper+0x1d7a/0x5450
[   24.027859]  kasan_report+0x141/0x180
[   24.027898]  ? kasan_atomics_helper+0x1d7a/0x5450
[   24.027937]  kasan_check_range+0x10c/0x1c0
[   24.027972]  __kasan_check_write+0x18/0x20
[   24.028001]  kasan_atomics_helper+0x1d7a/0x5450
[   24.028035]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.028067]  ? kasan_save_alloc_info+0x3b/0x50
[   24.028111]  kasan_atomics+0x1dc/0x310
[   24.028143]  ? __pfx_kasan_atomics+0x10/0x10
[   24.028178]  ? __pfx_read_tsc+0x10/0x10
[   24.028224]  ? ktime_get_ts64+0x86/0x230
[   24.028288]  kunit_try_run_case+0x1a5/0x480
[   24.028326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.028361]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.028393]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.028432]  ? __kthread_parkme+0x82/0x180
[   24.028462]  ? preempt_count_sub+0x50/0x80
[   24.028498]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.028534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.028568]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.028604]  kthread+0x337/0x6f0
[   24.028634]  ? trace_preempt_on+0x20/0xc0
[   24.028670]  ? __pfx_kthread+0x10/0x10
[   24.028702]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.028739]  ? calculate_sigpending+0x7b/0xa0
[   24.028776]  ? __pfx_kthread+0x10/0x10
[   24.028809]  ret_from_fork+0x116/0x1d0
[   24.028858]  ? __pfx_kthread+0x10/0x10
[   24.028893]  ret_from_fork_asm+0x1a/0x30
[   24.028938]  </TASK>
[   24.028955] 
[   24.042650] Allocated by task 292:
[   24.043074]  kasan_save_stack+0x45/0x70
[   24.043575]  kasan_save_track+0x18/0x40
[   24.044030]  kasan_save_alloc_info+0x3b/0x50
[   24.044495]  __kasan_kmalloc+0xb7/0xc0
[   24.044957]  __kmalloc_cache_noprof+0x189/0x420
[   24.045480]  kasan_atomics+0x95/0x310
[   24.045849]  kunit_try_run_case+0x1a5/0x480
[   24.046288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.046763]  kthread+0x337/0x6f0
[   24.047053]  ret_from_fork+0x116/0x1d0
[   24.047864]  ret_from_fork_asm+0x1a/0x30
[   24.048290] 
[   24.048502] The buggy address belongs to the object at ffff88810383ae00
[   24.048502]  which belongs to the cache kmalloc-64 of size 64
[   24.051390] The buggy address is located 0 bytes to the right of
[   24.051390]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   24.052334] 
[   24.052501] The buggy address belongs to the physical page:
[   24.052855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   24.053641] flags: 0x200000000000000(node=0|zone=2)
[   24.054752] page_type: f5(slab)
[   24.055131] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.055905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.056685] page dumped because: kasan: bad access detected
[   24.057050] 
[   24.057265] Memory state around the buggy address:
[   24.057717]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.058617]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.059172] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.059871]                                      ^
[   24.060172]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.060952]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.061549] ==================================================================
[   23.164727] ==================================================================
[   23.165176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   23.166183] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.166722] 
[   23.166965] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.167133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.167207] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.167312] Call Trace:
[   23.167394]  <TASK>
[   23.167453]  dump_stack_lvl+0x73/0xb0
[   23.167547]  print_report+0xd1/0x650
[   23.167625]  ? __virt_addr_valid+0x1db/0x2d0
[   23.167700]  ? kasan_atomics_helper+0x49e8/0x5450
[   23.167772]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.167863]  ? kasan_atomics_helper+0x49e8/0x5450
[   23.167942]  kasan_report+0x141/0x180
[   23.168016]  ? kasan_atomics_helper+0x49e8/0x5450
[   23.168100]  __asan_report_load4_noabort+0x18/0x20
[   23.168184]  kasan_atomics_helper+0x49e8/0x5450
[   23.168319]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.168477]  ? kasan_save_alloc_info+0x3b/0x50
[   23.168601]  kasan_atomics+0x1dc/0x310
[   23.168680]  ? __pfx_kasan_atomics+0x10/0x10
[   23.168748]  ? __pfx_read_tsc+0x10/0x10
[   23.168785]  ? ktime_get_ts64+0x86/0x230
[   23.168826]  kunit_try_run_case+0x1a5/0x480
[   23.168892]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.168929]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.168960]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.168999]  ? __kthread_parkme+0x82/0x180
[   23.169028]  ? preempt_count_sub+0x50/0x80
[   23.169063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.169100]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.169134]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.169168]  kthread+0x337/0x6f0
[   23.169198]  ? trace_preempt_on+0x20/0xc0
[   23.169267]  ? __pfx_kthread+0x10/0x10
[   23.169303]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.169339]  ? calculate_sigpending+0x7b/0xa0
[   23.169376]  ? __pfx_kthread+0x10/0x10
[   23.169407]  ret_from_fork+0x116/0x1d0
[   23.169434]  ? __pfx_kthread+0x10/0x10
[   23.169463]  ret_from_fork_asm+0x1a/0x30
[   23.169506]  </TASK>
[   23.169521] 
[   23.183765] Allocated by task 292:
[   23.184171]  kasan_save_stack+0x45/0x70
[   23.184604]  kasan_save_track+0x18/0x40
[   23.185030]  kasan_save_alloc_info+0x3b/0x50
[   23.185432]  __kasan_kmalloc+0xb7/0xc0
[   23.185716]  __kmalloc_cache_noprof+0x189/0x420
[   23.186193]  kasan_atomics+0x95/0x310
[   23.186661]  kunit_try_run_case+0x1a5/0x480
[   23.187121]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.187664]  kthread+0x337/0x6f0
[   23.187954]  ret_from_fork+0x116/0x1d0
[   23.188274]  ret_from_fork_asm+0x1a/0x30
[   23.188631] 
[   23.188899] The buggy address belongs to the object at ffff88810383ae00
[   23.188899]  which belongs to the cache kmalloc-64 of size 64
[   23.189988] The buggy address is located 0 bytes to the right of
[   23.189988]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.190990] 
[   23.191158] The buggy address belongs to the physical page:
[   23.191670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.192452] flags: 0x200000000000000(node=0|zone=2)
[   23.193462] page_type: f5(slab)
[   23.193728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.194194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.195904] page dumped because: kasan: bad access detected
[   23.197069] 
[   23.197269] Memory state around the buggy address:
[   23.198092]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.198991]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.199732] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.200532]                                      ^
[   23.201287]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.201978]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.202581] ==================================================================
[   23.203454] ==================================================================
[   23.204369] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   23.204939] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.205556] 
[   23.205788] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.205933] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.205975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.206036] Call Trace:
[   23.206087]  <TASK>
[   23.206133]  dump_stack_lvl+0x73/0xb0
[   23.206258]  print_report+0xd1/0x650
[   23.206342]  ? __virt_addr_valid+0x1db/0x2d0
[   23.206419]  ? kasan_atomics_helper+0x12e6/0x5450
[   23.206494]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.206566]  ? kasan_atomics_helper+0x12e6/0x5450
[   23.206638]  kasan_report+0x141/0x180
[   23.206713]  ? kasan_atomics_helper+0x12e6/0x5450
[   23.206796]  kasan_check_range+0x10c/0x1c0
[   23.206894]  __kasan_check_write+0x18/0x20
[   23.206965]  kasan_atomics_helper+0x12e6/0x5450
[   23.207042]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.207117]  ? kasan_save_alloc_info+0x3b/0x50
[   23.207248]  kasan_atomics+0x1dc/0x310
[   23.207334]  ? __pfx_kasan_atomics+0x10/0x10
[   23.207421]  ? __pfx_read_tsc+0x10/0x10
[   23.207494]  ? ktime_get_ts64+0x86/0x230
[   23.207598]  kunit_try_run_case+0x1a5/0x480
[   23.207682]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.207757]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.207827]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.207900]  ? __kthread_parkme+0x82/0x180
[   23.207931]  ? preempt_count_sub+0x50/0x80
[   23.207969]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.208007]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.208043]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.208079]  kthread+0x337/0x6f0
[   23.208109]  ? trace_preempt_on+0x20/0xc0
[   23.208144]  ? __pfx_kthread+0x10/0x10
[   23.208176]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.208228]  ? calculate_sigpending+0x7b/0xa0
[   23.208290]  ? __pfx_kthread+0x10/0x10
[   23.208324]  ret_from_fork+0x116/0x1d0
[   23.208353]  ? __pfx_kthread+0x10/0x10
[   23.208384]  ret_from_fork_asm+0x1a/0x30
[   23.208428]  </TASK>
[   23.208444] 
[   23.223739] Allocated by task 292:
[   23.224048]  kasan_save_stack+0x45/0x70
[   23.224460]  kasan_save_track+0x18/0x40
[   23.224904]  kasan_save_alloc_info+0x3b/0x50
[   23.225432]  __kasan_kmalloc+0xb7/0xc0
[   23.225810]  __kmalloc_cache_noprof+0x189/0x420
[   23.226361]  kasan_atomics+0x95/0x310
[   23.226795]  kunit_try_run_case+0x1a5/0x480
[   23.228858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.229219]  kthread+0x337/0x6f0
[   23.229487]  ret_from_fork+0x116/0x1d0
[   23.229772]  ret_from_fork_asm+0x1a/0x30
[   23.230110] 
[   23.230455] The buggy address belongs to the object at ffff88810383ae00
[   23.230455]  which belongs to the cache kmalloc-64 of size 64
[   23.231157] The buggy address is located 0 bytes to the right of
[   23.231157]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.233149] 
[   23.233339] The buggy address belongs to the physical page:
[   23.234140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.234969] flags: 0x200000000000000(node=0|zone=2)
[   23.235396] page_type: f5(slab)
[   23.235726] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.236428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.236861] page dumped because: kasan: bad access detected
[   23.237170] 
[   23.237315] Memory state around the buggy address:
[   23.237704]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.239682]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.240088] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.242182]                                      ^
[   23.242502]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.243270]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.243721] ==================================================================
[   23.121757] ==================================================================
[   23.123622] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   23.124202] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.124998] 
[   23.125176] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.125651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.125996] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.126086] Call Trace:
[   23.126200]  <TASK>
[   23.126244]  dump_stack_lvl+0x73/0xb0
[   23.126298]  print_report+0xd1/0x650
[   23.126336]  ? __virt_addr_valid+0x1db/0x2d0
[   23.126372]  ? kasan_atomics_helper+0x1217/0x5450
[   23.126404]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.126437]  ? kasan_atomics_helper+0x1217/0x5450
[   23.126469]  kasan_report+0x141/0x180
[   23.126502]  ? kasan_atomics_helper+0x1217/0x5450
[   23.126541]  kasan_check_range+0x10c/0x1c0
[   23.126577]  __kasan_check_write+0x18/0x20
[   23.126606]  kasan_atomics_helper+0x1217/0x5450
[   23.126639]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.126672]  ? kasan_save_alloc_info+0x3b/0x50
[   23.126714]  kasan_atomics+0x1dc/0x310
[   23.126749]  ? __pfx_kasan_atomics+0x10/0x10
[   23.126785]  ? __pfx_read_tsc+0x10/0x10
[   23.126816]  ? ktime_get_ts64+0x86/0x230
[   23.126880]  kunit_try_run_case+0x1a5/0x480
[   23.126919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.126953]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.126984]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.127022]  ? __kthread_parkme+0x82/0x180
[   23.127051]  ? preempt_count_sub+0x50/0x80
[   23.127085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.127120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.127154]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.127189]  kthread+0x337/0x6f0
[   23.127235]  ? trace_preempt_on+0x20/0xc0
[   23.127286]  ? __pfx_kthread+0x10/0x10
[   23.127317]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.127353]  ? calculate_sigpending+0x7b/0xa0
[   23.127389]  ? __pfx_kthread+0x10/0x10
[   23.127420]  ret_from_fork+0x116/0x1d0
[   23.127447]  ? __pfx_kthread+0x10/0x10
[   23.127477]  ret_from_fork_asm+0x1a/0x30
[   23.127520]  </TASK>
[   23.127542] 
[   23.145739] Allocated by task 292:
[   23.145991]  kasan_save_stack+0x45/0x70
[   23.146387]  kasan_save_track+0x18/0x40
[   23.146769]  kasan_save_alloc_info+0x3b/0x50
[   23.147267]  __kasan_kmalloc+0xb7/0xc0
[   23.147565]  __kmalloc_cache_noprof+0x189/0x420
[   23.148020]  kasan_atomics+0x95/0x310
[   23.148554]  kunit_try_run_case+0x1a5/0x480
[   23.149399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.150035]  kthread+0x337/0x6f0
[   23.150675]  ret_from_fork+0x116/0x1d0
[   23.151379]  ret_from_fork_asm+0x1a/0x30
[   23.151960] 
[   23.152169] The buggy address belongs to the object at ffff88810383ae00
[   23.152169]  which belongs to the cache kmalloc-64 of size 64
[   23.153098] The buggy address is located 0 bytes to the right of
[   23.153098]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.153920] 
[   23.154204] The buggy address belongs to the physical page:
[   23.154713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.155243] flags: 0x200000000000000(node=0|zone=2)
[   23.155788] page_type: f5(slab)
[   23.156113] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.156773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.157980] page dumped because: kasan: bad access detected
[   23.158631] 
[   23.159028] Memory state around the buggy address:
[   23.159583]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.160267]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.160793] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.161636]                                      ^
[   23.162171]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.162973]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.163708] ==================================================================
[   23.574902] ==================================================================
[   23.575574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   23.576461] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.576920] 
[   23.577113] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.577241] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.577284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.577346] Call Trace:
[   23.577391]  <TASK>
[   23.577436]  dump_stack_lvl+0x73/0xb0
[   23.577519]  print_report+0xd1/0x650
[   23.577595]  ? __virt_addr_valid+0x1db/0x2d0
[   23.577670]  ? kasan_atomics_helper+0x16e7/0x5450
[   23.577740]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.577815]  ? kasan_atomics_helper+0x16e7/0x5450
[   23.577910]  kasan_report+0x141/0x180
[   23.577990]  ? kasan_atomics_helper+0x16e7/0x5450
[   23.578076]  kasan_check_range+0x10c/0x1c0
[   23.578156]  __kasan_check_write+0x18/0x20
[   23.578228]  kasan_atomics_helper+0x16e7/0x5450
[   23.578309]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.578389]  ? kasan_save_alloc_info+0x3b/0x50
[   23.578479]  kasan_atomics+0x1dc/0x310
[   23.578559]  ? __pfx_kasan_atomics+0x10/0x10
[   23.578640]  ? __pfx_read_tsc+0x10/0x10
[   23.578800]  ? ktime_get_ts64+0x86/0x230
[   23.578905]  kunit_try_run_case+0x1a5/0x480
[   23.578985]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.579057]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.579127]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.579205]  ? __kthread_parkme+0x82/0x180
[   23.579276]  ? preempt_count_sub+0x50/0x80
[   23.579357]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.579434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.579509]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.579603]  kthread+0x337/0x6f0
[   23.579669]  ? trace_preempt_on+0x20/0xc0
[   23.579747]  ? __pfx_kthread+0x10/0x10
[   23.579818]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.579914]  ? calculate_sigpending+0x7b/0xa0
[   23.579983]  ? __pfx_kthread+0x10/0x10
[   23.580039]  ret_from_fork+0x116/0x1d0
[   23.580106]  ? __pfx_kthread+0x10/0x10
[   23.580236]  ret_from_fork_asm+0x1a/0x30
[   23.580414]  </TASK>
[   23.580531] 
[   23.596207] Allocated by task 292:
[   23.596522]  kasan_save_stack+0x45/0x70
[   23.596913]  kasan_save_track+0x18/0x40
[   23.599264]  kasan_save_alloc_info+0x3b/0x50
[   23.600069]  __kasan_kmalloc+0xb7/0xc0
[   23.601009]  __kmalloc_cache_noprof+0x189/0x420
[   23.602139]  kasan_atomics+0x95/0x310
[   23.603374]  kunit_try_run_case+0x1a5/0x480
[   23.604554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.605133]  kthread+0x337/0x6f0
[   23.605938]  ret_from_fork+0x116/0x1d0
[   23.606580]  ret_from_fork_asm+0x1a/0x30
[   23.607607] 
[   23.608502] The buggy address belongs to the object at ffff88810383ae00
[   23.608502]  which belongs to the cache kmalloc-64 of size 64
[   23.609683] The buggy address is located 0 bytes to the right of
[   23.609683]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.612361] 
[   23.612864] The buggy address belongs to the physical page:
[   23.613573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.614986] flags: 0x200000000000000(node=0|zone=2)
[   23.615754] page_type: f5(slab)
[   23.616158] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.616877] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.617496] page dumped because: kasan: bad access detected
[   23.617986] 
[   23.618208] Memory state around the buggy address:
[   23.618711]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.619303]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.619883] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.620572]                                      ^
[   23.621057]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.621714]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.622276] ==================================================================
[   22.386857] ==================================================================
[   22.388432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   22.389670] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.390227] 
[   22.390641] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.390872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.390917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.390977] Call Trace:
[   22.391030]  <TASK>
[   22.391082]  dump_stack_lvl+0x73/0xb0
[   22.391170]  print_report+0xd1/0x650
[   22.391248]  ? __virt_addr_valid+0x1db/0x2d0
[   22.391329]  ? kasan_atomics_helper+0x8f9/0x5450
[   22.391426]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.391517]  ? kasan_atomics_helper+0x8f9/0x5450
[   22.391612]  kasan_report+0x141/0x180
[   22.391691]  ? kasan_atomics_helper+0x8f9/0x5450
[   22.391734]  kasan_check_range+0x10c/0x1c0
[   22.391774]  __kasan_check_write+0x18/0x20
[   22.391805]  kasan_atomics_helper+0x8f9/0x5450
[   22.391864]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.391903]  ? kasan_save_alloc_info+0x3b/0x50
[   22.391947]  kasan_atomics+0x1dc/0x310
[   22.391985]  ? __pfx_kasan_atomics+0x10/0x10
[   22.392023]  ? __pfx_read_tsc+0x10/0x10
[   22.392056]  ? ktime_get_ts64+0x86/0x230
[   22.392096]  kunit_try_run_case+0x1a5/0x480
[   22.392134]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.392168]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.392201]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.392293]  ? __kthread_parkme+0x82/0x180
[   22.392361]  ? preempt_count_sub+0x50/0x80
[   22.392400]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.392436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.392473]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.392511]  kthread+0x337/0x6f0
[   22.392540]  ? trace_preempt_on+0x20/0xc0
[   22.392577]  ? __pfx_kthread+0x10/0x10
[   22.392607]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.392644]  ? calculate_sigpending+0x7b/0xa0
[   22.392681]  ? __pfx_kthread+0x10/0x10
[   22.392713]  ret_from_fork+0x116/0x1d0
[   22.392740]  ? __pfx_kthread+0x10/0x10
[   22.392771]  ret_from_fork_asm+0x1a/0x30
[   22.392816]  </TASK>
[   22.392872] 
[   22.410743] Allocated by task 292:
[   22.411122]  kasan_save_stack+0x45/0x70
[   22.411979]  kasan_save_track+0x18/0x40
[   22.412437]  kasan_save_alloc_info+0x3b/0x50
[   22.413082]  __kasan_kmalloc+0xb7/0xc0
[   22.413697]  __kmalloc_cache_noprof+0x189/0x420
[   22.414044]  kasan_atomics+0x95/0x310
[   22.414328]  kunit_try_run_case+0x1a5/0x480
[   22.414898]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.415388]  kthread+0x337/0x6f0
[   22.415751]  ret_from_fork+0x116/0x1d0
[   22.416149]  ret_from_fork_asm+0x1a/0x30
[   22.416550] 
[   22.416761] The buggy address belongs to the object at ffff88810383ae00
[   22.416761]  which belongs to the cache kmalloc-64 of size 64
[   22.418343] The buggy address is located 0 bytes to the right of
[   22.418343]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.419093] 
[   22.419397] The buggy address belongs to the physical page:
[   22.419974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.420764] flags: 0x200000000000000(node=0|zone=2)
[   22.421639] page_type: f5(slab)
[   22.421994] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.422941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.424014] page dumped because: kasan: bad access detected
[   22.424756] 
[   22.424975] Memory state around the buggy address:
[   22.425630]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.426439]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.427175] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.427691]                                      ^
[   22.428073]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.428671]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.429109] ==================================================================
[   23.537608] ==================================================================
[   23.538221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   23.538784] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.539440] 
[   23.539735] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.539876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.539918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.539979] Call Trace:
[   23.540029]  <TASK>
[   23.540077]  dump_stack_lvl+0x73/0xb0
[   23.540159]  print_report+0xd1/0x650
[   23.540237]  ? __virt_addr_valid+0x1db/0x2d0
[   23.540313]  ? kasan_atomics_helper+0x164f/0x5450
[   23.540389]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.540465]  ? kasan_atomics_helper+0x164f/0x5450
[   23.540538]  kasan_report+0x141/0x180
[   23.540617]  ? kasan_atomics_helper+0x164f/0x5450
[   23.540704]  kasan_check_range+0x10c/0x1c0
[   23.540803]  __kasan_check_write+0x18/0x20
[   23.540911]  kasan_atomics_helper+0x164f/0x5450
[   23.540990]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.541065]  ? kasan_save_alloc_info+0x3b/0x50
[   23.541152]  kasan_atomics+0x1dc/0x310
[   23.541231]  ? __pfx_kasan_atomics+0x10/0x10
[   23.541314]  ? __pfx_read_tsc+0x10/0x10
[   23.541382]  ? ktime_get_ts64+0x86/0x230
[   23.541462]  kunit_try_run_case+0x1a5/0x480
[   23.541537]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.541610]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.541678]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.541759]  ? __kthread_parkme+0x82/0x180
[   23.541826]  ? preempt_count_sub+0x50/0x80
[   23.541925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.542004]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.542062]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.542126]  kthread+0x337/0x6f0
[   23.542195]  ? trace_preempt_on+0x20/0xc0
[   23.542275]  ? __pfx_kthread+0x10/0x10
[   23.542399]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.542500]  ? calculate_sigpending+0x7b/0xa0
[   23.542628]  ? __pfx_kthread+0x10/0x10
[   23.542731]  ret_from_fork+0x116/0x1d0
[   23.542815]  ? __pfx_kthread+0x10/0x10
[   23.542921]  ret_from_fork_asm+0x1a/0x30
[   23.543014]  </TASK>
[   23.543054] 
[   23.556708] Allocated by task 292:
[   23.557141]  kasan_save_stack+0x45/0x70
[   23.557577]  kasan_save_track+0x18/0x40
[   23.558010]  kasan_save_alloc_info+0x3b/0x50
[   23.558890]  __kasan_kmalloc+0xb7/0xc0
[   23.559321]  __kmalloc_cache_noprof+0x189/0x420
[   23.559867]  kasan_atomics+0x95/0x310
[   23.560367]  kunit_try_run_case+0x1a5/0x480
[   23.560902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.561473]  kthread+0x337/0x6f0
[   23.561811]  ret_from_fork+0x116/0x1d0
[   23.562215]  ret_from_fork_asm+0x1a/0x30
[   23.562575] 
[   23.562736] The buggy address belongs to the object at ffff88810383ae00
[   23.562736]  which belongs to the cache kmalloc-64 of size 64
[   23.563917] The buggy address is located 0 bytes to the right of
[   23.563917]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.565102] 
[   23.565418] The buggy address belongs to the physical page:
[   23.565885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.566350] flags: 0x200000000000000(node=0|zone=2)
[   23.566677] page_type: f5(slab)
[   23.566992] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.567640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.568391] page dumped because: kasan: bad access detected
[   23.568895] 
[   23.569194] Memory state around the buggy address:
[   23.569792]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.570501]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.571101] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.571670]                                      ^
[   23.572006]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.572530]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.573574] ==================================================================
[   23.660976] ==================================================================
[   23.661644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   23.662249] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.662928] 
[   23.663138] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.663346] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.663391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.663455] Call Trace:
[   23.663504]  <TASK>
[   23.663559]  dump_stack_lvl+0x73/0xb0
[   23.663682]  print_report+0xd1/0x650
[   23.663767]  ? __virt_addr_valid+0x1db/0x2d0
[   23.663891]  ? kasan_atomics_helper+0x1818/0x5450
[   23.663976]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.664056]  ? kasan_atomics_helper+0x1818/0x5450
[   23.664135]  kasan_report+0x141/0x180
[   23.664255]  ? kasan_atomics_helper+0x1818/0x5450
[   23.664381]  kasan_check_range+0x10c/0x1c0
[   23.664469]  __kasan_check_write+0x18/0x20
[   23.664541]  kasan_atomics_helper+0x1818/0x5450
[   23.664617]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.664690]  ? kasan_save_alloc_info+0x3b/0x50
[   23.664781]  kasan_atomics+0x1dc/0x310
[   23.664876]  ? __pfx_kasan_atomics+0x10/0x10
[   23.664947]  ? __pfx_read_tsc+0x10/0x10
[   23.665004]  ? ktime_get_ts64+0x86/0x230
[   23.665088]  kunit_try_run_case+0x1a5/0x480
[   23.665244]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.665329]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.665404]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.665487]  ? __kthread_parkme+0x82/0x180
[   23.665563]  ? preempt_count_sub+0x50/0x80
[   23.665645]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.665766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.665855]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.665918]  kthread+0x337/0x6f0
[   23.665984]  ? trace_preempt_on+0x20/0xc0
[   23.666060]  ? __pfx_kthread+0x10/0x10
[   23.666134]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.666255]  ? calculate_sigpending+0x7b/0xa0
[   23.666344]  ? __pfx_kthread+0x10/0x10
[   23.666416]  ret_from_fork+0x116/0x1d0
[   23.666485]  ? __pfx_kthread+0x10/0x10
[   23.666562]  ret_from_fork_asm+0x1a/0x30
[   23.666657]  </TASK>
[   23.666698] 
[   23.680129] Allocated by task 292:
[   23.680533]  kasan_save_stack+0x45/0x70
[   23.680974]  kasan_save_track+0x18/0x40
[   23.681479]  kasan_save_alloc_info+0x3b/0x50
[   23.681916]  __kasan_kmalloc+0xb7/0xc0
[   23.682393]  __kmalloc_cache_noprof+0x189/0x420
[   23.682905]  kasan_atomics+0x95/0x310
[   23.683371]  kunit_try_run_case+0x1a5/0x480
[   23.683780]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.684154]  kthread+0x337/0x6f0
[   23.684475]  ret_from_fork+0x116/0x1d0
[   23.684895]  ret_from_fork_asm+0x1a/0x30
[   23.685383] 
[   23.685625] The buggy address belongs to the object at ffff88810383ae00
[   23.685625]  which belongs to the cache kmalloc-64 of size 64
[   23.686665] The buggy address is located 0 bytes to the right of
[   23.686665]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.687523] 
[   23.687702] The buggy address belongs to the physical page:
[   23.688298] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.689019] flags: 0x200000000000000(node=0|zone=2)
[   23.689470] page_type: f5(slab)
[   23.689727] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.690455] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.691059] page dumped because: kasan: bad access detected
[   23.691451] 
[   23.691620] Memory state around the buggy address:
[   23.691945]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.692410]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.692959] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.693638]                                      ^
[   23.694122]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.694806]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.695493] ==================================================================
[   22.993854] ==================================================================
[   22.995074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   22.995733] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.996391] 
[   22.996649] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.996825] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.996885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.996942] Call Trace:
[   22.996967]  <TASK>
[   22.996993]  dump_stack_lvl+0x73/0xb0
[   22.997037]  print_report+0xd1/0x650
[   22.997099]  ? __virt_addr_valid+0x1db/0x2d0
[   22.997157]  ? kasan_atomics_helper+0x4a1c/0x5450
[   22.997259]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.997342]  ? kasan_atomics_helper+0x4a1c/0x5450
[   22.997416]  kasan_report+0x141/0x180
[   22.997492]  ? kasan_atomics_helper+0x4a1c/0x5450
[   22.997579]  __asan_report_load4_noabort+0x18/0x20
[   22.997655]  kasan_atomics_helper+0x4a1c/0x5450
[   22.997734]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.997813]  ? kasan_save_alloc_info+0x3b/0x50
[   22.997928]  kasan_atomics+0x1dc/0x310
[   22.998012]  ? __pfx_kasan_atomics+0x10/0x10
[   22.998138]  ? __pfx_read_tsc+0x10/0x10
[   22.998252]  ? ktime_get_ts64+0x86/0x230
[   22.998339]  kunit_try_run_case+0x1a5/0x480
[   22.998420]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.998493]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.998561]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.998640]  ? __kthread_parkme+0x82/0x180
[   22.998711]  ? preempt_count_sub+0x50/0x80
[   22.998789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.998885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.998933]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.998972]  kthread+0x337/0x6f0
[   22.999003]  ? trace_preempt_on+0x20/0xc0
[   22.999042]  ? __pfx_kthread+0x10/0x10
[   22.999072]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.999109]  ? calculate_sigpending+0x7b/0xa0
[   22.999146]  ? __pfx_kthread+0x10/0x10
[   22.999177]  ret_from_fork+0x116/0x1d0
[   22.999203]  ? __pfx_kthread+0x10/0x10
[   22.999277]  ret_from_fork_asm+0x1a/0x30
[   22.999323]  </TASK>
[   22.999341] 
[   23.015088] Allocated by task 292:
[   23.015753]  kasan_save_stack+0x45/0x70
[   23.016088]  kasan_save_track+0x18/0x40
[   23.016384]  kasan_save_alloc_info+0x3b/0x50
[   23.016697]  __kasan_kmalloc+0xb7/0xc0
[   23.017162]  __kmalloc_cache_noprof+0x189/0x420
[   23.017777]  kasan_atomics+0x95/0x310
[   23.018211]  kunit_try_run_case+0x1a5/0x480
[   23.018587]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.019106]  kthread+0x337/0x6f0
[   23.019526]  ret_from_fork+0x116/0x1d0
[   23.020262]  ret_from_fork_asm+0x1a/0x30
[   23.020651] 
[   23.020914] The buggy address belongs to the object at ffff88810383ae00
[   23.020914]  which belongs to the cache kmalloc-64 of size 64
[   23.021908] The buggy address is located 0 bytes to the right of
[   23.021908]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.023005] 
[   23.024133] The buggy address belongs to the physical page:
[   23.025009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.026140] flags: 0x200000000000000(node=0|zone=2)
[   23.026918] page_type: f5(slab)
[   23.027066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.027718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.028995] page dumped because: kasan: bad access detected
[   23.029588] 
[   23.029977] Memory state around the buggy address:
[   23.030811]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.032164]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.033073] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.033702]                                      ^
[   23.034089]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.035233]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.035864] ==================================================================
[   23.623866] ==================================================================
[   23.624619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   23.625243] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.626465] 
[   23.626687] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.626873] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.626917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.626979] Call Trace:
[   23.627034]  <TASK>
[   23.627084]  dump_stack_lvl+0x73/0xb0
[   23.627251]  print_report+0xd1/0x650
[   23.627369]  ? __virt_addr_valid+0x1db/0x2d0
[   23.627446]  ? kasan_atomics_helper+0x177f/0x5450
[   23.627520]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.627608]  ? kasan_atomics_helper+0x177f/0x5450
[   23.627757]  kasan_report+0x141/0x180
[   23.627857]  ? kasan_atomics_helper+0x177f/0x5450
[   23.627946]  kasan_check_range+0x10c/0x1c0
[   23.628067]  __kasan_check_write+0x18/0x20
[   23.628145]  kasan_atomics_helper+0x177f/0x5450
[   23.628226]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.628289]  ? kasan_save_alloc_info+0x3b/0x50
[   23.628336]  kasan_atomics+0x1dc/0x310
[   23.628371]  ? __pfx_kasan_atomics+0x10/0x10
[   23.628407]  ? __pfx_read_tsc+0x10/0x10
[   23.628440]  ? ktime_get_ts64+0x86/0x230
[   23.628477]  kunit_try_run_case+0x1a5/0x480
[   23.628512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.628545]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.628575]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.628614]  ? __kthread_parkme+0x82/0x180
[   23.628641]  ? preempt_count_sub+0x50/0x80
[   23.628674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.628709]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.628744]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.628779]  kthread+0x337/0x6f0
[   23.628808]  ? trace_preempt_on+0x20/0xc0
[   23.628872]  ? __pfx_kthread+0x10/0x10
[   23.628907]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.628943]  ? calculate_sigpending+0x7b/0xa0
[   23.628981]  ? __pfx_kthread+0x10/0x10
[   23.629012]  ret_from_fork+0x116/0x1d0
[   23.629039]  ? __pfx_kthread+0x10/0x10
[   23.629069]  ret_from_fork_asm+0x1a/0x30
[   23.629110]  </TASK>
[   23.629125] 
[   23.642957] Allocated by task 292:
[   23.643379]  kasan_save_stack+0x45/0x70
[   23.643768]  kasan_save_track+0x18/0x40
[   23.644177]  kasan_save_alloc_info+0x3b/0x50
[   23.644670]  __kasan_kmalloc+0xb7/0xc0
[   23.645067]  __kmalloc_cache_noprof+0x189/0x420
[   23.645440]  kasan_atomics+0x95/0x310
[   23.645728]  kunit_try_run_case+0x1a5/0x480
[   23.646188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.646754]  kthread+0x337/0x6f0
[   23.647208]  ret_from_fork+0x116/0x1d0
[   23.647666]  ret_from_fork_asm+0x1a/0x30
[   23.648125] 
[   23.648378] The buggy address belongs to the object at ffff88810383ae00
[   23.648378]  which belongs to the cache kmalloc-64 of size 64
[   23.649387] The buggy address is located 0 bytes to the right of
[   23.649387]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.650080] 
[   23.650376] The buggy address belongs to the physical page:
[   23.650861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.651639] flags: 0x200000000000000(node=0|zone=2)
[   23.652153] page_type: f5(slab)
[   23.652533] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.653208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.653873] page dumped because: kasan: bad access detected
[   23.654398] 
[   23.654603] Memory state around the buggy address:
[   23.655050]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.655699]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.656374] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.656984]                                      ^
[   23.657386]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.657809]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.658526] ==================================================================
[   22.741536] ==================================================================
[   22.742112] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   22.743813] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.744776] 
[   22.745039] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.745167] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.745209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.745273] Call Trace:
[   22.745326]  <TASK>
[   22.745376]  dump_stack_lvl+0x73/0xb0
[   22.745462]  print_report+0xd1/0x650
[   22.745544]  ? __virt_addr_valid+0x1db/0x2d0
[   22.745623]  ? kasan_atomics_helper+0xde0/0x5450
[   22.745695]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.745771]  ? kasan_atomics_helper+0xde0/0x5450
[   22.745864]  kasan_report+0x141/0x180
[   22.745944]  ? kasan_atomics_helper+0xde0/0x5450
[   22.746037]  kasan_check_range+0x10c/0x1c0
[   22.746124]  __kasan_check_write+0x18/0x20
[   22.746200]  kasan_atomics_helper+0xde0/0x5450
[   22.746281]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.746363]  ? kasan_save_alloc_info+0x3b/0x50
[   22.746418]  kasan_atomics+0x1dc/0x310
[   22.746455]  ? __pfx_kasan_atomics+0x10/0x10
[   22.746492]  ? __pfx_read_tsc+0x10/0x10
[   22.746522]  ? ktime_get_ts64+0x86/0x230
[   22.746559]  kunit_try_run_case+0x1a5/0x480
[   22.746596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.746630]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.746660]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.746698]  ? __kthread_parkme+0x82/0x180
[   22.746727]  ? preempt_count_sub+0x50/0x80
[   22.746760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.746795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.746852]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.746896]  kthread+0x337/0x6f0
[   22.746926]  ? trace_preempt_on+0x20/0xc0
[   22.746962]  ? __pfx_kthread+0x10/0x10
[   22.746994]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.747030]  ? calculate_sigpending+0x7b/0xa0
[   22.747065]  ? __pfx_kthread+0x10/0x10
[   22.747096]  ret_from_fork+0x116/0x1d0
[   22.747123]  ? __pfx_kthread+0x10/0x10
[   22.747152]  ret_from_fork_asm+0x1a/0x30
[   22.747193]  </TASK>
[   22.747209] 
[   22.767688] Allocated by task 292:
[   22.767974]  kasan_save_stack+0x45/0x70
[   22.768390]  kasan_save_track+0x18/0x40
[   22.768789]  kasan_save_alloc_info+0x3b/0x50
[   22.769239]  __kasan_kmalloc+0xb7/0xc0
[   22.769633]  __kmalloc_cache_noprof+0x189/0x420
[   22.770089]  kasan_atomics+0x95/0x310
[   22.770468]  kunit_try_run_case+0x1a5/0x480
[   22.770992]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.771629]  kthread+0x337/0x6f0
[   22.772022]  ret_from_fork+0x116/0x1d0
[   22.772565]  ret_from_fork_asm+0x1a/0x30
[   22.772999] 
[   22.773218] The buggy address belongs to the object at ffff88810383ae00
[   22.773218]  which belongs to the cache kmalloc-64 of size 64
[   22.773919] The buggy address is located 0 bytes to the right of
[   22.773919]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.775444] 
[   22.775676] The buggy address belongs to the physical page:
[   22.776213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.777076] flags: 0x200000000000000(node=0|zone=2)
[   22.777624] page_type: f5(slab)
[   22.778014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.778880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.779432] page dumped because: kasan: bad access detected
[   22.779777] 
[   22.780520] Memory state around the buggy address:
[   22.781005]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.782061]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.783040] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.784054]                                      ^
[   22.784705]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.785303]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.785878] ==================================================================
[   23.080894] ==================================================================
[   23.083875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   23.084878] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.085701] 
[   23.085983] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.086144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.086188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.086375] Call Trace:
[   23.086458]  <TASK>
[   23.086513]  dump_stack_lvl+0x73/0xb0
[   23.086601]  print_report+0xd1/0x650
[   23.086700]  ? __virt_addr_valid+0x1db/0x2d0
[   23.086811]  ? kasan_atomics_helper+0x4a02/0x5450
[   23.086904]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.086980]  ? kasan_atomics_helper+0x4a02/0x5450
[   23.087056]  kasan_report+0x141/0x180
[   23.087132]  ? kasan_atomics_helper+0x4a02/0x5450
[   23.087242]  __asan_report_load4_noabort+0x18/0x20
[   23.087354]  kasan_atomics_helper+0x4a02/0x5450
[   23.087486]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.087575]  ? kasan_save_alloc_info+0x3b/0x50
[   23.087626]  kasan_atomics+0x1dc/0x310
[   23.087663]  ? __pfx_kasan_atomics+0x10/0x10
[   23.087699]  ? __pfx_read_tsc+0x10/0x10
[   23.087733]  ? ktime_get_ts64+0x86/0x230
[   23.087769]  kunit_try_run_case+0x1a5/0x480
[   23.087805]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.087867]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.087904]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.087944]  ? __kthread_parkme+0x82/0x180
[   23.087976]  ? preempt_count_sub+0x50/0x80
[   23.088010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.088046]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.088081]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.088116]  kthread+0x337/0x6f0
[   23.088146]  ? trace_preempt_on+0x20/0xc0
[   23.088181]  ? __pfx_kthread+0x10/0x10
[   23.088215]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.088275]  ? calculate_sigpending+0x7b/0xa0
[   23.088316]  ? __pfx_kthread+0x10/0x10
[   23.088348]  ret_from_fork+0x116/0x1d0
[   23.088377]  ? __pfx_kthread+0x10/0x10
[   23.088409]  ret_from_fork_asm+0x1a/0x30
[   23.088452]  </TASK>
[   23.088468] 
[   23.103890] Allocated by task 292:
[   23.104348]  kasan_save_stack+0x45/0x70
[   23.104748]  kasan_save_track+0x18/0x40
[   23.105190]  kasan_save_alloc_info+0x3b/0x50
[   23.105551]  __kasan_kmalloc+0xb7/0xc0
[   23.106059]  __kmalloc_cache_noprof+0x189/0x420
[   23.106619]  kasan_atomics+0x95/0x310
[   23.107020]  kunit_try_run_case+0x1a5/0x480
[   23.107480]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.108058]  kthread+0x337/0x6f0
[   23.108518]  ret_from_fork+0x116/0x1d0
[   23.108942]  ret_from_fork_asm+0x1a/0x30
[   23.109425] 
[   23.109698] The buggy address belongs to the object at ffff88810383ae00
[   23.109698]  which belongs to the cache kmalloc-64 of size 64
[   23.110671] The buggy address is located 0 bytes to the right of
[   23.110671]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.111741] 
[   23.111994] The buggy address belongs to the physical page:
[   23.112515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.113336] flags: 0x200000000000000(node=0|zone=2)
[   23.113847] page_type: f5(slab)
[   23.114255] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.114895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.115460] page dumped because: kasan: bad access detected
[   23.115981] 
[   23.116189] Memory state around the buggy address:
[   23.116724]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.117442]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.117884] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.118484]                                      ^
[   23.119057]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.119725]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.120431] ==================================================================
[   22.430579] ==================================================================
[   22.431402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   22.431957] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.432666] 
[   22.432980] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.433110] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.433152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.433213] Call Trace:
[   22.433264]  <TASK>
[   22.433312]  dump_stack_lvl+0x73/0xb0
[   22.433394]  print_report+0xd1/0x650
[   22.433470]  ? __virt_addr_valid+0x1db/0x2d0
[   22.433546]  ? kasan_atomics_helper+0x992/0x5450
[   22.433620]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.433733]  ? kasan_atomics_helper+0x992/0x5450
[   22.433818]  kasan_report+0x141/0x180
[   22.433945]  ? kasan_atomics_helper+0x992/0x5450
[   22.434040]  kasan_check_range+0x10c/0x1c0
[   22.434125]  __kasan_check_write+0x18/0x20
[   22.434197]  kasan_atomics_helper+0x992/0x5450
[   22.434627]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.434704]  ? kasan_save_alloc_info+0x3b/0x50
[   22.434796]  kasan_atomics+0x1dc/0x310
[   22.434893]  ? __pfx_kasan_atomics+0x10/0x10
[   22.434972]  ? __pfx_read_tsc+0x10/0x10
[   22.435008]  ? ktime_get_ts64+0x86/0x230
[   22.435047]  kunit_try_run_case+0x1a5/0x480
[   22.435086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.435124]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.435156]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.435194]  ? __kthread_parkme+0x82/0x180
[   22.435241]  ? preempt_count_sub+0x50/0x80
[   22.435322]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.435385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.435422]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.435459]  kthread+0x337/0x6f0
[   22.435489]  ? trace_preempt_on+0x20/0xc0
[   22.435526]  ? __pfx_kthread+0x10/0x10
[   22.435569]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.435606]  ? calculate_sigpending+0x7b/0xa0
[   22.435642]  ? __pfx_kthread+0x10/0x10
[   22.435674]  ret_from_fork+0x116/0x1d0
[   22.435701]  ? __pfx_kthread+0x10/0x10
[   22.435733]  ret_from_fork_asm+0x1a/0x30
[   22.435777]  </TASK>
[   22.435793] 
[   22.456093] Allocated by task 292:
[   22.456717]  kasan_save_stack+0x45/0x70
[   22.457129]  kasan_save_track+0x18/0x40
[   22.458000]  kasan_save_alloc_info+0x3b/0x50
[   22.458316]  __kasan_kmalloc+0xb7/0xc0
[   22.458744]  __kmalloc_cache_noprof+0x189/0x420
[   22.459268]  kasan_atomics+0x95/0x310
[   22.460098]  kunit_try_run_case+0x1a5/0x480
[   22.460513]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.461216]  kthread+0x337/0x6f0
[   22.461608]  ret_from_fork+0x116/0x1d0
[   22.462046]  ret_from_fork_asm+0x1a/0x30
[   22.462902] 
[   22.463095] The buggy address belongs to the object at ffff88810383ae00
[   22.463095]  which belongs to the cache kmalloc-64 of size 64
[   22.464293] The buggy address is located 0 bytes to the right of
[   22.464293]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.466105] 
[   22.466471] The buggy address belongs to the physical page:
[   22.466827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.467359] flags: 0x200000000000000(node=0|zone=2)
[   22.468230] page_type: f5(slab)
[   22.468744] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.470071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.470895] page dumped because: kasan: bad access detected
[   22.471653] 
[   22.471894] Memory state around the buggy address:
[   22.472284]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.473084]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.473625] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.474642]                                      ^
[   22.475049]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.475974]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.476601] ==================================================================
[   22.838529] ==================================================================
[   22.839152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   22.840146] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.841082] 
[   22.841321] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.841453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.841494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.841873] Call Trace:
[   22.842138]  <TASK>
[   22.842192]  dump_stack_lvl+0x73/0xb0
[   22.842278]  print_report+0xd1/0x650
[   22.842353]  ? __virt_addr_valid+0x1db/0x2d0
[   22.842432]  ? kasan_atomics_helper+0xf10/0x5450
[   22.842520]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.842560]  ? kasan_atomics_helper+0xf10/0x5450
[   22.842593]  kasan_report+0x141/0x180
[   22.842631]  ? kasan_atomics_helper+0xf10/0x5450
[   22.842713]  kasan_check_range+0x10c/0x1c0
[   22.842796]  __kasan_check_write+0x18/0x20
[   22.842976]  kasan_atomics_helper+0xf10/0x5450
[   22.843141]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.843253]  ? kasan_save_alloc_info+0x3b/0x50
[   22.843357]  kasan_atomics+0x1dc/0x310
[   22.843427]  ? __pfx_kasan_atomics+0x10/0x10
[   22.843469]  ? __pfx_read_tsc+0x10/0x10
[   22.843521]  ? ktime_get_ts64+0x86/0x230
[   22.843579]  kunit_try_run_case+0x1a5/0x480
[   22.843631]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.843673]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.843718]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.843770]  ? __kthread_parkme+0x82/0x180
[   22.843811]  ? preempt_count_sub+0x50/0x80
[   22.843879]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.843920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.843975]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.844013]  kthread+0x337/0x6f0
[   22.844062]  ? trace_preempt_on+0x20/0xc0
[   22.844098]  ? __pfx_kthread+0x10/0x10
[   22.844167]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.844217]  ? calculate_sigpending+0x7b/0xa0
[   22.844278]  ? __pfx_kthread+0x10/0x10
[   22.844313]  ret_from_fork+0x116/0x1d0
[   22.844340]  ? __pfx_kthread+0x10/0x10
[   22.844370]  ret_from_fork_asm+0x1a/0x30
[   22.844413]  </TASK>
[   22.844428] 
[   22.859815] Allocated by task 292:
[   22.860178]  kasan_save_stack+0x45/0x70
[   22.860581]  kasan_save_track+0x18/0x40
[   22.860975]  kasan_save_alloc_info+0x3b/0x50
[   22.862882]  __kasan_kmalloc+0xb7/0xc0
[   22.863315]  __kmalloc_cache_noprof+0x189/0x420
[   22.864063]  kasan_atomics+0x95/0x310
[   22.864341]  kunit_try_run_case+0x1a5/0x480
[   22.864826]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.865366]  kthread+0x337/0x6f0
[   22.865714]  ret_from_fork+0x116/0x1d0
[   22.866117]  ret_from_fork_asm+0x1a/0x30
[   22.866717] 
[   22.867038] The buggy address belongs to the object at ffff88810383ae00
[   22.867038]  which belongs to the cache kmalloc-64 of size 64
[   22.868139] The buggy address is located 0 bytes to the right of
[   22.868139]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.869171] 
[   22.869494] The buggy address belongs to the physical page:
[   22.869988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.870708] flags: 0x200000000000000(node=0|zone=2)
[   22.871262] page_type: f5(slab)
[   22.871719] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.872409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.873072] page dumped because: kasan: bad access detected
[   22.873607] 
[   22.873859] Memory state around the buggy address:
[   22.874388]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.875043]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.875726] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.876387]                                      ^
[   22.876882]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.877543]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.878303] ==================================================================
[   22.880251] ==================================================================
[   22.880741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   22.881560] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.882351] 
[   22.882737] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.882884] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.882926] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.882989] Call Trace:
[   22.883031]  <TASK>
[   22.883078]  dump_stack_lvl+0x73/0xb0
[   22.883157]  print_report+0xd1/0x650
[   22.883254]  ? __virt_addr_valid+0x1db/0x2d0
[   22.883488]  ? kasan_atomics_helper+0xfa9/0x5450
[   22.883601]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.883682]  ? kasan_atomics_helper+0xfa9/0x5450
[   22.883752]  kasan_report+0x141/0x180
[   22.883846]  ? kasan_atomics_helper+0xfa9/0x5450
[   22.883932]  kasan_check_range+0x10c/0x1c0
[   22.884016]  __kasan_check_write+0x18/0x20
[   22.884085]  kasan_atomics_helper+0xfa9/0x5450
[   22.884188]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.884320]  ? kasan_save_alloc_info+0x3b/0x50
[   22.884407]  kasan_atomics+0x1dc/0x310
[   22.884453]  ? __pfx_kasan_atomics+0x10/0x10
[   22.884494]  ? __pfx_read_tsc+0x10/0x10
[   22.884524]  ? ktime_get_ts64+0x86/0x230
[   22.884563]  kunit_try_run_case+0x1a5/0x480
[   22.884601]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.884635]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.884666]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.884704]  ? __kthread_parkme+0x82/0x180
[   22.884733]  ? preempt_count_sub+0x50/0x80
[   22.884768]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.884804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.884865]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.884906]  kthread+0x337/0x6f0
[   22.884938]  ? trace_preempt_on+0x20/0xc0
[   22.884975]  ? __pfx_kthread+0x10/0x10
[   22.885005]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.885041]  ? calculate_sigpending+0x7b/0xa0
[   22.885077]  ? __pfx_kthread+0x10/0x10
[   22.885110]  ret_from_fork+0x116/0x1d0
[   22.885138]  ? __pfx_kthread+0x10/0x10
[   22.885170]  ret_from_fork_asm+0x1a/0x30
[   22.885231]  </TASK>
[   22.885269] 
[   22.899260] Allocated by task 292:
[   22.899609]  kasan_save_stack+0x45/0x70
[   22.900024]  kasan_save_track+0x18/0x40
[   22.900432]  kasan_save_alloc_info+0x3b/0x50
[   22.900869]  __kasan_kmalloc+0xb7/0xc0
[   22.901247]  __kmalloc_cache_noprof+0x189/0x420
[   22.901692]  kasan_atomics+0x95/0x310
[   22.902060]  kunit_try_run_case+0x1a5/0x480
[   22.902438]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.902944]  kthread+0x337/0x6f0
[   22.903311]  ret_from_fork+0x116/0x1d0
[   22.903687]  ret_from_fork_asm+0x1a/0x30
[   22.904059] 
[   22.904267] The buggy address belongs to the object at ffff88810383ae00
[   22.904267]  which belongs to the cache kmalloc-64 of size 64
[   22.904937] The buggy address is located 0 bytes to the right of
[   22.904937]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.905547] 
[   22.905756] The buggy address belongs to the physical page:
[   22.906109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.907297] flags: 0x200000000000000(node=0|zone=2)
[   22.908072] page_type: f5(slab)
[   22.908711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.910102] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.910648] page dumped because: kasan: bad access detected
[   22.911007] 
[   22.911168] Memory state around the buggy address:
[   22.912284]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.913404]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.914504] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.915549]                                      ^
[   22.915985]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.916800]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.917268] ==================================================================
[   23.037692] ==================================================================
[   23.038516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   23.039170] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.039997] 
[   23.040191] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.040285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.040307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.040340] Call Trace:
[   23.040357]  <TASK>
[   23.040379]  dump_stack_lvl+0x73/0xb0
[   23.040419]  print_report+0xd1/0x650
[   23.040451]  ? __virt_addr_valid+0x1db/0x2d0
[   23.040484]  ? kasan_atomics_helper+0x1148/0x5450
[   23.040516]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.040550]  ? kasan_atomics_helper+0x1148/0x5450
[   23.040581]  kasan_report+0x141/0x180
[   23.040613]  ? kasan_atomics_helper+0x1148/0x5450
[   23.040652]  kasan_check_range+0x10c/0x1c0
[   23.040688]  __kasan_check_write+0x18/0x20
[   23.040716]  kasan_atomics_helper+0x1148/0x5450
[   23.040749]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.040781]  ? kasan_save_alloc_info+0x3b/0x50
[   23.040823]  kasan_atomics+0x1dc/0x310
[   23.040915]  ? __pfx_kasan_atomics+0x10/0x10
[   23.040997]  ? __pfx_read_tsc+0x10/0x10
[   23.041072]  ? ktime_get_ts64+0x86/0x230
[   23.041158]  kunit_try_run_case+0x1a5/0x480
[   23.041241]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.041320]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.041429]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.041520]  ? __kthread_parkme+0x82/0x180
[   23.041596]  ? preempt_count_sub+0x50/0x80
[   23.041676]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.041751]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.041843]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.041927]  kthread+0x337/0x6f0
[   23.041995]  ? trace_preempt_on+0x20/0xc0
[   23.042040]  ? __pfx_kthread+0x10/0x10
[   23.042073]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.042110]  ? calculate_sigpending+0x7b/0xa0
[   23.042146]  ? __pfx_kthread+0x10/0x10
[   23.042177]  ret_from_fork+0x116/0x1d0
[   23.042206]  ? __pfx_kthread+0x10/0x10
[   23.042266]  ret_from_fork_asm+0x1a/0x30
[   23.042314]  </TASK>
[   23.042329] 
[   23.058395] Allocated by task 292:
[   23.058733]  kasan_save_stack+0x45/0x70
[   23.059192]  kasan_save_track+0x18/0x40
[   23.059690]  kasan_save_alloc_info+0x3b/0x50
[   23.060179]  __kasan_kmalloc+0xb7/0xc0
[   23.060670]  __kmalloc_cache_noprof+0x189/0x420
[   23.061198]  kasan_atomics+0x95/0x310
[   23.061723]  kunit_try_run_case+0x1a5/0x480
[   23.062185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.062770]  kthread+0x337/0x6f0
[   23.063170]  ret_from_fork+0x116/0x1d0
[   23.063499]  ret_from_fork_asm+0x1a/0x30
[   23.063918] 
[   23.064199] The buggy address belongs to the object at ffff88810383ae00
[   23.064199]  which belongs to the cache kmalloc-64 of size 64
[   23.065425] The buggy address is located 0 bytes to the right of
[   23.065425]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.066594] 
[   23.066856] The buggy address belongs to the physical page:
[   23.067302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.067958] flags: 0x200000000000000(node=0|zone=2)
[   23.068534] page_type: f5(slab)
[   23.068799] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.069659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.070393] page dumped because: kasan: bad access detected
[   23.070810] 
[   23.070973] Memory state around the buggy address:
[   23.072104]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.074463]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.076255] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.076618]                                      ^
[   23.076915]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.077276]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.077670] ==================================================================
[   23.980682] ==================================================================
[   23.981764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   23.982869] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.983948] 
[   23.984407] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.984592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.984661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.984723] Call Trace:
[   23.984818]  <TASK>
[   23.984900]  dump_stack_lvl+0x73/0xb0
[   23.984982]  print_report+0xd1/0x650
[   23.985067]  ? __virt_addr_valid+0x1db/0x2d0
[   23.985202]  ? kasan_atomics_helper+0x1ce1/0x5450
[   23.985309]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.985391]  ? kasan_atomics_helper+0x1ce1/0x5450
[   23.985516]  kasan_report+0x141/0x180
[   23.985626]  ? kasan_atomics_helper+0x1ce1/0x5450
[   23.985716]  kasan_check_range+0x10c/0x1c0
[   23.985775]  __kasan_check_write+0x18/0x20
[   23.985807]  kasan_atomics_helper+0x1ce1/0x5450
[   23.985866]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.985903]  ? kasan_save_alloc_info+0x3b/0x50
[   23.985948]  kasan_atomics+0x1dc/0x310
[   23.985984]  ? __pfx_kasan_atomics+0x10/0x10
[   23.986021]  ? __pfx_read_tsc+0x10/0x10
[   23.986053]  ? ktime_get_ts64+0x86/0x230
[   23.986093]  kunit_try_run_case+0x1a5/0x480
[   23.986130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.986165]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.986195]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.986259]  ? __kthread_parkme+0x82/0x180
[   23.986295]  ? preempt_count_sub+0x50/0x80
[   23.986332]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.986368]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.986403]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.986439]  kthread+0x337/0x6f0
[   23.986467]  ? trace_preempt_on+0x20/0xc0
[   23.986505]  ? __pfx_kthread+0x10/0x10
[   23.986537]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.986573]  ? calculate_sigpending+0x7b/0xa0
[   23.986610]  ? __pfx_kthread+0x10/0x10
[   23.986641]  ret_from_fork+0x116/0x1d0
[   23.986668]  ? __pfx_kthread+0x10/0x10
[   23.986698]  ret_from_fork_asm+0x1a/0x30
[   23.986742]  </TASK>
[   23.986759] 
[   24.003930] Allocated by task 292:
[   24.004297]  kasan_save_stack+0x45/0x70
[   24.004777]  kasan_save_track+0x18/0x40
[   24.005222]  kasan_save_alloc_info+0x3b/0x50
[   24.005696]  __kasan_kmalloc+0xb7/0xc0
[   24.006869]  __kmalloc_cache_noprof+0x189/0x420
[   24.007230]  kasan_atomics+0x95/0x310
[   24.007643]  kunit_try_run_case+0x1a5/0x480
[   24.008017]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.008599]  kthread+0x337/0x6f0
[   24.009018]  ret_from_fork+0x116/0x1d0
[   24.009494]  ret_from_fork_asm+0x1a/0x30
[   24.010749] 
[   24.011094] The buggy address belongs to the object at ffff88810383ae00
[   24.011094]  which belongs to the cache kmalloc-64 of size 64
[   24.012184] The buggy address is located 0 bytes to the right of
[   24.012184]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   24.013290] 
[   24.013535] The buggy address belongs to the physical page:
[   24.014093] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   24.014749] flags: 0x200000000000000(node=0|zone=2)
[   24.015303] page_type: f5(slab)
[   24.015765] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.016389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.017042] page dumped because: kasan: bad access detected
[   24.017508] 
[   24.017698] Memory state around the buggy address:
[   24.018129]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.018648]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.019424] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.019875]                                      ^
[   24.020334]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.021330]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.021883] ==================================================================
[   24.146870] ==================================================================
[   24.147501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   24.148145] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   24.148792] 
[   24.149056] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   24.149193] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.149280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.149346] Call Trace:
[   24.149399]  <TASK>
[   24.149450]  dump_stack_lvl+0x73/0xb0
[   24.149539]  print_report+0xd1/0x650
[   24.149617]  ? __virt_addr_valid+0x1db/0x2d0
[   24.149694]  ? kasan_atomics_helper+0x1f43/0x5450
[   24.149771]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.149904]  ? kasan_atomics_helper+0x1f43/0x5450
[   24.149987]  kasan_report+0x141/0x180
[   24.150067]  ? kasan_atomics_helper+0x1f43/0x5450
[   24.150153]  kasan_check_range+0x10c/0x1c0
[   24.150271]  __kasan_check_write+0x18/0x20
[   24.150346]  kasan_atomics_helper+0x1f43/0x5450
[   24.150419]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.150490]  ? kasan_save_alloc_info+0x3b/0x50
[   24.150579]  kasan_atomics+0x1dc/0x310
[   24.150656]  ? __pfx_kasan_atomics+0x10/0x10
[   24.150733]  ? __pfx_read_tsc+0x10/0x10
[   24.150804]  ? ktime_get_ts64+0x86/0x230
[   24.150921]  kunit_try_run_case+0x1a5/0x480
[   24.150998]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.151074]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.151122]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.151164]  ? __kthread_parkme+0x82/0x180
[   24.151194]  ? preempt_count_sub+0x50/0x80
[   24.151272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.151314]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.151350]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.151388]  kthread+0x337/0x6f0
[   24.151419]  ? trace_preempt_on+0x20/0xc0
[   24.151457]  ? __pfx_kthread+0x10/0x10
[   24.151489]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.151526]  ? calculate_sigpending+0x7b/0xa0
[   24.151574]  ? __pfx_kthread+0x10/0x10
[   24.151608]  ret_from_fork+0x116/0x1d0
[   24.151636]  ? __pfx_kthread+0x10/0x10
[   24.151666]  ret_from_fork_asm+0x1a/0x30
[   24.151710]  </TASK>
[   24.151728] 
[   24.166855] Allocated by task 292:
[   24.167182]  kasan_save_stack+0x45/0x70
[   24.167645]  kasan_save_track+0x18/0x40
[   24.168043]  kasan_save_alloc_info+0x3b/0x50
[   24.168514]  __kasan_kmalloc+0xb7/0xc0
[   24.168904]  __kmalloc_cache_noprof+0x189/0x420
[   24.169357]  kasan_atomics+0x95/0x310
[   24.169736]  kunit_try_run_case+0x1a5/0x480
[   24.170147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.170598]  kthread+0x337/0x6f0
[   24.170969]  ret_from_fork+0x116/0x1d0
[   24.171379]  ret_from_fork_asm+0x1a/0x30
[   24.171752] 
[   24.171969] The buggy address belongs to the object at ffff88810383ae00
[   24.171969]  which belongs to the cache kmalloc-64 of size 64
[   24.172845] The buggy address is located 0 bytes to the right of
[   24.172845]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   24.173767] 
[   24.173956] The buggy address belongs to the physical page:
[   24.174350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   24.174817] flags: 0x200000000000000(node=0|zone=2)
[   24.175358] page_type: f5(slab)
[   24.175728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.176469] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.177128] page dumped because: kasan: bad access detected
[   24.177655] 
[   24.177815] Memory state around the buggy address:
[   24.178142]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.178672]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.179350] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.179958]                                      ^
[   24.180464]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.181064]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.181628] ==================================================================
[   24.422499] ==================================================================
[   24.423085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   24.423826] Read of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   24.424575] 
[   24.424777] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   24.424931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.424974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.425035] Call Trace:
[   24.425089]  <TASK>
[   24.425140]  dump_stack_lvl+0x73/0xb0
[   24.425279]  print_report+0xd1/0x650
[   24.425367]  ? __virt_addr_valid+0x1db/0x2d0
[   24.425465]  ? kasan_atomics_helper+0x4fa5/0x5450
[   24.425543]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.425689]  ? kasan_atomics_helper+0x4fa5/0x5450
[   24.425773]  kasan_report+0x141/0x180
[   24.425870]  ? kasan_atomics_helper+0x4fa5/0x5450
[   24.426030]  __asan_report_load8_noabort+0x18/0x20
[   24.426115]  kasan_atomics_helper+0x4fa5/0x5450
[   24.426194]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.426337]  ? kasan_save_alloc_info+0x3b/0x50
[   24.426433]  kasan_atomics+0x1dc/0x310
[   24.426491]  ? __pfx_kasan_atomics+0x10/0x10
[   24.426533]  ? __pfx_read_tsc+0x10/0x10
[   24.426565]  ? ktime_get_ts64+0x86/0x230
[   24.426617]  kunit_try_run_case+0x1a5/0x480
[   24.426696]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.426853]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.426932]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.427013]  ? __kthread_parkme+0x82/0x180
[   24.427087]  ? preempt_count_sub+0x50/0x80
[   24.427239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.427325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.427400]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.427442]  kthread+0x337/0x6f0
[   24.427472]  ? trace_preempt_on+0x20/0xc0
[   24.427511]  ? __pfx_kthread+0x10/0x10
[   24.427551]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.427588]  ? calculate_sigpending+0x7b/0xa0
[   24.427625]  ? __pfx_kthread+0x10/0x10
[   24.427656]  ret_from_fork+0x116/0x1d0
[   24.427684]  ? __pfx_kthread+0x10/0x10
[   24.427713]  ret_from_fork_asm+0x1a/0x30
[   24.427756]  </TASK>
[   24.427771] 
[   24.445923] Allocated by task 292:
[   24.446347]  kasan_save_stack+0x45/0x70
[   24.446763]  kasan_save_track+0x18/0x40
[   24.447149]  kasan_save_alloc_info+0x3b/0x50
[   24.447618]  __kasan_kmalloc+0xb7/0xc0
[   24.448069]  __kmalloc_cache_noprof+0x189/0x420
[   24.448489]  kasan_atomics+0x95/0x310
[   24.448776]  kunit_try_run_case+0x1a5/0x480
[   24.449318]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.449815]  kthread+0x337/0x6f0
[   24.450260]  ret_from_fork+0x116/0x1d0
[   24.450544]  ret_from_fork_asm+0x1a/0x30
[   24.450954] 
[   24.451179] The buggy address belongs to the object at ffff88810383ae00
[   24.451179]  which belongs to the cache kmalloc-64 of size 64
[   24.452326] The buggy address is located 0 bytes to the right of
[   24.452326]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   24.453190] 
[   24.453487] The buggy address belongs to the physical page:
[   24.454041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   24.454625] flags: 0x200000000000000(node=0|zone=2)
[   24.455051] page_type: f5(slab)
[   24.455482] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.456178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.456701] page dumped because: kasan: bad access detected
[   24.457059] 
[   24.457322] Memory state around the buggy address:
[   24.457776]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.458518]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.459100] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.459664]                                      ^
[   24.460001]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.460632]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.461352] ==================================================================
[   24.256794] ==================================================================
[   24.257392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   24.257951] Read of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   24.258540] 
[   24.258735] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   24.258880] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.258921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.258982] Call Trace:
[   24.259030]  <TASK>
[   24.259075]  dump_stack_lvl+0x73/0xb0
[   24.259154]  print_report+0xd1/0x650
[   24.259278]  ? __virt_addr_valid+0x1db/0x2d0
[   24.259362]  ? kasan_atomics_helper+0x4f98/0x5450
[   24.259436]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.259514]  ? kasan_atomics_helper+0x4f98/0x5450
[   24.259598]  kasan_report+0x141/0x180
[   24.259679]  ? kasan_atomics_helper+0x4f98/0x5450
[   24.259766]  __asan_report_load8_noabort+0x18/0x20
[   24.259873]  kasan_atomics_helper+0x4f98/0x5450
[   24.259956]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.260031]  ? kasan_save_alloc_info+0x3b/0x50
[   24.260120]  kasan_atomics+0x1dc/0x310
[   24.260197]  ? __pfx_kasan_atomics+0x10/0x10
[   24.260321]  ? __pfx_read_tsc+0x10/0x10
[   24.260390]  ? ktime_get_ts64+0x86/0x230
[   24.260472]  kunit_try_run_case+0x1a5/0x480
[   24.260547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.260622]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.260698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.260779]  ? __kthread_parkme+0x82/0x180
[   24.260868]  ? preempt_count_sub+0x50/0x80
[   24.260949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.261023]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.261098]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.261175]  kthread+0x337/0x6f0
[   24.261289]  ? trace_preempt_on+0x20/0xc0
[   24.261369]  ? __pfx_kthread+0x10/0x10
[   24.261439]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.261515]  ? calculate_sigpending+0x7b/0xa0
[   24.261593]  ? __pfx_kthread+0x10/0x10
[   24.261663]  ret_from_fork+0x116/0x1d0
[   24.261731]  ? __pfx_kthread+0x10/0x10
[   24.261806]  ret_from_fork_asm+0x1a/0x30
[   24.261921]  </TASK>
[   24.261960] 
[   24.274732] Allocated by task 292:
[   24.275122]  kasan_save_stack+0x45/0x70
[   24.275588]  kasan_save_track+0x18/0x40
[   24.276011]  kasan_save_alloc_info+0x3b/0x50
[   24.276479]  __kasan_kmalloc+0xb7/0xc0
[   24.276763]  __kmalloc_cache_noprof+0x189/0x420
[   24.277134]  kasan_atomics+0x95/0x310
[   24.277545]  kunit_try_run_case+0x1a5/0x480
[   24.277968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.278529]  kthread+0x337/0x6f0
[   24.278895]  ret_from_fork+0x116/0x1d0
[   24.279320]  ret_from_fork_asm+0x1a/0x30
[   24.279663] 
[   24.279879] The buggy address belongs to the object at ffff88810383ae00
[   24.279879]  which belongs to the cache kmalloc-64 of size 64
[   24.280619] The buggy address is located 0 bytes to the right of
[   24.280619]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   24.282788] 
[   24.283020] The buggy address belongs to the physical page:
[   24.284375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   24.284981] flags: 0x200000000000000(node=0|zone=2)
[   24.285316] page_type: f5(slab)
[   24.285578] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.287794] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.288754] page dumped because: kasan: bad access detected
[   24.289352] 
[   24.289559] Memory state around the buggy address:
[   24.290052]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.290721]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.291374] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.292087]                                      ^
[   24.292572]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.293131]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.293773] ==================================================================
[   22.062149] ==================================================================
[   22.062969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   22.063705] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.064518] 
[   22.064972] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.065104] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.065146] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.065225] Call Trace:
[   22.065279]  <TASK>
[   22.065327]  dump_stack_lvl+0x73/0xb0
[   22.065409]  print_report+0xd1/0x650
[   22.065483]  ? __virt_addr_valid+0x1db/0x2d0
[   22.065558]  ? kasan_atomics_helper+0x4b3a/0x5450
[   22.065631]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.065708]  ? kasan_atomics_helper+0x4b3a/0x5450
[   22.065786]  kasan_report+0x141/0x180
[   22.065888]  ? kasan_atomics_helper+0x4b3a/0x5450
[   22.065987]  __asan_report_store4_noabort+0x1b/0x30
[   22.066047]  kasan_atomics_helper+0x4b3a/0x5450
[   22.066085]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.066118]  ? kasan_save_alloc_info+0x3b/0x50
[   22.066161]  kasan_atomics+0x1dc/0x310
[   22.066195]  ? __pfx_kasan_atomics+0x10/0x10
[   22.066231]  ? __pfx_read_tsc+0x10/0x10
[   22.066263]  ? ktime_get_ts64+0x86/0x230
[   22.066300]  kunit_try_run_case+0x1a5/0x480
[   22.066336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.066369]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.066399]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.066438]  ? __kthread_parkme+0x82/0x180
[   22.066469]  ? preempt_count_sub+0x50/0x80
[   22.066543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.066617]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.066657]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.066693]  kthread+0x337/0x6f0
[   22.066723]  ? trace_preempt_on+0x20/0xc0
[   22.066760]  ? __pfx_kthread+0x10/0x10
[   22.066791]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.066825]  ? calculate_sigpending+0x7b/0xa0
[   22.066889]  ? __pfx_kthread+0x10/0x10
[   22.066921]  ret_from_fork+0x116/0x1d0
[   22.066950]  ? __pfx_kthread+0x10/0x10
[   22.066983]  ret_from_fork_asm+0x1a/0x30
[   22.067027]  </TASK>
[   22.067043] 
[   22.085734] Allocated by task 292:
[   22.086131]  kasan_save_stack+0x45/0x70
[   22.086440]  kasan_save_track+0x18/0x40
[   22.087151]  kasan_save_alloc_info+0x3b/0x50
[   22.087855]  __kasan_kmalloc+0xb7/0xc0
[   22.088203]  __kmalloc_cache_noprof+0x189/0x420
[   22.088901]  kasan_atomics+0x95/0x310
[   22.089860]  kunit_try_run_case+0x1a5/0x480
[   22.090342]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.090882]  kthread+0x337/0x6f0
[   22.091287]  ret_from_fork+0x116/0x1d0
[   22.091664]  ret_from_fork_asm+0x1a/0x30
[   22.092049] 
[   22.092294] The buggy address belongs to the object at ffff88810383ae00
[   22.092294]  which belongs to the cache kmalloc-64 of size 64
[   22.093155] The buggy address is located 0 bytes to the right of
[   22.093155]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.094322] 
[   22.094616] The buggy address belongs to the physical page:
[   22.095151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.095955] flags: 0x200000000000000(node=0|zone=2)
[   22.096713] page_type: f5(slab)
[   22.097012] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.097574] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.098108] page dumped because: kasan: bad access detected
[   22.098509] 
[   22.098660] Memory state around the buggy address:
[   22.100146]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.101386]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.102095] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.102667]                                      ^
[   22.103075]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.104090]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.104876] ==================================================================
[   21.966900] ==================================================================
[   21.967688] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   21.968781] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   21.969531] 
[   21.969790] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.970152] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.970339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.970410] Call Trace:
[   21.970462]  <TASK>
[   21.970514]  dump_stack_lvl+0x73/0xb0
[   21.970599]  print_report+0xd1/0x650
[   21.970673]  ? __virt_addr_valid+0x1db/0x2d0
[   21.970749]  ? kasan_atomics_helper+0x4b54/0x5450
[   21.970912]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.971041]  ? kasan_atomics_helper+0x4b54/0x5450
[   21.971174]  kasan_report+0x141/0x180
[   21.971492]  ? kasan_atomics_helper+0x4b54/0x5450
[   21.971547]  __asan_report_load4_noabort+0x18/0x20
[   21.971589]  kasan_atomics_helper+0x4b54/0x5450
[   21.971623]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.971659]  ? kasan_save_alloc_info+0x3b/0x50
[   21.971702]  kasan_atomics+0x1dc/0x310
[   21.971736]  ? __pfx_kasan_atomics+0x10/0x10
[   21.971773]  ? __pfx_read_tsc+0x10/0x10
[   21.971804]  ? ktime_get_ts64+0x86/0x230
[   21.971865]  kunit_try_run_case+0x1a5/0x480
[   21.971906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.971940]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.971969]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.972008]  ? __kthread_parkme+0x82/0x180
[   21.972039]  ? preempt_count_sub+0x50/0x80
[   21.972074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.972111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.972145]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.972180]  kthread+0x337/0x6f0
[   21.972210]  ? trace_preempt_on+0x20/0xc0
[   21.972304]  ? __pfx_kthread+0x10/0x10
[   21.972383]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.972470]  ? calculate_sigpending+0x7b/0xa0
[   21.972543]  ? __pfx_kthread+0x10/0x10
[   21.972579]  ret_from_fork+0x116/0x1d0
[   21.972608]  ? __pfx_kthread+0x10/0x10
[   21.972641]  ret_from_fork_asm+0x1a/0x30
[   21.972689]  </TASK>
[   21.972704] 
[   21.991734] Allocated by task 292:
[   21.992547]  kasan_save_stack+0x45/0x70
[   21.992873]  kasan_save_track+0x18/0x40
[   21.993159]  kasan_save_alloc_info+0x3b/0x50
[   21.994009]  __kasan_kmalloc+0xb7/0xc0
[   21.994404]  __kmalloc_cache_noprof+0x189/0x420
[   21.995245]  kasan_atomics+0x95/0x310
[   21.995662]  kunit_try_run_case+0x1a5/0x480
[   21.996040]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.996814]  kthread+0x337/0x6f0
[   21.997809]  ret_from_fork+0x116/0x1d0
[   21.998306]  ret_from_fork_asm+0x1a/0x30
[   21.998639] 
[   21.998855] The buggy address belongs to the object at ffff88810383ae00
[   21.998855]  which belongs to the cache kmalloc-64 of size 64
[   21.999962] The buggy address is located 0 bytes to the right of
[   21.999962]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.001586] 
[   22.001820] The buggy address belongs to the physical page:
[   22.002283] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.003134] flags: 0x200000000000000(node=0|zone=2)
[   22.003900] page_type: f5(slab)
[   22.004264] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.005167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.005614] page dumped because: kasan: bad access detected
[   22.006594] 
[   22.006845] Memory state around the buggy address:
[   22.007628]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.008449]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.008868] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.010721]                                      ^
[   22.011019]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.012769]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.013627] ==================================================================
[   22.918223] ==================================================================
[   22.918793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   22.920003] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.920597] 
[   22.920866] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.920995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.921034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.921097] Call Trace:
[   22.921149]  <TASK>
[   22.921198]  dump_stack_lvl+0x73/0xb0
[   22.921325]  print_report+0xd1/0x650
[   22.921405]  ? __virt_addr_valid+0x1db/0x2d0
[   22.921480]  ? kasan_atomics_helper+0x4a36/0x5450
[   22.921555]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.921629]  ? kasan_atomics_helper+0x4a36/0x5450
[   22.921703]  kasan_report+0x141/0x180
[   22.921778]  ? kasan_atomics_helper+0x4a36/0x5450
[   22.921881]  __asan_report_load4_noabort+0x18/0x20
[   22.921971]  kasan_atomics_helper+0x4a36/0x5450
[   22.922049]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.922125]  ? kasan_save_alloc_info+0x3b/0x50
[   22.922256]  kasan_atomics+0x1dc/0x310
[   22.922338]  ? __pfx_kasan_atomics+0x10/0x10
[   22.922416]  ? __pfx_read_tsc+0x10/0x10
[   22.922454]  ? ktime_get_ts64+0x86/0x230
[   22.922492]  kunit_try_run_case+0x1a5/0x480
[   22.922530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.922565]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.922595]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.922633]  ? __kthread_parkme+0x82/0x180
[   22.922662]  ? preempt_count_sub+0x50/0x80
[   22.922698]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.922733]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.922767]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.922802]  kthread+0x337/0x6f0
[   22.922853]  ? trace_preempt_on+0x20/0xc0
[   22.922898]  ? __pfx_kthread+0x10/0x10
[   22.922929]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.922964]  ? calculate_sigpending+0x7b/0xa0
[   22.923000]  ? __pfx_kthread+0x10/0x10
[   22.923030]  ret_from_fork+0x116/0x1d0
[   22.923057]  ? __pfx_kthread+0x10/0x10
[   22.923087]  ret_from_fork_asm+0x1a/0x30
[   22.923128]  </TASK>
[   22.923143] 
[   22.935928] Allocated by task 292:
[   22.936330]  kasan_save_stack+0x45/0x70
[   22.936727]  kasan_save_track+0x18/0x40
[   22.937150]  kasan_save_alloc_info+0x3b/0x50
[   22.937608]  __kasan_kmalloc+0xb7/0xc0
[   22.937974]  __kmalloc_cache_noprof+0x189/0x420
[   22.938429]  kasan_atomics+0x95/0x310
[   22.938804]  kunit_try_run_case+0x1a5/0x480
[   22.939137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.939649]  kthread+0x337/0x6f0
[   22.940041]  ret_from_fork+0x116/0x1d0
[   22.940449]  ret_from_fork_asm+0x1a/0x30
[   22.940856] 
[   22.941070] The buggy address belongs to the object at ffff88810383ae00
[   22.941070]  which belongs to the cache kmalloc-64 of size 64
[   22.941859] The buggy address is located 0 bytes to the right of
[   22.941859]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.942593] 
[   22.942762] The buggy address belongs to the physical page:
[   22.943326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.944062] flags: 0x200000000000000(node=0|zone=2)
[   22.944526] page_type: f5(slab)
[   22.944894] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.945567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.946111] page dumped because: kasan: bad access detected
[   22.946499] 
[   22.946658] Memory state around the buggy address:
[   22.947059]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.947678]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.948282] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.951092]                                      ^
[   22.952610]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.953163]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.954168] ==================================================================
[   23.897703] ==================================================================
[   23.898151] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   23.899701] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.900805] 
[   23.901079] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.901339] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.901384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.901448] Call Trace:
[   23.901498]  <TASK>
[   23.901549]  dump_stack_lvl+0x73/0xb0
[   23.901601]  print_report+0xd1/0x650
[   23.901639]  ? __virt_addr_valid+0x1db/0x2d0
[   23.901674]  ? kasan_atomics_helper+0x1c18/0x5450
[   23.901705]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.901737]  ? kasan_atomics_helper+0x1c18/0x5450
[   23.901768]  kasan_report+0x141/0x180
[   23.901801]  ? kasan_atomics_helper+0x1c18/0x5450
[   23.901864]  kasan_check_range+0x10c/0x1c0
[   23.901904]  __kasan_check_write+0x18/0x20
[   23.901934]  kasan_atomics_helper+0x1c18/0x5450
[   23.901968]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.902000]  ? kasan_save_alloc_info+0x3b/0x50
[   23.902041]  kasan_atomics+0x1dc/0x310
[   23.902074]  ? __pfx_kasan_atomics+0x10/0x10
[   23.902109]  ? __pfx_read_tsc+0x10/0x10
[   23.902140]  ? ktime_get_ts64+0x86/0x230
[   23.902174]  kunit_try_run_case+0x1a5/0x480
[   23.902223]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.902283]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.902317]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.902356]  ? __kthread_parkme+0x82/0x180
[   23.902384]  ? preempt_count_sub+0x50/0x80
[   23.902419]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.902454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.902487]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.902522]  kthread+0x337/0x6f0
[   23.902550]  ? trace_preempt_on+0x20/0xc0
[   23.902586]  ? __pfx_kthread+0x10/0x10
[   23.902616]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.902651]  ? calculate_sigpending+0x7b/0xa0
[   23.902688]  ? __pfx_kthread+0x10/0x10
[   23.902724]  ret_from_fork+0x116/0x1d0
[   23.902752]  ? __pfx_kthread+0x10/0x10
[   23.902784]  ret_from_fork_asm+0x1a/0x30
[   23.902825]  </TASK>
[   23.902868] 
[   23.919400] Allocated by task 292:
[   23.919774]  kasan_save_stack+0x45/0x70
[   23.920264]  kasan_save_track+0x18/0x40
[   23.920698]  kasan_save_alloc_info+0x3b/0x50
[   23.921177]  __kasan_kmalloc+0xb7/0xc0
[   23.921629]  __kmalloc_cache_noprof+0x189/0x420
[   23.922125]  kasan_atomics+0x95/0x310
[   23.922571]  kunit_try_run_case+0x1a5/0x480
[   23.923003]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.923565]  kthread+0x337/0x6f0
[   23.923952]  ret_from_fork+0x116/0x1d0
[   23.924435]  ret_from_fork_asm+0x1a/0x30
[   23.924877] 
[   23.925081] The buggy address belongs to the object at ffff88810383ae00
[   23.925081]  which belongs to the cache kmalloc-64 of size 64
[   23.926041] The buggy address is located 0 bytes to the right of
[   23.926041]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.927059] 
[   23.927376] The buggy address belongs to the physical page:
[   23.927913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.928598] flags: 0x200000000000000(node=0|zone=2)
[   23.929082] page_type: f5(slab)
[   23.929520] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.930055] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.930867] page dumped because: kasan: bad access detected
[   23.931412] 
[   23.931614] Memory state around the buggy address:
[   23.932026]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.932699]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.933445] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.933982]                                      ^
[   23.934538]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.935180]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.935865] ==================================================================
[   22.199119] ==================================================================
[   22.199602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   22.200920] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.201630] 
[   22.202042] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.202200] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.202242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.202306] Call Trace:
[   22.202357]  <TASK>
[   22.202407]  dump_stack_lvl+0x73/0xb0
[   22.202488]  print_report+0xd1/0x650
[   22.202563]  ? __virt_addr_valid+0x1db/0x2d0
[   22.202640]  ? kasan_atomics_helper+0x697/0x5450
[   22.202719]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.202796]  ? kasan_atomics_helper+0x697/0x5450
[   22.202912]  kasan_report+0x141/0x180
[   22.203021]  ? kasan_atomics_helper+0x697/0x5450
[   22.203082]  kasan_check_range+0x10c/0x1c0
[   22.203123]  __kasan_check_write+0x18/0x20
[   22.203153]  kasan_atomics_helper+0x697/0x5450
[   22.203199]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.203276]  ? kasan_save_alloc_info+0x3b/0x50
[   22.203376]  kasan_atomics+0x1dc/0x310
[   22.203466]  ? __pfx_kasan_atomics+0x10/0x10
[   22.203562]  ? __pfx_read_tsc+0x10/0x10
[   22.203598]  ? ktime_get_ts64+0x86/0x230
[   22.203638]  kunit_try_run_case+0x1a5/0x480
[   22.203674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.203709]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.203740]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.203780]  ? __kthread_parkme+0x82/0x180
[   22.203809]  ? preempt_count_sub+0x50/0x80
[   22.203870]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.203913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.203950]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.203984]  kthread+0x337/0x6f0
[   22.204014]  ? trace_preempt_on+0x20/0xc0
[   22.204050]  ? __pfx_kthread+0x10/0x10
[   22.204082]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.204117]  ? calculate_sigpending+0x7b/0xa0
[   22.204154]  ? __pfx_kthread+0x10/0x10
[   22.204186]  ret_from_fork+0x116/0x1d0
[   22.204218]  ? __pfx_kthread+0x10/0x10
[   22.204291]  ret_from_fork_asm+0x1a/0x30
[   22.204369]  </TASK>
[   22.204387] 
[   22.224376] Allocated by task 292:
[   22.224800]  kasan_save_stack+0x45/0x70
[   22.225176]  kasan_save_track+0x18/0x40
[   22.225689]  kasan_save_alloc_info+0x3b/0x50
[   22.226686]  __kasan_kmalloc+0xb7/0xc0
[   22.227110]  __kmalloc_cache_noprof+0x189/0x420
[   22.227709]  kasan_atomics+0x95/0x310
[   22.228211]  kunit_try_run_case+0x1a5/0x480
[   22.228856]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.229661]  kthread+0x337/0x6f0
[   22.230044]  ret_from_fork+0x116/0x1d0
[   22.230367]  ret_from_fork_asm+0x1a/0x30
[   22.230736] 
[   22.231458] The buggy address belongs to the object at ffff88810383ae00
[   22.231458]  which belongs to the cache kmalloc-64 of size 64
[   22.233743] The buggy address is located 0 bytes to the right of
[   22.233743]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.234542] 
[   22.234706] The buggy address belongs to the physical page:
[   22.235143] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.235704] flags: 0x200000000000000(node=0|zone=2)
[   22.236821] page_type: f5(slab)
[   22.237656] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.238394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.238958] page dumped because: kasan: bad access detected
[   22.239432] 
[   22.239700] Memory state around the buggy address:
[   22.240427]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.241209]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.241917] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.242560]                                      ^
[   22.243253]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.244548]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.245461] ==================================================================
[   23.736048] ==================================================================
[   23.736700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   23.737288] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.737898] 
[   23.738172] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.738373] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.738420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.738482] Call Trace:
[   23.738529]  <TASK>
[   23.738576]  dump_stack_lvl+0x73/0xb0
[   23.738657]  print_report+0xd1/0x650
[   23.738733]  ? __virt_addr_valid+0x1db/0x2d0
[   23.738867]  ? kasan_atomics_helper+0x194a/0x5450
[   23.738947]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.739026]  ? kasan_atomics_helper+0x194a/0x5450
[   23.739102]  kasan_report+0x141/0x180
[   23.739253]  ? kasan_atomics_helper+0x194a/0x5450
[   23.739345]  kasan_check_range+0x10c/0x1c0
[   23.739410]  __kasan_check_write+0x18/0x20
[   23.739478]  kasan_atomics_helper+0x194a/0x5450
[   23.739608]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.739691]  ? kasan_save_alloc_info+0x3b/0x50
[   23.739785]  kasan_atomics+0x1dc/0x310
[   23.739884]  ? __pfx_kasan_atomics+0x10/0x10
[   23.739967]  ? __pfx_read_tsc+0x10/0x10
[   23.740039]  ? ktime_get_ts64+0x86/0x230
[   23.740120]  kunit_try_run_case+0x1a5/0x480
[   23.740203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.740348]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.740424]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.740506]  ? __kthread_parkme+0x82/0x180
[   23.740577]  ? preempt_count_sub+0x50/0x80
[   23.740656]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.740731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.740809]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.740908]  kthread+0x337/0x6f0
[   23.740976]  ? trace_preempt_on+0x20/0xc0
[   23.741023]  ? __pfx_kthread+0x10/0x10
[   23.741057]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.741094]  ? calculate_sigpending+0x7b/0xa0
[   23.741131]  ? __pfx_kthread+0x10/0x10
[   23.741162]  ret_from_fork+0x116/0x1d0
[   23.741188]  ? __pfx_kthread+0x10/0x10
[   23.741245]  ret_from_fork_asm+0x1a/0x30
[   23.741303]  </TASK>
[   23.741321] 
[   23.757510] Allocated by task 292:
[   23.757869]  kasan_save_stack+0x45/0x70
[   23.758335]  kasan_save_track+0x18/0x40
[   23.758724]  kasan_save_alloc_info+0x3b/0x50
[   23.759151]  __kasan_kmalloc+0xb7/0xc0
[   23.759590]  __kmalloc_cache_noprof+0x189/0x420
[   23.760053]  kasan_atomics+0x95/0x310
[   23.760504]  kunit_try_run_case+0x1a5/0x480
[   23.760966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.761408]  kthread+0x337/0x6f0
[   23.761754]  ret_from_fork+0x116/0x1d0
[   23.762161]  ret_from_fork_asm+0x1a/0x30
[   23.762652] 
[   23.762820] The buggy address belongs to the object at ffff88810383ae00
[   23.762820]  which belongs to the cache kmalloc-64 of size 64
[   23.763800] The buggy address is located 0 bytes to the right of
[   23.763800]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.764786] 
[   23.765017] The buggy address belongs to the physical page:
[   23.765550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.766167] flags: 0x200000000000000(node=0|zone=2)
[   23.766688] page_type: f5(slab)
[   23.767045] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.767733] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.768412] page dumped because: kasan: bad access detected
[   23.768876] 
[   23.769068] Memory state around the buggy address:
[   23.769434]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.769931]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.770645] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.771303]                                      ^
[   23.771732]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.772397]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.772808] ==================================================================
[   24.182928] ==================================================================
[   24.183527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   24.184116] Read of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   24.184655] 
[   24.184878] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   24.185007] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.185048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.185112] Call Trace:
[   24.185159]  <TASK>
[   24.185205]  dump_stack_lvl+0x73/0xb0
[   24.185332]  print_report+0xd1/0x650
[   24.185408]  ? __virt_addr_valid+0x1db/0x2d0
[   24.185478]  ? kasan_atomics_helper+0x4f71/0x5450
[   24.185553]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.185628]  ? kasan_atomics_helper+0x4f71/0x5450
[   24.185710]  kasan_report+0x141/0x180
[   24.185788]  ? kasan_atomics_helper+0x4f71/0x5450
[   24.185894]  __asan_report_load8_noabort+0x18/0x20
[   24.185980]  kasan_atomics_helper+0x4f71/0x5450
[   24.186058]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.186133]  ? kasan_save_alloc_info+0x3b/0x50
[   24.186268]  kasan_atomics+0x1dc/0x310
[   24.186354]  ? __pfx_kasan_atomics+0x10/0x10
[   24.186435]  ? __pfx_read_tsc+0x10/0x10
[   24.186507]  ? ktime_get_ts64+0x86/0x230
[   24.186588]  kunit_try_run_case+0x1a5/0x480
[   24.186671]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.186745]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.186816]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.187008]  ? __kthread_parkme+0x82/0x180
[   24.187089]  ? preempt_count_sub+0x50/0x80
[   24.187173]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.187330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.187415]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.187495]  kthread+0x337/0x6f0
[   24.187570]  ? trace_preempt_on+0x20/0xc0
[   24.187649]  ? __pfx_kthread+0x10/0x10
[   24.187718]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.187794]  ? calculate_sigpending+0x7b/0xa0
[   24.187894]  ? __pfx_kthread+0x10/0x10
[   24.187970]  ret_from_fork+0x116/0x1d0
[   24.188032]  ? __pfx_kthread+0x10/0x10
[   24.188104]  ret_from_fork_asm+0x1a/0x30
[   24.188197]  </TASK>
[   24.188281] 
[   24.202082] Allocated by task 292:
[   24.202543]  kasan_save_stack+0x45/0x70
[   24.203007]  kasan_save_track+0x18/0x40
[   24.203402]  kasan_save_alloc_info+0x3b/0x50
[   24.203893]  __kasan_kmalloc+0xb7/0xc0
[   24.204345]  __kmalloc_cache_noprof+0x189/0x420
[   24.204815]  kasan_atomics+0x95/0x310
[   24.205292]  kunit_try_run_case+0x1a5/0x480
[   24.205721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.206347]  kthread+0x337/0x6f0
[   24.206721]  ret_from_fork+0x116/0x1d0
[   24.207144]  ret_from_fork_asm+0x1a/0x30
[   24.207606] 
[   24.207809] The buggy address belongs to the object at ffff88810383ae00
[   24.207809]  which belongs to the cache kmalloc-64 of size 64
[   24.208916] The buggy address is located 0 bytes to the right of
[   24.208916]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   24.209880] 
[   24.210103] The buggy address belongs to the physical page:
[   24.210656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   24.211387] flags: 0x200000000000000(node=0|zone=2)
[   24.211794] page_type: f5(slab)
[   24.212196] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.212902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.213539] page dumped because: kasan: bad access detected
[   24.213902] 
[   24.214062] Memory state around the buggy address:
[   24.214507]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.215141]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.215892] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.216533]                                      ^
[   24.217016]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.217511]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.218132] ==================================================================
[   24.462753] ==================================================================
[   24.463756] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   24.465487] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   24.467114] 
[   24.467382] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   24.467512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.467563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.467628] Call Trace:
[   24.467683]  <TASK>
[   24.467732]  dump_stack_lvl+0x73/0xb0
[   24.467820]  print_report+0xd1/0x650
[   24.467924]  ? __virt_addr_valid+0x1db/0x2d0
[   24.468006]  ? kasan_atomics_helper+0x224c/0x5450
[   24.468079]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.468157]  ? kasan_atomics_helper+0x224c/0x5450
[   24.468234]  kasan_report+0x141/0x180
[   24.468314]  ? kasan_atomics_helper+0x224c/0x5450
[   24.468402]  kasan_check_range+0x10c/0x1c0
[   24.468485]  __kasan_check_write+0x18/0x20
[   24.468553]  kasan_atomics_helper+0x224c/0x5450
[   24.468629]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.468699]  ? kasan_save_alloc_info+0x3b/0x50
[   24.468787]  kasan_atomics+0x1dc/0x310
[   24.468917]  ? __pfx_kasan_atomics+0x10/0x10
[   24.468998]  ? __pfx_read_tsc+0x10/0x10
[   24.469070]  ? ktime_get_ts64+0x86/0x230
[   24.469150]  kunit_try_run_case+0x1a5/0x480
[   24.469203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.469279]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.469315]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.469355]  ? __kthread_parkme+0x82/0x180
[   24.469387]  ? preempt_count_sub+0x50/0x80
[   24.469422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.469458]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.469494]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.469528]  kthread+0x337/0x6f0
[   24.469558]  ? trace_preempt_on+0x20/0xc0
[   24.469593]  ? __pfx_kthread+0x10/0x10
[   24.469624]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.469661]  ? calculate_sigpending+0x7b/0xa0
[   24.469697]  ? __pfx_kthread+0x10/0x10
[   24.469729]  ret_from_fork+0x116/0x1d0
[   24.469756]  ? __pfx_kthread+0x10/0x10
[   24.469788]  ret_from_fork_asm+0x1a/0x30
[   24.469854]  </TASK>
[   24.469875] 
[   24.486727] Allocated by task 292:
[   24.487185]  kasan_save_stack+0x45/0x70
[   24.487593]  kasan_save_track+0x18/0x40
[   24.487934]  kasan_save_alloc_info+0x3b/0x50
[   24.488372]  __kasan_kmalloc+0xb7/0xc0
[   24.488751]  __kmalloc_cache_noprof+0x189/0x420
[   24.489159]  kasan_atomics+0x95/0x310
[   24.489512]  kunit_try_run_case+0x1a5/0x480
[   24.489989]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.490610]  kthread+0x337/0x6f0
[   24.490891]  ret_from_fork+0x116/0x1d0
[   24.491174]  ret_from_fork_asm+0x1a/0x30
[   24.491553] 
[   24.491760] The buggy address belongs to the object at ffff88810383ae00
[   24.491760]  which belongs to the cache kmalloc-64 of size 64
[   24.492767] The buggy address is located 0 bytes to the right of
[   24.492767]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   24.493872] 
[   24.494040] The buggy address belongs to the physical page:
[   24.494427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   24.495010] flags: 0x200000000000000(node=0|zone=2)
[   24.495598] page_type: f5(slab)
[   24.495970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.496651] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.497424] page dumped because: kasan: bad access detected
[   24.497937] 
[   24.498261] Memory state around the buggy address:
[   24.498692]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.499402]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.499849] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.500621]                                      ^
[   24.501140]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.501793]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.502860] ==================================================================
[   21.788784] ==================================================================
[   21.789477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   21.790750] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   21.791983] 
[   21.792207] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.792336] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.792372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.792431] Call Trace:
[   21.792471]  <TASK>
[   21.792516]  dump_stack_lvl+0x73/0xb0
[   21.792601]  print_report+0xd1/0x650
[   21.792677]  ? __virt_addr_valid+0x1db/0x2d0
[   21.792754]  ? kasan_atomics_helper+0x4ba2/0x5450
[   21.792826]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.792919]  ? kasan_atomics_helper+0x4ba2/0x5450
[   21.792976]  kasan_report+0x141/0x180
[   21.793013]  ? kasan_atomics_helper+0x4ba2/0x5450
[   21.793049]  __asan_report_store4_noabort+0x1b/0x30
[   21.793085]  kasan_atomics_helper+0x4ba2/0x5450
[   21.793115]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.793144]  ? kasan_save_alloc_info+0x3b/0x50
[   21.793183]  kasan_atomics+0x1dc/0x310
[   21.793223]  ? __pfx_kasan_atomics+0x10/0x10
[   21.793298]  ? __pfx_read_tsc+0x10/0x10
[   21.793358]  ? ktime_get_ts64+0x86/0x230
[   21.793397]  kunit_try_run_case+0x1a5/0x480
[   21.793433]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.793465]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.793494]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.793531]  ? __kthread_parkme+0x82/0x180
[   21.793557]  ? preempt_count_sub+0x50/0x80
[   21.793589]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.793622]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.793654]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.793687]  kthread+0x337/0x6f0
[   21.793713]  ? trace_preempt_on+0x20/0xc0
[   21.793747]  ? __pfx_kthread+0x10/0x10
[   21.793775]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.793808]  ? calculate_sigpending+0x7b/0xa0
[   21.793867]  ? __pfx_kthread+0x10/0x10
[   21.793902]  ret_from_fork+0x116/0x1d0
[   21.793929]  ? __pfx_kthread+0x10/0x10
[   21.793957]  ret_from_fork_asm+0x1a/0x30
[   21.793997]  </TASK>
[   21.794012] 
[   21.808077] Allocated by task 292:
[   21.808668]  kasan_save_stack+0x45/0x70
[   21.808986]  kasan_save_track+0x18/0x40
[   21.809272]  kasan_save_alloc_info+0x3b/0x50
[   21.809579]  __kasan_kmalloc+0xb7/0xc0
[   21.809886]  __kmalloc_cache_noprof+0x189/0x420
[   21.810632]  kasan_atomics+0x95/0x310
[   21.811068]  kunit_try_run_case+0x1a5/0x480
[   21.811644]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.812219]  kthread+0x337/0x6f0
[   21.814574]  ret_from_fork+0x116/0x1d0
[   21.814987]  ret_from_fork_asm+0x1a/0x30
[   21.815439] 
[   21.815614] The buggy address belongs to the object at ffff88810383ae00
[   21.815614]  which belongs to the cache kmalloc-64 of size 64
[   21.817354] The buggy address is located 0 bytes to the right of
[   21.817354]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   21.818967] 
[   21.819597] The buggy address belongs to the physical page:
[   21.819936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   21.821065] flags: 0x200000000000000(node=0|zone=2)
[   21.821569] page_type: f5(slab)
[   21.821918] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.822710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.823361] page dumped because: kasan: bad access detected
[   21.823777] 
[   21.824017] Memory state around the buggy address:
[   21.824780]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.825368]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.825998] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.826786]                                      ^
[   21.827209]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.827910]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.828331] ==================================================================
[   22.297818] ==================================================================
[   22.298362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   22.298996] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.300345] 
[   22.300970] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.301103] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.301147] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.301211] Call Trace:
[   22.301278]  <TASK>
[   22.301326]  dump_stack_lvl+0x73/0xb0
[   22.301413]  print_report+0xd1/0x650
[   22.301496]  ? __virt_addr_valid+0x1db/0x2d0
[   22.301581]  ? kasan_atomics_helper+0x7c7/0x5450
[   22.301655]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.301731]  ? kasan_atomics_helper+0x7c7/0x5450
[   22.301807]  kasan_report+0x141/0x180
[   22.301911]  ? kasan_atomics_helper+0x7c7/0x5450
[   22.302002]  kasan_check_range+0x10c/0x1c0
[   22.302085]  __kasan_check_write+0x18/0x20
[   22.302156]  kasan_atomics_helper+0x7c7/0x5450
[   22.302234]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.302314]  ? kasan_save_alloc_info+0x3b/0x50
[   22.302372]  kasan_atomics+0x1dc/0x310
[   22.302410]  ? __pfx_kasan_atomics+0x10/0x10
[   22.302448]  ? __pfx_read_tsc+0x10/0x10
[   22.302483]  ? ktime_get_ts64+0x86/0x230
[   22.302521]  kunit_try_run_case+0x1a5/0x480
[   22.302559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.302593]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.302624]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.302663]  ? __kthread_parkme+0x82/0x180
[   22.302694]  ? preempt_count_sub+0x50/0x80
[   22.302728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.302765]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.302801]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.302861]  kthread+0x337/0x6f0
[   22.302895]  ? trace_preempt_on+0x20/0xc0
[   22.302932]  ? __pfx_kthread+0x10/0x10
[   22.302962]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.302998]  ? calculate_sigpending+0x7b/0xa0
[   22.303035]  ? __pfx_kthread+0x10/0x10
[   22.303066]  ret_from_fork+0x116/0x1d0
[   22.303093]  ? __pfx_kthread+0x10/0x10
[   22.303123]  ret_from_fork_asm+0x1a/0x30
[   22.303168]  </TASK>
[   22.303184] 
[   22.320804] Allocated by task 292:
[   22.321153]  kasan_save_stack+0x45/0x70
[   22.321481]  kasan_save_track+0x18/0x40
[   22.322442]  kasan_save_alloc_info+0x3b/0x50
[   22.322943]  __kasan_kmalloc+0xb7/0xc0
[   22.323622]  __kmalloc_cache_noprof+0x189/0x420
[   22.324164]  kasan_atomics+0x95/0x310
[   22.324587]  kunit_try_run_case+0x1a5/0x480
[   22.324937]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.325850]  kthread+0x337/0x6f0
[   22.326186]  ret_from_fork+0x116/0x1d0
[   22.326780]  ret_from_fork_asm+0x1a/0x30
[   22.327428] 
[   22.327728] The buggy address belongs to the object at ffff88810383ae00
[   22.327728]  which belongs to the cache kmalloc-64 of size 64
[   22.328757] The buggy address is located 0 bytes to the right of
[   22.328757]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.330286] 
[   22.330505] The buggy address belongs to the physical page:
[   22.330993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.331589] flags: 0x200000000000000(node=0|zone=2)
[   22.332017] page_type: f5(slab)
[   22.332361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.333184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.333958] page dumped because: kasan: bad access detected
[   22.334699] 
[   22.334920] Memory state around the buggy address:
[   22.335770]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.336534]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.337153] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.338164]                                      ^
[   22.338599]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.339635]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.340354] ==================================================================
[   22.478151] ==================================================================
[   22.478852] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   22.479668] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.480231] 
[   22.480785] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.480924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.480969] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.481027] Call Trace:
[   22.481119]  <TASK>
[   22.481197]  dump_stack_lvl+0x73/0xb0
[   22.481284]  print_report+0xd1/0x650
[   22.481363]  ? __virt_addr_valid+0x1db/0x2d0
[   22.481439]  ? kasan_atomics_helper+0xa2b/0x5450
[   22.481508]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.481583]  ? kasan_atomics_helper+0xa2b/0x5450
[   22.481656]  kasan_report+0x141/0x180
[   22.481729]  ? kasan_atomics_helper+0xa2b/0x5450
[   22.481815]  kasan_check_range+0x10c/0x1c0
[   22.482053]  __kasan_check_write+0x18/0x20
[   22.482126]  kasan_atomics_helper+0xa2b/0x5450
[   22.482240]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.482415]  ? kasan_save_alloc_info+0x3b/0x50
[   22.482508]  kasan_atomics+0x1dc/0x310
[   22.482558]  ? __pfx_kasan_atomics+0x10/0x10
[   22.482598]  ? __pfx_read_tsc+0x10/0x10
[   22.482630]  ? ktime_get_ts64+0x86/0x230
[   22.482669]  kunit_try_run_case+0x1a5/0x480
[   22.482704]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.482737]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.482766]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.482804]  ? __kthread_parkme+0x82/0x180
[   22.482858]  ? preempt_count_sub+0x50/0x80
[   22.482898]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.482934]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.482968]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.483003]  kthread+0x337/0x6f0
[   22.483031]  ? trace_preempt_on+0x20/0xc0
[   22.483067]  ? __pfx_kthread+0x10/0x10
[   22.483096]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.483131]  ? calculate_sigpending+0x7b/0xa0
[   22.483167]  ? __pfx_kthread+0x10/0x10
[   22.483197]  ret_from_fork+0x116/0x1d0
[   22.483239]  ? __pfx_kthread+0x10/0x10
[   22.483347]  ret_from_fork_asm+0x1a/0x30
[   22.483399]  </TASK>
[   22.483418] 
[   22.500818] Allocated by task 292:
[   22.501145]  kasan_save_stack+0x45/0x70
[   22.501935]  kasan_save_track+0x18/0x40
[   22.502236]  kasan_save_alloc_info+0x3b/0x50
[   22.502556]  __kasan_kmalloc+0xb7/0xc0
[   22.502902]  __kmalloc_cache_noprof+0x189/0x420
[   22.503616]  kasan_atomics+0x95/0x310
[   22.504048]  kunit_try_run_case+0x1a5/0x480
[   22.504630]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.505198]  kthread+0x337/0x6f0
[   22.505584]  ret_from_fork+0x116/0x1d0
[   22.506190]  ret_from_fork_asm+0x1a/0x30
[   22.506773] 
[   22.507005] The buggy address belongs to the object at ffff88810383ae00
[   22.507005]  which belongs to the cache kmalloc-64 of size 64
[   22.508018] The buggy address is located 0 bytes to the right of
[   22.508018]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.509294] 
[   22.509461] The buggy address belongs to the physical page:
[   22.509793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.510357] flags: 0x200000000000000(node=0|zone=2)
[   22.511383] page_type: f5(slab)
[   22.511788] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.512610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.513268] page dumped because: kasan: bad access detected
[   22.513781] 
[   22.514256] Memory state around the buggy address:
[   22.514739]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.516075]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.516751] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.517531]                                      ^
[   22.517969]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.518670]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.519162] ==================================================================
[   22.571824] ==================================================================
[   22.572948] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   22.573825] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.574584] 
[   22.575330] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.575469] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.575512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.575586] Call Trace:
[   22.575662]  <TASK>
[   22.575739]  dump_stack_lvl+0x73/0xb0
[   22.575846]  print_report+0xd1/0x650
[   22.575903]  ? __virt_addr_valid+0x1db/0x2d0
[   22.575939]  ? kasan_atomics_helper+0xb6a/0x5450
[   22.575969]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.576001]  ? kasan_atomics_helper+0xb6a/0x5450
[   22.576030]  kasan_report+0x141/0x180
[   22.576064]  ? kasan_atomics_helper+0xb6a/0x5450
[   22.576101]  kasan_check_range+0x10c/0x1c0
[   22.576135]  __kasan_check_write+0x18/0x20
[   22.576162]  kasan_atomics_helper+0xb6a/0x5450
[   22.576193]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.576282]  ? kasan_save_alloc_info+0x3b/0x50
[   22.576385]  kasan_atomics+0x1dc/0x310
[   22.576427]  ? __pfx_kasan_atomics+0x10/0x10
[   22.576465]  ? __pfx_read_tsc+0x10/0x10
[   22.576496]  ? ktime_get_ts64+0x86/0x230
[   22.576533]  kunit_try_run_case+0x1a5/0x480
[   22.576570]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.576604]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.576632]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.576670]  ? __kthread_parkme+0x82/0x180
[   22.576697]  ? preempt_count_sub+0x50/0x80
[   22.576731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.576766]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.576800]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.576859]  kthread+0x337/0x6f0
[   22.576892]  ? trace_preempt_on+0x20/0xc0
[   22.576928]  ? __pfx_kthread+0x10/0x10
[   22.576957]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.576992]  ? calculate_sigpending+0x7b/0xa0
[   22.577028]  ? __pfx_kthread+0x10/0x10
[   22.577058]  ret_from_fork+0x116/0x1d0
[   22.577084]  ? __pfx_kthread+0x10/0x10
[   22.577112]  ret_from_fork_asm+0x1a/0x30
[   22.577154]  </TASK>
[   22.577169] 
[   22.596953] Allocated by task 292:
[   22.597533]  kasan_save_stack+0x45/0x70
[   22.598010]  kasan_save_track+0x18/0x40
[   22.598470]  kasan_save_alloc_info+0x3b/0x50
[   22.598914]  __kasan_kmalloc+0xb7/0xc0
[   22.599388]  __kmalloc_cache_noprof+0x189/0x420
[   22.599741]  kasan_atomics+0x95/0x310
[   22.600045]  kunit_try_run_case+0x1a5/0x480
[   22.600525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.601185]  kthread+0x337/0x6f0
[   22.601605]  ret_from_fork+0x116/0x1d0
[   22.602605]  ret_from_fork_asm+0x1a/0x30
[   22.603016] 
[   22.603195] The buggy address belongs to the object at ffff88810383ae00
[   22.603195]  which belongs to the cache kmalloc-64 of size 64
[   22.605683] The buggy address is located 0 bytes to the right of
[   22.605683]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.607299] 
[   22.607690] The buggy address belongs to the physical page:
[   22.608204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.608816] flags: 0x200000000000000(node=0|zone=2)
[   22.609405] page_type: f5(slab)
[   22.610185] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.610924] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.611940] page dumped because: kasan: bad access detected
[   22.612136] 
[   22.612238] Memory state around the buggy address:
[   22.612622]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.613410]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.614874] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.615574]                                      ^
[   22.616051]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.616700]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.617265] ==================================================================
[   23.416656] ==================================================================
[   23.417160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   23.417628] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.418356] 
[   23.418619] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.418752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.418794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.418876] Call Trace:
[   23.418930]  <TASK>
[   23.418985]  dump_stack_lvl+0x73/0xb0
[   23.419068]  print_report+0xd1/0x650
[   23.419152]  ? __virt_addr_valid+0x1db/0x2d0
[   23.419233]  ? kasan_atomics_helper+0x50d4/0x5450
[   23.419308]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.419386]  ? kasan_atomics_helper+0x50d4/0x5450
[   23.419460]  kasan_report+0x141/0x180
[   23.419532]  ? kasan_atomics_helper+0x50d4/0x5450
[   23.419623]  __asan_report_store8_noabort+0x1b/0x30
[   23.419706]  kasan_atomics_helper+0x50d4/0x5450
[   23.419785]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.419883]  ? kasan_save_alloc_info+0x3b/0x50
[   23.419978]  kasan_atomics+0x1dc/0x310
[   23.420061]  ? __pfx_kasan_atomics+0x10/0x10
[   23.420144]  ? __pfx_read_tsc+0x10/0x10
[   23.420214]  ? ktime_get_ts64+0x86/0x230
[   23.420300]  kunit_try_run_case+0x1a5/0x480
[   23.420381]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.420456]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.420529]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.420618]  ? __kthread_parkme+0x82/0x180
[   23.420685]  ? preempt_count_sub+0x50/0x80
[   23.420765]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.420861]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.420939]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.421004]  kthread+0x337/0x6f0
[   23.421037]  ? trace_preempt_on+0x20/0xc0
[   23.421076]  ? __pfx_kthread+0x10/0x10
[   23.421107]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.421142]  ? calculate_sigpending+0x7b/0xa0
[   23.421179]  ? __pfx_kthread+0x10/0x10
[   23.421211]  ret_from_fork+0x116/0x1d0
[   23.421269]  ? __pfx_kthread+0x10/0x10
[   23.421306]  ret_from_fork_asm+0x1a/0x30
[   23.421352]  </TASK>
[   23.421369] 
[   23.435733] Allocated by task 292:
[   23.436071]  kasan_save_stack+0x45/0x70
[   23.436576]  kasan_save_track+0x18/0x40
[   23.437133]  kasan_save_alloc_info+0x3b/0x50
[   23.437473]  __kasan_kmalloc+0xb7/0xc0
[   23.438303]  __kmalloc_cache_noprof+0x189/0x420
[   23.438765]  kasan_atomics+0x95/0x310
[   23.439190]  kunit_try_run_case+0x1a5/0x480
[   23.439645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.441073]  kthread+0x337/0x6f0
[   23.441895]  ret_from_fork+0x116/0x1d0
[   23.442291]  ret_from_fork_asm+0x1a/0x30
[   23.442867] 
[   23.443020] The buggy address belongs to the object at ffff88810383ae00
[   23.443020]  which belongs to the cache kmalloc-64 of size 64
[   23.444516] The buggy address is located 0 bytes to the right of
[   23.444516]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.445669] 
[   23.445878] The buggy address belongs to the physical page:
[   23.446553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.447245] flags: 0x200000000000000(node=0|zone=2)
[   23.447703] page_type: f5(slab)
[   23.448107] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.448611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.449445] page dumped because: kasan: bad access detected
[   23.449820] 
[   23.450113] Memory state around the buggy address:
[   23.450567]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.451170]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.451846] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.452937]                                      ^
[   23.453330]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.453979]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.454661] ==================================================================
[   24.101822] ==================================================================
[   24.102440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   24.103316] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   24.103757] 
[   24.104032] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   24.104157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.104201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.104260] Call Trace:
[   24.104313]  <TASK>
[   24.104360]  dump_stack_lvl+0x73/0xb0
[   24.104435]  print_report+0xd1/0x650
[   24.104494]  ? __virt_addr_valid+0x1db/0x2d0
[   24.104559]  ? kasan_atomics_helper+0x1eaa/0x5450
[   24.104624]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.104689]  ? kasan_atomics_helper+0x1eaa/0x5450
[   24.104755]  kasan_report+0x141/0x180
[   24.104815]  ? kasan_atomics_helper+0x1eaa/0x5450
[   24.104988]  kasan_check_range+0x10c/0x1c0
[   24.105072]  __kasan_check_write+0x18/0x20
[   24.105183]  kasan_atomics_helper+0x1eaa/0x5450
[   24.105299]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.105416]  ? kasan_save_alloc_info+0x3b/0x50
[   24.105539]  kasan_atomics+0x1dc/0x310
[   24.105621]  ? __pfx_kasan_atomics+0x10/0x10
[   24.105702]  ? __pfx_read_tsc+0x10/0x10
[   24.105772]  ? ktime_get_ts64+0x86/0x230
[   24.105869]  kunit_try_run_case+0x1a5/0x480
[   24.105951]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.106022]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.106095]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.106174]  ? __kthread_parkme+0x82/0x180
[   24.106293]  ? preempt_count_sub+0x50/0x80
[   24.106378]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.106504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.106588]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.106702]  kthread+0x337/0x6f0
[   24.106780]  ? trace_preempt_on+0x20/0xc0
[   24.106880]  ? __pfx_kthread+0x10/0x10
[   24.106952]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.107030]  ? calculate_sigpending+0x7b/0xa0
[   24.107109]  ? __pfx_kthread+0x10/0x10
[   24.107181]  ret_from_fork+0x116/0x1d0
[   24.107263]  ? __pfx_kthread+0x10/0x10
[   24.107300]  ret_from_fork_asm+0x1a/0x30
[   24.107345]  </TASK>
[   24.107361] 
[   24.123215] Allocated by task 292:
[   24.123583]  kasan_save_stack+0x45/0x70
[   24.125481]  kasan_save_track+0x18/0x40
[   24.125920]  kasan_save_alloc_info+0x3b/0x50
[   24.126606]  __kasan_kmalloc+0xb7/0xc0
[   24.127294]  __kmalloc_cache_noprof+0x189/0x420
[   24.127758]  kasan_atomics+0x95/0x310
[   24.128163]  kunit_try_run_case+0x1a5/0x480
[   24.128631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.129188]  kthread+0x337/0x6f0
[   24.129574]  ret_from_fork+0x116/0x1d0
[   24.130000]  ret_from_fork_asm+0x1a/0x30
[   24.130460] 
[   24.130692] The buggy address belongs to the object at ffff88810383ae00
[   24.130692]  which belongs to the cache kmalloc-64 of size 64
[   24.131673] The buggy address is located 0 bytes to the right of
[   24.131673]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   24.134900] 
[   24.135044] The buggy address belongs to the physical page:
[   24.135336] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   24.135730] flags: 0x200000000000000(node=0|zone=2)
[   24.136073] page_type: f5(slab)
[   24.136349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.137001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.137438] page dumped because: kasan: bad access detected
[   24.138915] 
[   24.139747] Memory state around the buggy address:
[   24.141349]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.143003]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.143398] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.143752]                                      ^
[   24.144037]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.144388]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.144741] ==================================================================
[   23.245282] ==================================================================
[   23.247095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   23.248774] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.249937] 
[   23.250440] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.250597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.250640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.250687] Call Trace:
[   23.250715]  <TASK>
[   23.250742]  dump_stack_lvl+0x73/0xb0
[   23.250788]  print_report+0xd1/0x650
[   23.250824]  ? __virt_addr_valid+0x1db/0x2d0
[   23.250894]  ? kasan_atomics_helper+0x49ce/0x5450
[   23.250928]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.250961]  ? kasan_atomics_helper+0x49ce/0x5450
[   23.250992]  kasan_report+0x141/0x180
[   23.251025]  ? kasan_atomics_helper+0x49ce/0x5450
[   23.251061]  __asan_report_load4_noabort+0x18/0x20
[   23.251098]  kasan_atomics_helper+0x49ce/0x5450
[   23.251130]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.251162]  ? kasan_save_alloc_info+0x3b/0x50
[   23.251203]  kasan_atomics+0x1dc/0x310
[   23.251280]  ? __pfx_kasan_atomics+0x10/0x10
[   23.251321]  ? __pfx_read_tsc+0x10/0x10
[   23.251353]  ? ktime_get_ts64+0x86/0x230
[   23.251389]  kunit_try_run_case+0x1a5/0x480
[   23.251425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.251458]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.251487]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.251525]  ? __kthread_parkme+0x82/0x180
[   23.251565]  ? preempt_count_sub+0x50/0x80
[   23.251600]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.251635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.251668]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.251701]  kthread+0x337/0x6f0
[   23.251729]  ? trace_preempt_on+0x20/0xc0
[   23.251765]  ? __pfx_kthread+0x10/0x10
[   23.251795]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.251851]  ? calculate_sigpending+0x7b/0xa0
[   23.251896]  ? __pfx_kthread+0x10/0x10
[   23.251928]  ret_from_fork+0x116/0x1d0
[   23.251955]  ? __pfx_kthread+0x10/0x10
[   23.251985]  ret_from_fork_asm+0x1a/0x30
[   23.252027]  </TASK>
[   23.252042] 
[   23.269768] Allocated by task 292:
[   23.270543]  kasan_save_stack+0x45/0x70
[   23.271119]  kasan_save_track+0x18/0x40
[   23.271654]  kasan_save_alloc_info+0x3b/0x50
[   23.272133]  __kasan_kmalloc+0xb7/0xc0
[   23.272539]  __kmalloc_cache_noprof+0x189/0x420
[   23.273117]  kasan_atomics+0x95/0x310
[   23.273495]  kunit_try_run_case+0x1a5/0x480
[   23.274081]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.274710]  kthread+0x337/0x6f0
[   23.275100]  ret_from_fork+0x116/0x1d0
[   23.275590]  ret_from_fork_asm+0x1a/0x30
[   23.276060] 
[   23.276366] The buggy address belongs to the object at ffff88810383ae00
[   23.276366]  which belongs to the cache kmalloc-64 of size 64
[   23.277349] The buggy address is located 0 bytes to the right of
[   23.277349]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.278507] 
[   23.278717] The buggy address belongs to the physical page:
[   23.279345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.280077] flags: 0x200000000000000(node=0|zone=2)
[   23.280646] page_type: f5(slab)
[   23.281064] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.281868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.282453] page dumped because: kasan: bad access detected
[   23.282954] 
[   23.283138] Memory state around the buggy address:
[   23.283890]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.285477]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.286384] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.286640]                                      ^
[   23.286812]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.287277]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.288266] ==================================================================
[   22.697812] ==================================================================
[   22.699409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   22.700103] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.701609] 
[   22.701813] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.701961] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.702001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.702059] Call Trace:
[   22.702106]  <TASK>
[   22.702152]  dump_stack_lvl+0x73/0xb0
[   22.702234]  print_report+0xd1/0x650
[   22.702314]  ? __virt_addr_valid+0x1db/0x2d0
[   22.702390]  ? kasan_atomics_helper+0xd47/0x5450
[   22.702457]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.702513]  ? kasan_atomics_helper+0xd47/0x5450
[   22.702580]  kasan_report+0x141/0x180
[   22.702656]  ? kasan_atomics_helper+0xd47/0x5450
[   22.702742]  kasan_check_range+0x10c/0x1c0
[   22.702844]  __kasan_check_write+0x18/0x20
[   22.702920]  kasan_atomics_helper+0xd47/0x5450
[   22.702996]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.703075]  ? kasan_save_alloc_info+0x3b/0x50
[   22.703170]  kasan_atomics+0x1dc/0x310
[   22.703550]  ? __pfx_kasan_atomics+0x10/0x10
[   22.703641]  ? __pfx_read_tsc+0x10/0x10
[   22.703716]  ? ktime_get_ts64+0x86/0x230
[   22.703803]  kunit_try_run_case+0x1a5/0x480
[   22.703903]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.703980]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.704055]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.704138]  ? __kthread_parkme+0x82/0x180
[   22.704213]  ? preempt_count_sub+0x50/0x80
[   22.704399]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.704484]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.704565]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.704650]  kthread+0x337/0x6f0
[   22.704723]  ? trace_preempt_on+0x20/0xc0
[   22.704806]  ? __pfx_kthread+0x10/0x10
[   22.704902]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.704982]  ? calculate_sigpending+0x7b/0xa0
[   22.705059]  ? __pfx_kthread+0x10/0x10
[   22.705140]  ret_from_fork+0x116/0x1d0
[   22.705209]  ? __pfx_kthread+0x10/0x10
[   22.705382]  ret_from_fork_asm+0x1a/0x30
[   22.705477]  </TASK>
[   22.705501] 
[   22.719691] Allocated by task 292:
[   22.720060]  kasan_save_stack+0x45/0x70
[   22.720856]  kasan_save_track+0x18/0x40
[   22.721154]  kasan_save_alloc_info+0x3b/0x50
[   22.721471]  __kasan_kmalloc+0xb7/0xc0
[   22.721825]  __kmalloc_cache_noprof+0x189/0x420
[   22.722296]  kasan_atomics+0x95/0x310
[   22.722808]  kunit_try_run_case+0x1a5/0x480
[   22.723351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.723893]  kthread+0x337/0x6f0
[   22.724266]  ret_from_fork+0x116/0x1d0
[   22.724616]  ret_from_fork_asm+0x1a/0x30
[   22.724983] 
[   22.725194] The buggy address belongs to the object at ffff88810383ae00
[   22.725194]  which belongs to the cache kmalloc-64 of size 64
[   22.726213] The buggy address is located 0 bytes to the right of
[   22.726213]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.728367] 
[   22.728583] The buggy address belongs to the physical page:
[   22.729878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.731193] flags: 0x200000000000000(node=0|zone=2)
[   22.731620] page_type: f5(slab)
[   22.731982] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.734169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.734716] page dumped because: kasan: bad access detected
[   22.735364] 
[   22.735581] Memory state around the buggy address:
[   22.735938]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.736961]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.737624] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.738391]                                      ^
[   22.738800]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.739511]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.740716] ==================================================================
[   23.289607] ==================================================================
[   23.290168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   23.290820] Read of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.291508] 
[   23.291730] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.291871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.291912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.291967] Call Trace:
[   23.292016]  <TASK>
[   23.292060]  dump_stack_lvl+0x73/0xb0
[   23.292144]  print_report+0xd1/0x650
[   23.292218]  ? __virt_addr_valid+0x1db/0x2d0
[   23.292289]  ? kasan_atomics_helper+0x13b5/0x5450
[   23.292361]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.292433]  ? kasan_atomics_helper+0x13b5/0x5450
[   23.292502]  kasan_report+0x141/0x180
[   23.292579]  ? kasan_atomics_helper+0x13b5/0x5450
[   23.292662]  kasan_check_range+0x10c/0x1c0
[   23.292739]  __kasan_check_read+0x15/0x20
[   23.292805]  kasan_atomics_helper+0x13b5/0x5450
[   23.292901]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.292971]  ? kasan_save_alloc_info+0x3b/0x50
[   23.293128]  kasan_atomics+0x1dc/0x310
[   23.293275]  ? __pfx_kasan_atomics+0x10/0x10
[   23.293366]  ? __pfx_read_tsc+0x10/0x10
[   23.293438]  ? ktime_get_ts64+0x86/0x230
[   23.293528]  kunit_try_run_case+0x1a5/0x480
[   23.293660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.293824]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.293922]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.294004]  ? __kthread_parkme+0x82/0x180
[   23.294074]  ? preempt_count_sub+0x50/0x80
[   23.294141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.294182]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.294231]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.294289]  kthread+0x337/0x6f0
[   23.294321]  ? trace_preempt_on+0x20/0xc0
[   23.294359]  ? __pfx_kthread+0x10/0x10
[   23.294391]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.294428]  ? calculate_sigpending+0x7b/0xa0
[   23.294464]  ? __pfx_kthread+0x10/0x10
[   23.294497]  ret_from_fork+0x116/0x1d0
[   23.294524]  ? __pfx_kthread+0x10/0x10
[   23.294555]  ret_from_fork_asm+0x1a/0x30
[   23.294598]  </TASK>
[   23.294615] 
[   23.310128] Allocated by task 292:
[   23.310436]  kasan_save_stack+0x45/0x70
[   23.310825]  kasan_save_track+0x18/0x40
[   23.311257]  kasan_save_alloc_info+0x3b/0x50
[   23.311699]  __kasan_kmalloc+0xb7/0xc0
[   23.312087]  __kmalloc_cache_noprof+0x189/0x420
[   23.312574]  kasan_atomics+0x95/0x310
[   23.312955]  kunit_try_run_case+0x1a5/0x480
[   23.313360]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.313803]  kthread+0x337/0x6f0
[   23.314161]  ret_from_fork+0x116/0x1d0
[   23.314593]  ret_from_fork_asm+0x1a/0x30
[   23.314989] 
[   23.315169] The buggy address belongs to the object at ffff88810383ae00
[   23.315169]  which belongs to the cache kmalloc-64 of size 64
[   23.316039] The buggy address is located 0 bytes to the right of
[   23.316039]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.317018] 
[   23.317268] The buggy address belongs to the physical page:
[   23.317660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.318976] flags: 0x200000000000000(node=0|zone=2)
[   23.319668] page_type: f5(slab)
[   23.320059] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.320699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.321407] page dumped because: kasan: bad access detected
[   23.321919] 
[   23.322134] Memory state around the buggy address:
[   23.322617]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.323309]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.323931] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.324542]                                      ^
[   23.324880]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.325584]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.326303] ==================================================================
[   24.504097] ==================================================================
[   24.504767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   24.505495] Read of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   24.506093] 
[   24.506443] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   24.506572] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.506613] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.506661] Call Trace:
[   24.506701]  <TASK>
[   24.506744]  dump_stack_lvl+0x73/0xb0
[   24.506825]  print_report+0xd1/0x650
[   24.507055]  ? __virt_addr_valid+0x1db/0x2d0
[   24.507169]  ? kasan_atomics_helper+0x5115/0x5450
[   24.507359]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.507437]  ? kasan_atomics_helper+0x5115/0x5450
[   24.507515]  kasan_report+0x141/0x180
[   24.507601]  ? kasan_atomics_helper+0x5115/0x5450
[   24.507653]  __asan_report_load8_noabort+0x18/0x20
[   24.507692]  kasan_atomics_helper+0x5115/0x5450
[   24.507728]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.507785]  ? kasan_save_alloc_info+0x3b/0x50
[   24.507872]  kasan_atomics+0x1dc/0x310
[   24.507913]  ? __pfx_kasan_atomics+0x10/0x10
[   24.507949]  ? __pfx_read_tsc+0x10/0x10
[   24.507980]  ? ktime_get_ts64+0x86/0x230
[   24.508016]  kunit_try_run_case+0x1a5/0x480
[   24.508050]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.508082]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.508112]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.508149]  ? __kthread_parkme+0x82/0x180
[   24.508176]  ? preempt_count_sub+0x50/0x80
[   24.508229]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.508291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.508329]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.508362]  kthread+0x337/0x6f0
[   24.508390]  ? trace_preempt_on+0x20/0xc0
[   24.508425]  ? __pfx_kthread+0x10/0x10
[   24.508456]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.508491]  ? calculate_sigpending+0x7b/0xa0
[   24.508526]  ? __pfx_kthread+0x10/0x10
[   24.508557]  ret_from_fork+0x116/0x1d0
[   24.508583]  ? __pfx_kthread+0x10/0x10
[   24.508613]  ret_from_fork_asm+0x1a/0x30
[   24.508654]  </TASK>
[   24.508669] 
[   24.523813] Allocated by task 292:
[   24.524227]  kasan_save_stack+0x45/0x70
[   24.524657]  kasan_save_track+0x18/0x40
[   24.525081]  kasan_save_alloc_info+0x3b/0x50
[   24.525562]  __kasan_kmalloc+0xb7/0xc0
[   24.525978]  __kmalloc_cache_noprof+0x189/0x420
[   24.526486]  kasan_atomics+0x95/0x310
[   24.526900]  kunit_try_run_case+0x1a5/0x480
[   24.527258]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.527624]  kthread+0x337/0x6f0
[   24.527932]  ret_from_fork+0x116/0x1d0
[   24.528317]  ret_from_fork_asm+0x1a/0x30
[   24.528747] 
[   24.529029] The buggy address belongs to the object at ffff88810383ae00
[   24.529029]  which belongs to the cache kmalloc-64 of size 64
[   24.530131] The buggy address is located 0 bytes to the right of
[   24.530131]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   24.531017] 
[   24.531180] The buggy address belongs to the physical page:
[   24.531757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   24.532517] flags: 0x200000000000000(node=0|zone=2)
[   24.533041] page_type: f5(slab)
[   24.533478] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.534070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.534713] page dumped because: kasan: bad access detected
[   24.535190] 
[   24.535465] Memory state around the buggy address:
[   24.535891]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.536549]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.537092] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.537731]                                      ^
[   24.538126]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.538810]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.539982] ==================================================================
[   21.919040] ==================================================================
[   21.920751] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   21.921985] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   21.922845] 
[   21.923073] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.923229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.923266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.923679] Call Trace:
[   21.923728]  <TASK>
[   21.923904]  dump_stack_lvl+0x73/0xb0
[   21.923951]  print_report+0xd1/0x650
[   21.924015]  ? __virt_addr_valid+0x1db/0x2d0
[   21.924052]  ? kasan_atomics_helper+0x3df/0x5450
[   21.924083]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.924115]  ? kasan_atomics_helper+0x3df/0x5450
[   21.924148]  kasan_report+0x141/0x180
[   21.924181]  ? kasan_atomics_helper+0x3df/0x5450
[   21.924219]  kasan_check_range+0x10c/0x1c0
[   21.924301]  __kasan_check_read+0x15/0x20
[   21.924380]  kasan_atomics_helper+0x3df/0x5450
[   21.924423]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.924456]  ? kasan_save_alloc_info+0x3b/0x50
[   21.924500]  kasan_atomics+0x1dc/0x310
[   21.924533]  ? __pfx_kasan_atomics+0x10/0x10
[   21.924571]  ? __pfx_read_tsc+0x10/0x10
[   21.924600]  ? ktime_get_ts64+0x86/0x230
[   21.924636]  kunit_try_run_case+0x1a5/0x480
[   21.924670]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.924703]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.924733]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.924771]  ? __kthread_parkme+0x82/0x180
[   21.924801]  ? preempt_count_sub+0x50/0x80
[   21.924858]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.924900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.924937]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.924972]  kthread+0x337/0x6f0
[   21.925001]  ? trace_preempt_on+0x20/0xc0
[   21.925038]  ? __pfx_kthread+0x10/0x10
[   21.925068]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.925104]  ? calculate_sigpending+0x7b/0xa0
[   21.925141]  ? __pfx_kthread+0x10/0x10
[   21.925172]  ret_from_fork+0x116/0x1d0
[   21.925200]  ? __pfx_kthread+0x10/0x10
[   21.925273]  ret_from_fork_asm+0x1a/0x30
[   21.925361]  </TASK>
[   21.925380] 
[   21.944822] Allocated by task 292:
[   21.945693]  kasan_save_stack+0x45/0x70
[   21.946014]  kasan_save_track+0x18/0x40
[   21.946637]  kasan_save_alloc_info+0x3b/0x50
[   21.947168]  __kasan_kmalloc+0xb7/0xc0
[   21.947787]  __kmalloc_cache_noprof+0x189/0x420
[   21.948609]  kasan_atomics+0x95/0x310
[   21.949340]  kunit_try_run_case+0x1a5/0x480
[   21.949968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.950778]  kthread+0x337/0x6f0
[   21.951210]  ret_from_fork+0x116/0x1d0
[   21.951776]  ret_from_fork_asm+0x1a/0x30
[   21.952174] 
[   21.952812] The buggy address belongs to the object at ffff88810383ae00
[   21.952812]  which belongs to the cache kmalloc-64 of size 64
[   21.954024] The buggy address is located 0 bytes to the right of
[   21.954024]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   21.955194] 
[   21.955564] The buggy address belongs to the physical page:
[   21.956149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   21.957127] flags: 0x200000000000000(node=0|zone=2)
[   21.957816] page_type: f5(slab)
[   21.958355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.959062] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.959860] page dumped because: kasan: bad access detected
[   21.960564] 
[   21.960757] Memory state around the buggy address:
[   21.961273]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.962139]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.962927] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.963698]                                      ^
[   21.964162]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.965086]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.965861] ==================================================================
[   24.336670] ==================================================================
[   24.337351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   24.338648] Read of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   24.340137] 
[   24.340380] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   24.340876] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.340899] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.340931] Call Trace:
[   24.340955]  <TASK>
[   24.340979]  dump_stack_lvl+0x73/0xb0
[   24.341022]  print_report+0xd1/0x650
[   24.341058]  ? __virt_addr_valid+0x1db/0x2d0
[   24.341094]  ? kasan_atomics_helper+0x4fb2/0x5450
[   24.341125]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.341155]  ? kasan_atomics_helper+0x4fb2/0x5450
[   24.341186]  kasan_report+0x141/0x180
[   24.341243]  ? kasan_atomics_helper+0x4fb2/0x5450
[   24.341300]  __asan_report_load8_noabort+0x18/0x20
[   24.341339]  kasan_atomics_helper+0x4fb2/0x5450
[   24.341371]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.341402]  ? kasan_save_alloc_info+0x3b/0x50
[   24.341444]  kasan_atomics+0x1dc/0x310
[   24.341477]  ? __pfx_kasan_atomics+0x10/0x10
[   24.341511]  ? __pfx_read_tsc+0x10/0x10
[   24.341541]  ? ktime_get_ts64+0x86/0x230
[   24.341577]  kunit_try_run_case+0x1a5/0x480
[   24.341614]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.341647]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.341677]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.341714]  ? __kthread_parkme+0x82/0x180
[   24.341743]  ? preempt_count_sub+0x50/0x80
[   24.341778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.341813]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.341874]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.341912]  kthread+0x337/0x6f0
[   24.341941]  ? trace_preempt_on+0x20/0xc0
[   24.341975]  ? __pfx_kthread+0x10/0x10
[   24.342005]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.342038]  ? calculate_sigpending+0x7b/0xa0
[   24.342073]  ? __pfx_kthread+0x10/0x10
[   24.342103]  ret_from_fork+0x116/0x1d0
[   24.342129]  ? __pfx_kthread+0x10/0x10
[   24.342158]  ret_from_fork_asm+0x1a/0x30
[   24.342201]  </TASK>
[   24.342225] 
[   24.359027] Allocated by task 292:
[   24.359396]  kasan_save_stack+0x45/0x70
[   24.359704]  kasan_save_track+0x18/0x40
[   24.360116]  kasan_save_alloc_info+0x3b/0x50
[   24.360603]  __kasan_kmalloc+0xb7/0xc0
[   24.361058]  __kmalloc_cache_noprof+0x189/0x420
[   24.361589]  kasan_atomics+0x95/0x310
[   24.361992]  kunit_try_run_case+0x1a5/0x480
[   24.362494]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.362948]  kthread+0x337/0x6f0
[   24.363355]  ret_from_fork+0x116/0x1d0
[   24.363766]  ret_from_fork_asm+0x1a/0x30
[   24.364282] 
[   24.364487] The buggy address belongs to the object at ffff88810383ae00
[   24.364487]  which belongs to the cache kmalloc-64 of size 64
[   24.365450] The buggy address is located 0 bytes to the right of
[   24.365450]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   24.366424] 
[   24.366652] The buggy address belongs to the physical page:
[   24.367073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   24.367597] flags: 0x200000000000000(node=0|zone=2)
[   24.368059] page_type: f5(slab)
[   24.368482] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.369140] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.369856] page dumped because: kasan: bad access detected
[   24.370370] 
[   24.370531] Memory state around the buggy address:
[   24.370859]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.371492]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.372120] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.372797]                                      ^
[   24.374044]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.374617]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.375599] ==================================================================
[   24.295023] ==================================================================
[   24.295977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   24.296511] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   24.297030] 
[   24.297391] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   24.297577] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.297623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.297718] Call Trace:
[   24.297794]  <TASK>
[   24.297859]  dump_stack_lvl+0x73/0xb0
[   24.297946]  print_report+0xd1/0x650
[   24.298022]  ? __virt_addr_valid+0x1db/0x2d0
[   24.298094]  ? kasan_atomics_helper+0x20c8/0x5450
[   24.298166]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.298285]  ? kasan_atomics_helper+0x20c8/0x5450
[   24.298361]  kasan_report+0x141/0x180
[   24.298439]  ? kasan_atomics_helper+0x20c8/0x5450
[   24.298522]  kasan_check_range+0x10c/0x1c0
[   24.298599]  __kasan_check_write+0x18/0x20
[   24.298664]  kasan_atomics_helper+0x20c8/0x5450
[   24.298738]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.298811]  ? kasan_save_alloc_info+0x3b/0x50
[   24.298921]  kasan_atomics+0x1dc/0x310
[   24.299038]  ? __pfx_kasan_atomics+0x10/0x10
[   24.299152]  ? __pfx_read_tsc+0x10/0x10
[   24.299267]  ? ktime_get_ts64+0x86/0x230
[   24.299356]  kunit_try_run_case+0x1a5/0x480
[   24.299433]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.299506]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.299584]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.299665]  ? __kthread_parkme+0x82/0x180
[   24.299731]  ? preempt_count_sub+0x50/0x80
[   24.299809]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.299904]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.299978]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.300054]  kthread+0x337/0x6f0
[   24.300125]  ? trace_preempt_on+0x20/0xc0
[   24.300201]  ? __pfx_kthread+0x10/0x10
[   24.300317]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.300397]  ? calculate_sigpending+0x7b/0xa0
[   24.300478]  ? __pfx_kthread+0x10/0x10
[   24.300549]  ret_from_fork+0x116/0x1d0
[   24.300613]  ? __pfx_kthread+0x10/0x10
[   24.300680]  ret_from_fork_asm+0x1a/0x30
[   24.300771]  </TASK>
[   24.300811] 
[   24.318710] Allocated by task 292:
[   24.319159]  kasan_save_stack+0x45/0x70
[   24.320061]  kasan_save_track+0x18/0x40
[   24.320736]  kasan_save_alloc_info+0x3b/0x50
[   24.321035]  __kasan_kmalloc+0xb7/0xc0
[   24.321510]  __kmalloc_cache_noprof+0x189/0x420
[   24.321981]  kasan_atomics+0x95/0x310
[   24.322368]  kunit_try_run_case+0x1a5/0x480
[   24.322731]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.323315]  kthread+0x337/0x6f0
[   24.323690]  ret_from_fork+0x116/0x1d0
[   24.324108]  ret_from_fork_asm+0x1a/0x30
[   24.324605] 
[   24.324846] The buggy address belongs to the object at ffff88810383ae00
[   24.324846]  which belongs to the cache kmalloc-64 of size 64
[   24.325899] The buggy address is located 0 bytes to the right of
[   24.325899]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   24.326896] 
[   24.327154] The buggy address belongs to the physical page:
[   24.327620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   24.328251] flags: 0x200000000000000(node=0|zone=2)
[   24.328794] page_type: f5(slab)
[   24.329147] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.329878] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.330496] page dumped because: kasan: bad access detected
[   24.330960] 
[   24.331121] Memory state around the buggy address:
[   24.331556]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.332255]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.332825] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.333486]                                      ^
[   24.333990]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.334617]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.335247] ==================================================================
[   22.956365] ==================================================================
[   22.956982] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   22.957743] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.958279] 
[   22.958540] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.958671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.958712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.958771] Call Trace:
[   22.958822]  <TASK>
[   22.958892]  dump_stack_lvl+0x73/0xb0
[   22.958979]  print_report+0xd1/0x650
[   22.959059]  ? __virt_addr_valid+0x1db/0x2d0
[   22.959136]  ? kasan_atomics_helper+0x1079/0x5450
[   22.959212]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.959288]  ? kasan_atomics_helper+0x1079/0x5450
[   22.959363]  kasan_report+0x141/0x180
[   22.959437]  ? kasan_atomics_helper+0x1079/0x5450
[   22.959513]  kasan_check_range+0x10c/0x1c0
[   22.959565]  __kasan_check_write+0x18/0x20
[   22.959596]  kasan_atomics_helper+0x1079/0x5450
[   22.959631]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.959667]  ? kasan_save_alloc_info+0x3b/0x50
[   22.959710]  kasan_atomics+0x1dc/0x310
[   22.959744]  ? __pfx_kasan_atomics+0x10/0x10
[   22.959779]  ? __pfx_read_tsc+0x10/0x10
[   22.959810]  ? ktime_get_ts64+0x86/0x230
[   22.959871]  kunit_try_run_case+0x1a5/0x480
[   22.959910]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.959944]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.959974]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.960012]  ? __kthread_parkme+0x82/0x180
[   22.960040]  ? preempt_count_sub+0x50/0x80
[   22.960075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.960111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.960145]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.960179]  kthread+0x337/0x6f0
[   22.960209]  ? trace_preempt_on+0x20/0xc0
[   22.960272]  ? __pfx_kthread+0x10/0x10
[   22.960306]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.960340]  ? calculate_sigpending+0x7b/0xa0
[   22.960376]  ? __pfx_kthread+0x10/0x10
[   22.960407]  ret_from_fork+0x116/0x1d0
[   22.960434]  ? __pfx_kthread+0x10/0x10
[   22.960466]  ret_from_fork_asm+0x1a/0x30
[   22.960508]  </TASK>
[   22.960524] 
[   22.975418] Allocated by task 292:
[   22.975851]  kasan_save_stack+0x45/0x70
[   22.976338]  kasan_save_track+0x18/0x40
[   22.976664]  kasan_save_alloc_info+0x3b/0x50
[   22.977170]  __kasan_kmalloc+0xb7/0xc0
[   22.977571]  __kmalloc_cache_noprof+0x189/0x420
[   22.978089]  kasan_atomics+0x95/0x310
[   22.978527]  kunit_try_run_case+0x1a5/0x480
[   22.978953]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.979518]  kthread+0x337/0x6f0
[   22.979895]  ret_from_fork+0x116/0x1d0
[   22.980347]  ret_from_fork_asm+0x1a/0x30
[   22.980730] 
[   22.980970] The buggy address belongs to the object at ffff88810383ae00
[   22.980970]  which belongs to the cache kmalloc-64 of size 64
[   22.981928] The buggy address is located 0 bytes to the right of
[   22.981928]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.982744] 
[   22.982978] The buggy address belongs to the physical page:
[   22.983576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.984309] flags: 0x200000000000000(node=0|zone=2)
[   22.984647] page_type: f5(slab)
[   22.984993] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.985715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.986444] page dumped because: kasan: bad access detected
[   22.986936] 
[   22.987138] Memory state around the buggy address:
[   22.987622]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.988261]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.988869] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.989491]                                      ^
[   22.989935]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.990600]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.991263] ==================================================================
[   23.372532] ==================================================================
[   23.373408] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   23.373978] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.374412] 
[   23.374746] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.374901] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.374945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.375007] Call Trace:
[   23.375064]  <TASK>
[   23.375115]  dump_stack_lvl+0x73/0xb0
[   23.375198]  print_report+0xd1/0x650
[   23.375324]  ? __virt_addr_valid+0x1db/0x2d0
[   23.375406]  ? kasan_atomics_helper+0x1467/0x5450
[   23.375480]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.375564]  ? kasan_atomics_helper+0x1467/0x5450
[   23.375642]  kasan_report+0x141/0x180
[   23.375742]  ? kasan_atomics_helper+0x1467/0x5450
[   23.375878]  kasan_check_range+0x10c/0x1c0
[   23.375968]  __kasan_check_write+0x18/0x20
[   23.376063]  kasan_atomics_helper+0x1467/0x5450
[   23.376172]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.376293]  ? kasan_save_alloc_info+0x3b/0x50
[   23.376382]  kasan_atomics+0x1dc/0x310
[   23.376454]  ? __pfx_kasan_atomics+0x10/0x10
[   23.376512]  ? __pfx_read_tsc+0x10/0x10
[   23.376580]  ? ktime_get_ts64+0x86/0x230
[   23.376658]  kunit_try_run_case+0x1a5/0x480
[   23.376789]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.376886]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.376960]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.377067]  ? __kthread_parkme+0x82/0x180
[   23.377169]  ? preempt_count_sub+0x50/0x80
[   23.377297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.377427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.377509]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.377590]  kthread+0x337/0x6f0
[   23.377687]  ? trace_preempt_on+0x20/0xc0
[   23.377797]  ? __pfx_kthread+0x10/0x10
[   23.377887]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.377967]  ? calculate_sigpending+0x7b/0xa0
[   23.378071]  ? __pfx_kthread+0x10/0x10
[   23.378178]  ret_from_fork+0x116/0x1d0
[   23.378290]  ? __pfx_kthread+0x10/0x10
[   23.378388]  ret_from_fork_asm+0x1a/0x30
[   23.378509]  </TASK>
[   23.378556] 
[   23.396208] Allocated by task 292:
[   23.396626]  kasan_save_stack+0x45/0x70
[   23.397142]  kasan_save_track+0x18/0x40
[   23.397572]  kasan_save_alloc_info+0x3b/0x50
[   23.397906]  __kasan_kmalloc+0xb7/0xc0
[   23.398365]  __kmalloc_cache_noprof+0x189/0x420
[   23.398941]  kasan_atomics+0x95/0x310
[   23.399451]  kunit_try_run_case+0x1a5/0x480
[   23.399983]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.400583]  kthread+0x337/0x6f0
[   23.401024]  ret_from_fork+0x116/0x1d0
[   23.401430]  ret_from_fork_asm+0x1a/0x30
[   23.401729] 
[   23.402013] The buggy address belongs to the object at ffff88810383ae00
[   23.402013]  which belongs to the cache kmalloc-64 of size 64
[   23.403165] The buggy address is located 0 bytes to the right of
[   23.403165]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.404341] 
[   23.404606] The buggy address belongs to the physical page:
[   23.405117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.406475] flags: 0x200000000000000(node=0|zone=2)
[   23.407097] page_type: f5(slab)
[   23.407486] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.408119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.409100] page dumped because: kasan: bad access detected
[   23.409893] 
[   23.410090] Memory state around the buggy address:
[   23.410498]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.411759]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.412703] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.413329]                                      ^
[   23.413752]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.414335]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.415463] ==================================================================
[   24.376736] ==================================================================
[   24.377418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   24.377986] Write of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   24.378711] 
[   24.378946] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   24.379065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.379128] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.379252] Call Trace:
[   24.379306]  <TASK>
[   24.379350]  dump_stack_lvl+0x73/0xb0
[   24.379433]  print_report+0xd1/0x650
[   24.379534]  ? __virt_addr_valid+0x1db/0x2d0
[   24.379652]  ? kasan_atomics_helper+0x218a/0x5450
[   24.379728]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.379805]  ? kasan_atomics_helper+0x218a/0x5450
[   24.379944]  kasan_report+0x141/0x180
[   24.380033]  ? kasan_atomics_helper+0x218a/0x5450
[   24.380119]  kasan_check_range+0x10c/0x1c0
[   24.380268]  __kasan_check_write+0x18/0x20
[   24.380346]  kasan_atomics_helper+0x218a/0x5450
[   24.380420]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.380494]  ? kasan_save_alloc_info+0x3b/0x50
[   24.380584]  kasan_atomics+0x1dc/0x310
[   24.380665]  ? __pfx_kasan_atomics+0x10/0x10
[   24.380769]  ? __pfx_read_tsc+0x10/0x10
[   24.380885]  ? ktime_get_ts64+0x86/0x230
[   24.380973]  kunit_try_run_case+0x1a5/0x480
[   24.381055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.381155]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.381281]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.381325]  ? __kthread_parkme+0x82/0x180
[   24.381355]  ? preempt_count_sub+0x50/0x80
[   24.381394]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.381431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.381465]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.381499]  kthread+0x337/0x6f0
[   24.381529]  ? trace_preempt_on+0x20/0xc0
[   24.381564]  ? __pfx_kthread+0x10/0x10
[   24.381597]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.381633]  ? calculate_sigpending+0x7b/0xa0
[   24.381670]  ? __pfx_kthread+0x10/0x10
[   24.381701]  ret_from_fork+0x116/0x1d0
[   24.381730]  ? __pfx_kthread+0x10/0x10
[   24.381760]  ret_from_fork_asm+0x1a/0x30
[   24.381803]  </TASK>
[   24.381820] 
[   24.398569] Allocated by task 292:
[   24.398870]  kasan_save_stack+0x45/0x70
[   24.401553]  kasan_save_track+0x18/0x40
[   24.402011]  kasan_save_alloc_info+0x3b/0x50
[   24.402292]  __kasan_kmalloc+0xb7/0xc0
[   24.402528]  __kmalloc_cache_noprof+0x189/0x420
[   24.402797]  kasan_atomics+0x95/0x310
[   24.404625]  kunit_try_run_case+0x1a5/0x480
[   24.404927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.405793]  kthread+0x337/0x6f0
[   24.406168]  ret_from_fork+0x116/0x1d0
[   24.407717]  ret_from_fork_asm+0x1a/0x30
[   24.409026] 
[   24.409583] The buggy address belongs to the object at ffff88810383ae00
[   24.409583]  which belongs to the cache kmalloc-64 of size 64
[   24.411118] The buggy address is located 0 bytes to the right of
[   24.411118]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   24.412412] 
[   24.412622] The buggy address belongs to the physical page:
[   24.413176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   24.413903] flags: 0x200000000000000(node=0|zone=2)
[   24.414467] page_type: f5(slab)
[   24.414799] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.415517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.416298] page dumped because: kasan: bad access detected
[   24.416782] 
[   24.417081] Memory state around the buggy address:
[   24.417603]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.418311]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.418897] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.419640]                                      ^
[   24.420049]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.420716]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.421436] ==================================================================
[   23.936877] ==================================================================
[   23.937504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   23.938410] Read of size 8 at addr ffff88810383ae30 by task kunit_try_catch/292
[   23.938952] 
[   23.939147] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   23.939461] Tainted: [B]=BAD_PAGE, [N]=TEST
[   23.939503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   23.939588] Call Trace:
[   23.939633]  <TASK>
[   23.939677]  dump_stack_lvl+0x73/0xb0
[   23.939761]  print_report+0xd1/0x650
[   23.940339]  ? __virt_addr_valid+0x1db/0x2d0
[   23.940453]  ? kasan_atomics_helper+0x4f30/0x5450
[   23.940527]  ? kasan_complete_mode_report_info+0x2a/0x200
[   23.940602]  ? kasan_atomics_helper+0x4f30/0x5450
[   23.940680]  kasan_report+0x141/0x180
[   23.940758]  ? kasan_atomics_helper+0x4f30/0x5450
[   23.940860]  __asan_report_load8_noabort+0x18/0x20
[   23.940945]  kasan_atomics_helper+0x4f30/0x5450
[   23.941020]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   23.941096]  ? kasan_save_alloc_info+0x3b/0x50
[   23.941209]  kasan_atomics+0x1dc/0x310
[   23.941316]  ? __pfx_kasan_atomics+0x10/0x10
[   23.941399]  ? __pfx_read_tsc+0x10/0x10
[   23.941469]  ? ktime_get_ts64+0x86/0x230
[   23.941577]  kunit_try_run_case+0x1a5/0x480
[   23.941685]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.941759]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   23.941851]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   23.941961]  ? __kthread_parkme+0x82/0x180
[   23.942060]  ? preempt_count_sub+0x50/0x80
[   23.942141]  ? __pfx_kunit_try_run_case+0x10/0x10
[   23.942306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.942392]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   23.942472]  kthread+0x337/0x6f0
[   23.942508]  ? trace_preempt_on+0x20/0xc0
[   23.942547]  ? __pfx_kthread+0x10/0x10
[   23.942581]  ? _raw_spin_unlock_irq+0x47/0x80
[   23.942619]  ? calculate_sigpending+0x7b/0xa0
[   23.942655]  ? __pfx_kthread+0x10/0x10
[   23.942687]  ret_from_fork+0x116/0x1d0
[   23.942715]  ? __pfx_kthread+0x10/0x10
[   23.942747]  ret_from_fork_asm+0x1a/0x30
[   23.942791]  </TASK>
[   23.942808] 
[   23.960669] Allocated by task 292:
[   23.961076]  kasan_save_stack+0x45/0x70
[   23.961602]  kasan_save_track+0x18/0x40
[   23.962065]  kasan_save_alloc_info+0x3b/0x50
[   23.962586]  __kasan_kmalloc+0xb7/0xc0
[   23.963070]  __kmalloc_cache_noprof+0x189/0x420
[   23.963619]  kasan_atomics+0x95/0x310
[   23.964092]  kunit_try_run_case+0x1a5/0x480
[   23.964565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   23.965280]  kthread+0x337/0x6f0
[   23.965655]  ret_from_fork+0x116/0x1d0
[   23.966080]  ret_from_fork_asm+0x1a/0x30
[   23.966537] 
[   23.966774] The buggy address belongs to the object at ffff88810383ae00
[   23.966774]  which belongs to the cache kmalloc-64 of size 64
[   23.968177] The buggy address is located 0 bytes to the right of
[   23.968177]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   23.969547] 
[   23.969880] The buggy address belongs to the physical page:
[   23.970433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   23.971320] flags: 0x200000000000000(node=0|zone=2)
[   23.971844] page_type: f5(slab)
[   23.972192] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   23.973047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   23.973533] page dumped because: kasan: bad access detected
[   23.974012] 
[   23.974499] Memory state around the buggy address:
[   23.974949]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.975810]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   23.976436] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   23.977022]                                      ^
[   23.977630]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.978377]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   23.978858] ==================================================================
[   22.152210] ==================================================================
[   22.152855] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   22.153363] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.154005] 
[   22.154301] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.154464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.154510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.154599] Call Trace:
[   22.154652]  <TASK>
[   22.154698]  dump_stack_lvl+0x73/0xb0
[   22.154780]  print_report+0xd1/0x650
[   22.154875]  ? __virt_addr_valid+0x1db/0x2d0
[   22.154954]  ? kasan_atomics_helper+0x5fe/0x5450
[   22.155025]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.155102]  ? kasan_atomics_helper+0x5fe/0x5450
[   22.155173]  kasan_report+0x141/0x180
[   22.155250]  ? kasan_atomics_helper+0x5fe/0x5450
[   22.155339]  kasan_check_range+0x10c/0x1c0
[   22.155432]  __kasan_check_write+0x18/0x20
[   22.155511]  kasan_atomics_helper+0x5fe/0x5450
[   22.155606]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.155688]  ? kasan_save_alloc_info+0x3b/0x50
[   22.155820]  kasan_atomics+0x1dc/0x310
[   22.155960]  ? __pfx_kasan_atomics+0x10/0x10
[   22.156049]  ? __pfx_read_tsc+0x10/0x10
[   22.156124]  ? ktime_get_ts64+0x86/0x230
[   22.156246]  kunit_try_run_case+0x1a5/0x480
[   22.156338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.156449]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.156533]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.156618]  ? __kthread_parkme+0x82/0x180
[   22.156689]  ? preempt_count_sub+0x50/0x80
[   22.156772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.156865]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.156949]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.157027]  kthread+0x337/0x6f0
[   22.157097]  ? trace_preempt_on+0x20/0xc0
[   22.157143]  ? __pfx_kthread+0x10/0x10
[   22.157177]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.157216]  ? calculate_sigpending+0x7b/0xa0
[   22.157294]  ? __pfx_kthread+0x10/0x10
[   22.157361]  ret_from_fork+0x116/0x1d0
[   22.157394]  ? __pfx_kthread+0x10/0x10
[   22.157426]  ret_from_fork_asm+0x1a/0x30
[   22.157470]  </TASK>
[   22.157486] 
[   22.176768] Allocated by task 292:
[   22.177081]  kasan_save_stack+0x45/0x70
[   22.177482]  kasan_save_track+0x18/0x40
[   22.178544]  kasan_save_alloc_info+0x3b/0x50
[   22.178953]  __kasan_kmalloc+0xb7/0xc0
[   22.179633]  __kmalloc_cache_noprof+0x189/0x420
[   22.180190]  kasan_atomics+0x95/0x310
[   22.180894]  kunit_try_run_case+0x1a5/0x480
[   22.181715]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.182097]  kthread+0x337/0x6f0
[   22.182852]  ret_from_fork+0x116/0x1d0
[   22.183606]  ret_from_fork_asm+0x1a/0x30
[   22.184338] 
[   22.184689] The buggy address belongs to the object at ffff88810383ae00
[   22.184689]  which belongs to the cache kmalloc-64 of size 64
[   22.186412] The buggy address is located 0 bytes to the right of
[   22.186412]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.187594] 
[   22.188105] The buggy address belongs to the physical page:
[   22.188800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.189792] flags: 0x200000000000000(node=0|zone=2)
[   22.190378] page_type: f5(slab)
[   22.190662] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.191221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.191731] page dumped because: kasan: bad access detected
[   22.192127] 
[   22.192334] Memory state around the buggy address:
[   22.192890]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.193423]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.194134] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.195189]                                      ^
[   22.196265]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.197164]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.198002] ==================================================================
[   21.734595] ==================================================================
[   21.736127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   21.737022] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   21.737519] 
[   21.737726] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.737879] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.737918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.737981] Call Trace:
[   21.738018]  <TASK>
[   21.738069]  dump_stack_lvl+0x73/0xb0
[   21.738135]  print_report+0xd1/0x650
[   21.738170]  ? __virt_addr_valid+0x1db/0x2d0
[   21.738205]  ? kasan_atomics_helper+0x4bbc/0x5450
[   21.738344]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.738463]  ? kasan_atomics_helper+0x4bbc/0x5450
[   21.738570]  kasan_report+0x141/0x180
[   21.738679]  ? kasan_atomics_helper+0x4bbc/0x5450
[   21.738790]  __asan_report_load4_noabort+0x18/0x20
[   21.738935]  kasan_atomics_helper+0x4bbc/0x5450
[   21.739044]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.739147]  ? kasan_save_alloc_info+0x3b/0x50
[   21.739310]  kasan_atomics+0x1dc/0x310
[   21.739427]  ? __pfx_kasan_atomics+0x10/0x10
[   21.739470]  ? __pfx_read_tsc+0x10/0x10
[   21.739507]  ? ktime_get_ts64+0x86/0x230
[   21.739553]  kunit_try_run_case+0x1a5/0x480
[   21.739594]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.739627]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.739657]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.739696]  ? __kthread_parkme+0x82/0x180
[   21.739726]  ? preempt_count_sub+0x50/0x80
[   21.739761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.739796]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.739851]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.739893]  kthread+0x337/0x6f0
[   21.739924]  ? trace_preempt_on+0x20/0xc0
[   21.739959]  ? __pfx_kthread+0x10/0x10
[   21.739988]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.740022]  ? calculate_sigpending+0x7b/0xa0
[   21.740056]  ? __pfx_kthread+0x10/0x10
[   21.740088]  ret_from_fork+0x116/0x1d0
[   21.740113]  ? __pfx_kthread+0x10/0x10
[   21.740143]  ret_from_fork_asm+0x1a/0x30
[   21.740187]  </TASK>
[   21.740204] 
[   21.764861] Allocated by task 292:
[   21.765297]  kasan_save_stack+0x45/0x70
[   21.765898]  kasan_save_track+0x18/0x40
[   21.766819]  kasan_save_alloc_info+0x3b/0x50
[   21.767420]  __kasan_kmalloc+0xb7/0xc0
[   21.767923]  __kmalloc_cache_noprof+0x189/0x420
[   21.768570]  kasan_atomics+0x95/0x310
[   21.768994]  kunit_try_run_case+0x1a5/0x480
[   21.769607]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.770186]  kthread+0x337/0x6f0
[   21.771046]  ret_from_fork+0x116/0x1d0
[   21.771727]  ret_from_fork_asm+0x1a/0x30
[   21.772108] 
[   21.772622] The buggy address belongs to the object at ffff88810383ae00
[   21.772622]  which belongs to the cache kmalloc-64 of size 64
[   21.774127] The buggy address is located 0 bytes to the right of
[   21.774127]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   21.776312] 
[   21.776733] The buggy address belongs to the physical page:
[   21.777535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   21.778320] flags: 0x200000000000000(node=0|zone=2)
[   21.779331] page_type: f5(slab)
[   21.779686] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.780909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.781602] page dumped because: kasan: bad access detected
[   21.782036] 
[   21.782268] Memory state around the buggy address:
[   21.782722]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.783300]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.783915] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.784519]                                      ^
[   21.785153]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.785755]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.786902] ==================================================================
[   21.829280] ==================================================================
[   21.830531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   21.831005] Read of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   21.831775] 
[   21.832035] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   21.832157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   21.832193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   21.832247] Call Trace:
[   21.832296]  <TASK>
[   21.832336]  dump_stack_lvl+0x73/0xb0
[   21.832417]  print_report+0xd1/0x650
[   21.832492]  ? __virt_addr_valid+0x1db/0x2d0
[   21.832570]  ? kasan_atomics_helper+0x4b88/0x5450
[   21.832636]  ? kasan_complete_mode_report_info+0x2a/0x200
[   21.832705]  ? kasan_atomics_helper+0x4b88/0x5450
[   21.832776]  kasan_report+0x141/0x180
[   21.832866]  ? kasan_atomics_helper+0x4b88/0x5450
[   21.832947]  __asan_report_load4_noabort+0x18/0x20
[   21.833028]  kasan_atomics_helper+0x4b88/0x5450
[   21.833103]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   21.833175]  ? kasan_save_alloc_info+0x3b/0x50
[   21.833265]  kasan_atomics+0x1dc/0x310
[   21.833344]  ? __pfx_kasan_atomics+0x10/0x10
[   21.833422]  ? __pfx_read_tsc+0x10/0x10
[   21.833491]  ? ktime_get_ts64+0x86/0x230
[   21.833572]  kunit_try_run_case+0x1a5/0x480
[   21.833651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.833721]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   21.833789]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   21.834196]  ? __kthread_parkme+0x82/0x180
[   21.834353]  ? preempt_count_sub+0x50/0x80
[   21.834398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   21.834434]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.834468]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   21.834501]  kthread+0x337/0x6f0
[   21.834530]  ? trace_preempt_on+0x20/0xc0
[   21.834563]  ? __pfx_kthread+0x10/0x10
[   21.834591]  ? _raw_spin_unlock_irq+0x47/0x80
[   21.834624]  ? calculate_sigpending+0x7b/0xa0
[   21.834659]  ? __pfx_kthread+0x10/0x10
[   21.834688]  ret_from_fork+0x116/0x1d0
[   21.834713]  ? __pfx_kthread+0x10/0x10
[   21.834740]  ret_from_fork_asm+0x1a/0x30
[   21.834780]  </TASK>
[   21.834794] 
[   21.852941] Allocated by task 292:
[   21.853201]  kasan_save_stack+0x45/0x70
[   21.853592]  kasan_save_track+0x18/0x40
[   21.853995]  kasan_save_alloc_info+0x3b/0x50
[   21.854599]  __kasan_kmalloc+0xb7/0xc0
[   21.854904]  __kmalloc_cache_noprof+0x189/0x420
[   21.855223]  kasan_atomics+0x95/0x310
[   21.855629]  kunit_try_run_case+0x1a5/0x480
[   21.856094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   21.856975]  kthread+0x337/0x6f0
[   21.857406]  ret_from_fork+0x116/0x1d0
[   21.858090]  ret_from_fork_asm+0x1a/0x30
[   21.859471] 
[   21.860039] The buggy address belongs to the object at ffff88810383ae00
[   21.860039]  which belongs to the cache kmalloc-64 of size 64
[   21.861434] The buggy address is located 0 bytes to the right of
[   21.861434]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   21.863442] 
[   21.863827] The buggy address belongs to the physical page:
[   21.864207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   21.864935] flags: 0x200000000000000(node=0|zone=2)
[   21.865352] page_type: f5(slab)
[   21.865770] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   21.866441] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   21.867060] page dumped because: kasan: bad access detected
[   21.867773] 
[   21.868086] Memory state around the buggy address:
[   21.868583]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.869278]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   21.870793] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   21.871589]                                      ^
[   21.871886]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.872899]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.873880] ==================================================================
[   22.786537] ==================================================================
[   22.787328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   22.788599] Write of size 4 at addr ffff88810383ae30 by task kunit_try_catch/292
[   22.789239] 
[   22.789470] CPU: 1 UID: 0 PID: 292 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250617 #1 PREEMPT(voluntary) 
[   22.789587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   22.789910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   22.790002] Call Trace:
[   22.790053]  <TASK>
[   22.790129]  dump_stack_lvl+0x73/0xb0
[   22.790242]  print_report+0xd1/0x650
[   22.790327]  ? __virt_addr_valid+0x1db/0x2d0
[   22.790437]  ? kasan_atomics_helper+0xe78/0x5450
[   22.790543]  ? kasan_complete_mode_report_info+0x2a/0x200
[   22.790620]  ? kasan_atomics_helper+0xe78/0x5450
[   22.790695]  kasan_report+0x141/0x180
[   22.790773]  ? kasan_atomics_helper+0xe78/0x5450
[   22.790873]  kasan_check_range+0x10c/0x1c0
[   22.790953]  __kasan_check_write+0x18/0x20
[   22.791022]  kasan_atomics_helper+0xe78/0x5450
[   22.791097]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   22.791170]  ? kasan_save_alloc_info+0x3b/0x50
[   22.791290]  kasan_atomics+0x1dc/0x310
[   22.791371]  ? __pfx_kasan_atomics+0x10/0x10
[   22.791452]  ? __pfx_read_tsc+0x10/0x10
[   22.791519]  ? ktime_get_ts64+0x86/0x230
[   22.791611]  kunit_try_run_case+0x1a5/0x480
[   22.791688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.791759]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   22.791846]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   22.791931]  ? __kthread_parkme+0x82/0x180
[   22.792002]  ? preempt_count_sub+0x50/0x80
[   22.792081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   22.792161]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.792242]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   22.792325]  kthread+0x337/0x6f0
[   22.792397]  ? trace_preempt_on+0x20/0xc0
[   22.792438]  ? __pfx_kthread+0x10/0x10
[   22.792470]  ? _raw_spin_unlock_irq+0x47/0x80
[   22.792507]  ? calculate_sigpending+0x7b/0xa0
[   22.792543]  ? __pfx_kthread+0x10/0x10
[   22.792573]  ret_from_fork+0x116/0x1d0
[   22.792601]  ? __pfx_kthread+0x10/0x10
[   22.792630]  ret_from_fork_asm+0x1a/0x30
[   22.792672]  </TASK>
[   22.792687] 
[   22.813294] Allocated by task 292:
[   22.813668]  kasan_save_stack+0x45/0x70
[   22.815693]  kasan_save_track+0x18/0x40
[   22.817113]  kasan_save_alloc_info+0x3b/0x50
[   22.818102]  __kasan_kmalloc+0xb7/0xc0
[   22.818472]  __kmalloc_cache_noprof+0x189/0x420
[   22.819514]  kasan_atomics+0x95/0x310
[   22.821054]  kunit_try_run_case+0x1a5/0x480
[   22.821540]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   22.822127]  kthread+0x337/0x6f0
[   22.822673]  ret_from_fork+0x116/0x1d0
[   22.823063]  ret_from_fork_asm+0x1a/0x30
[   22.823490] 
[   22.823721] The buggy address belongs to the object at ffff88810383ae00
[   22.823721]  which belongs to the cache kmalloc-64 of size 64
[   22.824526] The buggy address is located 0 bytes to the right of
[   22.824526]  allocated 48-byte region [ffff88810383ae00, ffff88810383ae30)
[   22.825637] 
[   22.825807] The buggy address belongs to the physical page:
[   22.826478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10383a
[   22.827165] flags: 0x200000000000000(node=0|zone=2)
[   22.828356] page_type: f5(slab)
[   22.829203] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   22.830504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   22.831582] page dumped because: kasan: bad access detected
[   22.832000] 
[   22.832153] Memory state around the buggy address:
[   22.833076]  ffff88810383ad00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.834235]  ffff88810383ad80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   22.834751] >ffff88810383ae00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   22.835376]                                      ^
[   22.835926]  ffff88810383ae80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.836623]  ffff88810383af00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   22.837292] ==================================================================