Hay
Date
June 20, 2025, 12:38 p.m.

Environment
qemu-arm64
qemu-x86_64

[   35.938135] ==================================================================
[   35.938920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   35.939213] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.939446] 
[   35.939929] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.940784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.941437] Hardware name: linux,dummy-virt (DT)
[   35.941659] Call trace:
[   35.941759]  show_stack+0x20/0x38 (C)
[   35.941911]  dump_stack_lvl+0x8c/0xd0
[   35.942002]  print_report+0x118/0x608
[   35.942087]  kasan_report+0xdc/0x128
[   35.942170]  kasan_check_range+0x100/0x1a8
[   35.942272]  __kasan_check_write+0x20/0x30
[   35.942383]  kasan_atomics_helper+0xff0/0x4858
[   35.943623]  kasan_atomics+0x198/0x2e0
[   35.943976]  kunit_try_run_case+0x170/0x3f0
[   35.944623]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.944799]  kthread+0x328/0x630
[   35.944922]  ret_from_fork+0x10/0x20
[   35.945161] 
[   35.945242] Allocated by task 276:
[   35.945418]  kasan_save_stack+0x3c/0x68
[   35.945856]  kasan_save_track+0x20/0x40
[   35.945943]  kasan_save_alloc_info+0x40/0x58
[   35.946087]  __kasan_kmalloc+0xd4/0xd8
[   35.946181]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.946279]  kasan_atomics+0xb8/0x2e0
[   35.946462]  kunit_try_run_case+0x170/0x3f0
[   35.946924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.947277]  kthread+0x328/0x630
[   35.947447]  ret_from_fork+0x10/0x20
[   35.947554] 
[   35.947795] The buggy address belongs to the object at fff00000c768c580
[   35.947795]  which belongs to the cache kmalloc-64 of size 64
[   35.948651] The buggy address is located 0 bytes to the right of
[   35.948651]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.948892] 
[   35.948945] The buggy address belongs to the physical page:
[   35.949013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.949113] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.949220] page_type: f5(slab)
[   35.949320] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.949454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.949571] page dumped because: kasan: bad access detected
[   35.950197] 
[   35.950392] Memory state around the buggy address:
[   35.950883]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.951233]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.951535] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.952157]                                      ^
[   35.952696]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.952849]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.952967] ==================================================================
[   35.860988] ==================================================================
[   35.861346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   35.861575] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.861739] 
[   35.861838] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.862071] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.862509] Hardware name: linux,dummy-virt (DT)
[   35.862944] Call trace:
[   35.863016]  show_stack+0x20/0x38 (C)
[   35.863935]  dump_stack_lvl+0x8c/0xd0
[   35.864182]  print_report+0x118/0x608
[   35.864716]  kasan_report+0xdc/0x128
[   35.864869]  __asan_report_load8_noabort+0x20/0x30
[   35.864970]  kasan_atomics_helper+0x3f58/0x4858
[   35.865075]  kasan_atomics+0x198/0x2e0
[   35.865193]  kunit_try_run_case+0x170/0x3f0
[   35.865302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.865432]  kthread+0x328/0x630
[   35.865705]  ret_from_fork+0x10/0x20
[   35.866128] 
[   35.866331] Allocated by task 276:
[   35.866598]  kasan_save_stack+0x3c/0x68
[   35.867169]  kasan_save_track+0x20/0x40
[   35.867308]  kasan_save_alloc_info+0x40/0x58
[   35.867432]  __kasan_kmalloc+0xd4/0xd8
[   35.867941]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.868074]  kasan_atomics+0xb8/0x2e0
[   35.868181]  kunit_try_run_case+0x170/0x3f0
[   35.868289]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.868402]  kthread+0x328/0x630
[   35.869042]  ret_from_fork+0x10/0x20
[   35.869154] 
[   35.869201] The buggy address belongs to the object at fff00000c768c580
[   35.869201]  which belongs to the cache kmalloc-64 of size 64
[   35.869847] The buggy address is located 0 bytes to the right of
[   35.869847]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.870047] 
[   35.870444] The buggy address belongs to the physical page:
[   35.870858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.871030] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.871174] page_type: f5(slab)
[   35.871286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.872014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.872545] page dumped because: kasan: bad access detected
[   35.873007] 
[   35.873067] Memory state around the buggy address:
[   35.873153]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.873258]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.873375] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.873482]                                      ^
[   35.874415]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.874568]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.874695] ==================================================================
[   36.007389] ==================================================================
[   36.007716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   36.008191] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.008798] 
[   36.008977] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.009170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.009224] Hardware name: linux,dummy-virt (DT)
[   36.009735] Call trace:
[   36.009844]  show_stack+0x20/0x38 (C)
[   36.010324]  dump_stack_lvl+0x8c/0xd0
[   36.010920]  print_report+0x118/0x608
[   36.011279]  kasan_report+0xdc/0x128
[   36.011403]  kasan_check_range+0x100/0x1a8
[   36.011879]  __kasan_check_write+0x20/0x30
[   36.012035]  kasan_atomics_helper+0x1190/0x4858
[   36.012528]  kasan_atomics+0x198/0x2e0
[   36.012900]  kunit_try_run_case+0x170/0x3f0
[   36.013283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.013788]  kthread+0x328/0x630
[   36.013904]  ret_from_fork+0x10/0x20
[   36.014001] 
[   36.014043] Allocated by task 276:
[   36.014560]  kasan_save_stack+0x3c/0x68
[   36.014780]  kasan_save_track+0x20/0x40
[   36.015195]  kasan_save_alloc_info+0x40/0x58
[   36.015412]  __kasan_kmalloc+0xd4/0xd8
[   36.015593]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.015793]  kasan_atomics+0xb8/0x2e0
[   36.015885]  kunit_try_run_case+0x170/0x3f0
[   36.016443]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.016576]  kthread+0x328/0x630
[   36.016939]  ret_from_fork+0x10/0x20
[   36.017222] 
[   36.017272] The buggy address belongs to the object at fff00000c768c580
[   36.017272]  which belongs to the cache kmalloc-64 of size 64
[   36.017428] The buggy address is located 0 bytes to the right of
[   36.017428]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.017592] 
[   36.017688] The buggy address belongs to the physical page:
[   36.017868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.018036] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.018175] page_type: f5(slab)
[   36.018811] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.018959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.019281] page dumped because: kasan: bad access detected
[   36.019953] 
[   36.020010] Memory state around the buggy address:
[   36.020106]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.020884]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.021082] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.021486]                                      ^
[   36.021570]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.021872]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.022117] ==================================================================
[   35.878699] ==================================================================
[   35.878856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   35.879003] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.879142] 
[   35.879237] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.880654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.880966] Hardware name: linux,dummy-virt (DT)
[   35.881333] Call trace:
[   35.881438]  show_stack+0x20/0x38 (C)
[   35.881997]  dump_stack_lvl+0x8c/0xd0
[   35.882714]  print_report+0x118/0x608
[   35.883174]  kasan_report+0xdc/0x128
[   35.883313]  kasan_check_range+0x100/0x1a8
[   35.883723]  __kasan_check_write+0x20/0x30
[   35.884057]  kasan_atomics_helper+0xe44/0x4858
[   35.884307]  kasan_atomics+0x198/0x2e0
[   35.885874]  kunit_try_run_case+0x170/0x3f0
[   35.886033]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.886109]  kthread+0x328/0x630
[   35.886163]  ret_from_fork+0x10/0x20
[   35.886226] 
[   35.886255] Allocated by task 276:
[   35.886296]  kasan_save_stack+0x3c/0x68
[   35.886355]  kasan_save_track+0x20/0x40
[   35.886401]  kasan_save_alloc_info+0x40/0x58
[   35.886450]  __kasan_kmalloc+0xd4/0xd8
[   35.886495]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.886543]  kasan_atomics+0xb8/0x2e0
[   35.886586]  kunit_try_run_case+0x170/0x3f0
[   35.886707]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.886831]  kthread+0x328/0x630
[   35.886924]  ret_from_fork+0x10/0x20
[   35.887252] 
[   35.887330] The buggy address belongs to the object at fff00000c768c580
[   35.887330]  which belongs to the cache kmalloc-64 of size 64
[   35.887664] The buggy address is located 0 bytes to the right of
[   35.887664]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.887857] 
[   35.888527] The buggy address belongs to the physical page:
[   35.888740] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.889063] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.889213] page_type: f5(slab)
[   35.889326] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.889814] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.890004] page dumped because: kasan: bad access detected
[   35.890100] 
[   35.890240] Memory state around the buggy address:
[   35.890390]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.890515]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.890643] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.890747]                                      ^
[   35.890854]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.891028]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.891139] ==================================================================
[   35.893368] ==================================================================
[   35.893848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   35.893992] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.894096] 
[   35.894186] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.894354] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.894419] Hardware name: linux,dummy-virt (DT)
[   35.894486] Call trace:
[   35.894535]  show_stack+0x20/0x38 (C)
[   35.894667]  dump_stack_lvl+0x8c/0xd0
[   35.894772]  print_report+0x118/0x608
[   35.894880]  kasan_report+0xdc/0x128
[   35.894995]  __asan_report_store8_noabort+0x20/0x30
[   35.896980]  kasan_atomics_helper+0x3e5c/0x4858
[   35.897216]  kasan_atomics+0x198/0x2e0
[   35.897331]  kunit_try_run_case+0x170/0x3f0
[   35.897438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.898573]  kthread+0x328/0x630
[   35.899172]  ret_from_fork+0x10/0x20
[   35.899435] 
[   35.899699] Allocated by task 276:
[   35.899790]  kasan_save_stack+0x3c/0x68
[   35.900347]  kasan_save_track+0x20/0x40
[   35.900507]  kasan_save_alloc_info+0x40/0x58
[   35.901069]  __kasan_kmalloc+0xd4/0xd8
[   35.901548]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.901880]  kasan_atomics+0xb8/0x2e0
[   35.901981]  kunit_try_run_case+0x170/0x3f0
[   35.902359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.902861]  kthread+0x328/0x630
[   35.903317]  ret_from_fork+0x10/0x20
[   35.903689] 
[   35.903754] The buggy address belongs to the object at fff00000c768c580
[   35.903754]  which belongs to the cache kmalloc-64 of size 64
[   35.904274] The buggy address is located 0 bytes to the right of
[   35.904274]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.904455] 
[   35.904539] The buggy address belongs to the physical page:
[   35.904639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.904797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.904910] page_type: f5(slab)
[   35.904993] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.905336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.905455] page dumped because: kasan: bad access detected
[   35.905735] 
[   35.905799] Memory state around the buggy address:
[   35.905928]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.906086]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.906199] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.906361]                                      ^
[   35.906745]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.906941]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.907083] ==================================================================
[   36.153527] ==================================================================
[   36.153694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   36.153849] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.153987] 
[   36.154079] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.154309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.154381] Hardware name: linux,dummy-virt (DT)
[   36.154918] Call trace:
[   36.155060]  show_stack+0x20/0x38 (C)
[   36.155323]  dump_stack_lvl+0x8c/0xd0
[   36.155521]  print_report+0x118/0x608
[   36.155971]  kasan_report+0xdc/0x128
[   36.156163]  __asan_report_load8_noabort+0x20/0x30
[   36.156364]  kasan_atomics_helper+0x3e10/0x4858
[   36.156573]  kasan_atomics+0x198/0x2e0
[   36.156767]  kunit_try_run_case+0x170/0x3f0
[   36.157198]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.157309]  kthread+0x328/0x630
[   36.157406]  ret_from_fork+0x10/0x20
[   36.157529] 
[   36.157645] Allocated by task 276:
[   36.157754]  kasan_save_stack+0x3c/0x68
[   36.158005]  kasan_save_track+0x20/0x40
[   36.158479]  kasan_save_alloc_info+0x40/0x58
[   36.158594]  __kasan_kmalloc+0xd4/0xd8
[   36.159177]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.159598]  kasan_atomics+0xb8/0x2e0
[   36.159975]  kunit_try_run_case+0x170/0x3f0
[   36.160129]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.160650]  kthread+0x328/0x630
[   36.160895]  ret_from_fork+0x10/0x20
[   36.161011] 
[   36.161071] The buggy address belongs to the object at fff00000c768c580
[   36.161071]  which belongs to the cache kmalloc-64 of size 64
[   36.161232] The buggy address is located 0 bytes to the right of
[   36.161232]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.161363] 
[   36.161404] The buggy address belongs to the physical page:
[   36.161825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.162238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.162638] page_type: f5(slab)
[   36.162762] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.163026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.163288] page dumped because: kasan: bad access detected
[   36.163381] 
[   36.163438] Memory state around the buggy address:
[   36.163529]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.163669]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.163796] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.163905]                                      ^
[   36.164540]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.164737]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.165073] ==================================================================
[   36.122503] ==================================================================
[   36.122656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   36.122778] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.122897] 
[   36.122990] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.123257] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.123365] Hardware name: linux,dummy-virt (DT)
[   36.123475] Call trace:
[   36.123586]  show_stack+0x20/0x38 (C)
[   36.123771]  dump_stack_lvl+0x8c/0xd0
[   36.123939]  print_report+0x118/0x608
[   36.124101]  kasan_report+0xdc/0x128
[   36.124227]  kasan_check_range+0x100/0x1a8
[   36.124391]  __kasan_check_write+0x20/0x30
[   36.124499]  kasan_atomics_helper+0x1644/0x4858
[   36.124711]  kasan_atomics+0x198/0x2e0
[   36.124849]  kunit_try_run_case+0x170/0x3f0
[   36.124965]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.125117]  kthread+0x328/0x630
[   36.125261]  ret_from_fork+0x10/0x20
[   36.125371] 
[   36.125419] Allocated by task 276:
[   36.125492]  kasan_save_stack+0x3c/0x68
[   36.125629]  kasan_save_track+0x20/0x40
[   36.125710]  kasan_save_alloc_info+0x40/0x58
[   36.125825]  __kasan_kmalloc+0xd4/0xd8
[   36.125922]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.126014]  kasan_atomics+0xb8/0x2e0
[   36.126082]  kunit_try_run_case+0x170/0x3f0
[   36.126164]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.126261]  kthread+0x328/0x630
[   36.126335]  ret_from_fork+0x10/0x20
[   36.126415] 
[   36.126469] The buggy address belongs to the object at fff00000c768c580
[   36.126469]  which belongs to the cache kmalloc-64 of size 64
[   36.126638] The buggy address is located 0 bytes to the right of
[   36.126638]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.126848] 
[   36.126913] The buggy address belongs to the physical page:
[   36.127003] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.127150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.127283] page_type: f5(slab)
[   36.127427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.127561] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.127674] page dumped because: kasan: bad access detected
[   36.127756] 
[   36.127803] Memory state around the buggy address:
[   36.127893]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.128013]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.128127] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.128233]                                      ^
[   36.128410]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.128520]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.128635] ==================================================================
[   35.919841] ==================================================================
[   35.919933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   35.920014] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.920076] 
[   35.920127] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.920231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.920267] Hardware name: linux,dummy-virt (DT)
[   35.921182] Call trace:
[   35.921270]  show_stack+0x20/0x38 (C)
[   35.921403]  dump_stack_lvl+0x8c/0xd0
[   35.921528]  print_report+0x118/0x608
[   35.921668]  kasan_report+0xdc/0x128
[   35.921781]  kasan_check_range+0x100/0x1a8
[   35.921902]  __kasan_check_write+0x20/0x30
[   35.923710]  kasan_atomics_helper+0xf20/0x4858
[   35.923793]  kasan_atomics+0x198/0x2e0
[   35.923851]  kunit_try_run_case+0x170/0x3f0
[   35.923940]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.924006]  kthread+0x328/0x630
[   35.924056]  ret_from_fork+0x10/0x20
[   35.924117] 
[   35.924144] Allocated by task 276:
[   35.924184]  kasan_save_stack+0x3c/0x68
[   35.924239]  kasan_save_track+0x20/0x40
[   35.924286]  kasan_save_alloc_info+0x40/0x58
[   35.924356]  __kasan_kmalloc+0xd4/0xd8
[   35.924404]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.924452]  kasan_atomics+0xb8/0x2e0
[   35.924496]  kunit_try_run_case+0x170/0x3f0
[   35.924541]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.924593]  kthread+0x328/0x630
[   35.924707]  ret_from_fork+0x10/0x20
[   35.924795] 
[   35.924852] The buggy address belongs to the object at fff00000c768c580
[   35.924852]  which belongs to the cache kmalloc-64 of size 64
[   35.924986] The buggy address is located 0 bytes to the right of
[   35.924986]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.925067] 
[   35.925096] The buggy address belongs to the physical page:
[   35.925137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.925201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.925272] page_type: f5(slab)
[   35.925325] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.925386] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.925437] page dumped because: kasan: bad access detected
[   35.925477] 
[   35.925500] Memory state around the buggy address:
[   35.925544]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.925596]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.925724] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.925842]                                      ^
[   35.925916]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.926001]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.926077] ==================================================================
[   36.086038] ==================================================================
[   36.086106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   36.086182] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.086243] 
[   36.086292] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.086397] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.086429] Hardware name: linux,dummy-virt (DT)
[   36.086473] Call trace:
[   36.086504]  show_stack+0x20/0x38 (C)
[   36.086566]  dump_stack_lvl+0x8c/0xd0
[   36.088393]  print_report+0x118/0x608
[   36.088548]  kasan_report+0xdc/0x128
[   36.088684]  kasan_check_range+0x100/0x1a8
[   36.088818]  __kasan_check_write+0x20/0x30
[   36.088936]  kasan_atomics_helper+0x147c/0x4858
[   36.089009]  kasan_atomics+0x198/0x2e0
[   36.089065]  kunit_try_run_case+0x170/0x3f0
[   36.089128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.089193]  kthread+0x328/0x630
[   36.089244]  ret_from_fork+0x10/0x20
[   36.089305] 
[   36.089331] Allocated by task 276:
[   36.089372]  kasan_save_stack+0x3c/0x68
[   36.089428]  kasan_save_track+0x20/0x40
[   36.089473]  kasan_save_alloc_info+0x40/0x58
[   36.089524]  __kasan_kmalloc+0xd4/0xd8
[   36.089567]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.089639]  kasan_atomics+0xb8/0x2e0
[   36.089688]  kunit_try_run_case+0x170/0x3f0
[   36.089734]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.089787]  kthread+0x328/0x630
[   36.089827]  ret_from_fork+0x10/0x20
[   36.089870] 
[   36.089898] The buggy address belongs to the object at fff00000c768c580
[   36.089898]  which belongs to the cache kmalloc-64 of size 64
[   36.089969] The buggy address is located 0 bytes to the right of
[   36.089969]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.090045] 
[   36.090073] The buggy address belongs to the physical page:
[   36.090116] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.090183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.090248] page_type: f5(slab)
[   36.090300] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.090360] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.090412] page dumped because: kasan: bad access detected
[   36.090450] 
[   36.090473] Memory state around the buggy address:
[   36.090516]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.090569]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.090733] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.090942]                                      ^
[   36.091111]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.091351]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.091489] ==================================================================
[   36.115000] ==================================================================
[   36.115180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   36.115370] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.115576] 
[   36.115685] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.115911] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.115977] Hardware name: linux,dummy-virt (DT)
[   36.116062] Call trace:
[   36.116126]  show_stack+0x20/0x38 (C)
[   36.116259]  dump_stack_lvl+0x8c/0xd0
[   36.116415]  print_report+0x118/0x608
[   36.116534]  kasan_report+0xdc/0x128
[   36.116692]  __asan_report_load8_noabort+0x20/0x30
[   36.116801]  kasan_atomics_helper+0x3db0/0x4858
[   36.116920]  kasan_atomics+0x198/0x2e0
[   36.117047]  kunit_try_run_case+0x170/0x3f0
[   36.117232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.117368]  kthread+0x328/0x630
[   36.117505]  ret_from_fork+0x10/0x20
[   36.117640] 
[   36.117709] Allocated by task 276:
[   36.117810]  kasan_save_stack+0x3c/0x68
[   36.117918]  kasan_save_track+0x20/0x40
[   36.118020]  kasan_save_alloc_info+0x40/0x58
[   36.118125]  __kasan_kmalloc+0xd4/0xd8
[   36.118221]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.118325]  kasan_atomics+0xb8/0x2e0
[   36.118415]  kunit_try_run_case+0x170/0x3f0
[   36.118516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.118640]  kthread+0x328/0x630
[   36.118752]  ret_from_fork+0x10/0x20
[   36.118836] 
[   36.118885] The buggy address belongs to the object at fff00000c768c580
[   36.118885]  which belongs to the cache kmalloc-64 of size 64
[   36.119022] The buggy address is located 0 bytes to the right of
[   36.119022]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.119159] 
[   36.119213] The buggy address belongs to the physical page:
[   36.119321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.119476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.119636] page_type: f5(slab)
[   36.119736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.119845] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.119967] page dumped because: kasan: bad access detected
[   36.120051] 
[   36.120094] Memory state around the buggy address:
[   36.120184]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.120327]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.120448] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.120559]                                      ^
[   36.120666]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.120789]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.120897] ==================================================================
[   35.718712] ==================================================================
[   35.718905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   35.719044] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.719174] 
[   35.719282] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.719747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.719823] Hardware name: linux,dummy-virt (DT)
[   35.719908] Call trace:
[   35.719969]  show_stack+0x20/0x38 (C)
[   35.720096]  dump_stack_lvl+0x8c/0xd0
[   35.720155]  print_report+0x118/0x608
[   35.720214]  kasan_report+0xdc/0x128
[   35.720268]  kasan_check_range+0x100/0x1a8
[   35.721075]  __kasan_check_write+0x20/0x30
[   35.721221]  kasan_atomics_helper+0xa04/0x4858
[   35.721331]  kasan_atomics+0x198/0x2e0
[   35.721389]  kunit_try_run_case+0x170/0x3f0
[   35.721453]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.721516]  kthread+0x328/0x630
[   35.721570]  ret_from_fork+0x10/0x20
[   35.721658] 
[   35.721686] Allocated by task 276:
[   35.721726]  kasan_save_stack+0x3c/0x68
[   35.721782]  kasan_save_track+0x20/0x40
[   35.721827]  kasan_save_alloc_info+0x40/0x58
[   35.721875]  __kasan_kmalloc+0xd4/0xd8
[   35.721918]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.721967]  kasan_atomics+0xb8/0x2e0
[   35.722010]  kunit_try_run_case+0x170/0x3f0
[   35.722053]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.722105]  kthread+0x328/0x630
[   35.722143]  ret_from_fork+0x10/0x20
[   35.722186] 
[   35.722213] The buggy address belongs to the object at fff00000c768c580
[   35.722213]  which belongs to the cache kmalloc-64 of size 64
[   35.722286] The buggy address is located 0 bytes to the right of
[   35.722286]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.722360] 
[   35.722389] The buggy address belongs to the physical page:
[   35.722431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.722496] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.722562] page_type: f5(slab)
[   35.722654] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.722805] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.722995] page dumped because: kasan: bad access detected
[   35.723217] 
[   35.723343] Memory state around the buggy address:
[   35.723504]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.723636]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.723767] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.724728]                                      ^
[   35.725085]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.725585]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.725976] ==================================================================
[   36.100133] ==================================================================
[   36.100277] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   36.100420] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.100541] 
[   36.100676] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.100898] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.100971] Hardware name: linux,dummy-virt (DT)
[   36.101061] Call trace:
[   36.101133]  show_stack+0x20/0x38 (C)
[   36.101251]  dump_stack_lvl+0x8c/0xd0
[   36.101407]  print_report+0x118/0x608
[   36.101551]  kasan_report+0xdc/0x128
[   36.101934]  kasan_check_range+0x100/0x1a8
[   36.102215]  __kasan_check_write+0x20/0x30
[   36.102478]  kasan_atomics_helper+0x154c/0x4858
[   36.102591]  kasan_atomics+0x198/0x2e0
[   36.102693]  kunit_try_run_case+0x170/0x3f0
[   36.102817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.102945]  kthread+0x328/0x630
[   36.103076]  ret_from_fork+0x10/0x20
[   36.103196] 
[   36.103244] Allocated by task 276:
[   36.103324]  kasan_save_stack+0x3c/0x68
[   36.103449]  kasan_save_track+0x20/0x40
[   36.103549]  kasan_save_alloc_info+0x40/0x58
[   36.103674]  __kasan_kmalloc+0xd4/0xd8
[   36.103773]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.103883]  kasan_atomics+0xb8/0x2e0
[   36.104019]  kunit_try_run_case+0x170/0x3f0
[   36.104166]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.104286]  kthread+0x328/0x630
[   36.104399]  ret_from_fork+0x10/0x20
[   36.104492] 
[   36.104554] The buggy address belongs to the object at fff00000c768c580
[   36.104554]  which belongs to the cache kmalloc-64 of size 64
[   36.104702] The buggy address is located 0 bytes to the right of
[   36.104702]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.104889] 
[   36.104943] The buggy address belongs to the physical page:
[   36.105042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.105186] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.105329] page_type: f5(slab)
[   36.105429] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.105577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.105713] page dumped because: kasan: bad access detected
[   36.105800] 
[   36.105855] Memory state around the buggy address:
[   36.105946]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.106083]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.106195] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.106288]                                      ^
[   36.106382]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.106523]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.106692] ==================================================================
[   36.061475] ==================================================================
[   36.061646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   36.061793] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.062150] 
[   36.062262] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.062474] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.062543] Hardware name: linux,dummy-virt (DT)
[   36.062641] Call trace:
[   36.062741]  show_stack+0x20/0x38 (C)
[   36.062984]  dump_stack_lvl+0x8c/0xd0
[   36.063160]  print_report+0x118/0x608
[   36.063330]  kasan_report+0xdc/0x128
[   36.063522]  kasan_check_range+0x100/0x1a8
[   36.063835]  __kasan_check_write+0x20/0x30
[   36.064007]  kasan_atomics_helper+0x1384/0x4858
[   36.064134]  kasan_atomics+0x198/0x2e0
[   36.064258]  kunit_try_run_case+0x170/0x3f0
[   36.064449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.064605]  kthread+0x328/0x630
[   36.064740]  ret_from_fork+0x10/0x20
[   36.064921] 
[   36.065001] Allocated by task 276:
[   36.065116]  kasan_save_stack+0x3c/0x68
[   36.065269]  kasan_save_track+0x20/0x40
[   36.065353]  kasan_save_alloc_info+0x40/0x58
[   36.065434]  __kasan_kmalloc+0xd4/0xd8
[   36.065725]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.065861]  kasan_atomics+0xb8/0x2e0
[   36.065967]  kunit_try_run_case+0x170/0x3f0
[   36.066077]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.066199]  kthread+0x328/0x630
[   36.066335]  ret_from_fork+0x10/0x20
[   36.066476] 
[   36.066567] The buggy address belongs to the object at fff00000c768c580
[   36.066567]  which belongs to the cache kmalloc-64 of size 64
[   36.066797] The buggy address is located 0 bytes to the right of
[   36.066797]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.066989] 
[   36.067081] The buggy address belongs to the physical page:
[   36.067181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.067330] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.067481] page_type: f5(slab)
[   36.067589] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.067720] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.067939] page dumped because: kasan: bad access detected
[   36.068100] 
[   36.068150] Memory state around the buggy address:
[   36.068239]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.068369]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.068499] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.068625]                                      ^
[   36.068716]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.068814]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.068892] ==================================================================
[   36.107477] ==================================================================
[   36.107574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   36.107683] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.107747] 
[   36.107799] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.107905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.107937] Hardware name: linux,dummy-virt (DT)
[   36.107980] Call trace:
[   36.108011]  show_stack+0x20/0x38 (C)
[   36.108073]  dump_stack_lvl+0x8c/0xd0
[   36.108126]  print_report+0x118/0x608
[   36.108183]  kasan_report+0xdc/0x128
[   36.108236]  kasan_check_range+0x100/0x1a8
[   36.108291]  __kasan_check_write+0x20/0x30
[   36.108344]  kasan_atomics_helper+0x15b4/0x4858
[   36.108401]  kasan_atomics+0x198/0x2e0
[   36.108455]  kunit_try_run_case+0x170/0x3f0
[   36.108512]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.108575]  kthread+0x328/0x630
[   36.108717]  ret_from_fork+0x10/0x20
[   36.108895] 
[   36.108957] Allocated by task 276:
[   36.109051]  kasan_save_stack+0x3c/0x68
[   36.109146]  kasan_save_track+0x20/0x40
[   36.109217]  kasan_save_alloc_info+0x40/0x58
[   36.109293]  __kasan_kmalloc+0xd4/0xd8
[   36.109368]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.109463]  kasan_atomics+0xb8/0x2e0
[   36.109558]  kunit_try_run_case+0x170/0x3f0
[   36.109673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.109778]  kthread+0x328/0x630
[   36.109871]  ret_from_fork+0x10/0x20
[   36.109969] 
[   36.110028] The buggy address belongs to the object at fff00000c768c580
[   36.110028]  which belongs to the cache kmalloc-64 of size 64
[   36.110188] The buggy address is located 0 bytes to the right of
[   36.110188]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.110362] 
[   36.110420] The buggy address belongs to the physical page:
[   36.111570] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.111737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.111882] page_type: f5(slab)
[   36.111995] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.112127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.112236] page dumped because: kasan: bad access detected
[   36.112361] 
[   36.112412] Memory state around the buggy address:
[   36.112544]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.112863]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.113000] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.113438]                                      ^
[   36.113590]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.113800]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.114016] ==================================================================
[   35.911630] ==================================================================
[   35.911783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   35.911925] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.912055] 
[   35.912152] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.912380] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.912457] Hardware name: linux,dummy-virt (DT)
[   35.912540] Call trace:
[   35.912603]  show_stack+0x20/0x38 (C)
[   35.912783]  dump_stack_lvl+0x8c/0xd0
[   35.912913]  print_report+0x118/0x608
[   35.913032]  kasan_report+0xdc/0x128
[   35.913158]  kasan_check_range+0x100/0x1a8
[   35.913287]  __kasan_check_write+0x20/0x30
[   35.913407]  kasan_atomics_helper+0xeb8/0x4858
[   35.913533]  kasan_atomics+0x198/0x2e0
[   35.913673]  kunit_try_run_case+0x170/0x3f0
[   35.913787]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.914053]  kthread+0x328/0x630
[   35.914177]  ret_from_fork+0x10/0x20
[   35.914288] 
[   35.914346] Allocated by task 276:
[   35.914517]  kasan_save_stack+0x3c/0x68
[   35.914928]  kasan_save_track+0x20/0x40
[   35.916532]  kasan_save_alloc_info+0x40/0x58
[   35.916594]  __kasan_kmalloc+0xd4/0xd8
[   35.916672]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.916745]  kasan_atomics+0xb8/0x2e0
[   35.916790]  kunit_try_run_case+0x170/0x3f0
[   35.916839]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.916893]  kthread+0x328/0x630
[   35.916933]  ret_from_fork+0x10/0x20
[   35.916986] 
[   35.917015] The buggy address belongs to the object at fff00000c768c580
[   35.917015]  which belongs to the cache kmalloc-64 of size 64
[   35.917090] The buggy address is located 0 bytes to the right of
[   35.917090]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.917165] 
[   35.917193] The buggy address belongs to the physical page:
[   35.917236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.917303] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.917369] page_type: f5(slab)
[   35.917423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.917484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.917536] page dumped because: kasan: bad access detected
[   35.917576] 
[   35.917599] Memory state around the buggy address:
[   35.917717]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.917822]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.917940] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.918053]                                      ^
[   35.918121]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.918177]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.918226] ==================================================================
[   36.137606] ==================================================================
[   36.137749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   36.137878] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.138011] 
[   36.138105] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.138335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.138405] Hardware name: linux,dummy-virt (DT)
[   36.138494] Call trace:
[   36.139125]  show_stack+0x20/0x38 (C)
[   36.139471]  dump_stack_lvl+0x8c/0xd0
[   36.139798]  print_report+0x118/0x608
[   36.140117]  kasan_report+0xdc/0x128
[   36.140495]  kasan_check_range+0x100/0x1a8
[   36.140637]  __kasan_check_write+0x20/0x30
[   36.141168]  kasan_atomics_helper+0x16d0/0x4858
[   36.141307]  kasan_atomics+0x198/0x2e0
[   36.141780]  kunit_try_run_case+0x170/0x3f0
[   36.141911]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.142119]  kthread+0x328/0x630
[   36.142244]  ret_from_fork+0x10/0x20
[   36.142508] 
[   36.142605] Allocated by task 276:
[   36.142812]  kasan_save_stack+0x3c/0x68
[   36.143195]  kasan_save_track+0x20/0x40
[   36.143354]  kasan_save_alloc_info+0x40/0x58
[   36.143681]  __kasan_kmalloc+0xd4/0xd8
[   36.143798]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.143983]  kasan_atomics+0xb8/0x2e0
[   36.144187]  kunit_try_run_case+0x170/0x3f0
[   36.144513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.144843]  kthread+0x328/0x630
[   36.144953]  ret_from_fork+0x10/0x20
[   36.145158] 
[   36.145229] The buggy address belongs to the object at fff00000c768c580
[   36.145229]  which belongs to the cache kmalloc-64 of size 64
[   36.145355] The buggy address is located 0 bytes to the right of
[   36.145355]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.145740] 
[   36.145806] The buggy address belongs to the physical page:
[   36.145951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.146175] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.146452] page_type: f5(slab)
[   36.146564] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.146714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.146830] page dumped because: kasan: bad access detected
[   36.146918] 
[   36.147282] Memory state around the buggy address:
[   36.147381]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.147606]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.147867] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.148439]                                      ^
[   36.148556]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.148696]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.148809] ==================================================================
[   36.052006] ==================================================================
[   36.052091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   36.052174] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.052236] 
[   36.052290] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.052540] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.052633] Hardware name: linux,dummy-virt (DT)
[   36.052729] Call trace:
[   36.052790]  show_stack+0x20/0x38 (C)
[   36.052859]  dump_stack_lvl+0x8c/0xd0
[   36.052919]  print_report+0x118/0x608
[   36.052975]  kasan_report+0xdc/0x128
[   36.053031]  kasan_check_range+0x100/0x1a8
[   36.053088]  __kasan_check_write+0x20/0x30
[   36.053140]  kasan_atomics_helper+0x12d8/0x4858
[   36.053197]  kasan_atomics+0x198/0x2e0
[   36.053251]  kunit_try_run_case+0x170/0x3f0
[   36.053309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.053371]  kthread+0x328/0x630
[   36.053422]  ret_from_fork+0x10/0x20
[   36.053482] 
[   36.053508] Allocated by task 276:
[   36.053547]  kasan_save_stack+0x3c/0x68
[   36.053601]  kasan_save_track+0x20/0x40
[   36.053865]  kasan_save_alloc_info+0x40/0x58
[   36.054171]  __kasan_kmalloc+0xd4/0xd8
[   36.054507]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.054733]  kasan_atomics+0xb8/0x2e0
[   36.054817]  kunit_try_run_case+0x170/0x3f0
[   36.054895]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.054995]  kthread+0x328/0x630
[   36.055081]  ret_from_fork+0x10/0x20
[   36.055180] 
[   36.055236] The buggy address belongs to the object at fff00000c768c580
[   36.055236]  which belongs to the cache kmalloc-64 of size 64
[   36.055699] The buggy address is located 0 bytes to the right of
[   36.055699]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.055908] 
[   36.056600] The buggy address belongs to the physical page:
[   36.056731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.056971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.057672] page_type: f5(slab)
[   36.057802] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.058025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.058267] page dumped because: kasan: bad access detected
[   36.058392] 
[   36.058450] Memory state around the buggy address:
[   36.058877]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.059017]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.059140] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.059249]                                      ^
[   36.059346]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.059483]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.059594] ==================================================================
[   36.077360] ==================================================================
[   36.077451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   36.077545] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.077627] 
[   36.077720] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.077944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.078071] Hardware name: linux,dummy-virt (DT)
[   36.078162] Call trace:
[   36.078231]  show_stack+0x20/0x38 (C)
[   36.078355]  dump_stack_lvl+0x8c/0xd0
[   36.078474]  print_report+0x118/0x608
[   36.078591]  kasan_report+0xdc/0x128
[   36.078730]  kasan_check_range+0x100/0x1a8
[   36.078831]  __kasan_check_write+0x20/0x30
[   36.078916]  kasan_atomics_helper+0x1414/0x4858
[   36.079018]  kasan_atomics+0x198/0x2e0
[   36.079132]  kunit_try_run_case+0x170/0x3f0
[   36.079537]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.079763]  kthread+0x328/0x630
[   36.080154]  ret_from_fork+0x10/0x20
[   36.080289] 
[   36.080341] Allocated by task 276:
[   36.080421]  kasan_save_stack+0x3c/0x68
[   36.080531]  kasan_save_track+0x20/0x40
[   36.080640]  kasan_save_alloc_info+0x40/0x58
[   36.080752]  __kasan_kmalloc+0xd4/0xd8
[   36.080845]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.080948]  kasan_atomics+0xb8/0x2e0
[   36.081047]  kunit_try_run_case+0x170/0x3f0
[   36.081150]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.081268]  kthread+0x328/0x630
[   36.081356]  ret_from_fork+0x10/0x20
[   36.081450] 
[   36.081508] The buggy address belongs to the object at fff00000c768c580
[   36.081508]  which belongs to the cache kmalloc-64 of size 64
[   36.082634] The buggy address is located 0 bytes to the right of
[   36.082634]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.082850] 
[   36.083743] The buggy address belongs to the physical page:
[   36.083862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.084511] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.084924] page_type: f5(slab)
[   36.085030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.085109] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.085165] page dumped because: kasan: bad access detected
[   36.085212] 
[   36.085253] Memory state around the buggy address:
[   36.085308]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.085363]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.085415] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.085462]                                      ^
[   36.085506]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.085558]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.085605] ==================================================================
[   36.130226] ==================================================================
[   36.130406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   36.130531] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.130663] 
[   36.130792] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.131038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.131113] Hardware name: linux,dummy-virt (DT)
[   36.131188] Call trace:
[   36.131243]  show_stack+0x20/0x38 (C)
[   36.131374]  dump_stack_lvl+0x8c/0xd0
[   36.131510]  print_report+0x118/0x608
[   36.131679]  kasan_report+0xdc/0x128
[   36.131838]  __asan_report_load8_noabort+0x20/0x30
[   36.131996]  kasan_atomics_helper+0x3df4/0x4858
[   36.132153]  kasan_atomics+0x198/0x2e0
[   36.132285]  kunit_try_run_case+0x170/0x3f0
[   36.132467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.132596]  kthread+0x328/0x630
[   36.132716]  ret_from_fork+0x10/0x20
[   36.132901] 
[   36.132972] Allocated by task 276:
[   36.133056]  kasan_save_stack+0x3c/0x68
[   36.133196]  kasan_save_track+0x20/0x40
[   36.133302]  kasan_save_alloc_info+0x40/0x58
[   36.133415]  __kasan_kmalloc+0xd4/0xd8
[   36.133549]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.133676]  kasan_atomics+0xb8/0x2e0
[   36.133769]  kunit_try_run_case+0x170/0x3f0
[   36.133879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.133990]  kthread+0x328/0x630
[   36.134072]  ret_from_fork+0x10/0x20
[   36.134152] 
[   36.134198] The buggy address belongs to the object at fff00000c768c580
[   36.134198]  which belongs to the cache kmalloc-64 of size 64
[   36.134355] The buggy address is located 0 bytes to the right of
[   36.134355]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.134529] 
[   36.134581] The buggy address belongs to the physical page:
[   36.134687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.134873] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.135028] page_type: f5(slab)
[   36.135183] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.135323] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.135450] page dumped because: kasan: bad access detected
[   36.135540] 
[   36.135598] Memory state around the buggy address:
[   36.135736]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.135867]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.135995] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.136144]                                      ^
[   36.136274]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.136423]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.136529] ==================================================================
[   35.689979] ==================================================================
[   35.690060] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   35.690136] Read of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.690199] 
[   35.690247] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.690353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.690389] Hardware name: linux,dummy-virt (DT)
[   35.690430] Call trace:
[   35.690462]  show_stack+0x20/0x38 (C)
[   35.690525]  dump_stack_lvl+0x8c/0xd0
[   35.690581]  print_report+0x118/0x608
[   35.690890]  kasan_report+0xdc/0x128
[   35.691252]  __asan_report_load4_noabort+0x20/0x30
[   35.691365]  kasan_atomics_helper+0x42d8/0x4858
[   35.691528]  kasan_atomics+0x198/0x2e0
[   35.692267]  kunit_try_run_case+0x170/0x3f0
[   35.692693]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.693021]  kthread+0x328/0x630
[   35.693234]  ret_from_fork+0x10/0x20
[   35.693539] 
[   35.693633] Allocated by task 276:
[   35.693714]  kasan_save_stack+0x3c/0x68
[   35.693808]  kasan_save_track+0x20/0x40
[   35.693907]  kasan_save_alloc_info+0x40/0x58
[   35.694010]  __kasan_kmalloc+0xd4/0xd8
[   35.694308]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.694425]  kasan_atomics+0xb8/0x2e0
[   35.694549]  kunit_try_run_case+0x170/0x3f0
[   35.694834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.694966]  kthread+0x328/0x630
[   35.695060]  ret_from_fork+0x10/0x20
[   35.695158] 
[   35.695213] The buggy address belongs to the object at fff00000c768c580
[   35.695213]  which belongs to the cache kmalloc-64 of size 64
[   35.695402] The buggy address is located 0 bytes to the right of
[   35.695402]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.695600] 
[   35.695671] The buggy address belongs to the physical page:
[   35.695760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.695961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.696105] page_type: f5(slab)
[   35.696208] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.696336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.696664] page dumped because: kasan: bad access detected
[   35.696846] 
[   35.696906] Memory state around the buggy address:
[   35.697380]                                      ^
[   35.700717]  print_report+0x118/0x608
[   35.703559]  __kasan_kmalloc+0xd4/0xd8
[   35.703657]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.703743]  kasan_atomics+0xb8/0x2e0
[   35.703823]  kunit_try_run_case+0x170/0x3f0
[   35.703917]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.704033]  kthread+0x328/0x630
[   35.704124]  ret_from_fork+0x10/0x20
[   35.704222] 
[   35.704276] The buggy address belongs to the object at fff00000c768c580
[   35.704276]  which belongs to the cache kmalloc-64 of size 64
[   35.705037] The buggy address is located 0 bytes to the right of
[   35.705037]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.705448] 
[   35.705737] The buggy address belongs to the physical page:
[   35.705862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.706110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.706312] page_type: f5(slab)
[   35.706460] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.706604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.707107] page dumped because: kasan: bad access detected
[   35.708004] 
[   35.708150] Memory state around the buggy address:
[   35.708256]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.708376]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.708503] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.709216]                                      ^
[   35.709640]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.709852]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.709968] ==================================================================
[   36.041591] ==================================================================
[   36.041752] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   36.041888] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.041995] 
[   36.042089] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.042467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.042803] Hardware name: linux,dummy-virt (DT)
[   36.042899] Call trace:
[   36.042971]  show_stack+0x20/0x38 (C)
[   36.043109]  dump_stack_lvl+0x8c/0xd0
[   36.043230]  print_report+0x118/0x608
[   36.043348]  kasan_report+0xdc/0x128
[   36.043483]  kasan_check_range+0x100/0x1a8
[   36.043618]  __kasan_check_write+0x20/0x30
[   36.043722]  kasan_atomics_helper+0x126c/0x4858
[   36.043837]  kasan_atomics+0x198/0x2e0
[   36.043956]  kunit_try_run_case+0x170/0x3f0
[   36.044069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.044202]  kthread+0x328/0x630
[   36.044380]  ret_from_fork+0x10/0x20
[   36.044497] 
[   36.044556] Allocated by task 276:
[   36.044670]  kasan_save_stack+0x3c/0x68
[   36.044786]  kasan_save_track+0x20/0x40
[   36.044871]  kasan_save_alloc_info+0x40/0x58
[   36.045253]  __kasan_kmalloc+0xd4/0xd8
[   36.045377]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.045928]  kasan_atomics+0xb8/0x2e0
[   36.046071]  kunit_try_run_case+0x170/0x3f0
[   36.046168]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.046255]  kthread+0x328/0x630
[   36.046317]  ret_from_fork+0x10/0x20
[   36.046422] 
[   36.046475] The buggy address belongs to the object at fff00000c768c580
[   36.046475]  which belongs to the cache kmalloc-64 of size 64
[   36.046633] The buggy address is located 0 bytes to the right of
[   36.046633]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.046788] 
[   36.046847] The buggy address belongs to the physical page:
[   36.046925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.047064] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.047219] page_type: f5(slab)
[   36.047676] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.048017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.048356] page dumped because: kasan: bad access detected
[   36.048452] 
[   36.048507] Memory state around the buggy address:
[   36.048595]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.048712]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.048783] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.048831]                                      ^
[   36.048876]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.048929]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.048976] ==================================================================
[   35.829134] ==================================================================
[   35.829269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   35.829959] Read of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.830126] 
[   35.830227] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.830462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.830537] Hardware name: linux,dummy-virt (DT)
[   35.830637] Call trace:
[   35.831637]  show_stack+0x20/0x38 (C)
[   35.831824]  dump_stack_lvl+0x8c/0xd0
[   35.832332]  print_report+0x118/0x608
[   35.832507]  kasan_report+0xdc/0x128
[   35.832634]  __asan_report_load4_noabort+0x20/0x30
[   35.832739]  kasan_atomics_helper+0x3e04/0x4858
[   35.832860]  kasan_atomics+0x198/0x2e0
[   35.832976]  kunit_try_run_case+0x170/0x3f0
[   35.833117]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.834308]  kthread+0x328/0x630
[   35.834820]  ret_from_fork+0x10/0x20
[   35.834977] 
[   35.835202] Allocated by task 276:
[   35.835601]  kasan_save_stack+0x3c/0x68
[   35.836108]  kasan_save_track+0x20/0x40
[   35.836276]  kasan_save_alloc_info+0x40/0x58
[   35.836386]  __kasan_kmalloc+0xd4/0xd8
[   35.836465]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.836545]  kasan_atomics+0xb8/0x2e0
[   35.836641]  kunit_try_run_case+0x170/0x3f0
[   35.836749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.836872]  kthread+0x328/0x630
[   35.836962]  ret_from_fork+0x10/0x20
[   35.838004] 
[   35.838288] The buggy address belongs to the object at fff00000c768c580
[   35.838288]  which belongs to the cache kmalloc-64 of size 64
[   35.838654] The buggy address is located 0 bytes to the right of
[   35.838654]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.838846] 
[   35.838907] The buggy address belongs to the physical page:
[   35.839370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.839627] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.839826] page_type: f5(slab)
[   35.839937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.840086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.840208] page dumped because: kasan: bad access detected
[   35.840297] 
[   35.840719] Memory state around the buggy address:
[   35.840838]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.841104]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.841890] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.842111]                                      ^
[   35.842563]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.842718]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.842833] ==================================================================
[   36.069504] ==================================================================
[   36.069643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   36.069780] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.069918] 
[   36.070009] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.070232] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.070310] Hardware name: linux,dummy-virt (DT)
[   36.070403] Call trace:
[   36.070466]  show_stack+0x20/0x38 (C)
[   36.070598]  dump_stack_lvl+0x8c/0xd0
[   36.070734]  print_report+0x118/0x608
[   36.070893]  kasan_report+0xdc/0x128
[   36.071009]  __asan_report_load8_noabort+0x20/0x30
[   36.071136]  kasan_atomics_helper+0x3f04/0x4858
[   36.071406]  kasan_atomics+0x198/0x2e0
[   36.071914]  kunit_try_run_case+0x170/0x3f0
[   36.072078]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.072214]  kthread+0x328/0x630
[   36.072375]  ret_from_fork+0x10/0x20
[   36.072603] 
[   36.072725] Allocated by task 276:
[   36.072840]  kasan_save_stack+0x3c/0x68
[   36.072956]  kasan_save_track+0x20/0x40
[   36.073059]  kasan_save_alloc_info+0x40/0x58
[   36.073167]  __kasan_kmalloc+0xd4/0xd8
[   36.073264]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.073350]  kasan_atomics+0xb8/0x2e0
[   36.073417]  kunit_try_run_case+0x170/0x3f0
[   36.073524]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.073654]  kthread+0x328/0x630
[   36.073737]  ret_from_fork+0x10/0x20
[   36.073830] 
[   36.073973] The buggy address belongs to the object at fff00000c768c580
[   36.073973]  which belongs to the cache kmalloc-64 of size 64
[   36.074170] The buggy address is located 0 bytes to the right of
[   36.074170]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.074333] 
[   36.074399] The buggy address belongs to the physical page:
[   36.074482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.074749] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.074933] page_type: f5(slab)
[   36.075069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.075213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.075344] page dumped because: kasan: bad access detected
[   36.075442] 
[   36.075606] Memory state around the buggy address:
[   36.075733]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.075855]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.076027] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.076183]                                      ^
[   36.076349]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.076472]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.076575] ==================================================================
[   35.750655] ==================================================================
[   35.750786] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   35.750946] Read of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.751279] 
[   35.751384] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.751647] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.751727] Hardware name: linux,dummy-virt (DT)
[   35.751816] Call trace:
[   35.751873]  show_stack+0x20/0x38 (C)
[   35.751974]  dump_stack_lvl+0x8c/0xd0
[   35.752066]  print_report+0x118/0x608
[   35.752169]  kasan_report+0xdc/0x128
[   35.752275]  __asan_report_load4_noabort+0x20/0x30
[   35.752399]  kasan_atomics_helper+0x3dcc/0x4858
[   35.752520]  kasan_atomics+0x198/0x2e0
[   35.752661]  kunit_try_run_case+0x170/0x3f0
[   35.752788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.752922]  kthread+0x328/0x630
[   35.753037]  ret_from_fork+0x10/0x20
[   35.753167] 
[   35.753221] Allocated by task 276:
[   35.753315]  kasan_save_stack+0x3c/0x68
[   35.753447]  kasan_save_track+0x20/0x40
[   35.753550]  kasan_save_alloc_info+0x40/0x58
[   35.753653]  __kasan_kmalloc+0xd4/0xd8
[   35.753734]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.753816]  kasan_atomics+0xb8/0x2e0
[   35.753894]  kunit_try_run_case+0x170/0x3f0
[   35.753986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.754110]  kthread+0x328/0x630
[   35.754344]  ret_from_fork+0x10/0x20
[   35.754430] 
[   35.754478] The buggy address belongs to the object at fff00000c768c580
[   35.754478]  which belongs to the cache kmalloc-64 of size 64
[   35.754638] The buggy address is located 0 bytes to the right of
[   35.754638]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.754793] 
[   35.754846] The buggy address belongs to the physical page:
[   35.754913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.755346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.755525] page_type: f5(slab)
[   35.755633] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.755774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.756221] page dumped because: kasan: bad access detected
[   35.756545] 
[   35.756599] Memory state around the buggy address:
[   35.756700]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.756927]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.757073] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.757185]                                      ^
[   35.757377]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.757511]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.757605] ==================================================================
[   35.967035] ==================================================================
[   35.967445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   35.967593] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.968178] 
[   35.968688] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.969163] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.969357] Hardware name: linux,dummy-virt (DT)
[   35.969559] Call trace:
[   35.969627]  show_stack+0x20/0x38 (C)
[   35.969975]  dump_stack_lvl+0x8c/0xd0
[   35.970105]  print_report+0x118/0x608
[   35.970471]  kasan_report+0xdc/0x128
[   35.970664]  kasan_check_range+0x100/0x1a8
[   35.971246]  __kasan_check_write+0x20/0x30
[   35.971762]  kasan_atomics_helper+0x10c0/0x4858
[   35.972208]  kasan_atomics+0x198/0x2e0
[   35.972346]  kunit_try_run_case+0x170/0x3f0
[   35.972762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.973645]  kthread+0x328/0x630
[   35.973813]  ret_from_fork+0x10/0x20
[   35.974260] 
[   35.974365] Allocated by task 276:
[   35.974786]  kasan_save_stack+0x3c/0x68
[   35.975014]  kasan_save_track+0x20/0x40
[   35.975117]  kasan_save_alloc_info+0x40/0x58
[   35.975867]  __kasan_kmalloc+0xd4/0xd8
[   35.976185]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.976295]  kasan_atomics+0xb8/0x2e0
[   35.976390]  kunit_try_run_case+0x170/0x3f0
[   35.976797]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.977470]  kthread+0x328/0x630
[   35.977587]  ret_from_fork+0x10/0x20
[   35.977700] 
[   35.977885] The buggy address belongs to the object at fff00000c768c580
[   35.977885]  which belongs to the cache kmalloc-64 of size 64
[   35.978551] The buggy address is located 0 bytes to the right of
[   35.978551]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.979220] 
[   35.979312] The buggy address belongs to the physical page:
[   35.979669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.979843] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.979978] page_type: f5(slab)
[   35.980102] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.980247] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.981336] page dumped because: kasan: bad access detected
[   35.981795] 
[   35.982008] Memory state around the buggy address:
[   35.982132]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.982269]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.982588] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.983295]                                      ^
[   35.983452]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.983675]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.984359] ==================================================================
[   35.926582] ==================================================================
[   35.926719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   35.926841] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.926973] 
[   35.927064] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.927289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.927362] Hardware name: linux,dummy-virt (DT)
[   35.927464] Call trace:
[   35.927529]  show_stack+0x20/0x38 (C)
[   35.927654]  dump_stack_lvl+0x8c/0xd0
[   35.927748]  print_report+0x118/0x608
[   35.927859]  kasan_report+0xdc/0x128
[   35.927975]  kasan_check_range+0x100/0x1a8
[   35.928131]  __kasan_check_write+0x20/0x30
[   35.928244]  kasan_atomics_helper+0xf88/0x4858
[   35.928371]  kasan_atomics+0x198/0x2e0
[   35.928482]  kunit_try_run_case+0x170/0x3f0
[   35.928624]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.928795]  kthread+0x328/0x630
[   35.928907]  ret_from_fork+0x10/0x20
[   35.929069] 
[   35.929124] Allocated by task 276:
[   35.929253]  kasan_save_stack+0x3c/0x68
[   35.929365]  kasan_save_track+0x20/0x40
[   35.929710]  kasan_save_alloc_info+0x40/0x58
[   35.929838]  __kasan_kmalloc+0xd4/0xd8
[   35.929960]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.930120]  kasan_atomics+0xb8/0x2e0
[   35.930369]  kunit_try_run_case+0x170/0x3f0
[   35.930667]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.930789]  kthread+0x328/0x630
[   35.930886]  ret_from_fork+0x10/0x20
[   35.930978] 
[   35.931167] The buggy address belongs to the object at fff00000c768c580
[   35.931167]  which belongs to the cache kmalloc-64 of size 64
[   35.931557] The buggy address is located 0 bytes to the right of
[   35.931557]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.932007] 
[   35.932269] The buggy address belongs to the physical page:
[   35.932385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.932753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.933157] page_type: f5(slab)
[   35.933356] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.933795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.933992] page dumped because: kasan: bad access detected
[   35.934325] 
[   35.934387] Memory state around the buggy address:
[   35.934507]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.934642]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.934764] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.935155]                                      ^
[   35.935656]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.935960]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.936141] ==================================================================
[   35.743879] ==================================================================
[   35.744433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   35.744575] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.744691] 
[   35.744782] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.745022] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.745099] Hardware name: linux,dummy-virt (DT)
[   35.745189] Call trace:
[   35.745256]  show_stack+0x20/0x38 (C)
[   35.747664]  dump_stack_lvl+0x8c/0xd0
[   35.747789]  print_report+0x118/0x608
[   35.747853]  kasan_report+0xdc/0x128
[   35.747947]  kasan_check_range+0x100/0x1a8
[   35.748021]  __kasan_check_write+0x20/0x30
[   35.748077]  kasan_atomics_helper+0xad4/0x4858
[   35.748136]  kasan_atomics+0x198/0x2e0
[   35.748190]  kunit_try_run_case+0x170/0x3f0
[   35.748250]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.748366]  kthread+0x328/0x630
[   35.748478]  ret_from_fork+0x10/0x20
[   35.748601] 
[   35.748668] Allocated by task 276:
[   35.748716]  kasan_save_stack+0x3c/0x68
[   35.748776]  kasan_save_track+0x20/0x40
[   35.748821]  kasan_save_alloc_info+0x40/0x58
[   35.748868]  __kasan_kmalloc+0xd4/0xd8
[   35.748914]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.748961]  kasan_atomics+0xb8/0x2e0
[   35.749005]  kunit_try_run_case+0x170/0x3f0
[   35.749050]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.749102]  kthread+0x328/0x630
[   35.749143]  ret_from_fork+0x10/0x20
[   35.749187] 
[   35.749213] The buggy address belongs to the object at fff00000c768c580
[   35.749213]  which belongs to the cache kmalloc-64 of size 64
[   35.749284] The buggy address is located 0 bytes to the right of
[   35.749284]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.749360] 
[   35.749389] The buggy address belongs to the physical page:
[   35.749431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.749497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.749564] page_type: f5(slab)
[   35.749638] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.749704] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.749754] page dumped because: kasan: bad access detected
[   35.749796] 
[   35.749819] Memory state around the buggy address:
[   35.749863]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.749916]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.749968] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.750015]                                      ^
[   35.750058]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.750107]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.750154] ==================================================================
[   36.166143] ==================================================================
[   36.166464] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   36.166992] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.167230] 
[   36.167430] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.167751] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.168087] Hardware name: linux,dummy-virt (DT)
[   36.168409] Call trace:
[   36.168537]  show_stack+0x20/0x38 (C)
[   36.168850]  dump_stack_lvl+0x8c/0xd0
[   36.168980]  print_report+0x118/0x608
[   36.169149]  kasan_report+0xdc/0x128
[   36.169517]  kasan_check_range+0x100/0x1a8
[   36.170238]  __kasan_check_write+0x20/0x30
[   36.170406]  kasan_atomics_helper+0x175c/0x4858
[   36.170542]  kasan_atomics+0x198/0x2e0
[   36.170682]  kunit_try_run_case+0x170/0x3f0
[   36.170997]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.171322]  kthread+0x328/0x630
[   36.171446]  ret_from_fork+0x10/0x20
[   36.172095] 
[   36.172357] Allocated by task 276:
[   36.172440]  kasan_save_stack+0x3c/0x68
[   36.172786]  kasan_save_track+0x20/0x40
[   36.173103]  kasan_save_alloc_info+0x40/0x58
[   36.173294]  __kasan_kmalloc+0xd4/0xd8
[   36.173371]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.173494]  kasan_atomics+0xb8/0x2e0
[   36.173587]  kunit_try_run_case+0x170/0x3f0
[   36.173699]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.173979]  kthread+0x328/0x630
[   36.174517]  ret_from_fork+0x10/0x20
[   36.174822] 
[   36.174973] The buggy address belongs to the object at fff00000c768c580
[   36.174973]  which belongs to the cache kmalloc-64 of size 64
[   36.175163] The buggy address is located 0 bytes to the right of
[   36.175163]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.176288] 
[   36.176367] The buggy address belongs to the physical page:
[   36.176454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.176565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.176661] page_type: f5(slab)
[   36.176720] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.176782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.176831] page dumped because: kasan: bad access detected
[   36.176873] 
[   36.176897] Memory state around the buggy address:
[   36.176940]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.176994]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.177047] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.177094]                                      ^
[   36.177137]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.177188]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.177236] ==================================================================
[   35.710861] ==================================================================
[   35.710941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   35.711026] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.711085] 
[   35.711137] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.711244] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.711277] Hardware name: linux,dummy-virt (DT)
[   35.711319] Call trace:
[   35.711351]  show_stack+0x20/0x38 (C)
[   35.711413]  dump_stack_lvl+0x8c/0xd0
[   35.711494]  print_report+0x118/0x608
[   35.711553]  kasan_report+0xdc/0x128
[   35.711624]  kasan_check_range+0x100/0x1a8
[   35.711725]  __kasan_check_write+0x20/0x30
[   35.711836]  kasan_atomics_helper+0x99c/0x4858
[   35.711923]  kasan_atomics+0x198/0x2e0
[   35.711981]  kunit_try_run_case+0x170/0x3f0
[   35.712054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.712145]  kthread+0x328/0x630
[   35.712198]  ret_from_fork+0x10/0x20
[   35.712258] 
[   35.712286] Allocated by task 276:
[   35.714719]  kasan_save_stack+0x3c/0x68
[   35.714856]  kasan_save_track+0x20/0x40
[   35.714958]  kasan_save_alloc_info+0x40/0x58
[   35.715076]  __kasan_kmalloc+0xd4/0xd8
[   35.715171]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.715262]  kasan_atomics+0xb8/0x2e0
[   35.715308]  kunit_try_run_case+0x170/0x3f0
[   35.715358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.715445]  kthread+0x328/0x630
[   35.715518]  ret_from_fork+0x10/0x20
[   35.715562] 
[   35.715591] The buggy address belongs to the object at fff00000c768c580
[   35.715591]  which belongs to the cache kmalloc-64 of size 64
[   35.715746] The buggy address is located 0 bytes to the right of
[   35.715746]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.715925] 
[   35.715982] The buggy address belongs to the physical page:
[   35.716074] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.716204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.716345] page_type: f5(slab)
[   35.716436] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.716606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.716811] page dumped because: kasan: bad access detected
[   35.716958] 
[   35.717098] Memory state around the buggy address:
[   35.717190]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.717309]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.717437] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.717530]                                      ^
[   35.717633]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.717737]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.717834] ==================================================================
[   35.987305] ==================================================================
[   35.987486] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   35.987997] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.988265] 
[   35.988839] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.989352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.989618] Hardware name: linux,dummy-virt (DT)
[   35.989783] Call trace:
[   35.990046]  show_stack+0x20/0x38 (C)
[   35.990436]  dump_stack_lvl+0x8c/0xd0
[   35.990657]  print_report+0x118/0x608
[   35.991555]  kasan_report+0xdc/0x128
[   35.992258]  kasan_check_range+0x100/0x1a8
[   35.992627]  __kasan_check_write+0x20/0x30
[   35.992739]  kasan_atomics_helper+0x1128/0x4858
[   35.992831]  kasan_atomics+0x198/0x2e0
[   35.993349]  kunit_try_run_case+0x170/0x3f0
[   35.994191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.994452]  kthread+0x328/0x630
[   35.995107]  ret_from_fork+0x10/0x20
[   35.995574] 
[   35.996108] Allocated by task 276:
[   35.996261]  kasan_save_stack+0x3c/0x68
[   35.997065]  kasan_save_track+0x20/0x40
[   35.997466]  kasan_save_alloc_info+0x40/0x58
[   35.997683]  __kasan_kmalloc+0xd4/0xd8
[   35.997994]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.998202]  kasan_atomics+0xb8/0x2e0
[   35.998302]  kunit_try_run_case+0x170/0x3f0
[   35.998409]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.998534]  kthread+0x328/0x630
[   35.999748]  ret_from_fork+0x10/0x20
[   36.000166] 
[   36.000758] The buggy address belongs to the object at fff00000c768c580
[   36.000758]  which belongs to the cache kmalloc-64 of size 64
[   36.000914] The buggy address is located 0 bytes to the right of
[   36.000914]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.001083] 
[   36.001700] The buggy address belongs to the physical page:
[   36.002151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.002807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.003233] page_type: f5(slab)
[   36.003579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.004351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.004689] page dumped because: kasan: bad access detected
[   36.004981] 
[   36.005045] Memory state around the buggy address:
[   36.005151]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.005278]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.005805] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.006046]                                      ^
[   36.006125]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.006216]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.006294] ==================================================================
[   35.807990] ==================================================================
[   35.808120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   35.808250] Read of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.808386] 
[   35.808480] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.808725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.808806] Hardware name: linux,dummy-virt (DT)
[   35.808896] Call trace:
[   35.808959]  show_stack+0x20/0x38 (C)
[   35.809090]  dump_stack_lvl+0x8c/0xd0
[   35.809218]  print_report+0x118/0x608
[   35.809338]  kasan_report+0xdc/0x128
[   35.809480]  __asan_report_load4_noabort+0x20/0x30
[   35.809624]  kasan_atomics_helper+0x3dd8/0x4858
[   35.809745]  kasan_atomics+0x198/0x2e0
[   35.809899]  kunit_try_run_case+0x170/0x3f0
[   35.810233]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.810398]  kthread+0x328/0x630
[   35.810518]  ret_from_fork+0x10/0x20
[   35.810661] 
[   35.811269] Allocated by task 276:
[   35.811406]  kasan_save_stack+0x3c/0x68
[   35.811528]  kasan_save_track+0x20/0x40
[   35.811816]  kasan_save_alloc_info+0x40/0x58
[   35.811921]  __kasan_kmalloc+0xd4/0xd8
[   35.812027]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.812135]  kasan_atomics+0xb8/0x2e0
[   35.812232]  kunit_try_run_case+0x170/0x3f0
[   35.812367]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.812504]  kthread+0x328/0x630
[   35.812643]  ret_from_fork+0x10/0x20
[   35.812777] 
[   35.812855] The buggy address belongs to the object at fff00000c768c580
[   35.812855]  which belongs to the cache kmalloc-64 of size 64
[   35.813076] The buggy address is located 0 bytes to the right of
[   35.813076]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.813324] 
[   35.813391] The buggy address belongs to the physical page:
[   35.813482] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.813640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.813783] page_type: f5(slab)
[   35.813909] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.814100] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.814262] page dumped because: kasan: bad access detected
[   35.814369] 
[   35.814416] Memory state around the buggy address:
[   35.814665]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.814946]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.815072] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.815676]                                      ^
[   35.816051]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.816276]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.816380] ==================================================================
[   36.179957] ==================================================================
[   36.180156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   36.180307] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.180445] 
[   36.180543] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.180767] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.180845] Hardware name: linux,dummy-virt (DT)
[   36.180935] Call trace:
[   36.181003]  show_stack+0x20/0x38 (C)
[   36.181145]  dump_stack_lvl+0x8c/0xd0
[   36.181290]  print_report+0x118/0x608
[   36.181417]  kasan_report+0xdc/0x128
[   36.181539]  __asan_report_load8_noabort+0x20/0x30
[   36.182195]  kasan_atomics_helper+0x3e20/0x4858
[   36.182498]  kasan_atomics+0x198/0x2e0
[   36.182623]  kunit_try_run_case+0x170/0x3f0
[   36.182722]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.182825]  kthread+0x328/0x630
[   36.183413]  ret_from_fork+0x10/0x20
[   36.183642] 
[   36.183769] Allocated by task 276:
[   36.183859]  kasan_save_stack+0x3c/0x68
[   36.183987]  kasan_save_track+0x20/0x40
[   36.184087]  kasan_save_alloc_info+0x40/0x58
[   36.184379]  __kasan_kmalloc+0xd4/0xd8
[   36.184514]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.184635]  kasan_atomics+0xb8/0x2e0
[   36.184758]  kunit_try_run_case+0x170/0x3f0
[   36.184912]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.185042]  kthread+0x328/0x630
[   36.185156]  ret_from_fork+0x10/0x20
[   36.185259] 
[   36.185313] The buggy address belongs to the object at fff00000c768c580
[   36.185313]  which belongs to the cache kmalloc-64 of size 64
[   36.185481] The buggy address is located 0 bytes to the right of
[   36.185481]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.185664] 
[   36.185719] The buggy address belongs to the physical page:
[   36.185814] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.185958] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.186564] page_type: f5(slab)
[   36.186738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.186884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.187001] page dumped because: kasan: bad access detected
[   36.187080] 
[   36.187311] Memory state around the buggy address:
[   36.187486]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.187654]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.187781] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.187891]                                      ^
[   36.188103]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.188194]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.188270] ==================================================================
[   35.844971] ==================================================================
[   35.845103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   35.845250] Read of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.845388] 
[   35.845483] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.845739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.845822] Hardware name: linux,dummy-virt (DT)
[   35.845913] Call trace:
[   35.845982]  show_stack+0x20/0x38 (C)
[   35.847361]  dump_stack_lvl+0x8c/0xd0
[   35.847778]  print_report+0x118/0x608
[   35.848353]  kasan_report+0xdc/0x128
[   35.848492]  kasan_check_range+0x100/0x1a8
[   35.849125]  __kasan_check_read+0x20/0x30
[   35.849400]  kasan_atomics_helper+0xdd4/0x4858
[   35.850064]  kasan_atomics+0x198/0x2e0
[   35.850217]  kunit_try_run_case+0x170/0x3f0
[   35.850355]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.850946]  kthread+0x328/0x630
[   35.851084]  ret_from_fork+0x10/0x20
[   35.851624] 
[   35.851695] Allocated by task 276:
[   35.852110]  kasan_save_stack+0x3c/0x68
[   35.852239]  kasan_save_track+0x20/0x40
[   35.852884]  kasan_save_alloc_info+0x40/0x58
[   35.853270]  __kasan_kmalloc+0xd4/0xd8
[   35.853541]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.853652]  kasan_atomics+0xb8/0x2e0
[   35.853726]  kunit_try_run_case+0x170/0x3f0
[   35.853805]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.853903]  kthread+0x328/0x630
[   35.853988]  ret_from_fork+0x10/0x20
[   35.854955] 
[   35.855043] The buggy address belongs to the object at fff00000c768c580
[   35.855043]  which belongs to the cache kmalloc-64 of size 64
[   35.855228] The buggy address is located 0 bytes to the right of
[   35.855228]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.855409] 
[   35.855481] The buggy address belongs to the physical page:
[   35.855573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.855732] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.855867] page_type: f5(slab)
[   35.855977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.856190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.857146] page dumped because: kasan: bad access detected
[   35.857486] 
[   35.857539] Memory state around the buggy address:
[   35.857787]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.858032]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.858511] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.858653]                                      ^
[   35.859159]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.859291]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.859862] ==================================================================
[   35.728447] ==================================================================
[   35.728886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   35.729036] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.729783] 
[   35.730180] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.730587] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.731135] Hardware name: linux,dummy-virt (DT)
[   35.731680] Call trace:
[   35.731763]  show_stack+0x20/0x38 (C)
[   35.731913]  dump_stack_lvl+0x8c/0xd0
[   35.732040]  print_report+0x118/0x608
[   35.734860]  kasan_report+0xdc/0x128
[   35.734985]  kasan_check_range+0x100/0x1a8
[   35.735120]  __kasan_check_write+0x20/0x30
[   35.735242]  kasan_atomics_helper+0xa6c/0x4858
[   35.735345]  kasan_atomics+0x198/0x2e0
[   35.735403]  kunit_try_run_case+0x170/0x3f0
[   35.735520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.735584]  kthread+0x328/0x630
[   35.735664]  ret_from_fork+0x10/0x20
[   35.735729] 
[   35.735756] Allocated by task 276:
[   35.735796]  kasan_save_stack+0x3c/0x68
[   35.735853]  kasan_save_track+0x20/0x40
[   35.735898]  kasan_save_alloc_info+0x40/0x58
[   35.735947]  __kasan_kmalloc+0xd4/0xd8
[   35.735990]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.736039]  kasan_atomics+0xb8/0x2e0
[   35.736080]  kunit_try_run_case+0x170/0x3f0
[   35.736128]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.736180]  kthread+0x328/0x630
[   35.736218]  ret_from_fork+0x10/0x20
[   35.736261] 
[   35.736287] The buggy address belongs to the object at fff00000c768c580
[   35.736287]  which belongs to the cache kmalloc-64 of size 64
[   35.736385] The buggy address is located 0 bytes to the right of
[   35.736385]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.736459] 
[   35.736491] The buggy address belongs to the physical page:
[   35.736530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.736595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.736819] page_type: f5(slab)
[   35.737193] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.737458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.737584] page dumped because: kasan: bad access detected
[   35.737707] 
[   35.738024] Memory state around the buggy address:
[   35.738343]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.738890]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.739681] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.739922]                                      ^
[   35.740270]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.740829]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.741065] ==================================================================
[   35.954092] ==================================================================
[   35.954232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   35.954796] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.955027] 
[   35.955405] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.955905] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.956060] Hardware name: linux,dummy-virt (DT)
[   35.956302] Call trace:
[   35.956574]  show_stack+0x20/0x38 (C)
[   35.956878]  dump_stack_lvl+0x8c/0xd0
[   35.957130]  print_report+0x118/0x608
[   35.957284]  kasan_report+0xdc/0x128
[   35.957377]  kasan_check_range+0x100/0x1a8
[   35.957735]  __kasan_check_write+0x20/0x30
[   35.957948]  kasan_atomics_helper+0x1058/0x4858
[   35.958072]  kasan_atomics+0x198/0x2e0
[   35.958267]  kunit_try_run_case+0x170/0x3f0
[   35.958552]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.959005]  kthread+0x328/0x630
[   35.959189]  ret_from_fork+0x10/0x20
[   35.959641] 
[   35.959803] Allocated by task 276:
[   35.960089]  kasan_save_stack+0x3c/0x68
[   35.960310]  kasan_save_track+0x20/0x40
[   35.960414]  kasan_save_alloc_info+0x40/0x58
[   35.960527]  __kasan_kmalloc+0xd4/0xd8
[   35.960634]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.960844]  kasan_atomics+0xb8/0x2e0
[   35.961213]  kunit_try_run_case+0x170/0x3f0
[   35.961423]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.961528]  kthread+0x328/0x630
[   35.961629]  ret_from_fork+0x10/0x20
[   35.961769] 
[   35.961871] The buggy address belongs to the object at fff00000c768c580
[   35.961871]  which belongs to the cache kmalloc-64 of size 64
[   35.962160] The buggy address is located 0 bytes to the right of
[   35.962160]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.962814] 
[   35.962939] The buggy address belongs to the physical page:
[   35.963170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.963499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.963921] page_type: f5(slab)
[   35.964266] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.964481] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.964686] page dumped because: kasan: bad access detected
[   35.964794] 
[   35.964850] Memory state around the buggy address:
[   35.964951]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.965068]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.965160] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.965236]                                      ^
[   35.965307]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.965408]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.965511] ==================================================================
[   36.026284] ==================================================================
[   36.026447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   36.026602] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.027100] 
[   36.027425] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.027942] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.028240] Hardware name: linux,dummy-virt (DT)
[   36.028717] Call trace:
[   36.028872]  show_stack+0x20/0x38 (C)
[   36.029314]  dump_stack_lvl+0x8c/0xd0
[   36.029850]  print_report+0x118/0x608
[   36.030047]  kasan_report+0xdc/0x128
[   36.030431]  kasan_check_range+0x100/0x1a8
[   36.030569]  __kasan_check_write+0x20/0x30
[   36.030836]  kasan_atomics_helper+0x11f8/0x4858
[   36.030978]  kasan_atomics+0x198/0x2e0
[   36.031094]  kunit_try_run_case+0x170/0x3f0
[   36.031232]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.031381]  kthread+0x328/0x630
[   36.031513]  ret_from_fork+0x10/0x20
[   36.031658] 
[   36.031715] Allocated by task 276:
[   36.031799]  kasan_save_stack+0x3c/0x68
[   36.031930]  kasan_save_track+0x20/0x40
[   36.032039]  kasan_save_alloc_info+0x40/0x58
[   36.032149]  __kasan_kmalloc+0xd4/0xd8
[   36.032249]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.032953]  kasan_atomics+0xb8/0x2e0
[   36.033067]  kunit_try_run_case+0x170/0x3f0
[   36.033220]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.033931]  kthread+0x328/0x630
[   36.034102]  ret_from_fork+0x10/0x20
[   36.034591] 
[   36.034687] The buggy address belongs to the object at fff00000c768c580
[   36.034687]  which belongs to the cache kmalloc-64 of size 64
[   36.034854] The buggy address is located 0 bytes to the right of
[   36.034854]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.035038] 
[   36.035106] The buggy address belongs to the physical page:
[   36.035521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.035902] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.036195] page_type: f5(slab)
[   36.036329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.036715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.036850] page dumped because: kasan: bad access detected
[   36.037065] 
[   36.037318] Memory state around the buggy address:
[   36.037603]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.037829]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.038234] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.038399]                                      ^
[   36.039380]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.039502]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.039584] ==================================================================
[   36.189033] ==================================================================
[   36.189209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   36.189338] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.189497] 
[   36.189643] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.189965] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.190063] Hardware name: linux,dummy-virt (DT)
[   36.190190] Call trace:
[   36.190276]  show_stack+0x20/0x38 (C)
[   36.190455]  dump_stack_lvl+0x8c/0xd0
[   36.190568]  print_report+0x118/0x608
[   36.190725]  kasan_report+0xdc/0x128
[   36.190849]  kasan_check_range+0x100/0x1a8
[   36.190980]  __kasan_check_write+0x20/0x30
[   36.191098]  kasan_atomics_helper+0x17ec/0x4858
[   36.191231]  kasan_atomics+0x198/0x2e0
[   36.191349]  kunit_try_run_case+0x170/0x3f0
[   36.191491]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.191643]  kthread+0x328/0x630
[   36.191745]  ret_from_fork+0x10/0x20
[   36.191870] 
[   36.191920] Allocated by task 276:
[   36.192199]  kasan_save_stack+0x3c/0x68
[   36.192331]  kasan_save_track+0x20/0x40
[   36.192433]  kasan_save_alloc_info+0x40/0x58
[   36.193114]  __kasan_kmalloc+0xd4/0xd8
[   36.193250]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.193362]  kasan_atomics+0xb8/0x2e0
[   36.193458]  kunit_try_run_case+0x170/0x3f0
[   36.193577]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.193744]  kthread+0x328/0x630
[   36.193872]  ret_from_fork+0x10/0x20
[   36.193996] 
[   36.194055] The buggy address belongs to the object at fff00000c768c580
[   36.194055]  which belongs to the cache kmalloc-64 of size 64
[   36.194224] The buggy address is located 0 bytes to the right of
[   36.194224]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.194401] 
[   36.194457] The buggy address belongs to the physical page:
[   36.194547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.194710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.194866] page_type: f5(slab)
[   36.194975] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.195108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.195215] page dumped because: kasan: bad access detected
[   36.195326] 
[   36.195411] Memory state around the buggy address:
[   36.195564]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.195843]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.196243] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.196503]                                      ^
[   36.196597]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.196714]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.196798] ==================================================================
[   36.092624] ==================================================================
[   36.092762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   36.093945] Write of size 8 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   36.094101] 
[   36.094189] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   36.094370] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.094438] Hardware name: linux,dummy-virt (DT)
[   36.094524] Call trace:
[   36.094591]  show_stack+0x20/0x38 (C)
[   36.096551]  dump_stack_lvl+0x8c/0xd0
[   36.096639]  print_report+0x118/0x608
[   36.096732]  kasan_report+0xdc/0x128
[   36.096787]  kasan_check_range+0x100/0x1a8
[   36.096843]  __kasan_check_write+0x20/0x30
[   36.096898]  kasan_atomics_helper+0x14e4/0x4858
[   36.096956]  kasan_atomics+0x198/0x2e0
[   36.097010]  kunit_try_run_case+0x170/0x3f0
[   36.097071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.097135]  kthread+0x328/0x630
[   36.097186]  ret_from_fork+0x10/0x20
[   36.097246] 
[   36.097273] Allocated by task 276:
[   36.097312]  kasan_save_stack+0x3c/0x68
[   36.097368]  kasan_save_track+0x20/0x40
[   36.097414]  kasan_save_alloc_info+0x40/0x58
[   36.097464]  __kasan_kmalloc+0xd4/0xd8
[   36.097507]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.097556]  kasan_atomics+0xb8/0x2e0
[   36.097600]  kunit_try_run_case+0x170/0x3f0
[   36.097671]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.097724]  kthread+0x328/0x630
[   36.097764]  ret_from_fork+0x10/0x20
[   36.097807] 
[   36.097836] The buggy address belongs to the object at fff00000c768c580
[   36.097836]  which belongs to the cache kmalloc-64 of size 64
[   36.097908] The buggy address is located 0 bytes to the right of
[   36.097908]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   36.097985] 
[   36.098013] The buggy address belongs to the physical page:
[   36.098056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   36.098121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.098187] page_type: f5(slab)
[   36.098240] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.098299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.098352] page dumped because: kasan: bad access detected
[   36.098390] 
[   36.098413] Memory state around the buggy address:
[   36.098456]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.098510]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.098562] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.098644]                                      ^
[   36.098785]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.098979]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.099124] ==================================================================
[   35.817458] ==================================================================
[   35.817596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   35.817739] Write of size 4 at addr fff00000c768c5b0 by task kunit_try_catch/276
[   35.817880] 
[   35.817975] CPU: 0 UID: 0 PID: 276 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT 
[   35.818212] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.818286] Hardware name: linux,dummy-virt (DT)
[   35.818375] Call trace:
[   35.818437]  show_stack+0x20/0x38 (C)
[   35.818565]  dump_stack_lvl+0x8c/0xd0
[   35.818707]  print_report+0x118/0x608
[   35.818834]  kasan_report+0xdc/0x128
[   35.818955]  kasan_check_range+0x100/0x1a8
[   35.819082]  __kasan_check_write+0x20/0x30
[   35.819200]  kasan_atomics_helper+0xd3c/0x4858
[   35.819331]  kasan_atomics+0x198/0x2e0
[   35.819477]  kunit_try_run_case+0x170/0x3f0
[   35.819879]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.820410]  kthread+0x328/0x630
[   35.820593]  ret_from_fork+0x10/0x20
[   35.820789] 
[   35.820868] Allocated by task 276:
[   35.820948]  kasan_save_stack+0x3c/0x68
[   35.821061]  kasan_save_track+0x20/0x40
[   35.821203]  kasan_save_alloc_info+0x40/0x58
[   35.821349]  __kasan_kmalloc+0xd4/0xd8
[   35.821482]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.822197]  kasan_atomics+0xb8/0x2e0
[   35.823128]  kunit_try_run_case+0x170/0x3f0
[   35.823283]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.823455]  kthread+0x328/0x630
[   35.823531]  ret_from_fork+0x10/0x20
[   35.823606] 
[   35.823662] The buggy address belongs to the object at fff00000c768c580
[   35.823662]  which belongs to the cache kmalloc-64 of size 64
[   35.824436] The buggy address is located 0 bytes to the right of
[   35.824436]  allocated 48-byte region [fff00000c768c580, fff00000c768c5b0)
[   35.824752] 
[   35.824839] The buggy address belongs to the physical page:
[   35.824946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10768c
[   35.825143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.825327] page_type: f5(slab)
[   35.825476] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.825668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.825780] page dumped because: kasan: bad access detected
[   35.826092] 
[   35.826232] Memory state around the buggy address:
[   35.826335]  fff00000c768c480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.826453]  fff00000c768c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.826572] >fff00000c768c580: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.826849]                                      ^
[   35.826949]  fff00000c768c600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.827067]  fff00000c768c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.827168] ==================================================================

[   30.010927] ==================================================================
[   30.011434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   30.012026] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   30.012530] 
[   30.012973] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.013046] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.013063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.013091] Call Trace:
[   30.013118]  <TASK>
[   30.013149]  dump_stack_lvl+0x73/0xb0
[   30.013210]  print_report+0xd1/0x650
[   30.013255]  ? __virt_addr_valid+0x1db/0x2d0
[   30.013304]  ? kasan_atomics_helper+0x1c18/0x5450
[   30.013349]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.013578]  ? kasan_atomics_helper+0x1c18/0x5450
[   30.013685]  kasan_report+0x141/0x180
[   30.013772]  ? kasan_atomics_helper+0x1c18/0x5450
[   30.013851]  kasan_check_range+0x10c/0x1c0
[   30.013909]  __kasan_check_write+0x18/0x20
[   30.013954]  kasan_atomics_helper+0x1c18/0x5450
[   30.014002]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.014062]  ? __kmalloc_cache_noprof+0x189/0x420
[   30.014114]  ? kasan_atomics+0x152/0x310
[   30.014188]  kasan_atomics+0x1dc/0x310
[   30.014236]  ? __pfx_kasan_atomics+0x10/0x10
[   30.014283]  ? __pfx_read_tsc+0x10/0x10
[   30.014325]  ? ktime_get_ts64+0x86/0x230
[   30.014387]  kunit_try_run_case+0x1a5/0x480
[   30.014460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.014516]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.014564]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.014603]  ? __kthread_parkme+0x82/0x180
[   30.014630]  ? preempt_count_sub+0x50/0x80
[   30.014669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.014697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.014724]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.014751]  kthread+0x337/0x6f0
[   30.014773]  ? trace_preempt_on+0x20/0xc0
[   30.014801]  ? __pfx_kthread+0x10/0x10
[   30.014825]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.014850]  ? calculate_sigpending+0x7b/0xa0
[   30.014878]  ? __pfx_kthread+0x10/0x10
[   30.014903]  ret_from_fork+0x116/0x1d0
[   30.014925]  ? __pfx_kthread+0x10/0x10
[   30.014947]  ret_from_fork_asm+0x1a/0x30
[   30.014982]  </TASK>
[   30.014997] 
[   30.023974] Allocated by task 294:
[   30.024362]  kasan_save_stack+0x45/0x70
[   30.024767]  kasan_save_track+0x18/0x40
[   30.025090]  kasan_save_alloc_info+0x3b/0x50
[   30.025471]  __kasan_kmalloc+0xb7/0xc0
[   30.025774]  __kmalloc_cache_noprof+0x189/0x420
[   30.026106]  kasan_atomics+0x95/0x310
[   30.026363]  kunit_try_run_case+0x1a5/0x480
[   30.026714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.027013]  kthread+0x337/0x6f0
[   30.027231]  ret_from_fork+0x116/0x1d0
[   30.027418]  ret_from_fork_asm+0x1a/0x30
[   30.027611] 
[   30.027765] The buggy address belongs to the object at ffff888102338080
[   30.027765]  which belongs to the cache kmalloc-64 of size 64
[   30.028674] The buggy address is located 0 bytes to the right of
[   30.028674]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   30.029271] 
[   30.029392] The buggy address belongs to the physical page:
[   30.029620] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   30.029916] flags: 0x200000000000000(node=0|zone=2)
[   30.030162] page_type: f5(slab)
[   30.030341] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.030863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.031465] page dumped because: kasan: bad access detected
[   30.031904] 
[   30.032042] Memory state around the buggy address:
[   30.032449]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.032992]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.033566] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.034104]                                      ^
[   30.034513]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.034943]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.035243] ==================================================================
[   30.036926] ==================================================================
[   30.038516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   30.039128] Read of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   30.039760] 
[   30.039971] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.040087] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.040119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.040198] Call Trace:
[   30.040246]  <TASK>
[   30.040293]  dump_stack_lvl+0x73/0xb0
[   30.040368]  print_report+0xd1/0x650
[   30.040425]  ? __virt_addr_valid+0x1db/0x2d0
[   30.040496]  ? kasan_atomics_helper+0x4f30/0x5450
[   30.040549]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.040610]  ? kasan_atomics_helper+0x4f30/0x5450
[   30.040664]  kasan_report+0x141/0x180
[   30.040717]  ? kasan_atomics_helper+0x4f30/0x5450
[   30.040782]  __asan_report_load8_noabort+0x18/0x20
[   30.040841]  kasan_atomics_helper+0x4f30/0x5450
[   30.040895]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.040949]  ? __kmalloc_cache_noprof+0x189/0x420
[   30.041005]  ? kasan_atomics+0x152/0x310
[   30.041068]  kasan_atomics+0x1dc/0x310
[   30.041123]  ? __pfx_kasan_atomics+0x10/0x10
[   30.041207]  ? __pfx_read_tsc+0x10/0x10
[   30.041248]  ? ktime_get_ts64+0x86/0x230
[   30.041304]  kunit_try_run_case+0x1a5/0x480
[   30.041351]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.041391]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.041437]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.041500]  ? __kthread_parkme+0x82/0x180
[   30.041547]  ? preempt_count_sub+0x50/0x80
[   30.041601]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.041654]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.041709]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.041764]  kthread+0x337/0x6f0
[   30.041806]  ? trace_preempt_on+0x20/0xc0
[   30.041858]  ? __pfx_kthread+0x10/0x10
[   30.041908]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.041957]  ? calculate_sigpending+0x7b/0xa0
[   30.042008]  ? __pfx_kthread+0x10/0x10
[   30.042063]  ret_from_fork+0x116/0x1d0
[   30.042101]  ? __pfx_kthread+0x10/0x10
[   30.042174]  ret_from_fork_asm+0x1a/0x30
[   30.042251]  </TASK>
[   30.042286] 
[   30.054126] Allocated by task 294:
[   30.054499]  kasan_save_stack+0x45/0x70
[   30.054746]  kasan_save_track+0x18/0x40
[   30.055107]  kasan_save_alloc_info+0x3b/0x50
[   30.055333]  __kasan_kmalloc+0xb7/0xc0
[   30.055705]  __kmalloc_cache_noprof+0x189/0x420
[   30.055925]  kasan_atomics+0x95/0x310
[   30.056313]  kunit_try_run_case+0x1a5/0x480
[   30.056616]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.057034]  kthread+0x337/0x6f0
[   30.057413]  ret_from_fork+0x116/0x1d0
[   30.057827]  ret_from_fork_asm+0x1a/0x30
[   30.058267] 
[   30.058516] The buggy address belongs to the object at ffff888102338080
[   30.058516]  which belongs to the cache kmalloc-64 of size 64
[   30.059419] The buggy address is located 0 bytes to the right of
[   30.059419]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   30.060259] 
[   30.060738] The buggy address belongs to the physical page:
[   30.060975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   30.061876] flags: 0x200000000000000(node=0|zone=2)
[   30.062375] page_type: f5(slab)
[   30.062687] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.063103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.063580] page dumped because: kasan: bad access detected
[   30.064074] 
[   30.064183] Memory state around the buggy address:
[   30.064397]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.065108]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.065490] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.065977]                                      ^
[   30.066362]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.066838]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.067281] ==================================================================
[   30.307958] ==================================================================
[   30.308682] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   30.308952] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   30.309486] 
[   30.309710] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.309826] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.309858] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.309911] Call Trace:
[   30.309960]  <TASK>
[   30.310005]  dump_stack_lvl+0x73/0xb0
[   30.310083]  print_report+0xd1/0x650
[   30.310132]  ? __virt_addr_valid+0x1db/0x2d0
[   30.310222]  ? kasan_atomics_helper+0x20c8/0x5450
[   30.310274]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.310334]  ? kasan_atomics_helper+0x20c8/0x5450
[   30.310388]  kasan_report+0x141/0x180
[   30.310448]  ? kasan_atomics_helper+0x20c8/0x5450
[   30.310512]  kasan_check_range+0x10c/0x1c0
[   30.310568]  __kasan_check_write+0x18/0x20
[   30.310624]  kasan_atomics_helper+0x20c8/0x5450
[   30.310676]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.310712]  ? __kmalloc_cache_noprof+0x189/0x420
[   30.310741]  ? kasan_atomics+0x152/0x310
[   30.310772]  kasan_atomics+0x1dc/0x310
[   30.310797]  ? __pfx_kasan_atomics+0x10/0x10
[   30.310824]  ? __pfx_read_tsc+0x10/0x10
[   30.310848]  ? ktime_get_ts64+0x86/0x230
[   30.310879]  kunit_try_run_case+0x1a5/0x480
[   30.310908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.310933]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.310959]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.310984]  ? __kthread_parkme+0x82/0x180
[   30.311008]  ? preempt_count_sub+0x50/0x80
[   30.311034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.311060]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.311087]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.311113]  kthread+0x337/0x6f0
[   30.311134]  ? trace_preempt_on+0x20/0xc0
[   30.311193]  ? __pfx_kthread+0x10/0x10
[   30.311221]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.311245]  ? calculate_sigpending+0x7b/0xa0
[   30.311273]  ? __pfx_kthread+0x10/0x10
[   30.311297]  ret_from_fork+0x116/0x1d0
[   30.311319]  ? __pfx_kthread+0x10/0x10
[   30.311343]  ret_from_fork_asm+0x1a/0x30
[   30.311377]  </TASK>
[   30.311392] 
[   30.323306] Allocated by task 294:
[   30.323682]  kasan_save_stack+0x45/0x70
[   30.324078]  kasan_save_track+0x18/0x40
[   30.324460]  kasan_save_alloc_info+0x3b/0x50
[   30.324858]  __kasan_kmalloc+0xb7/0xc0
[   30.325209]  __kmalloc_cache_noprof+0x189/0x420
[   30.325615]  kasan_atomics+0x95/0x310
[   30.325955]  kunit_try_run_case+0x1a5/0x480
[   30.326364]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.326681]  kthread+0x337/0x6f0
[   30.326857]  ret_from_fork+0x116/0x1d0
[   30.327189]  ret_from_fork_asm+0x1a/0x30
[   30.327521] 
[   30.327660] The buggy address belongs to the object at ffff888102338080
[   30.327660]  which belongs to the cache kmalloc-64 of size 64
[   30.328207] The buggy address is located 0 bytes to the right of
[   30.328207]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   30.328942] 
[   30.329059] The buggy address belongs to the physical page:
[   30.329475] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   30.329878] flags: 0x200000000000000(node=0|zone=2)
[   30.330312] page_type: f5(slab)
[   30.330617] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.330991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.331324] page dumped because: kasan: bad access detected
[   30.331738] 
[   30.331896] Memory state around the buggy address:
[   30.332199]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.332687]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.333027] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.333488]                                      ^
[   30.333699]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.334212]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.334709] ==================================================================
[   28.889912] ==================================================================
[   28.890683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   28.891204] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   28.891545] 
[   28.891724] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.891840] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.891872] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.891919] Call Trace:
[   28.891965]  <TASK>
[   28.892006]  dump_stack_lvl+0x73/0xb0
[   28.892063]  print_report+0xd1/0x650
[   28.892104]  ? __virt_addr_valid+0x1db/0x2d0
[   28.892151]  ? kasan_atomics_helper+0x7c7/0x5450
[   28.892199]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.892260]  ? kasan_atomics_helper+0x7c7/0x5450
[   28.892306]  kasan_report+0x141/0x180
[   28.892347]  ? kasan_atomics_helper+0x7c7/0x5450
[   28.892388]  kasan_check_range+0x10c/0x1c0
[   28.892423]  __kasan_check_write+0x18/0x20
[   28.892474]  kasan_atomics_helper+0x7c7/0x5450
[   28.892511]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.892548]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.892590]  ? kasan_atomics+0x152/0x310
[   28.892629]  kasan_atomics+0x1dc/0x310
[   28.892663]  ? __pfx_kasan_atomics+0x10/0x10
[   28.892702]  ? __pfx_read_tsc+0x10/0x10
[   28.892736]  ? ktime_get_ts64+0x86/0x230
[   28.892782]  kunit_try_run_case+0x1a5/0x480
[   28.892821]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.892856]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.892894]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.892932]  ? __kthread_parkme+0x82/0x180
[   28.892971]  ? preempt_count_sub+0x50/0x80
[   28.893011]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.893054]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.893104]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.893152]  kthread+0x337/0x6f0
[   28.893197]  ? trace_preempt_on+0x20/0xc0
[   28.893251]  ? __pfx_kthread+0x10/0x10
[   28.893301]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.893352]  ? calculate_sigpending+0x7b/0xa0
[   28.893407]  ? __pfx_kthread+0x10/0x10
[   28.893466]  ret_from_fork+0x116/0x1d0
[   28.893505]  ? __pfx_kthread+0x10/0x10
[   28.893544]  ret_from_fork_asm+0x1a/0x30
[   28.893605]  </TASK>
[   28.893634] 
[   28.902601] Allocated by task 294:
[   28.902952]  kasan_save_stack+0x45/0x70
[   28.903331]  kasan_save_track+0x18/0x40
[   28.903755]  kasan_save_alloc_info+0x3b/0x50
[   28.904097]  __kasan_kmalloc+0xb7/0xc0
[   28.904449]  __kmalloc_cache_noprof+0x189/0x420
[   28.904747]  kasan_atomics+0x95/0x310
[   28.904928]  kunit_try_run_case+0x1a5/0x480
[   28.905120]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.905535]  kthread+0x337/0x6f0
[   28.905818]  ret_from_fork+0x116/0x1d0
[   28.906133]  ret_from_fork_asm+0x1a/0x30
[   28.906431] 
[   28.906549] The buggy address belongs to the object at ffff888102338080
[   28.906549]  which belongs to the cache kmalloc-64 of size 64
[   28.907263] The buggy address is located 0 bytes to the right of
[   28.907263]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   28.907878] 
[   28.908061] The buggy address belongs to the physical page:
[   28.908552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   28.908838] flags: 0x200000000000000(node=0|zone=2)
[   28.909051] page_type: f5(slab)
[   28.909301] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.909876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.910581] page dumped because: kasan: bad access detected
[   28.910915] 
[   28.911018] Memory state around the buggy address:
[   28.911476]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.911826]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.912217] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.912577]                                      ^
[   28.912831]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.913316]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.913680] ==================================================================
[   29.920345] ==================================================================
[   29.920978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   29.921317] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.923288] 
[   29.924219] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.924356] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.924384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.924427] Call Trace:
[   29.924479]  <TASK>
[   29.924519]  dump_stack_lvl+0x73/0xb0
[   29.924610]  print_report+0xd1/0x650
[   29.924649]  ? __virt_addr_valid+0x1db/0x2d0
[   29.924682]  ? kasan_atomics_helper+0x19e3/0x5450
[   29.924708]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.924738]  ? kasan_atomics_helper+0x19e3/0x5450
[   29.924763]  kasan_report+0x141/0x180
[   29.924787]  ? kasan_atomics_helper+0x19e3/0x5450
[   29.924816]  kasan_check_range+0x10c/0x1c0
[   29.924843]  __kasan_check_write+0x18/0x20
[   29.924868]  kasan_atomics_helper+0x19e3/0x5450
[   29.924894]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.924919]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.924947]  ? kasan_atomics+0x152/0x310
[   29.924976]  kasan_atomics+0x1dc/0x310
[   29.925002]  ? __pfx_kasan_atomics+0x10/0x10
[   29.925029]  ? __pfx_read_tsc+0x10/0x10
[   29.925053]  ? ktime_get_ts64+0x86/0x230
[   29.925084]  kunit_try_run_case+0x1a5/0x480
[   29.925113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.925138]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.925164]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.925191]  ? __kthread_parkme+0x82/0x180
[   29.925215]  ? preempt_count_sub+0x50/0x80
[   29.925243]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.925269]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.925296]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.925322]  kthread+0x337/0x6f0
[   29.925345]  ? trace_preempt_on+0x20/0xc0
[   29.925372]  ? __pfx_kthread+0x10/0x10
[   29.925396]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.925420]  ? calculate_sigpending+0x7b/0xa0
[   29.925468]  ? __pfx_kthread+0x10/0x10
[   29.925495]  ret_from_fork+0x116/0x1d0
[   29.925518]  ? __pfx_kthread+0x10/0x10
[   29.925543]  ret_from_fork_asm+0x1a/0x30
[   29.925577]  </TASK>
[   29.925593] 
[   29.935865] Allocated by task 294:
[   29.936182]  kasan_save_stack+0x45/0x70
[   29.936476]  kasan_save_track+0x18/0x40
[   29.936674]  kasan_save_alloc_info+0x3b/0x50
[   29.936933]  __kasan_kmalloc+0xb7/0xc0
[   29.937281]  __kmalloc_cache_noprof+0x189/0x420
[   29.937682]  kasan_atomics+0x95/0x310
[   29.938000]  kunit_try_run_case+0x1a5/0x480
[   29.938385]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.938841]  kthread+0x337/0x6f0
[   29.939143]  ret_from_fork+0x116/0x1d0
[   29.939467]  ret_from_fork_asm+0x1a/0x30
[   29.939637] 
[   29.939846] The buggy address belongs to the object at ffff888102338080
[   29.939846]  which belongs to the cache kmalloc-64 of size 64
[   29.940614] The buggy address is located 0 bytes to the right of
[   29.940614]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.941452] 
[   29.941651] The buggy address belongs to the physical page:
[   29.941972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.942559] flags: 0x200000000000000(node=0|zone=2)
[   29.942803] page_type: f5(slab)
[   29.942989] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.943353] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.943920] page dumped because: kasan: bad access detected
[   29.944385] 
[   29.944545] Memory state around the buggy address:
[   29.944942]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.945525]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.946062] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.946640]                                      ^
[   29.946994]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.947423]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.947862] ==================================================================
[   28.621991] ==================================================================
[   28.622652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   28.624301] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   28.624663] 
[   28.624818] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.624923] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.624948] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.624989] Call Trace:
[   28.625031]  <TASK>
[   28.625071]  dump_stack_lvl+0x73/0xb0
[   28.625594]  print_report+0xd1/0x650
[   28.625674]  ? __virt_addr_valid+0x1db/0x2d0
[   28.625707]  ? kasan_atomics_helper+0x4b6e/0x5450
[   28.625731]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.625760]  ? kasan_atomics_helper+0x4b6e/0x5450
[   28.625784]  kasan_report+0x141/0x180
[   28.625808]  ? kasan_atomics_helper+0x4b6e/0x5450
[   28.625835]  __asan_report_store4_noabort+0x1b/0x30
[   28.625862]  kasan_atomics_helper+0x4b6e/0x5450
[   28.625886]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.625910]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.625937]  ? kasan_atomics+0x152/0x310
[   28.625964]  kasan_atomics+0x1dc/0x310
[   28.625989]  ? __pfx_kasan_atomics+0x10/0x10
[   28.626014]  ? __pfx_read_tsc+0x10/0x10
[   28.626050]  ? ktime_get_ts64+0x86/0x230
[   28.626081]  kunit_try_run_case+0x1a5/0x480
[   28.626110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.626135]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.626190]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.626219]  ? __kthread_parkme+0x82/0x180
[   28.626244]  ? preempt_count_sub+0x50/0x80
[   28.626269]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.626296]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.626321]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.626347]  kthread+0x337/0x6f0
[   28.626369]  ? trace_preempt_on+0x20/0xc0
[   28.626395]  ? __pfx_kthread+0x10/0x10
[   28.626419]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.626461]  ? calculate_sigpending+0x7b/0xa0
[   28.626490]  ? __pfx_kthread+0x10/0x10
[   28.626515]  ret_from_fork+0x116/0x1d0
[   28.626535]  ? __pfx_kthread+0x10/0x10
[   28.626558]  ret_from_fork_asm+0x1a/0x30
[   28.626591]  </TASK>
[   28.626604] 
[   28.638420] Allocated by task 294:
[   28.639902]  kasan_save_stack+0x45/0x70
[   28.640565]  kasan_save_track+0x18/0x40
[   28.641037]  kasan_save_alloc_info+0x3b/0x50
[   28.641518]  __kasan_kmalloc+0xb7/0xc0
[   28.641723]  __kmalloc_cache_noprof+0x189/0x420
[   28.642099]  kasan_atomics+0x95/0x310
[   28.642319]  kunit_try_run_case+0x1a5/0x480
[   28.642553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.642981]  kthread+0x337/0x6f0
[   28.643316]  ret_from_fork+0x116/0x1d0
[   28.644029]  ret_from_fork_asm+0x1a/0x30
[   28.644318] 
[   28.644563] The buggy address belongs to the object at ffff888102338080
[   28.644563]  which belongs to the cache kmalloc-64 of size 64
[   28.645248] The buggy address is located 0 bytes to the right of
[   28.645248]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   28.646270] 
[   28.646504] The buggy address belongs to the physical page:
[   28.646827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   28.647471] flags: 0x200000000000000(node=0|zone=2)
[   28.647814] page_type: f5(slab)
[   28.648125] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.648565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.649177] page dumped because: kasan: bad access detected
[   28.649593] 
[   28.649696] Memory state around the buggy address:
[   28.650093]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.650394]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.650874] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.651163]                                      ^
[   28.651629]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.652404]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.652655] ==================================================================
[   29.005275] ==================================================================
[   29.006095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   29.007382] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.007947] 
[   29.008191] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.008308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.008342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.008418] Call Trace:
[   29.008478]  <TASK>
[   29.008526]  dump_stack_lvl+0x73/0xb0
[   29.008584]  print_report+0xd1/0x650
[   29.008614]  ? __virt_addr_valid+0x1db/0x2d0
[   29.008642]  ? kasan_atomics_helper+0xa2b/0x5450
[   29.008666]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.008704]  ? kasan_atomics_helper+0xa2b/0x5450
[   29.008744]  kasan_report+0x141/0x180
[   29.008789]  ? kasan_atomics_helper+0xa2b/0x5450
[   29.008845]  kasan_check_range+0x10c/0x1c0
[   29.008932]  __kasan_check_write+0x18/0x20
[   29.009003]  kasan_atomics_helper+0xa2b/0x5450
[   29.009053]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.009103]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.009156]  ? kasan_atomics+0x152/0x310
[   29.009205]  kasan_atomics+0x1dc/0x310
[   29.009260]  ? __pfx_kasan_atomics+0x10/0x10
[   29.009313]  ? __pfx_read_tsc+0x10/0x10
[   29.009380]  ? ktime_get_ts64+0x86/0x230
[   29.009426]  kunit_try_run_case+0x1a5/0x480
[   29.009481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.009509]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.009537]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.009564]  ? __kthread_parkme+0x82/0x180
[   29.009591]  ? preempt_count_sub+0x50/0x80
[   29.009619]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.009646]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.009673]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.009700]  kthread+0x337/0x6f0
[   29.009724]  ? trace_preempt_on+0x20/0xc0
[   29.009752]  ? __pfx_kthread+0x10/0x10
[   29.009776]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.009801]  ? calculate_sigpending+0x7b/0xa0
[   29.009830]  ? __pfx_kthread+0x10/0x10
[   29.009856]  ret_from_fork+0x116/0x1d0
[   29.009877]  ? __pfx_kthread+0x10/0x10
[   29.009901]  ret_from_fork_asm+0x1a/0x30
[   29.009937]  </TASK>
[   29.009954] 
[   29.021737] Allocated by task 294:
[   29.022136]  kasan_save_stack+0x45/0x70
[   29.022390]  kasan_save_track+0x18/0x40
[   29.022790]  kasan_save_alloc_info+0x3b/0x50
[   29.023115]  __kasan_kmalloc+0xb7/0xc0
[   29.023332]  __kmalloc_cache_noprof+0x189/0x420
[   29.023551]  kasan_atomics+0x95/0x310
[   29.023737]  kunit_try_run_case+0x1a5/0x480
[   29.023932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.024438]  kthread+0x337/0x6f0
[   29.024927]  ret_from_fork+0x116/0x1d0
[   29.025366]  ret_from_fork_asm+0x1a/0x30
[   29.025696] 
[   29.025932] The buggy address belongs to the object at ffff888102338080
[   29.025932]  which belongs to the cache kmalloc-64 of size 64
[   29.026923] The buggy address is located 0 bytes to the right of
[   29.026923]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.027929] 
[   29.028062] The buggy address belongs to the physical page:
[   29.028322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.028914] flags: 0x200000000000000(node=0|zone=2)
[   29.029528] page_type: f5(slab)
[   29.029879] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.030567] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.031069] page dumped because: kasan: bad access detected
[   29.031325] 
[   29.031431] Memory state around the buggy address:
[   29.031972]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.032895]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.033600] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.034095]                                      ^
[   29.034586]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.035020]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.035638] ==================================================================
[   29.274374] ==================================================================
[   29.275079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   29.275595] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.276111] 
[   29.276326] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.276430] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.276477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.276517] Call Trace:
[   29.276570]  <TASK>
[   29.276607]  dump_stack_lvl+0x73/0xb0
[   29.276676]  print_report+0xd1/0x650
[   29.276736]  ? __virt_addr_valid+0x1db/0x2d0
[   29.276805]  ? kasan_atomics_helper+0xfa9/0x5450
[   29.276861]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.276928]  ? kasan_atomics_helper+0xfa9/0x5450
[   29.276977]  kasan_report+0x141/0x180
[   29.277032]  ? kasan_atomics_helper+0xfa9/0x5450
[   29.277096]  kasan_check_range+0x10c/0x1c0
[   29.277186]  __kasan_check_write+0x18/0x20
[   29.277236]  kasan_atomics_helper+0xfa9/0x5450
[   29.277285]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.277334]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.277398]  ? kasan_atomics+0x152/0x310
[   29.277482]  kasan_atomics+0x1dc/0x310
[   29.277536]  ? __pfx_kasan_atomics+0x10/0x10
[   29.277582]  ? __pfx_read_tsc+0x10/0x10
[   29.277627]  ? ktime_get_ts64+0x86/0x230
[   29.277688]  kunit_try_run_case+0x1a5/0x480
[   29.277753]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.277823]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.277873]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.277926]  ? __kthread_parkme+0x82/0x180
[   29.277981]  ? preempt_count_sub+0x50/0x80
[   29.278060]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.278116]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.278199]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.278234]  kthread+0x337/0x6f0
[   29.278258]  ? trace_preempt_on+0x20/0xc0
[   29.278287]  ? __pfx_kthread+0x10/0x10
[   29.278311]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.278336]  ? calculate_sigpending+0x7b/0xa0
[   29.278365]  ? __pfx_kthread+0x10/0x10
[   29.278389]  ret_from_fork+0x116/0x1d0
[   29.278412]  ? __pfx_kthread+0x10/0x10
[   29.278437]  ret_from_fork_asm+0x1a/0x30
[   29.278495]  </TASK>
[   29.278512] 
[   29.288286] Allocated by task 294:
[   29.288536]  kasan_save_stack+0x45/0x70
[   29.288917]  kasan_save_track+0x18/0x40
[   29.289298]  kasan_save_alloc_info+0x3b/0x50
[   29.289700]  __kasan_kmalloc+0xb7/0xc0
[   29.290037]  __kmalloc_cache_noprof+0x189/0x420
[   29.290470]  kasan_atomics+0x95/0x310
[   29.290817]  kunit_try_run_case+0x1a5/0x480
[   29.291206]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.291495]  kthread+0x337/0x6f0
[   29.291669]  ret_from_fork+0x116/0x1d0
[   29.291985]  ret_from_fork_asm+0x1a/0x30
[   29.292377] 
[   29.292565] The buggy address belongs to the object at ffff888102338080
[   29.292565]  which belongs to the cache kmalloc-64 of size 64
[   29.293315] The buggy address is located 0 bytes to the right of
[   29.293315]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.293776] 
[   29.293979] The buggy address belongs to the physical page:
[   29.294423] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.294919] flags: 0x200000000000000(node=0|zone=2)
[   29.295270] page_type: f5(slab)
[   29.295609] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.296056] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.296518] page dumped because: kasan: bad access detected
[   29.296791] 
[   29.296897] Memory state around the buggy address:
[   29.297103]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.297400]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.297930] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.298530]                                      ^
[   29.298922]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.299454]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.299725] ==================================================================
[   29.357938] ==================================================================
[   29.358764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   29.359186] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.359851] 
[   29.360063] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.360178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.360209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.360261] Call Trace:
[   29.360309]  <TASK>
[   29.360357]  dump_stack_lvl+0x73/0xb0
[   29.360428]  print_report+0xd1/0x650
[   29.360499]  ? __virt_addr_valid+0x1db/0x2d0
[   29.360561]  ? kasan_atomics_helper+0x4a1c/0x5450
[   29.360613]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.360675]  ? kasan_atomics_helper+0x4a1c/0x5450
[   29.360729]  kasan_report+0x141/0x180
[   29.360781]  ? kasan_atomics_helper+0x4a1c/0x5450
[   29.360845]  __asan_report_load4_noabort+0x18/0x20
[   29.360904]  kasan_atomics_helper+0x4a1c/0x5450
[   29.360956]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.361011]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.361072]  ? kasan_atomics+0x152/0x310
[   29.361136]  kasan_atomics+0x1dc/0x310
[   29.361178]  ? __pfx_kasan_atomics+0x10/0x10
[   29.361228]  ? __pfx_read_tsc+0x10/0x10
[   29.361268]  ? ktime_get_ts64+0x86/0x230
[   29.361316]  kunit_try_run_case+0x1a5/0x480
[   29.361365]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.361411]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.361503]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.361571]  ? __kthread_parkme+0x82/0x180
[   29.361635]  ? preempt_count_sub+0x50/0x80
[   29.361692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.361760]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.361827]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.361891]  kthread+0x337/0x6f0
[   29.361950]  ? trace_preempt_on+0x20/0xc0
[   29.362006]  ? __pfx_kthread+0x10/0x10
[   29.362077]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.362140]  ? calculate_sigpending+0x7b/0xa0
[   29.362187]  ? __pfx_kthread+0x10/0x10
[   29.362230]  ret_from_fork+0x116/0x1d0
[   29.362272]  ? __pfx_kthread+0x10/0x10
[   29.362314]  ret_from_fork_asm+0x1a/0x30
[   29.362387]  </TASK>
[   29.362417] 
[   29.377130] Allocated by task 294:
[   29.378564]  kasan_save_stack+0x45/0x70
[   29.378963]  kasan_save_track+0x18/0x40
[   29.379484]  kasan_save_alloc_info+0x3b/0x50
[   29.379698]  __kasan_kmalloc+0xb7/0xc0
[   29.380066]  __kmalloc_cache_noprof+0x189/0x420
[   29.380597]  kasan_atomics+0x95/0x310
[   29.380777]  kunit_try_run_case+0x1a5/0x480
[   29.381288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.381563]  kthread+0x337/0x6f0
[   29.382135]  ret_from_fork+0x116/0x1d0
[   29.382329]  ret_from_fork_asm+0x1a/0x30
[   29.382760] 
[   29.382866] The buggy address belongs to the object at ffff888102338080
[   29.382866]  which belongs to the cache kmalloc-64 of size 64
[   29.384047] The buggy address is located 0 bytes to the right of
[   29.384047]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.384926] 
[   29.385042] The buggy address belongs to the physical page:
[   29.385245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.385772] flags: 0x200000000000000(node=0|zone=2)
[   29.385963] page_type: f5(slab)
[   29.386077] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.386899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.387530] page dumped because: kasan: bad access detected
[   29.387971] 
[   29.388138] Memory state around the buggy address:
[   29.388554]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.389044]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.389691] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.390069]                                      ^
[   29.390550]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.390916]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.391422] ==================================================================
[   30.336097] ==================================================================
[   30.336789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   30.337281] Read of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   30.337701] 
[   30.337891] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.337998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.338038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.338087] Call Trace:
[   30.338131]  <TASK>
[   30.338213]  dump_stack_lvl+0x73/0xb0
[   30.338285]  print_report+0xd1/0x650
[   30.338333]  ? __virt_addr_valid+0x1db/0x2d0
[   30.338381]  ? kasan_atomics_helper+0x4fb2/0x5450
[   30.338423]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.338491]  ? kasan_atomics_helper+0x4fb2/0x5450
[   30.338543]  kasan_report+0x141/0x180
[   30.338589]  ? kasan_atomics_helper+0x4fb2/0x5450
[   30.338647]  __asan_report_load8_noabort+0x18/0x20
[   30.338696]  kasan_atomics_helper+0x4fb2/0x5450
[   30.338743]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.338790]  ? __kmalloc_cache_noprof+0x189/0x420
[   30.338844]  ? kasan_atomics+0x152/0x310
[   30.338898]  kasan_atomics+0x1dc/0x310
[   30.338943]  ? __pfx_kasan_atomics+0x10/0x10
[   30.338997]  ? __pfx_read_tsc+0x10/0x10
[   30.339047]  ? ktime_get_ts64+0x86/0x230
[   30.339107]  kunit_try_run_case+0x1a5/0x480
[   30.339199]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.339250]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.339304]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.339349]  ? __kthread_parkme+0x82/0x180
[   30.339399]  ? preempt_count_sub+0x50/0x80
[   30.339466]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.339522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.339582]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.339637]  kthread+0x337/0x6f0
[   30.339678]  ? trace_preempt_on+0x20/0xc0
[   30.339727]  ? __pfx_kthread+0x10/0x10
[   30.339774]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.339817]  ? calculate_sigpending+0x7b/0xa0
[   30.339861]  ? __pfx_kthread+0x10/0x10
[   30.339909]  ret_from_fork+0x116/0x1d0
[   30.339952]  ? __pfx_kthread+0x10/0x10
[   30.339996]  ret_from_fork_asm+0x1a/0x30
[   30.340058]  </TASK>
[   30.340083] 
[   30.349186] Allocated by task 294:
[   30.349540]  kasan_save_stack+0x45/0x70
[   30.349918]  kasan_save_track+0x18/0x40
[   30.350235]  kasan_save_alloc_info+0x3b/0x50
[   30.350516]  __kasan_kmalloc+0xb7/0xc0
[   30.350683]  __kmalloc_cache_noprof+0x189/0x420
[   30.350861]  kasan_atomics+0x95/0x310
[   30.351009]  kunit_try_run_case+0x1a5/0x480
[   30.352049]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.352348]  kthread+0x337/0x6f0
[   30.352542]  ret_from_fork+0x116/0x1d0
[   30.354176]  ret_from_fork_asm+0x1a/0x30
[   30.354463] 
[   30.354581] The buggy address belongs to the object at ffff888102338080
[   30.354581]  which belongs to the cache kmalloc-64 of size 64
[   30.355004] The buggy address is located 0 bytes to the right of
[   30.355004]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   30.355833] 
[   30.356054] The buggy address belongs to the physical page:
[   30.356543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   30.356932] flags: 0x200000000000000(node=0|zone=2)
[   30.357365] page_type: f5(slab)
[   30.357643] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.358197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.358723] page dumped because: kasan: bad access detected
[   30.359011] 
[   30.359173] Memory state around the buggy address:
[   30.359589]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.359919]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.360361] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.360936]                                      ^
[   30.361127]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.361392]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.361912] ==================================================================
[   29.538233] ==================================================================
[   29.538887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   29.539402] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.539828] 
[   29.540038] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.540190] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.540223] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.540275] Call Trace:
[   29.540322]  <TASK>
[   29.540370]  dump_stack_lvl+0x73/0xb0
[   29.540452]  print_report+0xd1/0x650
[   29.540508]  ? __virt_addr_valid+0x1db/0x2d0
[   29.540586]  ? kasan_atomics_helper+0x49ce/0x5450
[   29.540633]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.540684]  ? kasan_atomics_helper+0x49ce/0x5450
[   29.540733]  kasan_report+0x141/0x180
[   29.540789]  ? kasan_atomics_helper+0x49ce/0x5450
[   29.540850]  __asan_report_load4_noabort+0x18/0x20
[   29.540909]  kasan_atomics_helper+0x49ce/0x5450
[   29.540965]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.541020]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.541078]  ? kasan_atomics+0x152/0x310
[   29.541176]  kasan_atomics+0x1dc/0x310
[   29.541235]  ? __pfx_kasan_atomics+0x10/0x10
[   29.541295]  ? __pfx_read_tsc+0x10/0x10
[   29.541339]  ? ktime_get_ts64+0x86/0x230
[   29.541390]  kunit_try_run_case+0x1a5/0x480
[   29.541438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.541496]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.541545]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.541595]  ? __kthread_parkme+0x82/0x180
[   29.541647]  ? preempt_count_sub+0x50/0x80
[   29.541703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.541757]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.541813]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.541866]  kthread+0x337/0x6f0
[   29.541912]  ? trace_preempt_on+0x20/0xc0
[   29.541968]  ? __pfx_kthread+0x10/0x10
[   29.542019]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.542075]  ? calculate_sigpending+0x7b/0xa0
[   29.542179]  ? __pfx_kthread+0x10/0x10
[   29.542230]  ret_from_fork+0x116/0x1d0
[   29.542271]  ? __pfx_kthread+0x10/0x10
[   29.542311]  ret_from_fork_asm+0x1a/0x30
[   29.542384]  </TASK>
[   29.542415] 
[   29.551854] Allocated by task 294:
[   29.552256]  kasan_save_stack+0x45/0x70
[   29.552652]  kasan_save_track+0x18/0x40
[   29.552988]  kasan_save_alloc_info+0x3b/0x50
[   29.553385]  __kasan_kmalloc+0xb7/0xc0
[   29.553678]  __kmalloc_cache_noprof+0x189/0x420
[   29.553889]  kasan_atomics+0x95/0x310
[   29.554077]  kunit_try_run_case+0x1a5/0x480
[   29.554462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.554907]  kthread+0x337/0x6f0
[   29.555230]  ret_from_fork+0x116/0x1d0
[   29.555554]  ret_from_fork_asm+0x1a/0x30
[   29.555896] 
[   29.556009] The buggy address belongs to the object at ffff888102338080
[   29.556009]  which belongs to the cache kmalloc-64 of size 64
[   29.556479] The buggy address is located 0 bytes to the right of
[   29.556479]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.557426] 
[   29.557586] The buggy address belongs to the physical page:
[   29.557933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.558334] flags: 0x200000000000000(node=0|zone=2)
[   29.558570] page_type: f5(slab)
[   29.558747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.559273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.559865] page dumped because: kasan: bad access detected
[   29.560318] 
[   29.560506] Memory state around the buggy address:
[   29.560828]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.561095]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.561380] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.561918]                                      ^
[   29.562361]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.562909]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.563417] ==================================================================
[   29.179789] ==================================================================
[   29.180227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   29.181489] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.182063] 
[   29.182222] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.182321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.182340] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.182368] Call Trace:
[   29.182395]  <TASK>
[   29.182426]  dump_stack_lvl+0x73/0xb0
[   29.182506]  print_report+0xd1/0x650
[   29.182547]  ? __virt_addr_valid+0x1db/0x2d0
[   29.182594]  ? kasan_atomics_helper+0xde0/0x5450
[   29.182641]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.182698]  ? kasan_atomics_helper+0xde0/0x5450
[   29.182751]  kasan_report+0x141/0x180
[   29.182806]  ? kasan_atomics_helper+0xde0/0x5450
[   29.182870]  kasan_check_range+0x10c/0x1c0
[   29.182928]  __kasan_check_write+0x18/0x20
[   29.182984]  kasan_atomics_helper+0xde0/0x5450
[   29.183041]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.183097]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.183154]  ? kasan_atomics+0x152/0x310
[   29.183213]  kasan_atomics+0x1dc/0x310
[   29.183269]  ? __pfx_kasan_atomics+0x10/0x10
[   29.183326]  ? __pfx_read_tsc+0x10/0x10
[   29.183372]  ? ktime_get_ts64+0x86/0x230
[   29.183406]  kunit_try_run_case+0x1a5/0x480
[   29.183437]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.183538]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.183594]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.183651]  ? __kthread_parkme+0x82/0x180
[   29.183701]  ? preempt_count_sub+0x50/0x80
[   29.183760]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.183819]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.183864]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.183911]  kthread+0x337/0x6f0
[   29.183958]  ? trace_preempt_on+0x20/0xc0
[   29.184010]  ? __pfx_kthread+0x10/0x10
[   29.184060]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.184114]  ? calculate_sigpending+0x7b/0xa0
[   29.185112]  ? __pfx_kthread+0x10/0x10
[   29.185222]  ret_from_fork+0x116/0x1d0
[   29.185276]  ? __pfx_kthread+0x10/0x10
[   29.185331]  ret_from_fork_asm+0x1a/0x30
[   29.185409]  </TASK>
[   29.185456] 
[   29.197846] Allocated by task 294:
[   29.198266]  kasan_save_stack+0x45/0x70
[   29.198509]  kasan_save_track+0x18/0x40
[   29.198953]  kasan_save_alloc_info+0x3b/0x50
[   29.199468]  __kasan_kmalloc+0xb7/0xc0
[   29.199786]  __kmalloc_cache_noprof+0x189/0x420
[   29.199970]  kasan_atomics+0x95/0x310
[   29.200411]  kunit_try_run_case+0x1a5/0x480
[   29.200844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.201277]  kthread+0x337/0x6f0
[   29.201547]  ret_from_fork+0x116/0x1d0
[   29.201924]  ret_from_fork_asm+0x1a/0x30
[   29.202268] 
[   29.202480] The buggy address belongs to the object at ffff888102338080
[   29.202480]  which belongs to the cache kmalloc-64 of size 64
[   29.203302] The buggy address is located 0 bytes to the right of
[   29.203302]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.203970] 
[   29.204225] The buggy address belongs to the physical page:
[   29.204592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.205092] flags: 0x200000000000000(node=0|zone=2)
[   29.205562] page_type: f5(slab)
[   29.205799] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.206327] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.206862] page dumped because: kasan: bad access detected
[   29.207350] 
[   29.207523] Memory state around the buggy address:
[   29.207934]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.208345]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.208890] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.209367]                                      ^
[   29.209649]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.210094]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.210409] ==================================================================
[   29.620245] ==================================================================
[   29.620947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   29.621640] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.622288] 
[   29.622552] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.622668] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.622738] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.622793] Call Trace:
[   29.622839]  <TASK>
[   29.622885]  dump_stack_lvl+0x73/0xb0
[   29.622996]  print_report+0xd1/0x650
[   29.623052]  ? __virt_addr_valid+0x1db/0x2d0
[   29.623107]  ? kasan_atomics_helper+0x1467/0x5450
[   29.623220]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.623285]  ? kasan_atomics_helper+0x1467/0x5450
[   29.623337]  kasan_report+0x141/0x180
[   29.623381]  ? kasan_atomics_helper+0x1467/0x5450
[   29.623413]  kasan_check_range+0x10c/0x1c0
[   29.623462]  __kasan_check_write+0x18/0x20
[   29.623496]  kasan_atomics_helper+0x1467/0x5450
[   29.623538]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.623580]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.623634]  ? kasan_atomics+0x152/0x310
[   29.623730]  kasan_atomics+0x1dc/0x310
[   29.623782]  ? __pfx_kasan_atomics+0x10/0x10
[   29.623837]  ? __pfx_read_tsc+0x10/0x10
[   29.623888]  ? ktime_get_ts64+0x86/0x230
[   29.623982]  kunit_try_run_case+0x1a5/0x480
[   29.624043]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.624091]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.624136]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.624199]  ? __kthread_parkme+0x82/0x180
[   29.624227]  ? preempt_count_sub+0x50/0x80
[   29.624255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.624284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.624312]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.624340]  kthread+0x337/0x6f0
[   29.624362]  ? trace_preempt_on+0x20/0xc0
[   29.624390]  ? __pfx_kthread+0x10/0x10
[   29.624415]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.624449]  ? calculate_sigpending+0x7b/0xa0
[   29.624481]  ? __pfx_kthread+0x10/0x10
[   29.624508]  ret_from_fork+0x116/0x1d0
[   29.624530]  ? __pfx_kthread+0x10/0x10
[   29.624554]  ret_from_fork_asm+0x1a/0x30
[   29.624589]  </TASK>
[   29.624604] 
[   29.636867] Allocated by task 294:
[   29.637377]  kasan_save_stack+0x45/0x70
[   29.637824]  kasan_save_track+0x18/0x40
[   29.638269]  kasan_save_alloc_info+0x3b/0x50
[   29.638536]  __kasan_kmalloc+0xb7/0xc0
[   29.638841]  __kmalloc_cache_noprof+0x189/0x420
[   29.639207]  kasan_atomics+0x95/0x310
[   29.639528]  kunit_try_run_case+0x1a5/0x480
[   29.639794]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.640029]  kthread+0x337/0x6f0
[   29.640351]  ret_from_fork+0x116/0x1d0
[   29.640797]  ret_from_fork_asm+0x1a/0x30
[   29.641202] 
[   29.641390] The buggy address belongs to the object at ffff888102338080
[   29.641390]  which belongs to the cache kmalloc-64 of size 64
[   29.642065] The buggy address is located 0 bytes to the right of
[   29.642065]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.642953] 
[   29.643270] The buggy address belongs to the physical page:
[   29.643621] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.643942] flags: 0x200000000000000(node=0|zone=2)
[   29.644415] page_type: f5(slab)
[   29.644809] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.645363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.645831] page dumped because: kasan: bad access detected
[   29.646242] 
[   29.646452] Memory state around the buggy address:
[   29.646792]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.647282]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.647607] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.648274]                                      ^
[   29.648720]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.649057]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.649489] ==================================================================
[   29.245351] ==================================================================
[   29.245791] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   29.246359] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.246747] 
[   29.247002] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.247198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.247234] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.247285] Call Trace:
[   29.247329]  <TASK>
[   29.247372]  dump_stack_lvl+0x73/0xb0
[   29.247491]  print_report+0xd1/0x650
[   29.247583]  ? __virt_addr_valid+0x1db/0x2d0
[   29.247653]  ? kasan_atomics_helper+0xf10/0x5450
[   29.247707]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.247766]  ? kasan_atomics_helper+0xf10/0x5450
[   29.247807]  kasan_report+0x141/0x180
[   29.247834]  ? kasan_atomics_helper+0xf10/0x5450
[   29.247863]  kasan_check_range+0x10c/0x1c0
[   29.247891]  __kasan_check_write+0x18/0x20
[   29.247918]  kasan_atomics_helper+0xf10/0x5450
[   29.247960]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.248002]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.248032]  ? kasan_atomics+0x152/0x310
[   29.248062]  kasan_atomics+0x1dc/0x310
[   29.248087]  ? __pfx_kasan_atomics+0x10/0x10
[   29.248114]  ? __pfx_read_tsc+0x10/0x10
[   29.248152]  ? ktime_get_ts64+0x86/0x230
[   29.248203]  kunit_try_run_case+0x1a5/0x480
[   29.248235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.248261]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.248289]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.248315]  ? __kthread_parkme+0x82/0x180
[   29.248341]  ? preempt_count_sub+0x50/0x80
[   29.248369]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.248396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.248423]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.248468]  kthread+0x337/0x6f0
[   29.248495]  ? trace_preempt_on+0x20/0xc0
[   29.248521]  ? __pfx_kthread+0x10/0x10
[   29.248546]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.248570]  ? calculate_sigpending+0x7b/0xa0
[   29.248599]  ? __pfx_kthread+0x10/0x10
[   29.248623]  ret_from_fork+0x116/0x1d0
[   29.248644]  ? __pfx_kthread+0x10/0x10
[   29.248668]  ret_from_fork_asm+0x1a/0x30
[   29.248704]  </TASK>
[   29.248719] 
[   29.259205] Allocated by task 294:
[   29.259619]  kasan_save_stack+0x45/0x70
[   29.260847]  kasan_save_track+0x18/0x40
[   29.261489]  kasan_save_alloc_info+0x3b/0x50
[   29.261721]  __kasan_kmalloc+0xb7/0xc0
[   29.261902]  __kmalloc_cache_noprof+0x189/0x420
[   29.262124]  kasan_atomics+0x95/0x310
[   29.262300]  kunit_try_run_case+0x1a5/0x480
[   29.262508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.262736]  kthread+0x337/0x6f0
[   29.263035]  ret_from_fork+0x116/0x1d0
[   29.264210]  ret_from_fork_asm+0x1a/0x30
[   29.264637] 
[   29.264752] The buggy address belongs to the object at ffff888102338080
[   29.264752]  which belongs to the cache kmalloc-64 of size 64
[   29.265795] The buggy address is located 0 bytes to the right of
[   29.265795]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.266529] 
[   29.266720] The buggy address belongs to the physical page:
[   29.267158] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.267893] flags: 0x200000000000000(node=0|zone=2)
[   29.268125] page_type: f5(slab)
[   29.268388] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.268908] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.269577] page dumped because: kasan: bad access detected
[   29.269787] 
[   29.269971] Memory state around the buggy address:
[   29.270651]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.271131]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.271432] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.271900]                                      ^
[   29.272259]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.272756]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.273017] ==================================================================
[   28.595944] ==================================================================
[   28.596873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   28.597213] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   28.597456] 
[   28.597562] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.597625] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.597640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.597666] Call Trace:
[   28.597683]  <TASK>
[   28.597707]  dump_stack_lvl+0x73/0xb0
[   28.597741]  print_report+0xd1/0x650
[   28.597765]  ? __virt_addr_valid+0x1db/0x2d0
[   28.597792]  ? kasan_atomics_helper+0x4b88/0x5450
[   28.597815]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.597844]  ? kasan_atomics_helper+0x4b88/0x5450
[   28.597867]  kasan_report+0x141/0x180
[   28.597891]  ? kasan_atomics_helper+0x4b88/0x5450
[   28.597919]  __asan_report_load4_noabort+0x18/0x20
[   28.597944]  kasan_atomics_helper+0x4b88/0x5450
[   28.597968]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.597992]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.598019]  ? kasan_atomics+0x152/0x310
[   28.598061]  kasan_atomics+0x1dc/0x310
[   28.598086]  ? __pfx_kasan_atomics+0x10/0x10
[   28.598112]  ? __pfx_read_tsc+0x10/0x10
[   28.598136]  ? ktime_get_ts64+0x86/0x230
[   28.598166]  kunit_try_run_case+0x1a5/0x480
[   28.598194]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.598219]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.598244]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.598269]  ? __kthread_parkme+0x82/0x180
[   28.598292]  ? preempt_count_sub+0x50/0x80
[   28.598318]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.598343]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.598369]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.598393]  kthread+0x337/0x6f0
[   28.598415]  ? trace_preempt_on+0x20/0xc0
[   28.598470]  ? __pfx_kthread+0x10/0x10
[   28.598518]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.598559]  ? calculate_sigpending+0x7b/0xa0
[   28.598611]  ? __pfx_kthread+0x10/0x10
[   28.598653]  ret_from_fork+0x116/0x1d0
[   28.598687]  ? __pfx_kthread+0x10/0x10
[   28.598724]  ret_from_fork_asm+0x1a/0x30
[   28.598786]  </TASK>
[   28.598807] 
[   28.609556] Allocated by task 294:
[   28.609923]  kasan_save_stack+0x45/0x70
[   28.610228]  kasan_save_track+0x18/0x40
[   28.610435]  kasan_save_alloc_info+0x3b/0x50
[   28.610646]  __kasan_kmalloc+0xb7/0xc0
[   28.610821]  __kmalloc_cache_noprof+0x189/0x420
[   28.611110]  kasan_atomics+0x95/0x310
[   28.611459]  kunit_try_run_case+0x1a5/0x480
[   28.611812]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.612222]  kthread+0x337/0x6f0
[   28.612522]  ret_from_fork+0x116/0x1d0
[   28.612842]  ret_from_fork_asm+0x1a/0x30
[   28.613128] 
[   28.613263] The buggy address belongs to the object at ffff888102338080
[   28.613263]  which belongs to the cache kmalloc-64 of size 64
[   28.614066] The buggy address is located 0 bytes to the right of
[   28.614066]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   28.614790] 
[   28.614968] The buggy address belongs to the physical page:
[   28.615306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   28.615733] flags: 0x200000000000000(node=0|zone=2)
[   28.616043] page_type: f5(slab)
[   28.616248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.616658] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.617250] page dumped because: kasan: bad access detected
[   28.617489] 
[   28.617590] Memory state around the buggy address:
[   28.617792]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.618207]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.618731] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.619264]                                      ^
[   28.619648]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.620115]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.620473] ==================================================================
[   30.068588] ==================================================================
[   30.069034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   30.069928] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   30.070389] 
[   30.070617] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.070732] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.070764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.070813] Call Trace:
[   30.070861]  <TASK>
[   30.070907]  dump_stack_lvl+0x73/0xb0
[   30.070984]  print_report+0xd1/0x650
[   30.071041]  ? __virt_addr_valid+0x1db/0x2d0
[   30.071090]  ? kasan_atomics_helper+0x1ce1/0x5450
[   30.071128]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.071176]  ? kasan_atomics_helper+0x1ce1/0x5450
[   30.071218]  kasan_report+0x141/0x180
[   30.071260]  ? kasan_atomics_helper+0x1ce1/0x5450
[   30.071316]  kasan_check_range+0x10c/0x1c0
[   30.071370]  __kasan_check_write+0x18/0x20
[   30.071426]  kasan_atomics_helper+0x1ce1/0x5450
[   30.071494]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.071549]  ? __kmalloc_cache_noprof+0x189/0x420
[   30.071610]  ? kasan_atomics+0x152/0x310
[   30.071673]  kasan_atomics+0x1dc/0x310
[   30.071719]  ? __pfx_kasan_atomics+0x10/0x10
[   30.071774]  ? __pfx_read_tsc+0x10/0x10
[   30.071811]  ? ktime_get_ts64+0x86/0x230
[   30.071845]  kunit_try_run_case+0x1a5/0x480
[   30.071876]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.071903]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.071930]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.071956]  ? __kthread_parkme+0x82/0x180
[   30.071981]  ? preempt_count_sub+0x50/0x80
[   30.072008]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.072034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.072061]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.072087]  kthread+0x337/0x6f0
[   30.072110]  ? trace_preempt_on+0x20/0xc0
[   30.072137]  ? __pfx_kthread+0x10/0x10
[   30.072173]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.072206]  ? calculate_sigpending+0x7b/0xa0
[   30.072234]  ? __pfx_kthread+0x10/0x10
[   30.072258]  ret_from_fork+0x116/0x1d0
[   30.072281]  ? __pfx_kthread+0x10/0x10
[   30.072304]  ret_from_fork_asm+0x1a/0x30
[   30.072339]  </TASK>
[   30.072355] 
[   30.083478] Allocated by task 294:
[   30.083914]  kasan_save_stack+0x45/0x70
[   30.084862]  kasan_save_track+0x18/0x40
[   30.085149]  kasan_save_alloc_info+0x3b/0x50
[   30.085358]  __kasan_kmalloc+0xb7/0xc0
[   30.085556]  __kmalloc_cache_noprof+0x189/0x420
[   30.085793]  kasan_atomics+0x95/0x310
[   30.085999]  kunit_try_run_case+0x1a5/0x480
[   30.086259]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.087075]  kthread+0x337/0x6f0
[   30.087536]  ret_from_fork+0x116/0x1d0
[   30.087918]  ret_from_fork_asm+0x1a/0x30
[   30.088330] 
[   30.088541] The buggy address belongs to the object at ffff888102338080
[   30.088541]  which belongs to the cache kmalloc-64 of size 64
[   30.089136] The buggy address is located 0 bytes to the right of
[   30.089136]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   30.089848] 
[   30.089981] The buggy address belongs to the physical page:
[   30.090573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   30.091138] flags: 0x200000000000000(node=0|zone=2)
[   30.091423] page_type: f5(slab)
[   30.091606] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.092168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.092738] page dumped because: kasan: bad access detected
[   30.093183] 
[   30.093357] Memory state around the buggy address:
[   30.093659]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.094168]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.094608] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.094985]                                      ^
[   30.095271]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.095670]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.095939] ==================================================================
[   29.510944] ==================================================================
[   29.511873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   29.512351] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.512786] 
[   29.512953] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.513068] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.513102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.513186] Call Trace:
[   29.513236]  <TASK>
[   29.513282]  dump_stack_lvl+0x73/0xb0
[   29.513360]  print_report+0xd1/0x650
[   29.513415]  ? __virt_addr_valid+0x1db/0x2d0
[   29.513483]  ? kasan_atomics_helper+0x12e6/0x5450
[   29.513535]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.513598]  ? kasan_atomics_helper+0x12e6/0x5450
[   29.513649]  kasan_report+0x141/0x180
[   29.513702]  ? kasan_atomics_helper+0x12e6/0x5450
[   29.513767]  kasan_check_range+0x10c/0x1c0
[   29.513821]  __kasan_check_write+0x18/0x20
[   29.513874]  kasan_atomics_helper+0x12e6/0x5450
[   29.513930]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.513986]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.514055]  ? kasan_atomics+0x152/0x310
[   29.514120]  kasan_atomics+0x1dc/0x310
[   29.514203]  ? __pfx_kasan_atomics+0x10/0x10
[   29.514265]  ? __pfx_read_tsc+0x10/0x10
[   29.514319]  ? ktime_get_ts64+0x86/0x230
[   29.514377]  kunit_try_run_case+0x1a5/0x480
[   29.514425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.514481]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.514531]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.514605]  ? __kthread_parkme+0x82/0x180
[   29.514657]  ? preempt_count_sub+0x50/0x80
[   29.514708]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.514774]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.514826]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.514873]  kthread+0x337/0x6f0
[   29.514913]  ? trace_preempt_on+0x20/0xc0
[   29.514965]  ? __pfx_kthread+0x10/0x10
[   29.515013]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.515064]  ? calculate_sigpending+0x7b/0xa0
[   29.515117]  ? __pfx_kthread+0x10/0x10
[   29.515201]  ret_from_fork+0x116/0x1d0
[   29.515251]  ? __pfx_kthread+0x10/0x10
[   29.515300]  ret_from_fork_asm+0x1a/0x30
[   29.515396]  </TASK>
[   29.515431] 
[   29.525040] Allocated by task 294:
[   29.525311]  kasan_save_stack+0x45/0x70
[   29.525700]  kasan_save_track+0x18/0x40
[   29.526057]  kasan_save_alloc_info+0x3b/0x50
[   29.526467]  __kasan_kmalloc+0xb7/0xc0
[   29.526790]  __kmalloc_cache_noprof+0x189/0x420
[   29.527196]  kasan_atomics+0x95/0x310
[   29.527512]  kunit_try_run_case+0x1a5/0x480
[   29.527873]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.528177]  kthread+0x337/0x6f0
[   29.528391]  ret_from_fork+0x116/0x1d0
[   29.528728]  ret_from_fork_asm+0x1a/0x30
[   29.529088] 
[   29.529308] The buggy address belongs to the object at ffff888102338080
[   29.529308]  which belongs to the cache kmalloc-64 of size 64
[   29.529732] The buggy address is located 0 bytes to the right of
[   29.529732]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.530202] 
[   29.530320] The buggy address belongs to the physical page:
[   29.530655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.531306] flags: 0x200000000000000(node=0|zone=2)
[   29.531733] page_type: f5(slab)
[   29.532028] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.532633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.533252] page dumped because: kasan: bad access detected
[   29.533683] 
[   29.533850] Memory state around the buggy address:
[   29.534242]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.534592]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.535110] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.535516]                                      ^
[   29.535705]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.535974]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.536549] ==================================================================
[   30.097424] ==================================================================
[   30.098403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   30.099178] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   30.099848] 
[   30.100145] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.100281] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.100313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.100365] Call Trace:
[   30.100436]  <TASK>
[   30.100499]  dump_stack_lvl+0x73/0xb0
[   30.100574]  print_report+0xd1/0x650
[   30.100608]  ? __virt_addr_valid+0x1db/0x2d0
[   30.100638]  ? kasan_atomics_helper+0x1d7a/0x5450
[   30.100663]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.100693]  ? kasan_atomics_helper+0x1d7a/0x5450
[   30.100726]  kasan_report+0x141/0x180
[   30.100768]  ? kasan_atomics_helper+0x1d7a/0x5450
[   30.100804]  kasan_check_range+0x10c/0x1c0
[   30.100831]  __kasan_check_write+0x18/0x20
[   30.100859]  kasan_atomics_helper+0x1d7a/0x5450
[   30.100884]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.100908]  ? __kmalloc_cache_noprof+0x189/0x420
[   30.100937]  ? kasan_atomics+0x152/0x310
[   30.100967]  kasan_atomics+0x1dc/0x310
[   30.100992]  ? __pfx_kasan_atomics+0x10/0x10
[   30.101019]  ? __pfx_read_tsc+0x10/0x10
[   30.101045]  ? ktime_get_ts64+0x86/0x230
[   30.101076]  kunit_try_run_case+0x1a5/0x480
[   30.101105]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.101130]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.101167]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.101203]  ? __kthread_parkme+0x82/0x180
[   30.101228]  ? preempt_count_sub+0x50/0x80
[   30.101255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.101282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.101309]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.101336]  kthread+0x337/0x6f0
[   30.101358]  ? trace_preempt_on+0x20/0xc0
[   30.101385]  ? __pfx_kthread+0x10/0x10
[   30.101409]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.101432]  ? calculate_sigpending+0x7b/0xa0
[   30.101484]  ? __pfx_kthread+0x10/0x10
[   30.101509]  ret_from_fork+0x116/0x1d0
[   30.101532]  ? __pfx_kthread+0x10/0x10
[   30.101555]  ret_from_fork_asm+0x1a/0x30
[   30.101590]  </TASK>
[   30.101604] 
[   30.114343] Allocated by task 294:
[   30.114889]  kasan_save_stack+0x45/0x70
[   30.115407]  kasan_save_track+0x18/0x40
[   30.115689]  kasan_save_alloc_info+0x3b/0x50
[   30.116192]  __kasan_kmalloc+0xb7/0xc0
[   30.116639]  __kmalloc_cache_noprof+0x189/0x420
[   30.116928]  kasan_atomics+0x95/0x310
[   30.117087]  kunit_try_run_case+0x1a5/0x480
[   30.117497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.118466]  kthread+0x337/0x6f0
[   30.118757]  ret_from_fork+0x116/0x1d0
[   30.118909]  ret_from_fork_asm+0x1a/0x30
[   30.119169] 
[   30.119509] The buggy address belongs to the object at ffff888102338080
[   30.119509]  which belongs to the cache kmalloc-64 of size 64
[   30.120530] The buggy address is located 0 bytes to the right of
[   30.120530]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   30.121334] 
[   30.121906] The buggy address belongs to the physical page:
[   30.122206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   30.122756] flags: 0x200000000000000(node=0|zone=2)
[   30.123323] page_type: f5(slab)
[   30.123665] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.124072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.124794] page dumped because: kasan: bad access detected
[   30.125223] 
[   30.125359] Memory state around the buggy address:
[   30.125758]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.126651]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.127337] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.127686]                                      ^
[   30.128123]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.128875]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.129184] ==================================================================
[   28.832885] ==================================================================
[   28.834341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   28.835213] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   28.835712] 
[   28.835912] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.836025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.836054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.836102] Call Trace:
[   28.836144]  <TASK>
[   28.836185]  dump_stack_lvl+0x73/0xb0
[   28.836253]  print_report+0xd1/0x650
[   28.836303]  ? __virt_addr_valid+0x1db/0x2d0
[   28.836355]  ? kasan_atomics_helper+0x697/0x5450
[   28.836402]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.836466]  ? kasan_atomics_helper+0x697/0x5450
[   28.836517]  kasan_report+0x141/0x180
[   28.836562]  ? kasan_atomics_helper+0x697/0x5450
[   28.836617]  kasan_check_range+0x10c/0x1c0
[   28.836671]  __kasan_check_write+0x18/0x20
[   28.836721]  kasan_atomics_helper+0x697/0x5450
[   28.836765]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.836792]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.836822]  ? kasan_atomics+0x152/0x310
[   28.836851]  kasan_atomics+0x1dc/0x310
[   28.836882]  ? __pfx_kasan_atomics+0x10/0x10
[   28.836925]  ? __pfx_read_tsc+0x10/0x10
[   28.836967]  ? ktime_get_ts64+0x86/0x230
[   28.837026]  kunit_try_run_case+0x1a5/0x480
[   28.837078]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.837127]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.837175]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.837218]  ? __kthread_parkme+0x82/0x180
[   28.837262]  ? preempt_count_sub+0x50/0x80
[   28.837310]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.837355]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.837401]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.837463]  kthread+0x337/0x6f0
[   28.837513]  ? trace_preempt_on+0x20/0xc0
[   28.837569]  ? __pfx_kthread+0x10/0x10
[   28.837611]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.837642]  ? calculate_sigpending+0x7b/0xa0
[   28.837671]  ? __pfx_kthread+0x10/0x10
[   28.837696]  ret_from_fork+0x116/0x1d0
[   28.837718]  ? __pfx_kthread+0x10/0x10
[   28.837742]  ret_from_fork_asm+0x1a/0x30
[   28.837777]  </TASK>
[   28.837792] 
[   28.848944] Allocated by task 294:
[   28.849346]  kasan_save_stack+0x45/0x70
[   28.849773]  kasan_save_track+0x18/0x40
[   28.850050]  kasan_save_alloc_info+0x3b/0x50
[   28.850293]  __kasan_kmalloc+0xb7/0xc0
[   28.850480]  __kmalloc_cache_noprof+0x189/0x420
[   28.850682]  kasan_atomics+0x95/0x310
[   28.851009]  kunit_try_run_case+0x1a5/0x480
[   28.851265]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.851484]  kthread+0x337/0x6f0
[   28.851664]  ret_from_fork+0x116/0x1d0
[   28.851826]  ret_from_fork_asm+0x1a/0x30
[   28.852129] 
[   28.852295] The buggy address belongs to the object at ffff888102338080
[   28.852295]  which belongs to the cache kmalloc-64 of size 64
[   28.852879] The buggy address is located 0 bytes to the right of
[   28.852879]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   28.853590] 
[   28.853756] The buggy address belongs to the physical page:
[   28.854049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   28.854371] flags: 0x200000000000000(node=0|zone=2)
[   28.854608] page_type: f5(slab)
[   28.854780] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.855351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.855936] page dumped because: kasan: bad access detected
[   28.856412] 
[   28.856542] Memory state around the buggy address:
[   28.856749]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.857129]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.857651] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.858016]                                      ^
[   28.858386]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.858832]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.859190] ==================================================================
[   29.829951] ==================================================================
[   29.830873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   29.831196] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.831819] 
[   29.832047] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.832161] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.832194] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.832314] Call Trace:
[   29.832361]  <TASK>
[   29.832408]  dump_stack_lvl+0x73/0xb0
[   29.832492]  print_report+0xd1/0x650
[   29.832544]  ? __virt_addr_valid+0x1db/0x2d0
[   29.832601]  ? kasan_atomics_helper+0x1818/0x5450
[   29.832648]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.832709]  ? kasan_atomics_helper+0x1818/0x5450
[   29.832762]  kasan_report+0x141/0x180
[   29.832815]  ? kasan_atomics_helper+0x1818/0x5450
[   29.832876]  kasan_check_range+0x10c/0x1c0
[   29.832934]  __kasan_check_write+0x18/0x20
[   29.832989]  kasan_atomics_helper+0x1818/0x5450
[   29.833040]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.833093]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.833153]  ? kasan_atomics+0x152/0x310
[   29.833206]  kasan_atomics+0x1dc/0x310
[   29.833253]  ? __pfx_kasan_atomics+0x10/0x10
[   29.833296]  ? __pfx_read_tsc+0x10/0x10
[   29.833337]  ? ktime_get_ts64+0x86/0x230
[   29.833393]  kunit_try_run_case+0x1a5/0x480
[   29.833527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.833623]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.833717]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.833771]  ? __kthread_parkme+0x82/0x180
[   29.833873]  ? preempt_count_sub+0x50/0x80
[   29.833971]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.834050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.834108]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.834160]  kthread+0x337/0x6f0
[   29.834207]  ? trace_preempt_on+0x20/0xc0
[   29.834263]  ? __pfx_kthread+0x10/0x10
[   29.834314]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.834366]  ? calculate_sigpending+0x7b/0xa0
[   29.834425]  ? __pfx_kthread+0x10/0x10
[   29.834491]  ret_from_fork+0x116/0x1d0
[   29.834540]  ? __pfx_kthread+0x10/0x10
[   29.834592]  ret_from_fork_asm+0x1a/0x30
[   29.834669]  </TASK>
[   29.834701] 
[   29.846089] Allocated by task 294:
[   29.846593]  kasan_save_stack+0x45/0x70
[   29.847076]  kasan_save_track+0x18/0x40
[   29.847475]  kasan_save_alloc_info+0x3b/0x50
[   29.847949]  __kasan_kmalloc+0xb7/0xc0
[   29.848497]  __kmalloc_cache_noprof+0x189/0x420
[   29.848885]  kasan_atomics+0x95/0x310
[   29.849309]  kunit_try_run_case+0x1a5/0x480
[   29.849529]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.849758]  kthread+0x337/0x6f0
[   29.849933]  ret_from_fork+0x116/0x1d0
[   29.850122]  ret_from_fork_asm+0x1a/0x30
[   29.850523] 
[   29.850815] The buggy address belongs to the object at ffff888102338080
[   29.850815]  which belongs to the cache kmalloc-64 of size 64
[   29.852099] The buggy address is located 0 bytes to the right of
[   29.852099]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.852666] 
[   29.852791] The buggy address belongs to the physical page:
[   29.853009] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.853521] flags: 0x200000000000000(node=0|zone=2)
[   29.854249] page_type: f5(slab)
[   29.854693] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.855392] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.855968] page dumped because: kasan: bad access detected
[   29.856481] 
[   29.856612] Memory state around the buggy address:
[   29.856840]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.857522]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.857891] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.858633]                                      ^
[   29.858993]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.859372]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.859970] ==================================================================
[   28.684458] ==================================================================
[   28.684748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   28.686014] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   28.686756] 
[   28.687007] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.687144] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.687193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.687241] Call Trace:
[   28.687287]  <TASK>
[   28.687333]  dump_stack_lvl+0x73/0xb0
[   28.687416]  print_report+0xd1/0x650
[   28.687483]  ? __virt_addr_valid+0x1db/0x2d0
[   28.687520]  ? kasan_atomics_helper+0x4b54/0x5450
[   28.687546]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.687576]  ? kasan_atomics_helper+0x4b54/0x5450
[   28.687602]  kasan_report+0x141/0x180
[   28.687626]  ? kasan_atomics_helper+0x4b54/0x5450
[   28.687656]  __asan_report_load4_noabort+0x18/0x20
[   28.687683]  kasan_atomics_helper+0x4b54/0x5450
[   28.687708]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.687734]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.687763]  ? kasan_atomics+0x152/0x310
[   28.687792]  kasan_atomics+0x1dc/0x310
[   28.687817]  ? __pfx_kasan_atomics+0x10/0x10
[   28.687845]  ? __pfx_read_tsc+0x10/0x10
[   28.687870]  ? ktime_get_ts64+0x86/0x230
[   28.687901]  kunit_try_run_case+0x1a5/0x480
[   28.687930]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.687956]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.687982]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.688007]  ? __kthread_parkme+0x82/0x180
[   28.688032]  ? preempt_count_sub+0x50/0x80
[   28.688059]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.688088]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.688115]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.688143]  kthread+0x337/0x6f0
[   28.688177]  ? trace_preempt_on+0x20/0xc0
[   28.688210]  ? __pfx_kthread+0x10/0x10
[   28.688235]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.688259]  ? calculate_sigpending+0x7b/0xa0
[   28.688287]  ? __pfx_kthread+0x10/0x10
[   28.688312]  ret_from_fork+0x116/0x1d0
[   28.688334]  ? __pfx_kthread+0x10/0x10
[   28.688357]  ret_from_fork_asm+0x1a/0x30
[   28.688393]  </TASK>
[   28.688409] 
[   28.699647] Allocated by task 294:
[   28.700063]  kasan_save_stack+0x45/0x70
[   28.700522]  kasan_save_track+0x18/0x40
[   28.700848]  kasan_save_alloc_info+0x3b/0x50
[   28.701244]  __kasan_kmalloc+0xb7/0xc0
[   28.701593]  __kmalloc_cache_noprof+0x189/0x420
[   28.701949]  kasan_atomics+0x95/0x310
[   28.702363]  kunit_try_run_case+0x1a5/0x480
[   28.702655]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.703087]  kthread+0x337/0x6f0
[   28.703507]  ret_from_fork+0x116/0x1d0
[   28.703935]  ret_from_fork_asm+0x1a/0x30
[   28.704372] 
[   28.704563] The buggy address belongs to the object at ffff888102338080
[   28.704563]  which belongs to the cache kmalloc-64 of size 64
[   28.705340] The buggy address is located 0 bytes to the right of
[   28.705340]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   28.706351] 
[   28.706564] The buggy address belongs to the physical page:
[   28.707032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   28.707461] flags: 0x200000000000000(node=0|zone=2)
[   28.707867] page_type: f5(slab)
[   28.708185] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.708711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.709299] page dumped because: kasan: bad access detected
[   28.709706] 
[   28.709813] Memory state around the buggy address:
[   28.710204]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.710631]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.711190] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.711534]                                      ^
[   28.711932]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.712358]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.712833] ==================================================================
[   28.861560] ==================================================================
[   28.862548] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   28.862928] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   28.863504] 
[   28.863712] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.863823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.863852] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.863901] Call Trace:
[   28.863947]  <TASK>
[   28.863991]  dump_stack_lvl+0x73/0xb0
[   28.864061]  print_report+0xd1/0x650
[   28.864115]  ? __virt_addr_valid+0x1db/0x2d0
[   28.864164]  ? kasan_atomics_helper+0x72f/0x5450
[   28.864205]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.864256]  ? kasan_atomics_helper+0x72f/0x5450
[   28.864301]  kasan_report+0x141/0x180
[   28.864344]  ? kasan_atomics_helper+0x72f/0x5450
[   28.864401]  kasan_check_range+0x10c/0x1c0
[   28.864465]  __kasan_check_write+0x18/0x20
[   28.864518]  kasan_atomics_helper+0x72f/0x5450
[   28.864567]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.864617]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.864677]  ? kasan_atomics+0x152/0x310
[   28.864739]  kasan_atomics+0x1dc/0x310
[   28.864785]  ? __pfx_kasan_atomics+0x10/0x10
[   28.864832]  ? __pfx_read_tsc+0x10/0x10
[   28.864877]  ? ktime_get_ts64+0x86/0x230
[   28.864932]  kunit_try_run_case+0x1a5/0x480
[   28.864990]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.865044]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.865099]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.865153]  ? __kthread_parkme+0x82/0x180
[   28.865204]  ? preempt_count_sub+0x50/0x80
[   28.865246]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.865286]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.865326]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.865364]  kthread+0x337/0x6f0
[   28.865398]  ? trace_preempt_on+0x20/0xc0
[   28.865437]  ? __pfx_kthread+0x10/0x10
[   28.865490]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.865515]  ? calculate_sigpending+0x7b/0xa0
[   28.865543]  ? __pfx_kthread+0x10/0x10
[   28.865567]  ret_from_fork+0x116/0x1d0
[   28.865590]  ? __pfx_kthread+0x10/0x10
[   28.865613]  ret_from_fork_asm+0x1a/0x30
[   28.865648]  </TASK>
[   28.865664] 
[   28.878008] Allocated by task 294:
[   28.878247]  kasan_save_stack+0x45/0x70
[   28.878491]  kasan_save_track+0x18/0x40
[   28.878793]  kasan_save_alloc_info+0x3b/0x50
[   28.879154]  __kasan_kmalloc+0xb7/0xc0
[   28.879429]  __kmalloc_cache_noprof+0x189/0x420
[   28.879645]  kasan_atomics+0x95/0x310
[   28.879936]  kunit_try_run_case+0x1a5/0x480
[   28.880333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.880616]  kthread+0x337/0x6f0
[   28.880832]  ret_from_fork+0x116/0x1d0
[   28.881089]  ret_from_fork_asm+0x1a/0x30
[   28.881384] 
[   28.881556] The buggy address belongs to the object at ffff888102338080
[   28.881556]  which belongs to the cache kmalloc-64 of size 64
[   28.882160] The buggy address is located 0 bytes to the right of
[   28.882160]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   28.882700] 
[   28.882827] The buggy address belongs to the physical page:
[   28.883198] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   28.883889] flags: 0x200000000000000(node=0|zone=2)
[   28.884226] page_type: f5(slab)
[   28.884517] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.884851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.885495] page dumped because: kasan: bad access detected
[   28.885715] 
[   28.885819] Memory state around the buggy address:
[   28.886019]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.886288]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.886868] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.887401]                                      ^
[   28.887854]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.888447]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.888697] ==================================================================
[   29.769104] ==================================================================
[   29.769753] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   29.770127] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.770635] 
[   29.770861] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.771066] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.771149] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.771243] Call Trace:
[   29.771304]  <TASK>
[   29.771353]  dump_stack_lvl+0x73/0xb0
[   29.771423]  print_report+0xd1/0x650
[   29.771489]  ? __virt_addr_valid+0x1db/0x2d0
[   29.771547]  ? kasan_atomics_helper+0x16e7/0x5450
[   29.771601]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.771664]  ? kasan_atomics_helper+0x16e7/0x5450
[   29.771716]  kasan_report+0x141/0x180
[   29.771772]  ? kasan_atomics_helper+0x16e7/0x5450
[   29.771833]  kasan_check_range+0x10c/0x1c0
[   29.771890]  __kasan_check_write+0x18/0x20
[   29.771945]  kasan_atomics_helper+0x16e7/0x5450
[   29.772002]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.772047]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.772101]  ? kasan_atomics+0x152/0x310
[   29.772156]  kasan_atomics+0x1dc/0x310
[   29.772206]  ? __pfx_kasan_atomics+0x10/0x10
[   29.772263]  ? __pfx_read_tsc+0x10/0x10
[   29.772316]  ? ktime_get_ts64+0x86/0x230
[   29.772379]  kunit_try_run_case+0x1a5/0x480
[   29.772448]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.772504]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.772552]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.772581]  ? __kthread_parkme+0x82/0x180
[   29.772607]  ? preempt_count_sub+0x50/0x80
[   29.772634]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.772661]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.772688]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.772715]  kthread+0x337/0x6f0
[   29.772738]  ? trace_preempt_on+0x20/0xc0
[   29.772765]  ? __pfx_kthread+0x10/0x10
[   29.772789]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.772814]  ? calculate_sigpending+0x7b/0xa0
[   29.772842]  ? __pfx_kthread+0x10/0x10
[   29.772866]  ret_from_fork+0x116/0x1d0
[   29.772890]  ? __pfx_kthread+0x10/0x10
[   29.772913]  ret_from_fork_asm+0x1a/0x30
[   29.772947]  </TASK>
[   29.772963] 
[   29.784264] Allocated by task 294:
[   29.784722]  kasan_save_stack+0x45/0x70
[   29.785184]  kasan_save_track+0x18/0x40
[   29.785492]  kasan_save_alloc_info+0x3b/0x50
[   29.785696]  __kasan_kmalloc+0xb7/0xc0
[   29.785875]  __kmalloc_cache_noprof+0x189/0x420
[   29.786088]  kasan_atomics+0x95/0x310
[   29.786571]  kunit_try_run_case+0x1a5/0x480
[   29.787062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.787552]  kthread+0x337/0x6f0
[   29.787902]  ret_from_fork+0x116/0x1d0
[   29.788386]  ret_from_fork_asm+0x1a/0x30
[   29.788742] 
[   29.788966] The buggy address belongs to the object at ffff888102338080
[   29.788966]  which belongs to the cache kmalloc-64 of size 64
[   29.789540] The buggy address is located 0 bytes to the right of
[   29.789540]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.789965] 
[   29.790092] The buggy address belongs to the physical page:
[   29.790668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.791423] flags: 0x200000000000000(node=0|zone=2)
[   29.791955] page_type: f5(slab)
[   29.792387] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.793058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.793746] page dumped because: kasan: bad access detected
[   29.794264] 
[   29.794457] Memory state around the buggy address:
[   29.794982]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.795392]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.795664] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.795926]                                      ^
[   29.796125]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.796680]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.797196] ==================================================================
[   29.679618] ==================================================================
[   29.680049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   29.681541] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.682372] 
[   29.682841] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.682935] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.682953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.682982] Call Trace:
[   29.683008]  <TASK>
[   29.683036]  dump_stack_lvl+0x73/0xb0
[   29.683085]  print_report+0xd1/0x650
[   29.683112]  ? __virt_addr_valid+0x1db/0x2d0
[   29.683142]  ? kasan_atomics_helper+0x151d/0x5450
[   29.683183]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.683235]  ? kasan_atomics_helper+0x151d/0x5450
[   29.683284]  kasan_report+0x141/0x180
[   29.683336]  ? kasan_atomics_helper+0x151d/0x5450
[   29.683370]  kasan_check_range+0x10c/0x1c0
[   29.683398]  __kasan_check_write+0x18/0x20
[   29.683425]  kasan_atomics_helper+0x151d/0x5450
[   29.683472]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.683500]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.683531]  ? kasan_atomics+0x152/0x310
[   29.683561]  kasan_atomics+0x1dc/0x310
[   29.683587]  ? __pfx_kasan_atomics+0x10/0x10
[   29.683614]  ? __pfx_read_tsc+0x10/0x10
[   29.683640]  ? ktime_get_ts64+0x86/0x230
[   29.683670]  kunit_try_run_case+0x1a5/0x480
[   29.683700]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.683725]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.683751]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.683777]  ? __kthread_parkme+0x82/0x180
[   29.683801]  ? preempt_count_sub+0x50/0x80
[   29.683828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.683854]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.683880]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.683907]  kthread+0x337/0x6f0
[   29.683929]  ? trace_preempt_on+0x20/0xc0
[   29.683955]  ? __pfx_kthread+0x10/0x10
[   29.683978]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.684002]  ? calculate_sigpending+0x7b/0xa0
[   29.684029]  ? __pfx_kthread+0x10/0x10
[   29.684054]  ret_from_fork+0x116/0x1d0
[   29.684076]  ? __pfx_kthread+0x10/0x10
[   29.684099]  ret_from_fork_asm+0x1a/0x30
[   29.684135]  </TASK>
[   29.684158] 
[   29.696155] Allocated by task 294:
[   29.696351]  kasan_save_stack+0x45/0x70
[   29.696595]  kasan_save_track+0x18/0x40
[   29.696818]  kasan_save_alloc_info+0x3b/0x50
[   29.697046]  __kasan_kmalloc+0xb7/0xc0
[   29.698224]  __kmalloc_cache_noprof+0x189/0x420
[   29.698506]  kasan_atomics+0x95/0x310
[   29.698684]  kunit_try_run_case+0x1a5/0x480
[   29.699034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.699487]  kthread+0x337/0x6f0
[   29.700134]  ret_from_fork+0x116/0x1d0
[   29.700544]  ret_from_fork_asm+0x1a/0x30
[   29.700919] 
[   29.701108] The buggy address belongs to the object at ffff888102338080
[   29.701108]  which belongs to the cache kmalloc-64 of size 64
[   29.701919] The buggy address is located 0 bytes to the right of
[   29.701919]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.702778] 
[   29.703008] The buggy address belongs to the physical page:
[   29.703640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.704171] flags: 0x200000000000000(node=0|zone=2)
[   29.704621] page_type: f5(slab)
[   29.704833] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.705426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.705869] page dumped because: kasan: bad access detected
[   29.706199] 
[   29.706330] Memory state around the buggy address:
[   29.706543]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.707070]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.707498] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.708061]                                      ^
[   29.708314]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.708774]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.709352] ==================================================================
[   30.363208] ==================================================================
[   30.364271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   30.364656] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   30.365183] 
[   30.365399] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.365542] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.365574] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.365626] Call Trace:
[   30.365673]  <TASK>
[   30.365720]  dump_stack_lvl+0x73/0xb0
[   30.365788]  print_report+0xd1/0x650
[   30.365862]  ? __virt_addr_valid+0x1db/0x2d0
[   30.365917]  ? kasan_atomics_helper+0x218a/0x5450
[   30.365966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.366034]  ? kasan_atomics_helper+0x218a/0x5450
[   30.366085]  kasan_report+0x141/0x180
[   30.366156]  ? kasan_atomics_helper+0x218a/0x5450
[   30.366212]  kasan_check_range+0x10c/0x1c0
[   30.366270]  __kasan_check_write+0x18/0x20
[   30.366316]  kasan_atomics_helper+0x218a/0x5450
[   30.366367]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.366437]  ? __kmalloc_cache_noprof+0x189/0x420
[   30.366504]  ? kasan_atomics+0x152/0x310
[   30.366563]  kasan_atomics+0x1dc/0x310
[   30.366610]  ? __pfx_kasan_atomics+0x10/0x10
[   30.366642]  ? __pfx_read_tsc+0x10/0x10
[   30.366676]  ? ktime_get_ts64+0x86/0x230
[   30.366726]  kunit_try_run_case+0x1a5/0x480
[   30.366779]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.366847]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.366901]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.366950]  ? __kthread_parkme+0x82/0x180
[   30.366998]  ? preempt_count_sub+0x50/0x80
[   30.367051]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.367122]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.367170]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.367220]  kthread+0x337/0x6f0
[   30.367261]  ? trace_preempt_on+0x20/0xc0
[   30.367306]  ? __pfx_kthread+0x10/0x10
[   30.367350]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.367392]  ? calculate_sigpending+0x7b/0xa0
[   30.367429]  ? __pfx_kthread+0x10/0x10
[   30.367475]  ret_from_fork+0x116/0x1d0
[   30.367500]  ? __pfx_kthread+0x10/0x10
[   30.367523]  ret_from_fork_asm+0x1a/0x30
[   30.367559]  </TASK>
[   30.367574] 
[   30.379042] Allocated by task 294:
[   30.379305]  kasan_save_stack+0x45/0x70
[   30.379546]  kasan_save_track+0x18/0x40
[   30.379866]  kasan_save_alloc_info+0x3b/0x50
[   30.380315]  __kasan_kmalloc+0xb7/0xc0
[   30.380684]  __kmalloc_cache_noprof+0x189/0x420
[   30.381075]  kasan_atomics+0x95/0x310
[   30.381523]  kunit_try_run_case+0x1a5/0x480
[   30.381906]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.382461]  kthread+0x337/0x6f0
[   30.382822]  ret_from_fork+0x116/0x1d0
[   30.383244]  ret_from_fork_asm+0x1a/0x30
[   30.383549] 
[   30.383702] The buggy address belongs to the object at ffff888102338080
[   30.383702]  which belongs to the cache kmalloc-64 of size 64
[   30.384704] The buggy address is located 0 bytes to the right of
[   30.384704]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   30.385464] 
[   30.385662] The buggy address belongs to the physical page:
[   30.385945] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   30.386448] flags: 0x200000000000000(node=0|zone=2)
[   30.386769] page_type: f5(slab)
[   30.386928] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.387534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.387887] page dumped because: kasan: bad access detected
[   30.388283] 
[   30.388463] Memory state around the buggy address:
[   30.388773]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.389214]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.389611] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.390166]                                      ^
[   30.390461]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.390914]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.391430] ==================================================================
[   29.453131] ==================================================================
[   29.454592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   29.455062] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.455720] 
[   29.455908] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.456013] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.456045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.456096] Call Trace:
[   29.456143]  <TASK>
[   29.456190]  dump_stack_lvl+0x73/0xb0
[   29.456266]  print_report+0xd1/0x650
[   29.456314]  ? __virt_addr_valid+0x1db/0x2d0
[   29.456366]  ? kasan_atomics_helper+0x1217/0x5450
[   29.456411]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.456522]  ? kasan_atomics_helper+0x1217/0x5450
[   29.456570]  kasan_report+0x141/0x180
[   29.456619]  ? kasan_atomics_helper+0x1217/0x5450
[   29.456674]  kasan_check_range+0x10c/0x1c0
[   29.456721]  __kasan_check_write+0x18/0x20
[   29.456773]  kasan_atomics_helper+0x1217/0x5450
[   29.456866]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.456917]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.456972]  ? kasan_atomics+0x152/0x310
[   29.457032]  kasan_atomics+0x1dc/0x310
[   29.457120]  ? __pfx_kasan_atomics+0x10/0x10
[   29.457170]  ? __pfx_read_tsc+0x10/0x10
[   29.457218]  ? ktime_get_ts64+0x86/0x230
[   29.457272]  kunit_try_run_case+0x1a5/0x480
[   29.457315]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.457341]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.457368]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.457394]  ? __kthread_parkme+0x82/0x180
[   29.457420]  ? preempt_count_sub+0x50/0x80
[   29.457470]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.457500]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.457529]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.457557]  kthread+0x337/0x6f0
[   29.457580]  ? trace_preempt_on+0x20/0xc0
[   29.457608]  ? __pfx_kthread+0x10/0x10
[   29.457631]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.457656]  ? calculate_sigpending+0x7b/0xa0
[   29.457684]  ? __pfx_kthread+0x10/0x10
[   29.457709]  ret_from_fork+0x116/0x1d0
[   29.457730]  ? __pfx_kthread+0x10/0x10
[   29.457754]  ret_from_fork_asm+0x1a/0x30
[   29.457789]  </TASK>
[   29.457806] 
[   29.469784] Allocated by task 294:
[   29.470130]  kasan_save_stack+0x45/0x70
[   29.470571]  kasan_save_track+0x18/0x40
[   29.470793]  kasan_save_alloc_info+0x3b/0x50
[   29.471140]  __kasan_kmalloc+0xb7/0xc0
[   29.471494]  __kmalloc_cache_noprof+0x189/0x420
[   29.471902]  kasan_atomics+0x95/0x310
[   29.472083]  kunit_try_run_case+0x1a5/0x480
[   29.472275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.472649]  kthread+0x337/0x6f0
[   29.472992]  ret_from_fork+0x116/0x1d0
[   29.473425]  ret_from_fork_asm+0x1a/0x30
[   29.473788] 
[   29.473985] The buggy address belongs to the object at ffff888102338080
[   29.473985]  which belongs to the cache kmalloc-64 of size 64
[   29.474972] The buggy address is located 0 bytes to the right of
[   29.474972]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.475915] 
[   29.476113] The buggy address belongs to the physical page:
[   29.476370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.476686] flags: 0x200000000000000(node=0|zone=2)
[   29.476908] page_type: f5(slab)
[   29.477138] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.477764] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.478339] page dumped because: kasan: bad access detected
[   29.478777] 
[   29.478944] Memory state around the buggy address:
[   29.479285]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.480396]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.480691] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.480958]                                      ^
[   29.481160]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.481426]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.481788] ==================================================================
[   29.651019] ==================================================================
[   29.651613] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   29.652007] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.652546] 
[   29.652766] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.652920] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.652971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.653024] Call Trace:
[   29.653074]  <TASK>
[   29.653119]  dump_stack_lvl+0x73/0xb0
[   29.653268]  print_report+0xd1/0x650
[   29.653350]  ? __virt_addr_valid+0x1db/0x2d0
[   29.653421]  ? kasan_atomics_helper+0x50d4/0x5450
[   29.653482]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.653538]  ? kasan_atomics_helper+0x50d4/0x5450
[   29.653588]  kasan_report+0x141/0x180
[   29.653690]  ? kasan_atomics_helper+0x50d4/0x5450
[   29.653757]  __asan_report_store8_noabort+0x1b/0x30
[   29.653818]  kasan_atomics_helper+0x50d4/0x5450
[   29.653871]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.653923]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.654021]  ? kasan_atomics+0x152/0x310
[   29.654097]  kasan_atomics+0x1dc/0x310
[   29.654157]  ? __pfx_kasan_atomics+0x10/0x10
[   29.654206]  ? __pfx_read_tsc+0x10/0x10
[   29.654235]  ? ktime_get_ts64+0x86/0x230
[   29.654267]  kunit_try_run_case+0x1a5/0x480
[   29.654298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.654325]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.654352]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.654378]  ? __kthread_parkme+0x82/0x180
[   29.654403]  ? preempt_count_sub+0x50/0x80
[   29.654430]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.654483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.654511]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.654538]  kthread+0x337/0x6f0
[   29.654560]  ? trace_preempt_on+0x20/0xc0
[   29.654588]  ? __pfx_kthread+0x10/0x10
[   29.654612]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.654636]  ? calculate_sigpending+0x7b/0xa0
[   29.654664]  ? __pfx_kthread+0x10/0x10
[   29.654688]  ret_from_fork+0x116/0x1d0
[   29.654711]  ? __pfx_kthread+0x10/0x10
[   29.654734]  ret_from_fork_asm+0x1a/0x30
[   29.654770]  </TASK>
[   29.654786] 
[   29.666339] Allocated by task 294:
[   29.666795]  kasan_save_stack+0x45/0x70
[   29.667180]  kasan_save_track+0x18/0x40
[   29.667521]  kasan_save_alloc_info+0x3b/0x50
[   29.667837]  __kasan_kmalloc+0xb7/0xc0
[   29.668108]  __kmalloc_cache_noprof+0x189/0x420
[   29.668527]  kasan_atomics+0x95/0x310
[   29.668734]  kunit_try_run_case+0x1a5/0x480
[   29.669138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.669405]  kthread+0x337/0x6f0
[   29.669673]  ret_from_fork+0x116/0x1d0
[   29.669935]  ret_from_fork_asm+0x1a/0x30
[   29.670375] 
[   29.670582] The buggy address belongs to the object at ffff888102338080
[   29.670582]  which belongs to the cache kmalloc-64 of size 64
[   29.671575] The buggy address is located 0 bytes to the right of
[   29.671575]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.672295] 
[   29.672411] The buggy address belongs to the physical page:
[   29.672639] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.672944] flags: 0x200000000000000(node=0|zone=2)
[   29.673141] page_type: f5(slab)
[   29.673426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.673918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.674406] page dumped because: kasan: bad access detected
[   29.674692] 
[   29.674840] Memory state around the buggy address:
[   29.675108]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.675605]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.676012] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.676415]                                      ^
[   29.676777]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.677191]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.677625] ==================================================================
[   30.246846] ==================================================================
[   30.247889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   30.248660] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   30.249284] 
[   30.249542] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.249676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.249710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.249762] Call Trace:
[   30.249811]  <TASK>
[   30.249855]  dump_stack_lvl+0x73/0xb0
[   30.249929]  print_report+0xd1/0x650
[   30.249985]  ? __virt_addr_valid+0x1db/0x2d0
[   30.250053]  ? kasan_atomics_helper+0x2006/0x5450
[   30.250106]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.250163]  ? kasan_atomics_helper+0x2006/0x5450
[   30.250211]  kasan_report+0x141/0x180
[   30.250257]  ? kasan_atomics_helper+0x2006/0x5450
[   30.250315]  kasan_check_range+0x10c/0x1c0
[   30.250371]  __kasan_check_write+0x18/0x20
[   30.250426]  kasan_atomics_helper+0x2006/0x5450
[   30.250493]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.250547]  ? __kmalloc_cache_noprof+0x189/0x420
[   30.250602]  ? kasan_atomics+0x152/0x310
[   30.250698]  kasan_atomics+0x1dc/0x310
[   30.250768]  ? __pfx_kasan_atomics+0x10/0x10
[   30.250827]  ? __pfx_read_tsc+0x10/0x10
[   30.250880]  ? ktime_get_ts64+0x86/0x230
[   30.250947]  kunit_try_run_case+0x1a5/0x480
[   30.251010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.251064]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.251121]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.251169]  ? __kthread_parkme+0x82/0x180
[   30.251214]  ? preempt_count_sub+0x50/0x80
[   30.251258]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.251300]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.251349]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.251399]  kthread+0x337/0x6f0
[   30.251488]  ? trace_preempt_on+0x20/0xc0
[   30.251564]  ? __pfx_kthread+0x10/0x10
[   30.251618]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.251672]  ? calculate_sigpending+0x7b/0xa0
[   30.251729]  ? __pfx_kthread+0x10/0x10
[   30.251785]  ret_from_fork+0x116/0x1d0
[   30.251831]  ? __pfx_kthread+0x10/0x10
[   30.251883]  ret_from_fork_asm+0x1a/0x30
[   30.251955]  </TASK>
[   30.251987] 
[   30.265437] Allocated by task 294:
[   30.265803]  kasan_save_stack+0x45/0x70
[   30.266106]  kasan_save_track+0x18/0x40
[   30.266331]  kasan_save_alloc_info+0x3b/0x50
[   30.266540]  __kasan_kmalloc+0xb7/0xc0
[   30.266819]  __kmalloc_cache_noprof+0x189/0x420
[   30.267261]  kasan_atomics+0x95/0x310
[   30.267623]  kunit_try_run_case+0x1a5/0x480
[   30.267994]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.268349]  kthread+0x337/0x6f0
[   30.268574]  ret_from_fork+0x116/0x1d0
[   30.268922]  ret_from_fork_asm+0x1a/0x30
[   30.269279] 
[   30.269469] The buggy address belongs to the object at ffff888102338080
[   30.269469]  which belongs to the cache kmalloc-64 of size 64
[   30.270294] The buggy address is located 0 bytes to the right of
[   30.270294]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   30.271570] 
[   30.271947] The buggy address belongs to the physical page:
[   30.272225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   30.272842] flags: 0x200000000000000(node=0|zone=2)
[   30.273072] page_type: f5(slab)
[   30.273288] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.273742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.274372] page dumped because: kasan: bad access detected
[   30.274815] 
[   30.274978] Memory state around the buggy address:
[   30.275322]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.275681]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.275952] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.276477]                                      ^
[   30.276871]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.277455]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.277819] ==================================================================
[   29.153107] ==================================================================
[   29.153934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   29.154359] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.154700] 
[   29.154918] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.155057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.155081] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.155121] Call Trace:
[   29.155160]  <TASK>
[   29.155197]  dump_stack_lvl+0x73/0xb0
[   29.155248]  print_report+0xd1/0x650
[   29.155287]  ? __virt_addr_valid+0x1db/0x2d0
[   29.155332]  ? kasan_atomics_helper+0xd47/0x5450
[   29.155372]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.155425]  ? kasan_atomics_helper+0xd47/0x5450
[   29.155486]  kasan_report+0x141/0x180
[   29.155561]  ? kasan_atomics_helper+0xd47/0x5450
[   29.155631]  kasan_check_range+0x10c/0x1c0
[   29.155681]  __kasan_check_write+0x18/0x20
[   29.155722]  kasan_atomics_helper+0xd47/0x5450
[   29.155770]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.155818]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.155874]  ? kasan_atomics+0x152/0x310
[   29.155939]  kasan_atomics+0x1dc/0x310
[   29.155988]  ? __pfx_kasan_atomics+0x10/0x10
[   29.156044]  ? __pfx_read_tsc+0x10/0x10
[   29.156098]  ? ktime_get_ts64+0x86/0x230
[   29.156161]  kunit_try_run_case+0x1a5/0x480
[   29.156222]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.156275]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.156331]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.156388]  ? __kthread_parkme+0x82/0x180
[   29.156451]  ? preempt_count_sub+0x50/0x80
[   29.156514]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.156571]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.156629]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.156686]  kthread+0x337/0x6f0
[   29.156768]  ? trace_preempt_on+0x20/0xc0
[   29.156802]  ? __pfx_kthread+0x10/0x10
[   29.156827]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.156851]  ? calculate_sigpending+0x7b/0xa0
[   29.156880]  ? __pfx_kthread+0x10/0x10
[   29.156905]  ret_from_fork+0x116/0x1d0
[   29.156927]  ? __pfx_kthread+0x10/0x10
[   29.156950]  ret_from_fork_asm+0x1a/0x30
[   29.156985]  </TASK>
[   29.157001] 
[   29.166787] Allocated by task 294:
[   29.167071]  kasan_save_stack+0x45/0x70
[   29.167401]  kasan_save_track+0x18/0x40
[   29.167644]  kasan_save_alloc_info+0x3b/0x50
[   29.167874]  __kasan_kmalloc+0xb7/0xc0
[   29.168083]  __kmalloc_cache_noprof+0x189/0x420
[   29.168438]  kasan_atomics+0x95/0x310
[   29.168753]  kunit_try_run_case+0x1a5/0x480
[   29.169059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.169452]  kthread+0x337/0x6f0
[   29.169849]  ret_from_fork+0x116/0x1d0
[   29.170175]  ret_from_fork_asm+0x1a/0x30
[   29.170516] 
[   29.170671] The buggy address belongs to the object at ffff888102338080
[   29.170671]  which belongs to the cache kmalloc-64 of size 64
[   29.171097] The buggy address is located 0 bytes to the right of
[   29.171097]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.172085] 
[   29.172314] The buggy address belongs to the physical page:
[   29.172726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.173185] flags: 0x200000000000000(node=0|zone=2)
[   29.173489] page_type: f5(slab)
[   29.173769] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.174121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.174880] page dumped because: kasan: bad access detected
[   29.175334] 
[   29.175488] Memory state around the buggy address:
[   29.175698]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.175968]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.176233] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.176535]                                      ^
[   29.177027]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.177625]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.178167] ==================================================================
[   28.525519] ==================================================================
[   28.526710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   28.527383] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   28.528147] 
[   28.528335] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.528462] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.528490] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.528550] Call Trace:
[   28.528596]  <TASK>
[   28.528639]  dump_stack_lvl+0x73/0xb0
[   28.528849]  print_report+0xd1/0x650
[   28.528916]  ? __virt_addr_valid+0x1db/0x2d0
[   28.528975]  ? kasan_atomics_helper+0x4bbc/0x5450
[   28.529017]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.529067]  ? kasan_atomics_helper+0x4bbc/0x5450
[   28.529112]  kasan_report+0x141/0x180
[   28.529156]  ? kasan_atomics_helper+0x4bbc/0x5450
[   28.529215]  __asan_report_load4_noabort+0x18/0x20
[   28.529283]  kasan_atomics_helper+0x4bbc/0x5450
[   28.529336]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.529382]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.529451]  ? kasan_atomics+0x152/0x310
[   28.529524]  kasan_atomics+0x1dc/0x310
[   28.529576]  ? __pfx_kasan_atomics+0x10/0x10
[   28.529725]  ? __pfx_read_tsc+0x10/0x10
[   28.529754]  ? ktime_get_ts64+0x86/0x230
[   28.529786]  kunit_try_run_case+0x1a5/0x480
[   28.529816]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.529840]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.529867]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.529893]  ? __kthread_parkme+0x82/0x180
[   28.529917]  ? preempt_count_sub+0x50/0x80
[   28.529944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.529969]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.529994]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.530021]  kthread+0x337/0x6f0
[   28.530057]  ? trace_preempt_on+0x20/0xc0
[   28.530085]  ? __pfx_kthread+0x10/0x10
[   28.530109]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.530133]  ? calculate_sigpending+0x7b/0xa0
[   28.530170]  ? __pfx_kthread+0x10/0x10
[   28.530203]  ret_from_fork+0x116/0x1d0
[   28.530225]  ? __pfx_kthread+0x10/0x10
[   28.530248]  ret_from_fork_asm+0x1a/0x30
[   28.530282]  </TASK>
[   28.530297] 
[   28.544710] Allocated by task 294:
[   28.545020]  kasan_save_stack+0x45/0x70
[   28.545365]  kasan_save_track+0x18/0x40
[   28.545551]  kasan_save_alloc_info+0x3b/0x50
[   28.545754]  __kasan_kmalloc+0xb7/0xc0
[   28.546057]  __kmalloc_cache_noprof+0x189/0x420
[   28.547207]  kasan_atomics+0x95/0x310
[   28.547635]  kunit_try_run_case+0x1a5/0x480
[   28.547975]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.548429]  kthread+0x337/0x6f0
[   28.548743]  ret_from_fork+0x116/0x1d0
[   28.548906]  ret_from_fork_asm+0x1a/0x30
[   28.549162] 
[   28.549317] The buggy address belongs to the object at ffff888102338080
[   28.549317]  which belongs to the cache kmalloc-64 of size 64
[   28.550785] The buggy address is located 0 bytes to the right of
[   28.550785]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   28.551960] 
[   28.552097] The buggy address belongs to the physical page:
[   28.552626] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   28.553227] flags: 0x200000000000000(node=0|zone=2)
[   28.553861] page_type: f5(slab)
[   28.554052] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.554506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.555201] page dumped because: kasan: bad access detected
[   28.555700] 
[   28.555882] Memory state around the buggy address:
[   28.556142]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.556626]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.557234] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.557762]                                      ^
[   28.558339]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.558610]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.559149] ==================================================================
[   28.974454] ==================================================================
[   28.974958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   28.975172] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   28.975462] 
[   28.975708] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.975851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.975884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.975931] Call Trace:
[   28.975976]  <TASK>
[   28.976018]  dump_stack_lvl+0x73/0xb0
[   28.976089]  print_report+0xd1/0x650
[   28.976154]  ? __virt_addr_valid+0x1db/0x2d0
[   28.976226]  ? kasan_atomics_helper+0x992/0x5450
[   28.976280]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.976339]  ? kasan_atomics_helper+0x992/0x5450
[   28.976381]  kasan_report+0x141/0x180
[   28.976429]  ? kasan_atomics_helper+0x992/0x5450
[   28.976527]  kasan_check_range+0x10c/0x1c0
[   28.976577]  __kasan_check_write+0x18/0x20
[   28.976670]  kasan_atomics_helper+0x992/0x5450
[   28.976723]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.976793]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.976856]  ? kasan_atomics+0x152/0x310
[   28.976915]  kasan_atomics+0x1dc/0x310
[   28.976959]  ? __pfx_kasan_atomics+0x10/0x10
[   28.976992]  ? __pfx_read_tsc+0x10/0x10
[   28.977019]  ? ktime_get_ts64+0x86/0x230
[   28.977053]  kunit_try_run_case+0x1a5/0x480
[   28.977083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.977108]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.977137]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.977178]  ? __kthread_parkme+0x82/0x180
[   28.977211]  ? preempt_count_sub+0x50/0x80
[   28.977239]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.977266]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.977294]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.977320]  kthread+0x337/0x6f0
[   28.977343]  ? trace_preempt_on+0x20/0xc0
[   28.977370]  ? __pfx_kthread+0x10/0x10
[   28.977394]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.977419]  ? calculate_sigpending+0x7b/0xa0
[   28.977469]  ? __pfx_kthread+0x10/0x10
[   28.977497]  ret_from_fork+0x116/0x1d0
[   28.977519]  ? __pfx_kthread+0x10/0x10
[   28.977543]  ret_from_fork_asm+0x1a/0x30
[   28.977579]  </TASK>
[   28.977594] 
[   28.991246] Allocated by task 294:
[   28.991691]  kasan_save_stack+0x45/0x70
[   28.992096]  kasan_save_track+0x18/0x40
[   28.992534]  kasan_save_alloc_info+0x3b/0x50
[   28.993147]  __kasan_kmalloc+0xb7/0xc0
[   28.993496]  __kmalloc_cache_noprof+0x189/0x420
[   28.994067]  kasan_atomics+0x95/0x310
[   28.994374]  kunit_try_run_case+0x1a5/0x480
[   28.994625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.994959]  kthread+0x337/0x6f0
[   28.995301]  ret_from_fork+0x116/0x1d0
[   28.995732]  ret_from_fork_asm+0x1a/0x30
[   28.995987] 
[   28.996105] The buggy address belongs to the object at ffff888102338080
[   28.996105]  which belongs to the cache kmalloc-64 of size 64
[   28.996755] The buggy address is located 0 bytes to the right of
[   28.996755]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   28.997404] 
[   28.997627] The buggy address belongs to the physical page:
[   28.998249] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   28.998887] flags: 0x200000000000000(node=0|zone=2)
[   28.999252] page_type: f5(slab)
[   28.999525] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.000103] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.000769] page dumped because: kasan: bad access detected
[   29.001292] 
[   29.001493] Memory state around the buggy address:
[   29.001693]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.002015]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.002462] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.002864]                                      ^
[   29.003091]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.003753]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.004121] ==================================================================
[   29.214565] ==================================================================
[   29.215541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   29.216246] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.216503] 
[   29.216770] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.216886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.216917] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.216998] Call Trace:
[   29.217059]  <TASK>
[   29.217108]  dump_stack_lvl+0x73/0xb0
[   29.217231]  print_report+0xd1/0x650
[   29.217288]  ? __virt_addr_valid+0x1db/0x2d0
[   29.217344]  ? kasan_atomics_helper+0xe78/0x5450
[   29.217396]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.217456]  ? kasan_atomics_helper+0xe78/0x5450
[   29.217505]  kasan_report+0x141/0x180
[   29.217584]  ? kasan_atomics_helper+0xe78/0x5450
[   29.217683]  kasan_check_range+0x10c/0x1c0
[   29.217753]  __kasan_check_write+0x18/0x20
[   29.217808]  kasan_atomics_helper+0xe78/0x5450
[   29.217862]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.217917]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.217966]  ? kasan_atomics+0x152/0x310
[   29.218006]  kasan_atomics+0x1dc/0x310
[   29.218043]  ? __pfx_kasan_atomics+0x10/0x10
[   29.218074]  ? __pfx_read_tsc+0x10/0x10
[   29.218100]  ? ktime_get_ts64+0x86/0x230
[   29.218133]  kunit_try_run_case+0x1a5/0x480
[   29.218176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.218215]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.218247]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.218274]  ? __kthread_parkme+0x82/0x180
[   29.218298]  ? preempt_count_sub+0x50/0x80
[   29.218326]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.218353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.218380]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.218407]  kthread+0x337/0x6f0
[   29.218430]  ? trace_preempt_on+0x20/0xc0
[   29.218479]  ? __pfx_kthread+0x10/0x10
[   29.218505]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.218530]  ? calculate_sigpending+0x7b/0xa0
[   29.218559]  ? __pfx_kthread+0x10/0x10
[   29.218584]  ret_from_fork+0x116/0x1d0
[   29.218606]  ? __pfx_kthread+0x10/0x10
[   29.218629]  ret_from_fork_asm+0x1a/0x30
[   29.218664]  </TASK>
[   29.218680] 
[   29.230678] Allocated by task 294:
[   29.231006]  kasan_save_stack+0x45/0x70
[   29.231331]  kasan_save_track+0x18/0x40
[   29.231640]  kasan_save_alloc_info+0x3b/0x50
[   29.232016]  __kasan_kmalloc+0xb7/0xc0
[   29.232365]  __kmalloc_cache_noprof+0x189/0x420
[   29.232588]  kasan_atomics+0x95/0x310
[   29.232964]  kunit_try_run_case+0x1a5/0x480
[   29.233393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.233655]  kthread+0x337/0x6f0
[   29.233831]  ret_from_fork+0x116/0x1d0
[   29.233989]  ret_from_fork_asm+0x1a/0x30
[   29.234187] 
[   29.234305] The buggy address belongs to the object at ffff888102338080
[   29.234305]  which belongs to the cache kmalloc-64 of size 64
[   29.235141] The buggy address is located 0 bytes to the right of
[   29.235141]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.236294] 
[   29.236571] The buggy address belongs to the physical page:
[   29.236863] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.237552] flags: 0x200000000000000(node=0|zone=2)
[   29.237937] page_type: f5(slab)
[   29.238343] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.238694] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.238958] page dumped because: kasan: bad access detected
[   29.239168] 
[   29.239269] Memory state around the buggy address:
[   29.239484]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.239754]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.240075] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.241572]                                      ^
[   29.241871]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.242944]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.243405] ==================================================================
[   30.449253] ==================================================================
[   30.449871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   30.451554] Read of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   30.452207] 
[   30.452404] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.452964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.453023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.453120] Call Trace:
[   30.453164]  <TASK>
[   30.453202]  dump_stack_lvl+0x73/0xb0
[   30.453253]  print_report+0xd1/0x650
[   30.453281]  ? __virt_addr_valid+0x1db/0x2d0
[   30.453310]  ? kasan_atomics_helper+0x5115/0x5450
[   30.453336]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.453367]  ? kasan_atomics_helper+0x5115/0x5450
[   30.453391]  kasan_report+0x141/0x180
[   30.453417]  ? kasan_atomics_helper+0x5115/0x5450
[   30.453466]  __asan_report_load8_noabort+0x18/0x20
[   30.453499]  kasan_atomics_helper+0x5115/0x5450
[   30.453526]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.453551]  ? __kmalloc_cache_noprof+0x189/0x420
[   30.453580]  ? kasan_atomics+0x152/0x310
[   30.453609]  kasan_atomics+0x1dc/0x310
[   30.453635]  ? __pfx_kasan_atomics+0x10/0x10
[   30.453662]  ? __pfx_read_tsc+0x10/0x10
[   30.453689]  ? ktime_get_ts64+0x86/0x230
[   30.453720]  kunit_try_run_case+0x1a5/0x480
[   30.453749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.453775]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.453802]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.453828]  ? __kthread_parkme+0x82/0x180
[   30.453853]  ? preempt_count_sub+0x50/0x80
[   30.453880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.453907]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.453933]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.453960]  kthread+0x337/0x6f0
[   30.453983]  ? trace_preempt_on+0x20/0xc0
[   30.454010]  ? __pfx_kthread+0x10/0x10
[   30.454046]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.454072]  ? calculate_sigpending+0x7b/0xa0
[   30.454101]  ? __pfx_kthread+0x10/0x10
[   30.454127]  ret_from_fork+0x116/0x1d0
[   30.454156]  ? __pfx_kthread+0x10/0x10
[   30.454190]  ret_from_fork_asm+0x1a/0x30
[   30.454224]  </TASK>
[   30.454239] 
[   30.465401] Allocated by task 294:
[   30.465705]  kasan_save_stack+0x45/0x70
[   30.466083]  kasan_save_track+0x18/0x40
[   30.466418]  kasan_save_alloc_info+0x3b/0x50
[   30.466842]  __kasan_kmalloc+0xb7/0xc0
[   30.467198]  __kmalloc_cache_noprof+0x189/0x420
[   30.467564]  kasan_atomics+0x95/0x310
[   30.467931]  kunit_try_run_case+0x1a5/0x480
[   30.468319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.468714]  kthread+0x337/0x6f0
[   30.469018]  ret_from_fork+0x116/0x1d0
[   30.469331]  ret_from_fork_asm+0x1a/0x30
[   30.469574] 
[   30.469768] The buggy address belongs to the object at ffff888102338080
[   30.469768]  which belongs to the cache kmalloc-64 of size 64
[   30.470619] The buggy address is located 0 bytes to the right of
[   30.470619]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   30.471465] 
[   30.471630] The buggy address belongs to the physical page:
[   30.472023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   30.472594] flags: 0x200000000000000(node=0|zone=2)
[   30.472941] page_type: f5(slab)
[   30.473315] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.473753] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.474317] page dumped because: kasan: bad access detected
[   30.474644] 
[   30.474834] Memory state around the buggy address:
[   30.475255]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.475686]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.476136] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.476638]                                      ^
[   30.476943]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.477298]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.477751] ==================================================================
[   28.714252] ==================================================================
[   28.714798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   28.715329] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   28.715657] 
[   28.715900] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.715991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.716014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.716053] Call Trace:
[   28.716090]  <TASK>
[   28.716126]  dump_stack_lvl+0x73/0xb0
[   28.716207]  print_report+0xd1/0x650
[   28.716247]  ? __virt_addr_valid+0x1db/0x2d0
[   28.716286]  ? kasan_atomics_helper+0x4a0/0x5450
[   28.716320]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.716360]  ? kasan_atomics_helper+0x4a0/0x5450
[   28.716393]  kasan_report+0x141/0x180
[   28.716431]  ? kasan_atomics_helper+0x4a0/0x5450
[   28.716490]  kasan_check_range+0x10c/0x1c0
[   28.716534]  __kasan_check_write+0x18/0x20
[   28.716610]  kasan_atomics_helper+0x4a0/0x5450
[   28.716701]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.716782]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.716855]  ? kasan_atomics+0x152/0x310
[   28.716919]  kasan_atomics+0x1dc/0x310
[   28.716985]  ? __pfx_kasan_atomics+0x10/0x10
[   28.717034]  ? __pfx_read_tsc+0x10/0x10
[   28.717080]  ? ktime_get_ts64+0x86/0x230
[   28.717201]  kunit_try_run_case+0x1a5/0x480
[   28.717281]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.717339]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.717395]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.717464]  ? __kthread_parkme+0x82/0x180
[   28.717518]  ? preempt_count_sub+0x50/0x80
[   28.717574]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.717626]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.717710]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.717776]  kthread+0x337/0x6f0
[   28.717827]  ? trace_preempt_on+0x20/0xc0
[   28.717874]  ? __pfx_kthread+0x10/0x10
[   28.717901]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.717926]  ? calculate_sigpending+0x7b/0xa0
[   28.717955]  ? __pfx_kthread+0x10/0x10
[   28.717980]  ret_from_fork+0x116/0x1d0
[   28.718003]  ? __pfx_kthread+0x10/0x10
[   28.718037]  ret_from_fork_asm+0x1a/0x30
[   28.718080]  </TASK>
[   28.718096] 
[   28.729792] Allocated by task 294:
[   28.730020]  kasan_save_stack+0x45/0x70
[   28.730273]  kasan_save_track+0x18/0x40
[   28.730530]  kasan_save_alloc_info+0x3b/0x50
[   28.730887]  __kasan_kmalloc+0xb7/0xc0
[   28.731235]  __kmalloc_cache_noprof+0x189/0x420
[   28.731617]  kasan_atomics+0x95/0x310
[   28.731962]  kunit_try_run_case+0x1a5/0x480
[   28.732365]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.732854]  kthread+0x337/0x6f0
[   28.733195]  ret_from_fork+0x116/0x1d0
[   28.733523]  ret_from_fork_asm+0x1a/0x30
[   28.733764] 
[   28.733868] The buggy address belongs to the object at ffff888102338080
[   28.733868]  which belongs to the cache kmalloc-64 of size 64
[   28.734558] The buggy address is located 0 bytes to the right of
[   28.734558]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   28.735539] 
[   28.735745] The buggy address belongs to the physical page:
[   28.736289] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   28.737016] flags: 0x200000000000000(node=0|zone=2)
[   28.737633] page_type: f5(slab)
[   28.737845] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.738662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.738945] page dumped because: kasan: bad access detected
[   28.739374] 
[   28.739510] Memory state around the buggy address:
[   28.739816]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.740319]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.740986] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.741700]                                      ^
[   28.742096]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.742627]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.743036] ==================================================================
[   29.710506] ==================================================================
[   29.711116] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   29.711584] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.711976] 
[   29.712129] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.712276] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.712308] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.712357] Call Trace:
[   29.712404]  <TASK>
[   29.712470]  dump_stack_lvl+0x73/0xb0
[   29.712545]  print_report+0xd1/0x650
[   29.712599]  ? __virt_addr_valid+0x1db/0x2d0
[   29.712656]  ? kasan_atomics_helper+0x15b6/0x5450
[   29.712699]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.712750]  ? kasan_atomics_helper+0x15b6/0x5450
[   29.712802]  kasan_report+0x141/0x180
[   29.712853]  ? kasan_atomics_helper+0x15b6/0x5450
[   29.712908]  kasan_check_range+0x10c/0x1c0
[   29.712956]  __kasan_check_write+0x18/0x20
[   29.713006]  kasan_atomics_helper+0x15b6/0x5450
[   29.713052]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.713115]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.713220]  ? kasan_atomics+0x152/0x310
[   29.713282]  kasan_atomics+0x1dc/0x310
[   29.713342]  ? __pfx_kasan_atomics+0x10/0x10
[   29.713413]  ? __pfx_read_tsc+0x10/0x10
[   29.713477]  ? ktime_get_ts64+0x86/0x230
[   29.713526]  kunit_try_run_case+0x1a5/0x480
[   29.713559]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.713585]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.713613]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.713645]  ? __kthread_parkme+0x82/0x180
[   29.713683]  ? preempt_count_sub+0x50/0x80
[   29.713731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.713782]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.713842]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.713910]  kthread+0x337/0x6f0
[   29.713959]  ? trace_preempt_on+0x20/0xc0
[   29.714008]  ? __pfx_kthread+0x10/0x10
[   29.714065]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.714117]  ? calculate_sigpending+0x7b/0xa0
[   29.714215]  ? __pfx_kthread+0x10/0x10
[   29.714260]  ret_from_fork+0x116/0x1d0
[   29.714302]  ? __pfx_kthread+0x10/0x10
[   29.714332]  ret_from_fork_asm+0x1a/0x30
[   29.714370]  </TASK>
[   29.714388] 
[   29.724669] Allocated by task 294:
[   29.724904]  kasan_save_stack+0x45/0x70
[   29.725089]  kasan_save_track+0x18/0x40
[   29.725240]  kasan_save_alloc_info+0x3b/0x50
[   29.725398]  __kasan_kmalloc+0xb7/0xc0
[   29.727368]  __kmalloc_cache_noprof+0x189/0x420
[   29.728401]  kasan_atomics+0x95/0x310
[   29.728709]  kunit_try_run_case+0x1a5/0x480
[   29.728966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.729797]  kthread+0x337/0x6f0
[   29.730011]  ret_from_fork+0x116/0x1d0
[   29.730242]  ret_from_fork_asm+0x1a/0x30
[   29.730815] 
[   29.730930] The buggy address belongs to the object at ffff888102338080
[   29.730930]  which belongs to the cache kmalloc-64 of size 64
[   29.731877] The buggy address is located 0 bytes to the right of
[   29.731877]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.732755] 
[   29.733182] The buggy address belongs to the physical page:
[   29.733803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.734541] flags: 0x200000000000000(node=0|zone=2)
[   29.734749] page_type: f5(slab)
[   29.735014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.735686] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.736171] page dumped because: kasan: bad access detected
[   29.736588] 
[   29.736697] Memory state around the buggy address:
[   29.737045]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.737654]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.738098] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.738557]                                      ^
[   29.738800]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.739468]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.739757] ==================================================================
[   28.561129] ==================================================================
[   28.561924] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   28.563187] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   28.563461] 
[   28.563594] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.564363] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.564397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.564427] Call Trace:
[   28.564457]  <TASK>
[   28.564484]  dump_stack_lvl+0x73/0xb0
[   28.564529]  print_report+0xd1/0x650
[   28.564565]  ? __virt_addr_valid+0x1db/0x2d0
[   28.564605]  ? kasan_atomics_helper+0x4ba2/0x5450
[   28.564692]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.564748]  ? kasan_atomics_helper+0x4ba2/0x5450
[   28.564776]  kasan_report+0x141/0x180
[   28.564801]  ? kasan_atomics_helper+0x4ba2/0x5450
[   28.564828]  __asan_report_store4_noabort+0x1b/0x30
[   28.564855]  kasan_atomics_helper+0x4ba2/0x5450
[   28.564879]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.564902]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.564930]  ? kasan_atomics+0x152/0x310
[   28.564957]  kasan_atomics+0x1dc/0x310
[   28.564982]  ? __pfx_kasan_atomics+0x10/0x10
[   28.565007]  ? __pfx_read_tsc+0x10/0x10
[   28.565031]  ? ktime_get_ts64+0x86/0x230
[   28.565060]  kunit_try_run_case+0x1a5/0x480
[   28.565088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.565113]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.565138]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.565162]  ? __kthread_parkme+0x82/0x180
[   28.565186]  ? preempt_count_sub+0x50/0x80
[   28.565212]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.565237]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.565292]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.565318]  kthread+0x337/0x6f0
[   28.565339]  ? trace_preempt_on+0x20/0xc0
[   28.565366]  ? __pfx_kthread+0x10/0x10
[   28.565389]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.565411]  ? calculate_sigpending+0x7b/0xa0
[   28.565438]  ? __pfx_kthread+0x10/0x10
[   28.565483]  ret_from_fork+0x116/0x1d0
[   28.565505]  ? __pfx_kthread+0x10/0x10
[   28.565530]  ret_from_fork_asm+0x1a/0x30
[   28.565582]  </TASK>
[   28.565603] 
[   28.578265] Allocated by task 294:
[   28.578576]  kasan_save_stack+0x45/0x70
[   28.578810]  kasan_save_track+0x18/0x40
[   28.578988]  kasan_save_alloc_info+0x3b/0x50
[   28.579346]  __kasan_kmalloc+0xb7/0xc0
[   28.580538]  __kmalloc_cache_noprof+0x189/0x420
[   28.581013]  kasan_atomics+0x95/0x310
[   28.581411]  kunit_try_run_case+0x1a5/0x480
[   28.581936]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.582225]  kthread+0x337/0x6f0
[   28.582554]  ret_from_fork+0x116/0x1d0
[   28.582894]  ret_from_fork_asm+0x1a/0x30
[   28.583220] 
[   28.583326] The buggy address belongs to the object at ffff888102338080
[   28.583326]  which belongs to the cache kmalloc-64 of size 64
[   28.584134] The buggy address is located 0 bytes to the right of
[   28.584134]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   28.585200] 
[   28.585464] The buggy address belongs to the physical page:
[   28.585983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   28.586371] flags: 0x200000000000000(node=0|zone=2)
[   28.586597] page_type: f5(slab)
[   28.586769] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.587958] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.589123] page dumped because: kasan: bad access detected
[   28.589406] 
[   28.589573] Memory state around the buggy address:
[   28.589916]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.590531]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.591297] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.592236]                                      ^
[   28.592788]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.593294]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.594517] ==================================================================
[   30.220996] ==================================================================
[   30.221536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   30.222053] Read of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   30.222457] 
[   30.222691] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.222818] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.222851] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.222900] Call Trace:
[   30.222957]  <TASK>
[   30.223015]  dump_stack_lvl+0x73/0xb0
[   30.223086]  print_report+0xd1/0x650
[   30.223131]  ? __virt_addr_valid+0x1db/0x2d0
[   30.223219]  ? kasan_atomics_helper+0x4f71/0x5450
[   30.223275]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.223348]  ? kasan_atomics_helper+0x4f71/0x5450
[   30.223400]  kasan_report+0x141/0x180
[   30.223459]  ? kasan_atomics_helper+0x4f71/0x5450
[   30.223518]  __asan_report_load8_noabort+0x18/0x20
[   30.223580]  kasan_atomics_helper+0x4f71/0x5450
[   30.223640]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.223691]  ? __kmalloc_cache_noprof+0x189/0x420
[   30.223747]  ? kasan_atomics+0x152/0x310
[   30.223783]  kasan_atomics+0x1dc/0x310
[   30.223812]  ? __pfx_kasan_atomics+0x10/0x10
[   30.223840]  ? __pfx_read_tsc+0x10/0x10
[   30.223866]  ? ktime_get_ts64+0x86/0x230
[   30.223897]  kunit_try_run_case+0x1a5/0x480
[   30.223925]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.223951]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.223977]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.224004]  ? __kthread_parkme+0x82/0x180
[   30.224028]  ? preempt_count_sub+0x50/0x80
[   30.224055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.224082]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.224108]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.224134]  kthread+0x337/0x6f0
[   30.224187]  ? trace_preempt_on+0x20/0xc0
[   30.224217]  ? __pfx_kthread+0x10/0x10
[   30.224242]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.224266]  ? calculate_sigpending+0x7b/0xa0
[   30.224294]  ? __pfx_kthread+0x10/0x10
[   30.224319]  ret_from_fork+0x116/0x1d0
[   30.224340]  ? __pfx_kthread+0x10/0x10
[   30.224364]  ret_from_fork_asm+0x1a/0x30
[   30.224398]  </TASK>
[   30.224413] 
[   30.233798] Allocated by task 294:
[   30.234189]  kasan_save_stack+0x45/0x70
[   30.234618]  kasan_save_track+0x18/0x40
[   30.234902]  kasan_save_alloc_info+0x3b/0x50
[   30.235234]  __kasan_kmalloc+0xb7/0xc0
[   30.235584]  __kmalloc_cache_noprof+0x189/0x420
[   30.235855]  kasan_atomics+0x95/0x310
[   30.236179]  kunit_try_run_case+0x1a5/0x480
[   30.236400]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.236798]  kthread+0x337/0x6f0
[   30.237013]  ret_from_fork+0x116/0x1d0
[   30.237355]  ret_from_fork_asm+0x1a/0x30
[   30.237588] 
[   30.237770] The buggy address belongs to the object at ffff888102338080
[   30.237770]  which belongs to the cache kmalloc-64 of size 64
[   30.238403] The buggy address is located 0 bytes to the right of
[   30.238403]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   30.238960] 
[   30.239149] The buggy address belongs to the physical page:
[   30.239582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   30.240422] flags: 0x200000000000000(node=0|zone=2)
[   30.240638] page_type: f5(slab)
[   30.240859] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.241546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.241934] page dumped because: kasan: bad access detected
[   30.242278] 
[   30.242479] Memory state around the buggy address:
[   30.242915]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.243362]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.243962] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.244361]                                      ^
[   30.244666]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.245127]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.245595] ==================================================================
[   29.392922] ==================================================================
[   29.393508] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   29.394098] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.394808] 
[   29.395076] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.395229] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.395265] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.395319] Call Trace:
[   29.395364]  <TASK>
[   29.395411]  dump_stack_lvl+0x73/0xb0
[   29.395588]  print_report+0xd1/0x650
[   29.395642]  ? __virt_addr_valid+0x1db/0x2d0
[   29.395699]  ? kasan_atomics_helper+0x1148/0x5450
[   29.395742]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.395801]  ? kasan_atomics_helper+0x1148/0x5450
[   29.395852]  kasan_report+0x141/0x180
[   29.395888]  ? kasan_atomics_helper+0x1148/0x5450
[   29.395918]  kasan_check_range+0x10c/0x1c0
[   29.395945]  __kasan_check_write+0x18/0x20
[   29.395972]  kasan_atomics_helper+0x1148/0x5450
[   29.395997]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.396023]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.396052]  ? kasan_atomics+0x152/0x310
[   29.396081]  kasan_atomics+0x1dc/0x310
[   29.396107]  ? __pfx_kasan_atomics+0x10/0x10
[   29.396134]  ? __pfx_read_tsc+0x10/0x10
[   29.396188]  ? ktime_get_ts64+0x86/0x230
[   29.396229]  kunit_try_run_case+0x1a5/0x480
[   29.396260]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.396285]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.396312]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.396339]  ? __kthread_parkme+0x82/0x180
[   29.396364]  ? preempt_count_sub+0x50/0x80
[   29.396391]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.396419]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.396464]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.396494]  kthread+0x337/0x6f0
[   29.396518]  ? trace_preempt_on+0x20/0xc0
[   29.396546]  ? __pfx_kthread+0x10/0x10
[   29.396570]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.396596]  ? calculate_sigpending+0x7b/0xa0
[   29.396626]  ? __pfx_kthread+0x10/0x10
[   29.396651]  ret_from_fork+0x116/0x1d0
[   29.396673]  ? __pfx_kthread+0x10/0x10
[   29.396697]  ret_from_fork_asm+0x1a/0x30
[   29.396734]  </TASK>
[   29.396750] 
[   29.408234] Allocated by task 294:
[   29.408499]  kasan_save_stack+0x45/0x70
[   29.408881]  kasan_save_track+0x18/0x40
[   29.409208]  kasan_save_alloc_info+0x3b/0x50
[   29.409632]  __kasan_kmalloc+0xb7/0xc0
[   29.409975]  __kmalloc_cache_noprof+0x189/0x420
[   29.410408]  kasan_atomics+0x95/0x310
[   29.410680]  kunit_try_run_case+0x1a5/0x480
[   29.411074]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.411619]  kthread+0x337/0x6f0
[   29.411989]  ret_from_fork+0x116/0x1d0
[   29.412401]  ret_from_fork_asm+0x1a/0x30
[   29.412738] 
[   29.412858] The buggy address belongs to the object at ffff888102338080
[   29.412858]  which belongs to the cache kmalloc-64 of size 64
[   29.413903] The buggy address is located 0 bytes to the right of
[   29.413903]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.414813] 
[   29.414949] The buggy address belongs to the physical page:
[   29.415316] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.415741] flags: 0x200000000000000(node=0|zone=2)
[   29.416224] page_type: f5(slab)
[   29.416429] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.416961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.417386] page dumped because: kasan: bad access detected
[   29.417892] 
[   29.418062] Memory state around the buggy address:
[   29.418324]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.418867]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.419221] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.419772]                                      ^
[   29.420053]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.420493]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.420777] ==================================================================
[   29.484025] ==================================================================
[   29.484503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   29.485055] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.485721] 
[   29.486302] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.486501] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.486523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.486554] Call Trace:
[   29.486580]  <TASK>
[   29.486608]  dump_stack_lvl+0x73/0xb0
[   29.486653]  print_report+0xd1/0x650
[   29.486680]  ? __virt_addr_valid+0x1db/0x2d0
[   29.486708]  ? kasan_atomics_helper+0x49e8/0x5450
[   29.486733]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.486762]  ? kasan_atomics_helper+0x49e8/0x5450
[   29.486787]  kasan_report+0x141/0x180
[   29.486811]  ? kasan_atomics_helper+0x49e8/0x5450
[   29.486839]  __asan_report_load4_noabort+0x18/0x20
[   29.486866]  kasan_atomics_helper+0x49e8/0x5450
[   29.486891]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.486916]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.486944]  ? kasan_atomics+0x152/0x310
[   29.486973]  kasan_atomics+0x1dc/0x310
[   29.486998]  ? __pfx_kasan_atomics+0x10/0x10
[   29.487025]  ? __pfx_read_tsc+0x10/0x10
[   29.487049]  ? ktime_get_ts64+0x86/0x230
[   29.487081]  kunit_try_run_case+0x1a5/0x480
[   29.487109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.487134]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.487173]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.487210]  ? __kthread_parkme+0x82/0x180
[   29.487235]  ? preempt_count_sub+0x50/0x80
[   29.487262]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.487290]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.487316]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.487343]  kthread+0x337/0x6f0
[   29.487365]  ? trace_preempt_on+0x20/0xc0
[   29.487392]  ? __pfx_kthread+0x10/0x10
[   29.487417]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.487461]  ? calculate_sigpending+0x7b/0xa0
[   29.487494]  ? __pfx_kthread+0x10/0x10
[   29.487520]  ret_from_fork+0x116/0x1d0
[   29.487544]  ? __pfx_kthread+0x10/0x10
[   29.487568]  ret_from_fork_asm+0x1a/0x30
[   29.487605]  </TASK>
[   29.487620] 
[   29.498638] Allocated by task 294:
[   29.499039]  kasan_save_stack+0x45/0x70
[   29.499379]  kasan_save_track+0x18/0x40
[   29.499700]  kasan_save_alloc_info+0x3b/0x50
[   29.499999]  __kasan_kmalloc+0xb7/0xc0
[   29.500326]  __kmalloc_cache_noprof+0x189/0x420
[   29.500702]  kasan_atomics+0x95/0x310
[   29.501040]  kunit_try_run_case+0x1a5/0x480
[   29.501350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.501755]  kthread+0x337/0x6f0
[   29.502117]  ret_from_fork+0x116/0x1d0
[   29.502402]  ret_from_fork_asm+0x1a/0x30
[   29.502676] 
[   29.502789] The buggy address belongs to the object at ffff888102338080
[   29.502789]  which belongs to the cache kmalloc-64 of size 64
[   29.503261] The buggy address is located 0 bytes to the right of
[   29.503261]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.503704] 
[   29.503826] The buggy address belongs to the physical page:
[   29.504083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.504712] flags: 0x200000000000000(node=0|zone=2)
[   29.505123] page_type: f5(slab)
[   29.505460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.505987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.506311] page dumped because: kasan: bad access detected
[   29.506543] 
[   29.506644] Memory state around the buggy address:
[   29.506852]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.507324]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.507871] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.508433]                                      ^
[   29.508832]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.509386]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.509855] ==================================================================
[   29.798953] ==================================================================
[   29.799785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   29.800369] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.800661] 
[   29.800810] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.800924] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.800958] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.801009] Call Trace:
[   29.801056]  <TASK>
[   29.801105]  dump_stack_lvl+0x73/0xb0
[   29.801170]  print_report+0xd1/0x650
[   29.801228]  ? __virt_addr_valid+0x1db/0x2d0
[   29.801281]  ? kasan_atomics_helper+0x177f/0x5450
[   29.801333]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.801397]  ? kasan_atomics_helper+0x177f/0x5450
[   29.801459]  kasan_report+0x141/0x180
[   29.801499]  ? kasan_atomics_helper+0x177f/0x5450
[   29.801541]  kasan_check_range+0x10c/0x1c0
[   29.801579]  __kasan_check_write+0x18/0x20
[   29.801615]  kasan_atomics_helper+0x177f/0x5450
[   29.801650]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.801685]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.801724]  ? kasan_atomics+0x152/0x310
[   29.801763]  kasan_atomics+0x1dc/0x310
[   29.801798]  ? __pfx_kasan_atomics+0x10/0x10
[   29.801836]  ? __pfx_read_tsc+0x10/0x10
[   29.801870]  ? ktime_get_ts64+0x86/0x230
[   29.801913]  kunit_try_run_case+0x1a5/0x480
[   29.801954]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.801990]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.802041]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.802085]  ? __kthread_parkme+0x82/0x180
[   29.802127]  ? preempt_count_sub+0x50/0x80
[   29.802176]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.802224]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.802428]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.802572]  kthread+0x337/0x6f0
[   29.802616]  ? trace_preempt_on+0x20/0xc0
[   29.802658]  ? __pfx_kthread+0x10/0x10
[   29.802697]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.802739]  ? calculate_sigpending+0x7b/0xa0
[   29.802792]  ? __pfx_kthread+0x10/0x10
[   29.802838]  ret_from_fork+0x116/0x1d0
[   29.802884]  ? __pfx_kthread+0x10/0x10
[   29.802933]  ret_from_fork_asm+0x1a/0x30
[   29.802995]  </TASK>
[   29.803022] 
[   29.815060] Allocated by task 294:
[   29.815527]  kasan_save_stack+0x45/0x70
[   29.815988]  kasan_save_track+0x18/0x40
[   29.816496]  kasan_save_alloc_info+0x3b/0x50
[   29.816706]  __kasan_kmalloc+0xb7/0xc0
[   29.816888]  __kmalloc_cache_noprof+0x189/0x420
[   29.817096]  kasan_atomics+0x95/0x310
[   29.817468]  kunit_try_run_case+0x1a5/0x480
[   29.817902]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.818414]  kthread+0x337/0x6f0
[   29.818724]  ret_from_fork+0x116/0x1d0
[   29.819011]  ret_from_fork_asm+0x1a/0x30
[   29.819574] 
[   29.819760] The buggy address belongs to the object at ffff888102338080
[   29.819760]  which belongs to the cache kmalloc-64 of size 64
[   29.820660] The buggy address is located 0 bytes to the right of
[   29.820660]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.821169] 
[   29.821288] The buggy address belongs to the physical page:
[   29.821573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.822181] flags: 0x200000000000000(node=0|zone=2)
[   29.822667] page_type: f5(slab)
[   29.823058] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.823815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.824485] page dumped because: kasan: bad access detected
[   29.824905] 
[   29.825075] Memory state around the buggy address:
[   29.825603]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.826045]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.826573] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.826977]                                      ^
[   29.827380]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.828077]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.828666] ==================================================================
[   30.422156] ==================================================================
[   30.422564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   30.422989] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   30.423362] 
[   30.423602] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.423710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.423741] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.423794] Call Trace:
[   30.423842]  <TASK>
[   30.423887]  dump_stack_lvl+0x73/0xb0
[   30.423961]  print_report+0xd1/0x650
[   30.424010]  ? __virt_addr_valid+0x1db/0x2d0
[   30.424053]  ? kasan_atomics_helper+0x224c/0x5450
[   30.424100]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.424193]  ? kasan_atomics_helper+0x224c/0x5450
[   30.424251]  kasan_report+0x141/0x180
[   30.424306]  ? kasan_atomics_helper+0x224c/0x5450
[   30.424370]  kasan_check_range+0x10c/0x1c0
[   30.424428]  __kasan_check_write+0x18/0x20
[   30.424496]  kasan_atomics_helper+0x224c/0x5450
[   30.424553]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.424607]  ? __kmalloc_cache_noprof+0x189/0x420
[   30.424661]  ? kasan_atomics+0x152/0x310
[   30.424711]  kasan_atomics+0x1dc/0x310
[   30.424759]  ? __pfx_kasan_atomics+0x10/0x10
[   30.424807]  ? __pfx_read_tsc+0x10/0x10
[   30.424849]  ? ktime_get_ts64+0x86/0x230
[   30.424905]  kunit_try_run_case+0x1a5/0x480
[   30.424961]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.425007]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.425055]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.425098]  ? __kthread_parkme+0x82/0x180
[   30.425179]  ? preempt_count_sub+0x50/0x80
[   30.425237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.425297]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.425350]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.425384]  kthread+0x337/0x6f0
[   30.425410]  ? trace_preempt_on+0x20/0xc0
[   30.425454]  ? __pfx_kthread+0x10/0x10
[   30.425490]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.425515]  ? calculate_sigpending+0x7b/0xa0
[   30.425545]  ? __pfx_kthread+0x10/0x10
[   30.425570]  ret_from_fork+0x116/0x1d0
[   30.425594]  ? __pfx_kthread+0x10/0x10
[   30.425618]  ret_from_fork_asm+0x1a/0x30
[   30.425653]  </TASK>
[   30.425668] 
[   30.434331] Allocated by task 294:
[   30.434677]  kasan_save_stack+0x45/0x70
[   30.435025]  kasan_save_track+0x18/0x40
[   30.435398]  kasan_save_alloc_info+0x3b/0x50
[   30.435758]  __kasan_kmalloc+0xb7/0xc0
[   30.436078]  __kmalloc_cache_noprof+0x189/0x420
[   30.436480]  kasan_atomics+0x95/0x310
[   30.436780]  kunit_try_run_case+0x1a5/0x480
[   30.437133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.437475]  kthread+0x337/0x6f0
[   30.437651]  ret_from_fork+0x116/0x1d0
[   30.437830]  ret_from_fork_asm+0x1a/0x30
[   30.438021] 
[   30.438222] The buggy address belongs to the object at ffff888102338080
[   30.438222]  which belongs to the cache kmalloc-64 of size 64
[   30.439098] The buggy address is located 0 bytes to the right of
[   30.439098]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   30.439946] 
[   30.440120] The buggy address belongs to the physical page:
[   30.440437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   30.440950] flags: 0x200000000000000(node=0|zone=2)
[   30.441271] page_type: f5(slab)
[   30.441625] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.441896] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.442487] page dumped because: kasan: bad access detected
[   30.442803] 
[   30.442902] Memory state around the buggy address:
[   30.443247]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.443911]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.444286] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.444825]                                      ^
[   30.446743]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.447212]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.447524] ==================================================================
[   28.773955] ==================================================================
[   28.774316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   28.775346] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   28.775706] 
[   28.775835] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.775936] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.775968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.776020] Call Trace:
[   28.776067]  <TASK>
[   28.776114]  dump_stack_lvl+0x73/0xb0
[   28.776188]  print_report+0xd1/0x650
[   28.776247]  ? __virt_addr_valid+0x1db/0x2d0
[   28.776303]  ? kasan_atomics_helper+0x565/0x5450
[   28.776353]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.776414]  ? kasan_atomics_helper+0x565/0x5450
[   28.776486]  kasan_report+0x141/0x180
[   28.776529]  ? kasan_atomics_helper+0x565/0x5450
[   28.776584]  kasan_check_range+0x10c/0x1c0
[   28.776636]  __kasan_check_write+0x18/0x20
[   28.776682]  kasan_atomics_helper+0x565/0x5450
[   28.776726]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.776774]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.776834]  ? kasan_atomics+0x152/0x310
[   28.776884]  kasan_atomics+0x1dc/0x310
[   28.776931]  ? __pfx_kasan_atomics+0x10/0x10
[   28.776983]  ? __pfx_read_tsc+0x10/0x10
[   28.777030]  ? ktime_get_ts64+0x86/0x230
[   28.777087]  kunit_try_run_case+0x1a5/0x480
[   28.777137]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.777184]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.777235]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.777288]  ? __kthread_parkme+0x82/0x180
[   28.777341]  ? preempt_count_sub+0x50/0x80
[   28.777393]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.777487]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.777540]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.777593]  kthread+0x337/0x6f0
[   28.777641]  ? trace_preempt_on+0x20/0xc0
[   28.777698]  ? __pfx_kthread+0x10/0x10
[   28.777740]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.777781]  ? calculate_sigpending+0x7b/0xa0
[   28.777812]  ? __pfx_kthread+0x10/0x10
[   28.777838]  ret_from_fork+0x116/0x1d0
[   28.777860]  ? __pfx_kthread+0x10/0x10
[   28.777885]  ret_from_fork_asm+0x1a/0x30
[   28.777920]  </TASK>
[   28.777937] 
[   28.786936] Allocated by task 294:
[   28.787148]  kasan_save_stack+0x45/0x70
[   28.787377]  kasan_save_track+0x18/0x40
[   28.787620]  kasan_save_alloc_info+0x3b/0x50
[   28.787970]  __kasan_kmalloc+0xb7/0xc0
[   28.788298]  __kmalloc_cache_noprof+0x189/0x420
[   28.788696]  kasan_atomics+0x95/0x310
[   28.789135]  kunit_try_run_case+0x1a5/0x480
[   28.789508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.789828]  kthread+0x337/0x6f0
[   28.790005]  ret_from_fork+0x116/0x1d0
[   28.790266]  ret_from_fork_asm+0x1a/0x30
[   28.790601] 
[   28.790766] The buggy address belongs to the object at ffff888102338080
[   28.790766]  which belongs to the cache kmalloc-64 of size 64
[   28.791627] The buggy address is located 0 bytes to the right of
[   28.791627]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   28.792268] 
[   28.792393] The buggy address belongs to the physical page:
[   28.792622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   28.792914] flags: 0x200000000000000(node=0|zone=2)
[   28.793285] page_type: f5(slab)
[   28.793597] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.794152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.794702] page dumped because: kasan: bad access detected
[   28.795080] 
[   28.795260] Memory state around the buggy address:
[   28.795567]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.795904]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.796171] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.796708]                                      ^
[   28.797233]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.797614]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.797941] ==================================================================
[   29.422419] ==================================================================
[   29.423617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   29.424008] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.424652] 
[   29.424898] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.425007] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.425036] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.425083] Call Trace:
[   29.425127]  <TASK>
[   29.425213]  dump_stack_lvl+0x73/0xb0
[   29.425296]  print_report+0xd1/0x650
[   29.425350]  ? __virt_addr_valid+0x1db/0x2d0
[   29.425404]  ? kasan_atomics_helper+0x4a02/0x5450
[   29.425459]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.425499]  ? kasan_atomics_helper+0x4a02/0x5450
[   29.425525]  kasan_report+0x141/0x180
[   29.425550]  ? kasan_atomics_helper+0x4a02/0x5450
[   29.425579]  __asan_report_load4_noabort+0x18/0x20
[   29.425607]  kasan_atomics_helper+0x4a02/0x5450
[   29.425632]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.425657]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.425686]  ? kasan_atomics+0x152/0x310
[   29.425714]  kasan_atomics+0x1dc/0x310
[   29.425741]  ? __pfx_kasan_atomics+0x10/0x10
[   29.425767]  ? __pfx_read_tsc+0x10/0x10
[   29.425793]  ? ktime_get_ts64+0x86/0x230
[   29.425823]  kunit_try_run_case+0x1a5/0x480
[   29.425852]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.425878]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.425903]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.425929]  ? __kthread_parkme+0x82/0x180
[   29.425954]  ? preempt_count_sub+0x50/0x80
[   29.425980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.426006]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.426049]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.426078]  kthread+0x337/0x6f0
[   29.426102]  ? trace_preempt_on+0x20/0xc0
[   29.426130]  ? __pfx_kthread+0x10/0x10
[   29.426180]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.426213]  ? calculate_sigpending+0x7b/0xa0
[   29.426242]  ? __pfx_kthread+0x10/0x10
[   29.426268]  ret_from_fork+0x116/0x1d0
[   29.426290]  ? __pfx_kthread+0x10/0x10
[   29.426315]  ret_from_fork_asm+0x1a/0x30
[   29.426351]  </TASK>
[   29.426367] 
[   29.435479] Allocated by task 294:
[   29.435834]  kasan_save_stack+0x45/0x70
[   29.436926]  kasan_save_track+0x18/0x40
[   29.437382]  kasan_save_alloc_info+0x3b/0x50
[   29.437778]  __kasan_kmalloc+0xb7/0xc0
[   29.438052]  __kmalloc_cache_noprof+0x189/0x420
[   29.440131]  kasan_atomics+0x95/0x310
[   29.440613]  kunit_try_run_case+0x1a5/0x480
[   29.441044]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.441493]  kthread+0x337/0x6f0
[   29.441813]  ret_from_fork+0x116/0x1d0
[   29.442209]  ret_from_fork_asm+0x1a/0x30
[   29.442559] 
[   29.442739] The buggy address belongs to the object at ffff888102338080
[   29.442739]  which belongs to the cache kmalloc-64 of size 64
[   29.443587] The buggy address is located 0 bytes to the right of
[   29.443587]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.444333] 
[   29.444553] The buggy address belongs to the physical page:
[   29.445000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.445652] flags: 0x200000000000000(node=0|zone=2)
[   29.446112] page_type: f5(slab)
[   29.446370] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.447028] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.447628] page dumped because: kasan: bad access detected
[   29.447954] 
[   29.448200] Memory state around the buggy address:
[   29.448657]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.449131]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.449715] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.450327]                                      ^
[   29.450657]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.451065]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.451647] ==================================================================
[   28.654287] ==================================================================
[   28.654878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   28.655678] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   28.655961] 
[   28.656083] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.656189] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.656215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.656264] Call Trace:
[   28.656307]  <TASK>
[   28.656347]  dump_stack_lvl+0x73/0xb0
[   28.656417]  print_report+0xd1/0x650
[   28.656479]  ? __virt_addr_valid+0x1db/0x2d0
[   28.656529]  ? kasan_atomics_helper+0x3df/0x5450
[   28.656571]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.656602]  ? kasan_atomics_helper+0x3df/0x5450
[   28.656626]  kasan_report+0x141/0x180
[   28.656649]  ? kasan_atomics_helper+0x3df/0x5450
[   28.656676]  kasan_check_range+0x10c/0x1c0
[   28.656701]  __kasan_check_read+0x15/0x20
[   28.656726]  kasan_atomics_helper+0x3df/0x5450
[   28.656750]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.656774]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.656801]  ? kasan_atomics+0x152/0x310
[   28.656829]  kasan_atomics+0x1dc/0x310
[   28.656853]  ? __pfx_kasan_atomics+0x10/0x10
[   28.656881]  ? __pfx_read_tsc+0x10/0x10
[   28.656908]  ? ktime_get_ts64+0x86/0x230
[   28.656940]  kunit_try_run_case+0x1a5/0x480
[   28.656970]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.656995]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.657022]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.657048]  ? __kthread_parkme+0x82/0x180
[   28.657072]  ? preempt_count_sub+0x50/0x80
[   28.657100]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.657126]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.657153]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.657181]  kthread+0x337/0x6f0
[   28.657203]  ? trace_preempt_on+0x20/0xc0
[   28.657230]  ? __pfx_kthread+0x10/0x10
[   28.657255]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.657279]  ? calculate_sigpending+0x7b/0xa0
[   28.657307]  ? __pfx_kthread+0x10/0x10
[   28.657332]  ret_from_fork+0x116/0x1d0
[   28.657353]  ? __pfx_kthread+0x10/0x10
[   28.657376]  ret_from_fork_asm+0x1a/0x30
[   28.657411]  </TASK>
[   28.657426] 
[   28.670250] Allocated by task 294:
[   28.670648]  kasan_save_stack+0x45/0x70
[   28.671206]  kasan_save_track+0x18/0x40
[   28.671498]  kasan_save_alloc_info+0x3b/0x50
[   28.671716]  __kasan_kmalloc+0xb7/0xc0
[   28.672114]  __kmalloc_cache_noprof+0x189/0x420
[   28.672535]  kasan_atomics+0x95/0x310
[   28.672864]  kunit_try_run_case+0x1a5/0x480
[   28.673274]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.673733]  kthread+0x337/0x6f0
[   28.674117]  ret_from_fork+0x116/0x1d0
[   28.674500]  ret_from_fork_asm+0x1a/0x30
[   28.674745] 
[   28.674992] The buggy address belongs to the object at ffff888102338080
[   28.674992]  which belongs to the cache kmalloc-64 of size 64
[   28.675824] The buggy address is located 0 bytes to the right of
[   28.675824]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   28.676740] 
[   28.676921] The buggy address belongs to the physical page:
[   28.677397] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   28.678001] flags: 0x200000000000000(node=0|zone=2)
[   28.678486] page_type: f5(slab)
[   28.678766] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.679311] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.679826] page dumped because: kasan: bad access detected
[   28.680244] 
[   28.680365] Memory state around the buggy address:
[   28.680687]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.681091]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.681665] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.681976]                                      ^
[   28.682190]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.682754]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.683066] ==================================================================
[   29.741332] ==================================================================
[   29.741810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   29.742391] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.742891] 
[   29.743189] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.743308] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.743339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.743413] Call Trace:
[   29.743482]  <TASK>
[   29.743529]  dump_stack_lvl+0x73/0xb0
[   29.743602]  print_report+0xd1/0x650
[   29.743655]  ? __virt_addr_valid+0x1db/0x2d0
[   29.743704]  ? kasan_atomics_helper+0x164f/0x5450
[   29.743751]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.743805]  ? kasan_atomics_helper+0x164f/0x5450
[   29.743856]  kasan_report+0x141/0x180
[   29.743903]  ? kasan_atomics_helper+0x164f/0x5450
[   29.743964]  kasan_check_range+0x10c/0x1c0
[   29.744016]  __kasan_check_write+0x18/0x20
[   29.744058]  kasan_atomics_helper+0x164f/0x5450
[   29.744112]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.744185]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.744287]  ? kasan_atomics+0x152/0x310
[   29.744369]  kasan_atomics+0x1dc/0x310
[   29.744452]  ? __pfx_kasan_atomics+0x10/0x10
[   29.744513]  ? __pfx_read_tsc+0x10/0x10
[   29.744555]  ? ktime_get_ts64+0x86/0x230
[   29.744588]  kunit_try_run_case+0x1a5/0x480
[   29.744620]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.744646]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.744674]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.744701]  ? __kthread_parkme+0x82/0x180
[   29.744726]  ? preempt_count_sub+0x50/0x80
[   29.744754]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.744782]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.744809]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.744836]  kthread+0x337/0x6f0
[   29.744858]  ? trace_preempt_on+0x20/0xc0
[   29.744886]  ? __pfx_kthread+0x10/0x10
[   29.744909]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.744934]  ? calculate_sigpending+0x7b/0xa0
[   29.744963]  ? __pfx_kthread+0x10/0x10
[   29.744988]  ret_from_fork+0x116/0x1d0
[   29.745011]  ? __pfx_kthread+0x10/0x10
[   29.745035]  ret_from_fork_asm+0x1a/0x30
[   29.745071]  </TASK>
[   29.745086] 
[   29.754271] Allocated by task 294:
[   29.754517]  kasan_save_stack+0x45/0x70
[   29.754754]  kasan_save_track+0x18/0x40
[   29.754935]  kasan_save_alloc_info+0x3b/0x50
[   29.755136]  __kasan_kmalloc+0xb7/0xc0
[   29.756333]  __kmalloc_cache_noprof+0x189/0x420
[   29.756547]  kasan_atomics+0x95/0x310
[   29.756702]  kunit_try_run_case+0x1a5/0x480
[   29.756864]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.757055]  kthread+0x337/0x6f0
[   29.757513]  ret_from_fork+0x116/0x1d0
[   29.757714]  ret_from_fork_asm+0x1a/0x30
[   29.757904] 
[   29.758012] The buggy address belongs to the object at ffff888102338080
[   29.758012]  which belongs to the cache kmalloc-64 of size 64
[   29.759392] The buggy address is located 0 bytes to the right of
[   29.759392]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.760400] 
[   29.760598] The buggy address belongs to the physical page:
[   29.761041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.761912] flags: 0x200000000000000(node=0|zone=2)
[   29.762621] page_type: f5(slab)
[   29.762874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.763138] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.763710] page dumped because: kasan: bad access detected
[   29.764033] 
[   29.764657] Memory state around the buggy address:
[   29.764881]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.765249]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.765792] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.766629]                                      ^
[   29.766843]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.767426]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.767937] ==================================================================
[   29.300842] ==================================================================
[   29.301867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   29.302523] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.302846] 
[   29.302999] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.303116] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.303148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.303200] Call Trace:
[   29.303248]  <TASK>
[   29.303294]  dump_stack_lvl+0x73/0xb0
[   29.303375]  print_report+0xd1/0x650
[   29.303449]  ? __virt_addr_valid+0x1db/0x2d0
[   29.303497]  ? kasan_atomics_helper+0x4a36/0x5450
[   29.303546]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.303605]  ? kasan_atomics_helper+0x4a36/0x5450
[   29.303659]  kasan_report+0x141/0x180
[   29.303714]  ? kasan_atomics_helper+0x4a36/0x5450
[   29.303779]  __asan_report_load4_noabort+0x18/0x20
[   29.303840]  kasan_atomics_helper+0x4a36/0x5450
[   29.303897]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.303952]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.304013]  ? kasan_atomics+0x152/0x310
[   29.304078]  kasan_atomics+0x1dc/0x310
[   29.304132]  ? __pfx_kasan_atomics+0x10/0x10
[   29.304188]  ? __pfx_read_tsc+0x10/0x10
[   29.304239]  ? ktime_get_ts64+0x86/0x230
[   29.304303]  kunit_try_run_case+0x1a5/0x480
[   29.304364]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.304412]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.304464]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.304516]  ? __kthread_parkme+0x82/0x180
[   29.304552]  ? preempt_count_sub+0x50/0x80
[   29.304597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.304642]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.304694]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.304741]  kthread+0x337/0x6f0
[   29.304797]  ? trace_preempt_on+0x20/0xc0
[   29.304872]  ? __pfx_kthread+0x10/0x10
[   29.304924]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.304975]  ? calculate_sigpending+0x7b/0xa0
[   29.305033]  ? __pfx_kthread+0x10/0x10
[   29.305086]  ret_from_fork+0x116/0x1d0
[   29.305132]  ? __pfx_kthread+0x10/0x10
[   29.305177]  ret_from_fork_asm+0x1a/0x30
[   29.305252]  </TASK>
[   29.305297] 
[   29.315321] Allocated by task 294:
[   29.315718]  kasan_save_stack+0x45/0x70
[   29.316048]  kasan_save_track+0x18/0x40
[   29.316372]  kasan_save_alloc_info+0x3b/0x50
[   29.316734]  __kasan_kmalloc+0xb7/0xc0
[   29.316989]  __kmalloc_cache_noprof+0x189/0x420
[   29.317491]  kasan_atomics+0x95/0x310
[   29.317777]  kunit_try_run_case+0x1a5/0x480
[   29.317993]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.318299]  kthread+0x337/0x6f0
[   29.318636]  ret_from_fork+0x116/0x1d0
[   29.318871]  ret_from_fork_asm+0x1a/0x30
[   29.319181] 
[   29.319329] The buggy address belongs to the object at ffff888102338080
[   29.319329]  which belongs to the cache kmalloc-64 of size 64
[   29.320031] The buggy address is located 0 bytes to the right of
[   29.320031]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.320899] 
[   29.321022] The buggy address belongs to the physical page:
[   29.321238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.321709] flags: 0x200000000000000(node=0|zone=2)
[   29.322139] page_type: f5(slab)
[   29.322433] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.323018] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.323808] page dumped because: kasan: bad access detected
[   29.324054] 
[   29.324209] Memory state around the buggy address:
[   29.324476]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.324805]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.325301] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.325769]                                      ^
[   29.326012]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.326687]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.327016] ==================================================================
[   29.123432] ==================================================================
[   29.124552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   29.125312] Read of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.125905] 
[   29.126108] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.126289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.126322] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.126377] Call Trace:
[   29.126422]  <TASK>
[   29.126475]  dump_stack_lvl+0x73/0xb0
[   29.126538]  print_report+0xd1/0x650
[   29.126566]  ? __virt_addr_valid+0x1db/0x2d0
[   29.126595]  ? kasan_atomics_helper+0x4a84/0x5450
[   29.126619]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.126649]  ? kasan_atomics_helper+0x4a84/0x5450
[   29.126674]  kasan_report+0x141/0x180
[   29.126698]  ? kasan_atomics_helper+0x4a84/0x5450
[   29.126727]  __asan_report_load4_noabort+0x18/0x20
[   29.126754]  kasan_atomics_helper+0x4a84/0x5450
[   29.126780]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.126804]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.126833]  ? kasan_atomics+0x152/0x310
[   29.126861]  kasan_atomics+0x1dc/0x310
[   29.126887]  ? __pfx_kasan_atomics+0x10/0x10
[   29.126914]  ? __pfx_read_tsc+0x10/0x10
[   29.126938]  ? ktime_get_ts64+0x86/0x230
[   29.126968]  kunit_try_run_case+0x1a5/0x480
[   29.126997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.127021]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.127047]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.127073]  ? __kthread_parkme+0x82/0x180
[   29.127098]  ? preempt_count_sub+0x50/0x80
[   29.127124]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.127174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.127214]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.127240]  kthread+0x337/0x6f0
[   29.127263]  ? trace_preempt_on+0x20/0xc0
[   29.127291]  ? __pfx_kthread+0x10/0x10
[   29.127316]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.127339]  ? calculate_sigpending+0x7b/0xa0
[   29.127368]  ? __pfx_kthread+0x10/0x10
[   29.127393]  ret_from_fork+0x116/0x1d0
[   29.127414]  ? __pfx_kthread+0x10/0x10
[   29.127438]  ret_from_fork_asm+0x1a/0x30
[   29.127494]  </TASK>
[   29.127510] 
[   29.140307] Allocated by task 294:
[   29.141010]  kasan_save_stack+0x45/0x70
[   29.141466]  kasan_save_track+0x18/0x40
[   29.141751]  kasan_save_alloc_info+0x3b/0x50
[   29.141969]  __kasan_kmalloc+0xb7/0xc0
[   29.142358]  __kmalloc_cache_noprof+0x189/0x420
[   29.142676]  kasan_atomics+0x95/0x310
[   29.142970]  kunit_try_run_case+0x1a5/0x480
[   29.143215]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.143506]  kthread+0x337/0x6f0
[   29.143695]  ret_from_fork+0x116/0x1d0
[   29.143986]  ret_from_fork_asm+0x1a/0x30
[   29.144348] 
[   29.144510] The buggy address belongs to the object at ffff888102338080
[   29.144510]  which belongs to the cache kmalloc-64 of size 64
[   29.145170] The buggy address is located 0 bytes to the right of
[   29.145170]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.145818] 
[   29.145983] The buggy address belongs to the physical page:
[   29.146294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.146886] flags: 0x200000000000000(node=0|zone=2)
[   29.147186] page_type: f5(slab)
[   29.147367] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.147913] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.148347] page dumped because: kasan: bad access detected
[   29.148679] 
[   29.148847] Memory state around the buggy address:
[   29.149078]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.149382]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.149985] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.150561]                                      ^
[   29.150906]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.151210]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.151761] ==================================================================
[   28.799923] ==================================================================
[   28.800706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   28.801342] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   28.801694] 
[   28.801886] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.801980] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.802007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.802061] Call Trace:
[   28.802102]  <TASK>
[   28.802138]  dump_stack_lvl+0x73/0xb0
[   28.802194]  print_report+0xd1/0x650
[   28.802232]  ? __virt_addr_valid+0x1db/0x2d0
[   28.802270]  ? kasan_atomics_helper+0x5fe/0x5450
[   28.802305]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.802346]  ? kasan_atomics_helper+0x5fe/0x5450
[   28.802386]  kasan_report+0x141/0x180
[   28.802428]  ? kasan_atomics_helper+0x5fe/0x5450
[   28.802496]  kasan_check_range+0x10c/0x1c0
[   28.802554]  __kasan_check_write+0x18/0x20
[   28.802609]  kasan_atomics_helper+0x5fe/0x5450
[   28.802662]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.802715]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.802776]  ? kasan_atomics+0x152/0x310
[   28.802843]  kasan_atomics+0x1dc/0x310
[   28.802896]  ? __pfx_kasan_atomics+0x10/0x10
[   28.802954]  ? __pfx_read_tsc+0x10/0x10
[   28.803004]  ? ktime_get_ts64+0x86/0x230
[   28.803066]  kunit_try_run_case+0x1a5/0x480
[   28.803125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.803179]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.803228]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.803269]  ? __kthread_parkme+0x82/0x180
[   28.803312]  ? preempt_count_sub+0x50/0x80
[   28.803363]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.803408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.803469]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.803523]  kthread+0x337/0x6f0
[   28.803567]  ? trace_preempt_on+0x20/0xc0
[   28.803622]  ? __pfx_kthread+0x10/0x10
[   28.803670]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.803722]  ? calculate_sigpending+0x7b/0xa0
[   28.803779]  ? __pfx_kthread+0x10/0x10
[   28.803831]  ret_from_fork+0x116/0x1d0
[   28.803879]  ? __pfx_kthread+0x10/0x10
[   28.803929]  ret_from_fork_asm+0x1a/0x30
[   28.804003]  </TASK>
[   28.804033] 
[   28.820021] Allocated by task 294:
[   28.820611]  kasan_save_stack+0x45/0x70
[   28.820849]  kasan_save_track+0x18/0x40
[   28.821194]  kasan_save_alloc_info+0x3b/0x50
[   28.821419]  __kasan_kmalloc+0xb7/0xc0
[   28.821662]  __kmalloc_cache_noprof+0x189/0x420
[   28.822036]  kasan_atomics+0x95/0x310
[   28.822386]  kunit_try_run_case+0x1a5/0x480
[   28.822659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.822914]  kthread+0x337/0x6f0
[   28.823180]  ret_from_fork+0x116/0x1d0
[   28.823379]  ret_from_fork_asm+0x1a/0x30
[   28.823663] 
[   28.823839] The buggy address belongs to the object at ffff888102338080
[   28.823839]  which belongs to the cache kmalloc-64 of size 64
[   28.824511] The buggy address is located 0 bytes to the right of
[   28.824511]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   28.825169] 
[   28.825289] The buggy address belongs to the physical page:
[   28.825591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   28.826115] flags: 0x200000000000000(node=0|zone=2)
[   28.826372] page_type: f5(slab)
[   28.826680] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.826968] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.827337] page dumped because: kasan: bad access detected
[   28.827752] 
[   28.827958] Memory state around the buggy address:
[   28.828240]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.828519]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.829030] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.829537]                                      ^
[   28.829818]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.830182]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.830601] ==================================================================
[   29.093958] ==================================================================
[   29.095456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   29.096046] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.096609] 
[   29.096818] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.096909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.096933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.096971] Call Trace:
[   29.097011]  <TASK>
[   29.097049]  dump_stack_lvl+0x73/0xb0
[   29.097106]  print_report+0xd1/0x650
[   29.097145]  ? __virt_addr_valid+0x1db/0x2d0
[   29.097184]  ? kasan_atomics_helper+0xc70/0x5450
[   29.097222]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.097277]  ? kasan_atomics_helper+0xc70/0x5450
[   29.097325]  kasan_report+0x141/0x180
[   29.097379]  ? kasan_atomics_helper+0xc70/0x5450
[   29.097627]  kasan_check_range+0x10c/0x1c0
[   29.097697]  __kasan_check_write+0x18/0x20
[   29.097749]  kasan_atomics_helper+0xc70/0x5450
[   29.098058]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.098120]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.098170]  ? kasan_atomics+0x152/0x310
[   29.098230]  kasan_atomics+0x1dc/0x310
[   29.098282]  ? __pfx_kasan_atomics+0x10/0x10
[   29.098340]  ? __pfx_read_tsc+0x10/0x10
[   29.098392]  ? ktime_get_ts64+0x86/0x230
[   29.098473]  kunit_try_run_case+0x1a5/0x480
[   29.098531]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.098578]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.098629]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.098682]  ? __kthread_parkme+0x82/0x180
[   29.098734]  ? preempt_count_sub+0x50/0x80
[   29.098792]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.098847]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.098897]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.098950]  kthread+0x337/0x6f0
[   29.098999]  ? trace_preempt_on+0x20/0xc0
[   29.099051]  ? __pfx_kthread+0x10/0x10
[   29.099093]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.099189]  ? calculate_sigpending+0x7b/0xa0
[   29.099250]  ? __pfx_kthread+0x10/0x10
[   29.099296]  ret_from_fork+0x116/0x1d0
[   29.099336]  ? __pfx_kthread+0x10/0x10
[   29.099389]  ret_from_fork_asm+0x1a/0x30
[   29.099476]  </TASK>
[   29.099509] 
[   29.108734] Allocated by task 294:
[   29.108989]  kasan_save_stack+0x45/0x70
[   29.109300]  kasan_save_track+0x18/0x40
[   29.110434]  kasan_save_alloc_info+0x3b/0x50
[   29.110751]  __kasan_kmalloc+0xb7/0xc0
[   29.110938]  __kmalloc_cache_noprof+0x189/0x420
[   29.111135]  kasan_atomics+0x95/0x310
[   29.111472]  kunit_try_run_case+0x1a5/0x480
[   29.111835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.112299]  kthread+0x337/0x6f0
[   29.112638]  ret_from_fork+0x116/0x1d0
[   29.113465]  ret_from_fork_asm+0x1a/0x30
[   29.113806] 
[   29.113913] The buggy address belongs to the object at ffff888102338080
[   29.113913]  which belongs to the cache kmalloc-64 of size 64
[   29.114943] The buggy address is located 0 bytes to the right of
[   29.114943]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.115706] 
[   29.115906] The buggy address belongs to the physical page:
[   29.116395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.116802] flags: 0x200000000000000(node=0|zone=2)
[   29.117456] page_type: f5(slab)
[   29.117709] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.118120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.118865] page dumped because: kasan: bad access detected
[   29.119247] 
[   29.119405] Memory state around the buggy address:
[   29.119710]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.120653]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.121156] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.121567]                                      ^
[   29.121868]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.122287]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.122569] ==================================================================
[   29.065816] ==================================================================
[   29.066232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   29.066598] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.067241] 
[   29.067404] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.067527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.067558] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.067611] Call Trace:
[   29.067660]  <TASK>
[   29.067707]  dump_stack_lvl+0x73/0xb0
[   29.067772]  print_report+0xd1/0x650
[   29.067821]  ? __virt_addr_valid+0x1db/0x2d0
[   29.067871]  ? kasan_atomics_helper+0xb6a/0x5450
[   29.067910]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.067961]  ? kasan_atomics_helper+0xb6a/0x5450
[   29.068007]  kasan_report+0x141/0x180
[   29.068057]  ? kasan_atomics_helper+0xb6a/0x5450
[   29.068113]  kasan_check_range+0x10c/0x1c0
[   29.068203]  __kasan_check_write+0x18/0x20
[   29.068259]  kasan_atomics_helper+0xb6a/0x5450
[   29.068312]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.068367]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.068418]  ? kasan_atomics+0x152/0x310
[   29.068484]  kasan_atomics+0x1dc/0x310
[   29.068537]  ? __pfx_kasan_atomics+0x10/0x10
[   29.068593]  ? __pfx_read_tsc+0x10/0x10
[   29.068632]  ? ktime_get_ts64+0x86/0x230
[   29.068688]  kunit_try_run_case+0x1a5/0x480
[   29.068737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.068779]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.068827]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.068874]  ? __kthread_parkme+0x82/0x180
[   29.068915]  ? preempt_count_sub+0x50/0x80
[   29.068962]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.069012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.069066]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.069112]  kthread+0x337/0x6f0
[   29.069194]  ? trace_preempt_on+0x20/0xc0
[   29.069243]  ? __pfx_kthread+0x10/0x10
[   29.069289]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.069330]  ? calculate_sigpending+0x7b/0xa0
[   29.069382]  ? __pfx_kthread+0x10/0x10
[   29.069429]  ret_from_fork+0x116/0x1d0
[   29.069486]  ? __pfx_kthread+0x10/0x10
[   29.069534]  ret_from_fork_asm+0x1a/0x30
[   29.069602]  </TASK>
[   29.069633] 
[   29.079630] Allocated by task 294:
[   29.079923]  kasan_save_stack+0x45/0x70
[   29.080315]  kasan_save_track+0x18/0x40
[   29.080639]  kasan_save_alloc_info+0x3b/0x50
[   29.080931]  __kasan_kmalloc+0xb7/0xc0
[   29.081202]  __kmalloc_cache_noprof+0x189/0x420
[   29.081570]  kasan_atomics+0x95/0x310
[   29.081776]  kunit_try_run_case+0x1a5/0x480
[   29.082078]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.083259]  kthread+0x337/0x6f0
[   29.083635]  ret_from_fork+0x116/0x1d0
[   29.083943]  ret_from_fork_asm+0x1a/0x30
[   29.084113] 
[   29.084294] The buggy address belongs to the object at ffff888102338080
[   29.084294]  which belongs to the cache kmalloc-64 of size 64
[   29.085032] The buggy address is located 0 bytes to the right of
[   29.085032]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.085712] 
[   29.085844] The buggy address belongs to the physical page:
[   29.086101] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.086435] flags: 0x200000000000000(node=0|zone=2)
[   29.086858] page_type: f5(slab)
[   29.087172] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.087711] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.088171] page dumped because: kasan: bad access detected
[   29.088487] 
[   29.088597] Memory state around the buggy address:
[   29.088907]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.089196]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.089472] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.090005]                                      ^
[   29.090447]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.090968]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.091320] ==================================================================
[   30.161975] ==================================================================
[   30.162371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   30.163258] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   30.163808] 
[   30.163953] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.164065] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.164096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.164148] Call Trace:
[   30.164196]  <TASK>
[   30.164240]  dump_stack_lvl+0x73/0xb0
[   30.164315]  print_report+0xd1/0x650
[   30.164436]  ? __virt_addr_valid+0x1db/0x2d0
[   30.164501]  ? kasan_atomics_helper+0x1eaa/0x5450
[   30.164548]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.164610]  ? kasan_atomics_helper+0x1eaa/0x5450
[   30.164663]  kasan_report+0x141/0x180
[   30.164717]  ? kasan_atomics_helper+0x1eaa/0x5450
[   30.164783]  kasan_check_range+0x10c/0x1c0
[   30.164839]  __kasan_check_write+0x18/0x20
[   30.164884]  kasan_atomics_helper+0x1eaa/0x5450
[   30.164927]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.164970]  ? __kmalloc_cache_noprof+0x189/0x420
[   30.165024]  ? kasan_atomics+0x152/0x310
[   30.165129]  kasan_atomics+0x1dc/0x310
[   30.165234]  ? __pfx_kasan_atomics+0x10/0x10
[   30.165284]  ? __pfx_read_tsc+0x10/0x10
[   30.165333]  ? ktime_get_ts64+0x86/0x230
[   30.165401]  kunit_try_run_case+0x1a5/0x480
[   30.165473]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.165515]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.165543]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.165569]  ? __kthread_parkme+0x82/0x180
[   30.165595]  ? preempt_count_sub+0x50/0x80
[   30.165623]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.165650]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.165678]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.165705]  kthread+0x337/0x6f0
[   30.165728]  ? trace_preempt_on+0x20/0xc0
[   30.165755]  ? __pfx_kthread+0x10/0x10
[   30.165778]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.165803]  ? calculate_sigpending+0x7b/0xa0
[   30.165831]  ? __pfx_kthread+0x10/0x10
[   30.165856]  ret_from_fork+0x116/0x1d0
[   30.165878]  ? __pfx_kthread+0x10/0x10
[   30.165901]  ret_from_fork_asm+0x1a/0x30
[   30.165937]  </TASK>
[   30.165952] 
[   30.177164] Allocated by task 294:
[   30.177530]  kasan_save_stack+0x45/0x70
[   30.177980]  kasan_save_track+0x18/0x40
[   30.178389]  kasan_save_alloc_info+0x3b/0x50
[   30.178813]  __kasan_kmalloc+0xb7/0xc0
[   30.179199]  __kmalloc_cache_noprof+0x189/0x420
[   30.179631]  kasan_atomics+0x95/0x310
[   30.179824]  kunit_try_run_case+0x1a5/0x480
[   30.180019]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.180629]  kthread+0x337/0x6f0
[   30.180919]  ret_from_fork+0x116/0x1d0
[   30.181241]  ret_from_fork_asm+0x1a/0x30
[   30.181481] 
[   30.181589] The buggy address belongs to the object at ffff888102338080
[   30.181589]  which belongs to the cache kmalloc-64 of size 64
[   30.182672] The buggy address is located 0 bytes to the right of
[   30.182672]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   30.183063] 
[   30.183589] The buggy address belongs to the physical page:
[   30.184107] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   30.184751] flags: 0x200000000000000(node=0|zone=2)
[   30.185164] page_type: f5(slab)
[   30.185356] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.185683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.185962] page dumped because: kasan: bad access detected
[   30.186266] 
[   30.186438] Memory state around the buggy address:
[   30.186902]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.187840]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.188723] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.189308]                                      ^
[   30.189695]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.190092]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.190594] ==================================================================
[   30.278989] ==================================================================
[   30.279666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   30.280290] Read of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   30.280810] 
[   30.280968] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.281058] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.281083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.281121] Call Trace:
[   30.281182]  <TASK>
[   30.281221]  dump_stack_lvl+0x73/0xb0
[   30.281278]  print_report+0xd1/0x650
[   30.281317]  ? __virt_addr_valid+0x1db/0x2d0
[   30.281358]  ? kasan_atomics_helper+0x4f98/0x5450
[   30.281393]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.281433]  ? kasan_atomics_helper+0x4f98/0x5450
[   30.281483]  kasan_report+0x141/0x180
[   30.281521]  ? kasan_atomics_helper+0x4f98/0x5450
[   30.281597]  __asan_report_load8_noabort+0x18/0x20
[   30.281651]  kasan_atomics_helper+0x4f98/0x5450
[   30.281703]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.281745]  ? __kmalloc_cache_noprof+0x189/0x420
[   30.281798]  ? kasan_atomics+0x152/0x310
[   30.281853]  kasan_atomics+0x1dc/0x310
[   30.281933]  ? __pfx_kasan_atomics+0x10/0x10
[   30.281985]  ? __pfx_read_tsc+0x10/0x10
[   30.282042]  ? ktime_get_ts64+0x86/0x230
[   30.282107]  kunit_try_run_case+0x1a5/0x480
[   30.282218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.282272]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.282325]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.282381]  ? __kthread_parkme+0x82/0x180
[   30.282431]  ? preempt_count_sub+0x50/0x80
[   30.282516]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.282572]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.282625]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.282673]  kthread+0x337/0x6f0
[   30.282714]  ? trace_preempt_on+0x20/0xc0
[   30.282768]  ? __pfx_kthread+0x10/0x10
[   30.282837]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.282887]  ? calculate_sigpending+0x7b/0xa0
[   30.282940]  ? __pfx_kthread+0x10/0x10
[   30.282991]  ret_from_fork+0x116/0x1d0
[   30.283041]  ? __pfx_kthread+0x10/0x10
[   30.283111]  ret_from_fork_asm+0x1a/0x30
[   30.283219]  </TASK>
[   30.283251] 
[   30.293618] Allocated by task 294:
[   30.293989]  kasan_save_stack+0x45/0x70
[   30.294344]  kasan_save_track+0x18/0x40
[   30.294604]  kasan_save_alloc_info+0x3b/0x50
[   30.294956]  __kasan_kmalloc+0xb7/0xc0
[   30.295257]  __kmalloc_cache_noprof+0x189/0x420
[   30.295524]  kasan_atomics+0x95/0x310
[   30.295724]  kunit_try_run_case+0x1a5/0x480
[   30.295911]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.296131]  kthread+0x337/0x6f0
[   30.296342]  ret_from_fork+0x116/0x1d0
[   30.296528]  ret_from_fork_asm+0x1a/0x30
[   30.296721] 
[   30.296830] The buggy address belongs to the object at ffff888102338080
[   30.296830]  which belongs to the cache kmalloc-64 of size 64
[   30.297408] The buggy address is located 0 bytes to the right of
[   30.297408]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   30.298358] 
[   30.298553] The buggy address belongs to the physical page:
[   30.298988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   30.299600] flags: 0x200000000000000(node=0|zone=2)
[   30.299978] page_type: f5(slab)
[   30.300174] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.300473] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.301013] page dumped because: kasan: bad access detected
[   30.301438] 
[   30.301614] Memory state around the buggy address:
[   30.301983]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.304564]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.305017] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.305371]                                      ^
[   30.305612]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.306390]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.306926] ==================================================================
[   29.950543] ==================================================================
[   29.951580] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   29.952084] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.952432] 
[   29.952659] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.952765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.952797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.952860] Call Trace:
[   29.952921]  <TASK>
[   29.952968]  dump_stack_lvl+0x73/0xb0
[   29.953065]  print_report+0xd1/0x650
[   29.953113]  ? __virt_addr_valid+0x1db/0x2d0
[   29.953195]  ? kasan_atomics_helper+0x1a7f/0x5450
[   29.953242]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.953301]  ? kasan_atomics_helper+0x1a7f/0x5450
[   29.953355]  kasan_report+0x141/0x180
[   29.953410]  ? kasan_atomics_helper+0x1a7f/0x5450
[   29.953498]  kasan_check_range+0x10c/0x1c0
[   29.953557]  __kasan_check_write+0x18/0x20
[   29.953613]  kasan_atomics_helper+0x1a7f/0x5450
[   29.953669]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.953721]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.953780]  ? kasan_atomics+0x152/0x310
[   29.953838]  kasan_atomics+0x1dc/0x310
[   29.953873]  ? __pfx_kasan_atomics+0x10/0x10
[   29.953902]  ? __pfx_read_tsc+0x10/0x10
[   29.953928]  ? ktime_get_ts64+0x86/0x230
[   29.953961]  kunit_try_run_case+0x1a5/0x480
[   29.953991]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.954017]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.954063]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.954090]  ? __kthread_parkme+0x82/0x180
[   29.954114]  ? preempt_count_sub+0x50/0x80
[   29.954160]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.954207]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.954251]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.954296]  kthread+0x337/0x6f0
[   29.954340]  ? trace_preempt_on+0x20/0xc0
[   29.954417]  ? __pfx_kthread+0x10/0x10
[   29.954468]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.954518]  ? calculate_sigpending+0x7b/0xa0
[   29.954573]  ? __pfx_kthread+0x10/0x10
[   29.954619]  ret_from_fork+0x116/0x1d0
[   29.954665]  ? __pfx_kthread+0x10/0x10
[   29.954731]  ret_from_fork_asm+0x1a/0x30
[   29.954801]  </TASK>
[   29.954832] 
[   29.965733] Allocated by task 294:
[   29.966129]  kasan_save_stack+0x45/0x70
[   29.966451]  kasan_save_track+0x18/0x40
[   29.966635]  kasan_save_alloc_info+0x3b/0x50
[   29.966898]  __kasan_kmalloc+0xb7/0xc0
[   29.967223]  __kmalloc_cache_noprof+0x189/0x420
[   29.967799]  kasan_atomics+0x95/0x310
[   29.968578]  kunit_try_run_case+0x1a5/0x480
[   29.969291]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.969997]  kthread+0x337/0x6f0
[   29.970413]  ret_from_fork+0x116/0x1d0
[   29.970739]  ret_from_fork_asm+0x1a/0x30
[   29.970984] 
[   29.971153] The buggy address belongs to the object at ffff888102338080
[   29.971153]  which belongs to the cache kmalloc-64 of size 64
[   29.971833] The buggy address is located 0 bytes to the right of
[   29.971833]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.973101] 
[   29.973264] The buggy address belongs to the physical page:
[   29.973593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.974180] flags: 0x200000000000000(node=0|zone=2)
[   29.974465] page_type: f5(slab)
[   29.974699] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.975076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.976094] page dumped because: kasan: bad access detected
[   29.976504] 
[   29.976674] Memory state around the buggy address:
[   29.977003]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.977735]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.978398] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.978785]                                      ^
[   29.979308]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.979788]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.980258] ==================================================================
[   29.981564] ==================================================================
[   29.982168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   29.982732] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.983048] 
[   29.983389] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.983545] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.983576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.983627] Call Trace:
[   29.983673]  <TASK>
[   29.983747]  dump_stack_lvl+0x73/0xb0
[   29.983841]  print_report+0xd1/0x650
[   29.983896]  ? __virt_addr_valid+0x1db/0x2d0
[   29.983955]  ? kasan_atomics_helper+0x1b22/0x5450
[   29.984009]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.984064]  ? kasan_atomics_helper+0x1b22/0x5450
[   29.984112]  kasan_report+0x141/0x180
[   29.984223]  ? kasan_atomics_helper+0x1b22/0x5450
[   29.984299]  kasan_check_range+0x10c/0x1c0
[   29.984357]  __kasan_check_write+0x18/0x20
[   29.984395]  kasan_atomics_helper+0x1b22/0x5450
[   29.984421]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.984470]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.984504]  ? kasan_atomics+0x152/0x310
[   29.984535]  kasan_atomics+0x1dc/0x310
[   29.984561]  ? __pfx_kasan_atomics+0x10/0x10
[   29.984588]  ? __pfx_read_tsc+0x10/0x10
[   29.984614]  ? ktime_get_ts64+0x86/0x230
[   29.984646]  kunit_try_run_case+0x1a5/0x480
[   29.984677]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.984703]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.984730]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.984756]  ? __kthread_parkme+0x82/0x180
[   29.984780]  ? preempt_count_sub+0x50/0x80
[   29.984808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.984834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.984861]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.984888]  kthread+0x337/0x6f0
[   29.984911]  ? trace_preempt_on+0x20/0xc0
[   29.984937]  ? __pfx_kthread+0x10/0x10
[   29.984961]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.984986]  ? calculate_sigpending+0x7b/0xa0
[   29.985013]  ? __pfx_kthread+0x10/0x10
[   29.985037]  ret_from_fork+0x116/0x1d0
[   29.985059]  ? __pfx_kthread+0x10/0x10
[   29.985083]  ret_from_fork_asm+0x1a/0x30
[   29.985118]  </TASK>
[   29.985135] 
[   29.995810] Allocated by task 294:
[   29.996190]  kasan_save_stack+0x45/0x70
[   29.996677]  kasan_save_track+0x18/0x40
[   29.997060]  kasan_save_alloc_info+0x3b/0x50
[   29.997467]  __kasan_kmalloc+0xb7/0xc0
[   29.997663]  __kmalloc_cache_noprof+0x189/0x420
[   29.997872]  kasan_atomics+0x95/0x310
[   29.998063]  kunit_try_run_case+0x1a5/0x480
[   29.998551]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.999056]  kthread+0x337/0x6f0
[   29.999402]  ret_from_fork+0x116/0x1d0
[   29.999824]  ret_from_fork_asm+0x1a/0x30
[   30.000269] 
[   30.000514] The buggy address belongs to the object at ffff888102338080
[   30.000514]  which belongs to the cache kmalloc-64 of size 64
[   30.001614] The buggy address is located 0 bytes to the right of
[   30.001614]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   30.002402] 
[   30.002613] The buggy address belongs to the physical page:
[   30.003168] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   30.003569] flags: 0x200000000000000(node=0|zone=2)
[   30.003798] page_type: f5(slab)
[   30.004103] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.004758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.005028] page dumped because: kasan: bad access detected
[   30.005640] 
[   30.005822] Memory state around the buggy address:
[   30.006414]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.006794]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.007715] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.008088]                                      ^
[   30.008451]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.009105]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.009532] ==================================================================
[   29.329188] ==================================================================
[   29.330658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   29.331079] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.331696] 
[   29.331880] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.332017] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.332052] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.332105] Call Trace:
[   29.332152]  <TASK>
[   29.332195]  dump_stack_lvl+0x73/0xb0
[   29.332267]  print_report+0xd1/0x650
[   29.332313]  ? __virt_addr_valid+0x1db/0x2d0
[   29.332365]  ? kasan_atomics_helper+0x1079/0x5450
[   29.332414]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.333114]  ? kasan_atomics_helper+0x1079/0x5450
[   29.333173]  kasan_report+0x141/0x180
[   29.333229]  ? kasan_atomics_helper+0x1079/0x5450
[   29.333294]  kasan_check_range+0x10c/0x1c0
[   29.333352]  __kasan_check_write+0x18/0x20
[   29.333408]  kasan_atomics_helper+0x1079/0x5450
[   29.333499]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.333552]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.333606]  ? kasan_atomics+0x152/0x310
[   29.333668]  kasan_atomics+0x1dc/0x310
[   29.333724]  ? __pfx_kasan_atomics+0x10/0x10
[   29.333781]  ? __pfx_read_tsc+0x10/0x10
[   29.333833]  ? ktime_get_ts64+0x86/0x230
[   29.333898]  kunit_try_run_case+0x1a5/0x480
[   29.333959]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.334014]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.334078]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.334134]  ? __kthread_parkme+0x82/0x180
[   29.334181]  ? preempt_count_sub+0x50/0x80
[   29.334237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.334293]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.334351]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.334403]  kthread+0x337/0x6f0
[   29.334450]  ? trace_preempt_on+0x20/0xc0
[   29.334505]  ? __pfx_kthread+0x10/0x10
[   29.334550]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.334602]  ? calculate_sigpending+0x7b/0xa0
[   29.334659]  ? __pfx_kthread+0x10/0x10
[   29.334713]  ret_from_fork+0x116/0x1d0
[   29.334759]  ? __pfx_kthread+0x10/0x10
[   29.334811]  ret_from_fork_asm+0x1a/0x30
[   29.334888]  </TASK>
[   29.334918] 
[   29.344422] Allocated by task 294:
[   29.344827]  kasan_save_stack+0x45/0x70
[   29.345239]  kasan_save_track+0x18/0x40
[   29.345624]  kasan_save_alloc_info+0x3b/0x50
[   29.346002]  __kasan_kmalloc+0xb7/0xc0
[   29.346337]  __kmalloc_cache_noprof+0x189/0x420
[   29.346590]  kasan_atomics+0x95/0x310
[   29.346793]  kunit_try_run_case+0x1a5/0x480
[   29.347020]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.347524]  kthread+0x337/0x6f0
[   29.347827]  ret_from_fork+0x116/0x1d0
[   29.348155]  ret_from_fork_asm+0x1a/0x30
[   29.348510] 
[   29.348669] The buggy address belongs to the object at ffff888102338080
[   29.348669]  which belongs to the cache kmalloc-64 of size 64
[   29.349583] The buggy address is located 0 bytes to the right of
[   29.349583]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.350351] 
[   29.350513] The buggy address belongs to the physical page:
[   29.350762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.351105] flags: 0x200000000000000(node=0|zone=2)
[   29.351554] page_type: f5(slab)
[   29.351860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.352477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.353054] page dumped because: kasan: bad access detected
[   29.353613] 
[   29.353776] Memory state around the buggy address:
[   29.354039]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.354614]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.355038] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.355641]                                      ^
[   29.355940]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.356299]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.356833] ==================================================================
[   30.393070] ==================================================================
[   30.393617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   30.394007] Read of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   30.394300] 
[   30.394455] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.394543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.394565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.394604] Call Trace:
[   30.394644]  <TASK>
[   30.394678]  dump_stack_lvl+0x73/0xb0
[   30.394731]  print_report+0xd1/0x650
[   30.394767]  ? __virt_addr_valid+0x1db/0x2d0
[   30.394807]  ? kasan_atomics_helper+0x4fa5/0x5450
[   30.394842]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.394882]  ? kasan_atomics_helper+0x4fa5/0x5450
[   30.394918]  kasan_report+0x141/0x180
[   30.394954]  ? kasan_atomics_helper+0x4fa5/0x5450
[   30.394996]  __asan_report_load8_noabort+0x18/0x20
[   30.395036]  kasan_atomics_helper+0x4fa5/0x5450
[   30.395072]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.395108]  ? __kmalloc_cache_noprof+0x189/0x420
[   30.395150]  ? kasan_atomics+0x152/0x310
[   30.395198]  kasan_atomics+0x1dc/0x310
[   30.395244]  ? __pfx_kasan_atomics+0x10/0x10
[   30.395292]  ? __pfx_read_tsc+0x10/0x10
[   30.395340]  ? ktime_get_ts64+0x86/0x230
[   30.395399]  kunit_try_run_case+0x1a5/0x480
[   30.395545]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.395611]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.395662]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.395703]  ? __kthread_parkme+0x82/0x180
[   30.395746]  ? preempt_count_sub+0x50/0x80
[   30.395791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.395833]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.395874]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.395921]  kthread+0x337/0x6f0
[   30.395965]  ? trace_preempt_on+0x20/0xc0
[   30.396019]  ? __pfx_kthread+0x10/0x10
[   30.396071]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.396123]  ? calculate_sigpending+0x7b/0xa0
[   30.396223]  ? __pfx_kthread+0x10/0x10
[   30.396279]  ret_from_fork+0x116/0x1d0
[   30.396328]  ? __pfx_kthread+0x10/0x10
[   30.396380]  ret_from_fork_asm+0x1a/0x30
[   30.396463]  </TASK>
[   30.396490] 
[   30.406105] Allocated by task 294:
[   30.406515]  kasan_save_stack+0x45/0x70
[   30.406862]  kasan_save_track+0x18/0x40
[   30.407069]  kasan_save_alloc_info+0x3b/0x50
[   30.407326]  __kasan_kmalloc+0xb7/0xc0
[   30.407652]  __kmalloc_cache_noprof+0x189/0x420
[   30.408030]  kasan_atomics+0x95/0x310
[   30.408384]  kunit_try_run_case+0x1a5/0x480
[   30.408758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.409221]  kthread+0x337/0x6f0
[   30.409549]  ret_from_fork+0x116/0x1d0
[   30.409741]  ret_from_fork_asm+0x1a/0x30
[   30.410079] 
[   30.410284] The buggy address belongs to the object at ffff888102338080
[   30.410284]  which belongs to the cache kmalloc-64 of size 64
[   30.410890] The buggy address is located 0 bytes to the right of
[   30.410890]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   30.411684] 
[   30.411895] The buggy address belongs to the physical page:
[   30.412306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   30.414844] flags: 0x200000000000000(node=0|zone=2)
[   30.415716] page_type: f5(slab)
[   30.415896] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.416376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.416845] page dumped because: kasan: bad access detected
[   30.417221] 
[   30.417384] Memory state around the buggy address:
[   30.417762]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.418199]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.418637] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.419564]                                      ^
[   30.419843]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.420416]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.420982] ==================================================================
[   30.191972] ==================================================================
[   30.192523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   30.192966] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   30.193839] 
[   30.194131] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.194277] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.194310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.194377] Call Trace:
[   30.194425]  <TASK>
[   30.194485]  dump_stack_lvl+0x73/0xb0
[   30.194597]  print_report+0xd1/0x650
[   30.194668]  ? __virt_addr_valid+0x1db/0x2d0
[   30.194722]  ? kasan_atomics_helper+0x1f43/0x5450
[   30.194771]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.194859]  ? kasan_atomics_helper+0x1f43/0x5450
[   30.194928]  kasan_report+0x141/0x180
[   30.194969]  ? kasan_atomics_helper+0x1f43/0x5450
[   30.194999]  kasan_check_range+0x10c/0x1c0
[   30.195026]  __kasan_check_write+0x18/0x20
[   30.195053]  kasan_atomics_helper+0x1f43/0x5450
[   30.195084]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.195127]  ? __kmalloc_cache_noprof+0x189/0x420
[   30.195173]  ? kasan_atomics+0x152/0x310
[   30.195228]  kasan_atomics+0x1dc/0x310
[   30.195308]  ? __pfx_kasan_atomics+0x10/0x10
[   30.195360]  ? __pfx_read_tsc+0x10/0x10
[   30.195427]  ? ktime_get_ts64+0x86/0x230
[   30.195501]  kunit_try_run_case+0x1a5/0x480
[   30.195587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.195653]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.195709]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.195758]  ? __kthread_parkme+0x82/0x180
[   30.195786]  ? preempt_count_sub+0x50/0x80
[   30.195814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.195841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.195870]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.195898]  kthread+0x337/0x6f0
[   30.195922]  ? trace_preempt_on+0x20/0xc0
[   30.195949]  ? __pfx_kthread+0x10/0x10
[   30.195973]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.195996]  ? calculate_sigpending+0x7b/0xa0
[   30.196024]  ? __pfx_kthread+0x10/0x10
[   30.196049]  ret_from_fork+0x116/0x1d0
[   30.196071]  ? __pfx_kthread+0x10/0x10
[   30.196095]  ret_from_fork_asm+0x1a/0x30
[   30.196129]  </TASK>
[   30.196146] 
[   30.207088] Allocated by task 294:
[   30.207288]  kasan_save_stack+0x45/0x70
[   30.207489]  kasan_save_track+0x18/0x40
[   30.207703]  kasan_save_alloc_info+0x3b/0x50
[   30.207936]  __kasan_kmalloc+0xb7/0xc0
[   30.208136]  __kmalloc_cache_noprof+0x189/0x420
[   30.208309]  kasan_atomics+0x95/0x310
[   30.208664]  kunit_try_run_case+0x1a5/0x480
[   30.209008]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.209485]  kthread+0x337/0x6f0
[   30.209710]  ret_from_fork+0x116/0x1d0
[   30.209880]  ret_from_fork_asm+0x1a/0x30
[   30.210073] 
[   30.210198] The buggy address belongs to the object at ffff888102338080
[   30.210198]  which belongs to the cache kmalloc-64 of size 64
[   30.210973] The buggy address is located 0 bytes to the right of
[   30.210973]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   30.212049] 
[   30.212247] The buggy address belongs to the physical page:
[   30.212484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   30.212856] flags: 0x200000000000000(node=0|zone=2)
[   30.213125] page_type: f5(slab)
[   30.213532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.214174] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.214892] page dumped because: kasan: bad access detected
[   30.215489] 
[   30.215677] Memory state around the buggy address:
[   30.216297]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.216779]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.217381] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.217749]                                      ^
[   30.218410]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.218875]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.219507] ==================================================================
[   29.592005] ==================================================================
[   29.592714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   29.593387] Read of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.593959] 
[   29.594221] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.594341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.594373] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.594426] Call Trace:
[   29.594482]  <TASK>
[   29.594528]  dump_stack_lvl+0x73/0xb0
[   29.594604]  print_report+0xd1/0x650
[   29.594661]  ? __virt_addr_valid+0x1db/0x2d0
[   29.594719]  ? kasan_atomics_helper+0x4eae/0x5450
[   29.594772]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.594834]  ? kasan_atomics_helper+0x4eae/0x5450
[   29.594888]  kasan_report+0x141/0x180
[   29.594943]  ? kasan_atomics_helper+0x4eae/0x5450
[   29.595008]  __asan_report_load8_noabort+0x18/0x20
[   29.595067]  kasan_atomics_helper+0x4eae/0x5450
[   29.595109]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.595189]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.595241]  ? kasan_atomics+0x152/0x310
[   29.595296]  kasan_atomics+0x1dc/0x310
[   29.595343]  ? __pfx_kasan_atomics+0x10/0x10
[   29.595399]  ? __pfx_read_tsc+0x10/0x10
[   29.595457]  ? ktime_get_ts64+0x86/0x230
[   29.595546]  kunit_try_run_case+0x1a5/0x480
[   29.595600]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.595647]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.595691]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.595738]  ? __kthread_parkme+0x82/0x180
[   29.595784]  ? preempt_count_sub+0x50/0x80
[   29.595837]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.595891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.595944]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.596000]  kthread+0x337/0x6f0
[   29.596048]  ? trace_preempt_on+0x20/0xc0
[   29.596096]  ? __pfx_kthread+0x10/0x10
[   29.596181]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.596234]  ? calculate_sigpending+0x7b/0xa0
[   29.596290]  ? __pfx_kthread+0x10/0x10
[   29.596356]  ret_from_fork+0x116/0x1d0
[   29.596402]  ? __pfx_kthread+0x10/0x10
[   29.596457]  ret_from_fork_asm+0x1a/0x30
[   29.596533]  </TASK>
[   29.596567] 
[   29.606220] Allocated by task 294:
[   29.606593]  kasan_save_stack+0x45/0x70
[   29.606992]  kasan_save_track+0x18/0x40
[   29.607333]  kasan_save_alloc_info+0x3b/0x50
[   29.608411]  __kasan_kmalloc+0xb7/0xc0
[   29.608793]  __kmalloc_cache_noprof+0x189/0x420
[   29.609008]  kasan_atomics+0x95/0x310
[   29.609181]  kunit_try_run_case+0x1a5/0x480
[   29.609350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.609571]  kthread+0x337/0x6f0
[   29.609714]  ret_from_fork+0x116/0x1d0
[   29.609865]  ret_from_fork_asm+0x1a/0x30
[   29.610035] 
[   29.610127] The buggy address belongs to the object at ffff888102338080
[   29.610127]  which belongs to the cache kmalloc-64 of size 64
[   29.610712] The buggy address is located 0 bytes to the right of
[   29.610712]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.612902] 
[   29.613136] The buggy address belongs to the physical page:
[   29.613387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.614253] flags: 0x200000000000000(node=0|zone=2)
[   29.614556] page_type: f5(slab)
[   29.614740] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.615025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.615344] page dumped because: kasan: bad access detected
[   29.615806] 
[   29.615975] Memory state around the buggy address:
[   29.616294]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.616569]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.617101] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.617588]                                      ^
[   29.617816]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.618376]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.618785] ==================================================================
[   28.914955] ==================================================================
[   28.915421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   28.915774] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   28.916054] 
[   28.916201] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.916310] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.916338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.916384] Call Trace:
[   28.916425]  <TASK>
[   28.916480]  dump_stack_lvl+0x73/0xb0
[   28.916548]  print_report+0xd1/0x650
[   28.916603]  ? __virt_addr_valid+0x1db/0x2d0
[   28.916662]  ? kasan_atomics_helper+0x860/0x5450
[   28.916714]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.916776]  ? kasan_atomics_helper+0x860/0x5450
[   28.916830]  kasan_report+0x141/0x180
[   28.916884]  ? kasan_atomics_helper+0x860/0x5450
[   28.916947]  kasan_check_range+0x10c/0x1c0
[   28.917005]  __kasan_check_write+0x18/0x20
[   28.917063]  kasan_atomics_helper+0x860/0x5450
[   28.917119]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.917168]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.917212]  ? kasan_atomics+0x152/0x310
[   28.917255]  kasan_atomics+0x1dc/0x310
[   28.917292]  ? __pfx_kasan_atomics+0x10/0x10
[   28.917328]  ? __pfx_read_tsc+0x10/0x10
[   28.917360]  ? ktime_get_ts64+0x86/0x230
[   28.917402]  kunit_try_run_case+0x1a5/0x480
[   28.917451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.917487]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.917525]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.917561]  ? __kthread_parkme+0x82/0x180
[   28.917595]  ? preempt_count_sub+0x50/0x80
[   28.917637]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.917682]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.917727]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.917773]  kthread+0x337/0x6f0
[   28.917815]  ? trace_preempt_on+0x20/0xc0
[   28.917865]  ? __pfx_kthread+0x10/0x10
[   28.917911]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.917956]  ? calculate_sigpending+0x7b/0xa0
[   28.918001]  ? __pfx_kthread+0x10/0x10
[   28.918060]  ret_from_fork+0x116/0x1d0
[   28.918106]  ? __pfx_kthread+0x10/0x10
[   28.918153]  ret_from_fork_asm+0x1a/0x30
[   28.918220]  </TASK>
[   28.918247] 
[   28.927967] Allocated by task 294:
[   28.928234]  kasan_save_stack+0x45/0x70
[   28.928619]  kasan_save_track+0x18/0x40
[   28.928940]  kasan_save_alloc_info+0x3b/0x50
[   28.929337]  __kasan_kmalloc+0xb7/0xc0
[   28.929657]  __kmalloc_cache_noprof+0x189/0x420
[   28.929959]  kasan_atomics+0x95/0x310
[   28.930214]  kunit_try_run_case+0x1a5/0x480
[   28.930416]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.930788]  kthread+0x337/0x6f0
[   28.930967]  ret_from_fork+0x116/0x1d0
[   28.931145]  ret_from_fork_asm+0x1a/0x30
[   28.931483] 
[   28.931660] The buggy address belongs to the object at ffff888102338080
[   28.931660]  which belongs to the cache kmalloc-64 of size 64
[   28.932473] The buggy address is located 0 bytes to the right of
[   28.932473]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   28.932917] 
[   28.933034] The buggy address belongs to the physical page:
[   28.933368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   28.934189] flags: 0x200000000000000(node=0|zone=2)
[   28.934580] page_type: f5(slab)
[   28.934877] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.935186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.935731] page dumped because: kasan: bad access detected
[   28.936018] 
[   28.936179] Memory state around the buggy address:
[   28.936386]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.936670]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.936931] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.937190]                                      ^
[   28.937464]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.938085]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.938616] ==================================================================
[   30.130716] ==================================================================
[   30.131008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   30.131808] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   30.132076] 
[   30.132288] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   30.132390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   30.132408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   30.132437] Call Trace:
[   30.132484]  <TASK>
[   30.132525]  dump_stack_lvl+0x73/0xb0
[   30.132590]  print_report+0xd1/0x650
[   30.132641]  ? __virt_addr_valid+0x1db/0x2d0
[   30.132699]  ? kasan_atomics_helper+0x1e12/0x5450
[   30.132746]  ? kasan_complete_mode_report_info+0x2a/0x200
[   30.132786]  ? kasan_atomics_helper+0x1e12/0x5450
[   30.132811]  kasan_report+0x141/0x180
[   30.132836]  ? kasan_atomics_helper+0x1e12/0x5450
[   30.132864]  kasan_check_range+0x10c/0x1c0
[   30.132892]  __kasan_check_write+0x18/0x20
[   30.132918]  kasan_atomics_helper+0x1e12/0x5450
[   30.132944]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   30.132969]  ? __kmalloc_cache_noprof+0x189/0x420
[   30.132998]  ? kasan_atomics+0x152/0x310
[   30.133027]  kasan_atomics+0x1dc/0x310
[   30.133052]  ? __pfx_kasan_atomics+0x10/0x10
[   30.133079]  ? __pfx_read_tsc+0x10/0x10
[   30.133103]  ? ktime_get_ts64+0x86/0x230
[   30.133134]  kunit_try_run_case+0x1a5/0x480
[   30.133177]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.133261]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   30.133309]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   30.133355]  ? __kthread_parkme+0x82/0x180
[   30.133403]  ? preempt_count_sub+0x50/0x80
[   30.133471]  ? __pfx_kunit_try_run_case+0x10/0x10
[   30.133528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.133588]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   30.133645]  kthread+0x337/0x6f0
[   30.133695]  ? trace_preempt_on+0x20/0xc0
[   30.133749]  ? __pfx_kthread+0x10/0x10
[   30.133801]  ? _raw_spin_unlock_irq+0x47/0x80
[   30.133853]  ? calculate_sigpending+0x7b/0xa0
[   30.133910]  ? __pfx_kthread+0x10/0x10
[   30.133962]  ret_from_fork+0x116/0x1d0
[   30.134010]  ? __pfx_kthread+0x10/0x10
[   30.134070]  ret_from_fork_asm+0x1a/0x30
[   30.134146]  </TASK>
[   30.134177] 
[   30.144525] Allocated by task 294:
[   30.144909]  kasan_save_stack+0x45/0x70
[   30.145335]  kasan_save_track+0x18/0x40
[   30.145658]  kasan_save_alloc_info+0x3b/0x50
[   30.145861]  __kasan_kmalloc+0xb7/0xc0
[   30.146209]  __kmalloc_cache_noprof+0x189/0x420
[   30.146626]  kasan_atomics+0x95/0x310
[   30.146927]  kunit_try_run_case+0x1a5/0x480
[   30.147375]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   30.147648]  kthread+0x337/0x6f0
[   30.147956]  ret_from_fork+0x116/0x1d0
[   30.148270]  ret_from_fork_asm+0x1a/0x30
[   30.148625] 
[   30.148789] The buggy address belongs to the object at ffff888102338080
[   30.148789]  which belongs to the cache kmalloc-64 of size 64
[   30.150627] The buggy address is located 0 bytes to the right of
[   30.150627]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   30.151778] 
[   30.152118] The buggy address belongs to the physical page:
[   30.152948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   30.153662] flags: 0x200000000000000(node=0|zone=2)
[   30.154078] page_type: f5(slab)
[   30.154346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   30.154940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   30.155484] page dumped because: kasan: bad access detected
[   30.155961] 
[   30.156063] Memory state around the buggy address:
[   30.156900]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.157313]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   30.157947] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   30.158637]                                      ^
[   30.158864]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.159668]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   30.160079] ==================================================================
[   28.939939] ==================================================================
[   28.940407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   28.940751] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   28.941180] 
[   28.941386] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.941514] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.941544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.941590] Call Trace:
[   28.941655]  <TASK>
[   28.941695]  dump_stack_lvl+0x73/0xb0
[   28.941761]  print_report+0xd1/0x650
[   28.941830]  ? __virt_addr_valid+0x1db/0x2d0
[   28.941884]  ? kasan_atomics_helper+0x8f9/0x5450
[   28.941930]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.941991]  ? kasan_atomics_helper+0x8f9/0x5450
[   28.942052]  kasan_report+0x141/0x180
[   28.942110]  ? kasan_atomics_helper+0x8f9/0x5450
[   28.942173]  kasan_check_range+0x10c/0x1c0
[   28.942232]  __kasan_check_write+0x18/0x20
[   28.942289]  kasan_atomics_helper+0x8f9/0x5450
[   28.942345]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.942399]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.942471]  ? kasan_atomics+0x152/0x310
[   28.942538]  kasan_atomics+0x1dc/0x310
[   28.942595]  ? __pfx_kasan_atomics+0x10/0x10
[   28.942654]  ? __pfx_read_tsc+0x10/0x10
[   28.942707]  ? ktime_get_ts64+0x86/0x230
[   28.942773]  kunit_try_run_case+0x1a5/0x480
[   28.942835]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.942890]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.942944]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.943001]  ? __kthread_parkme+0x82/0x180
[   28.943053]  ? preempt_count_sub+0x50/0x80
[   28.943109]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.943169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.943226]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.943278]  kthread+0x337/0x6f0
[   28.943326]  ? trace_preempt_on+0x20/0xc0
[   28.943382]  ? __pfx_kthread+0x10/0x10
[   28.943435]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.943487]  ? calculate_sigpending+0x7b/0xa0
[   28.943536]  ? __pfx_kthread+0x10/0x10
[   28.943582]  ret_from_fork+0x116/0x1d0
[   28.943623]  ? __pfx_kthread+0x10/0x10
[   28.943703]  ret_from_fork_asm+0x1a/0x30
[   28.943773]  </TASK>
[   28.943805] 
[   28.959256] Allocated by task 294:
[   28.959668]  kasan_save_stack+0x45/0x70
[   28.960112]  kasan_save_track+0x18/0x40
[   28.960482]  kasan_save_alloc_info+0x3b/0x50
[   28.960837]  __kasan_kmalloc+0xb7/0xc0
[   28.961123]  __kmalloc_cache_noprof+0x189/0x420
[   28.961490]  kasan_atomics+0x95/0x310
[   28.961773]  kunit_try_run_case+0x1a5/0x480
[   28.962115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.962516]  kthread+0x337/0x6f0
[   28.962725]  ret_from_fork+0x116/0x1d0
[   28.963137]  ret_from_fork_asm+0x1a/0x30
[   28.963484] 
[   28.963668] The buggy address belongs to the object at ffff888102338080
[   28.963668]  which belongs to the cache kmalloc-64 of size 64
[   28.964536] The buggy address is located 0 bytes to the right of
[   28.964536]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   28.965162] 
[   28.965382] The buggy address belongs to the physical page:
[   28.965967] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   28.966719] flags: 0x200000000000000(node=0|zone=2)
[   28.967035] page_type: f5(slab)
[   28.967419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.967862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.968513] page dumped because: kasan: bad access detected
[   28.968823] 
[   28.968973] Memory state around the buggy address:
[   28.969456]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.969868]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.970329] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.970838]                                      ^
[   28.971304]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.971585]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.972125] ==================================================================
[   29.564729] ==================================================================
[   29.565367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   29.565727] Read of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.566253] 
[   29.566434] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.567934] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.567972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.568020] Call Trace:
[   29.568069]  <TASK>
[   29.568113]  dump_stack_lvl+0x73/0xb0
[   29.568228]  print_report+0xd1/0x650
[   29.568282]  ? __virt_addr_valid+0x1db/0x2d0
[   29.568339]  ? kasan_atomics_helper+0x13b5/0x5450
[   29.568391]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.568464]  ? kasan_atomics_helper+0x13b5/0x5450
[   29.568519]  kasan_report+0x141/0x180
[   29.568574]  ? kasan_atomics_helper+0x13b5/0x5450
[   29.568638]  kasan_check_range+0x10c/0x1c0
[   29.568694]  __kasan_check_read+0x15/0x20
[   29.568750]  kasan_atomics_helper+0x13b5/0x5450
[   29.568802]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.568854]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.568913]  ? kasan_atomics+0x152/0x310
[   29.568974]  kasan_atomics+0x1dc/0x310
[   29.569031]  ? __pfx_kasan_atomics+0x10/0x10
[   29.569088]  ? __pfx_read_tsc+0x10/0x10
[   29.569138]  ? ktime_get_ts64+0x86/0x230
[   29.569235]  kunit_try_run_case+0x1a5/0x480
[   29.569298]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.569351]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.569408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.569501]  ? __kthread_parkme+0x82/0x180
[   29.569555]  ? preempt_count_sub+0x50/0x80
[   29.569612]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.569671]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.569726]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.569767]  kthread+0x337/0x6f0
[   29.569792]  ? trace_preempt_on+0x20/0xc0
[   29.569820]  ? __pfx_kthread+0x10/0x10
[   29.569844]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.569869]  ? calculate_sigpending+0x7b/0xa0
[   29.569897]  ? __pfx_kthread+0x10/0x10
[   29.569921]  ret_from_fork+0x116/0x1d0
[   29.569944]  ? __pfx_kthread+0x10/0x10
[   29.569968]  ret_from_fork_asm+0x1a/0x30
[   29.570004]  </TASK>
[   29.570019] 
[   29.579456] Allocated by task 294:
[   29.579698]  kasan_save_stack+0x45/0x70
[   29.580125]  kasan_save_track+0x18/0x40
[   29.580500]  kasan_save_alloc_info+0x3b/0x50
[   29.580866]  __kasan_kmalloc+0xb7/0xc0
[   29.581218]  __kmalloc_cache_noprof+0x189/0x420
[   29.581596]  kasan_atomics+0x95/0x310
[   29.581917]  kunit_try_run_case+0x1a5/0x480
[   29.582171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.582404]  kthread+0x337/0x6f0
[   29.582708]  ret_from_fork+0x116/0x1d0
[   29.583052]  ret_from_fork_asm+0x1a/0x30
[   29.583451] 
[   29.583629] The buggy address belongs to the object at ffff888102338080
[   29.583629]  which belongs to the cache kmalloc-64 of size 64
[   29.584107] The buggy address is located 0 bytes to the right of
[   29.584107]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.584572] 
[   29.584688] The buggy address belongs to the physical page:
[   29.585000] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.585661] flags: 0x200000000000000(node=0|zone=2)
[   29.586066] page_type: f5(slab)
[   29.586407] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.587005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.587588] page dumped because: kasan: bad access detected
[   29.587882] 
[   29.587988] Memory state around the buggy address:
[   29.588229]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.588559]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.589088] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.589653]                                      ^
[   29.590059]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.590430]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.590699] ==================================================================
[   29.891305] ==================================================================
[   29.892173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   29.893349] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.894213] 
[   29.894462] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.894770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.894793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.894823] Call Trace:
[   29.894849]  <TASK>
[   29.894876]  dump_stack_lvl+0x73/0xb0
[   29.894922]  print_report+0xd1/0x650
[   29.894950]  ? __virt_addr_valid+0x1db/0x2d0
[   29.894978]  ? kasan_atomics_helper+0x194a/0x5450
[   29.895002]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.895033]  ? kasan_atomics_helper+0x194a/0x5450
[   29.895057]  kasan_report+0x141/0x180
[   29.895081]  ? kasan_atomics_helper+0x194a/0x5450
[   29.895110]  kasan_check_range+0x10c/0x1c0
[   29.895136]  __kasan_check_write+0x18/0x20
[   29.895195]  kasan_atomics_helper+0x194a/0x5450
[   29.895222]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.895248]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.895276]  ? kasan_atomics+0x152/0x310
[   29.895304]  kasan_atomics+0x1dc/0x310
[   29.895330]  ? __pfx_kasan_atomics+0x10/0x10
[   29.895357]  ? __pfx_read_tsc+0x10/0x10
[   29.895381]  ? ktime_get_ts64+0x86/0x230
[   29.895412]  kunit_try_run_case+0x1a5/0x480
[   29.895460]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.895489]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.895517]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.895544]  ? __kthread_parkme+0x82/0x180
[   29.895568]  ? preempt_count_sub+0x50/0x80
[   29.895596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.895622]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.895650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.895676]  kthread+0x337/0x6f0
[   29.895699]  ? trace_preempt_on+0x20/0xc0
[   29.895726]  ? __pfx_kthread+0x10/0x10
[   29.895749]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.895774]  ? calculate_sigpending+0x7b/0xa0
[   29.895803]  ? __pfx_kthread+0x10/0x10
[   29.895828]  ret_from_fork+0x116/0x1d0
[   29.895850]  ? __pfx_kthread+0x10/0x10
[   29.895873]  ret_from_fork_asm+0x1a/0x30
[   29.895908]  </TASK>
[   29.895924] 
[   29.906411] Allocated by task 294:
[   29.906799]  kasan_save_stack+0x45/0x70
[   29.907331]  kasan_save_track+0x18/0x40
[   29.907717]  kasan_save_alloc_info+0x3b/0x50
[   29.908131]  __kasan_kmalloc+0xb7/0xc0
[   29.908535]  __kmalloc_cache_noprof+0x189/0x420
[   29.908888]  kasan_atomics+0x95/0x310
[   29.909243]  kunit_try_run_case+0x1a5/0x480
[   29.909499]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.909952]  kthread+0x337/0x6f0
[   29.910286]  ret_from_fork+0x116/0x1d0
[   29.910626]  ret_from_fork_asm+0x1a/0x30
[   29.910944] 
[   29.911127] The buggy address belongs to the object at ffff888102338080
[   29.911127]  which belongs to the cache kmalloc-64 of size 64
[   29.911928] The buggy address is located 0 bytes to the right of
[   29.911928]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.912758] 
[   29.912954] The buggy address belongs to the physical page:
[   29.913402] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.913890] flags: 0x200000000000000(node=0|zone=2)
[   29.914135] page_type: f5(slab)
[   29.914348] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.914881] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.915488] page dumped because: kasan: bad access detected
[   29.915983] 
[   29.916195] Memory state around the buggy address:
[   29.916476]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.916745]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.917006] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.917295]                                      ^
[   29.917506]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.918094]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.918666] ==================================================================
[   29.861199] ==================================================================
[   29.861698] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   29.862327] Write of size 8 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.862714] 
[   29.863010] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.863199] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.863230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.863281] Call Trace:
[   29.863322]  <TASK>
[   29.863362]  dump_stack_lvl+0x73/0xb0
[   29.863434]  print_report+0xd1/0x650
[   29.863547]  ? __virt_addr_valid+0x1db/0x2d0
[   29.863654]  ? kasan_atomics_helper+0x18b1/0x5450
[   29.863781]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.863854]  ? kasan_atomics_helper+0x18b1/0x5450
[   29.863943]  kasan_report+0x141/0x180
[   29.864041]  ? kasan_atomics_helper+0x18b1/0x5450
[   29.864112]  kasan_check_range+0x10c/0x1c0
[   29.864196]  __kasan_check_write+0x18/0x20
[   29.864240]  kasan_atomics_helper+0x18b1/0x5450
[   29.864292]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.864343]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.864403]  ? kasan_atomics+0x152/0x310
[   29.864475]  kasan_atomics+0x1dc/0x310
[   29.864532]  ? __pfx_kasan_atomics+0x10/0x10
[   29.864592]  ? __pfx_read_tsc+0x10/0x10
[   29.864644]  ? ktime_get_ts64+0x86/0x230
[   29.864710]  kunit_try_run_case+0x1a5/0x480
[   29.864774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.864828]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.864882]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.864938]  ? __kthread_parkme+0x82/0x180
[   29.864990]  ? preempt_count_sub+0x50/0x80
[   29.865048]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.865105]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.865191]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.865252]  kthread+0x337/0x6f0
[   29.865302]  ? trace_preempt_on+0x20/0xc0
[   29.865358]  ? __pfx_kthread+0x10/0x10
[   29.865403]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.865431]  ? calculate_sigpending+0x7b/0xa0
[   29.865485]  ? __pfx_kthread+0x10/0x10
[   29.865511]  ret_from_fork+0x116/0x1d0
[   29.865534]  ? __pfx_kthread+0x10/0x10
[   29.865558]  ret_from_fork_asm+0x1a/0x30
[   29.865593]  </TASK>
[   29.865609] 
[   29.877244] Allocated by task 294:
[   29.877736]  kasan_save_stack+0x45/0x70
[   29.878172]  kasan_save_track+0x18/0x40
[   29.878517]  kasan_save_alloc_info+0x3b/0x50
[   29.878957]  __kasan_kmalloc+0xb7/0xc0
[   29.879331]  __kmalloc_cache_noprof+0x189/0x420
[   29.879563]  kasan_atomics+0x95/0x310
[   29.879746]  kunit_try_run_case+0x1a5/0x480
[   29.879927]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.880390]  kthread+0x337/0x6f0
[   29.880937]  ret_from_fork+0x116/0x1d0
[   29.881406]  ret_from_fork_asm+0x1a/0x30
[   29.881792] 
[   29.881969] The buggy address belongs to the object at ffff888102338080
[   29.881969]  which belongs to the cache kmalloc-64 of size 64
[   29.882956] The buggy address is located 0 bytes to the right of
[   29.882956]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.883662] 
[   29.883792] The buggy address belongs to the physical page:
[   29.884014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.884342] flags: 0x200000000000000(node=0|zone=2)
[   29.884739] page_type: f5(slab)
[   29.885221] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.885913] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.886560] page dumped because: kasan: bad access detected
[   29.886990] 
[   29.887309] Memory state around the buggy address:
[   29.887711]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.888127]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.888601] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.888862]                                      ^
[   29.889246]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.889789]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.890264] ==================================================================
[   29.036859] ==================================================================
[   29.037262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   29.038152] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   29.038715] 
[   29.038949] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   29.039129] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.039181] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   29.039232] Call Trace:
[   29.039276]  <TASK>
[   29.039322]  dump_stack_lvl+0x73/0xb0
[   29.039403]  print_report+0xd1/0x650
[   29.039472]  ? __virt_addr_valid+0x1db/0x2d0
[   29.039529]  ? kasan_atomics_helper+0xac7/0x5450
[   29.039579]  ? kasan_complete_mode_report_info+0x2a/0x200
[   29.039639]  ? kasan_atomics_helper+0xac7/0x5450
[   29.039694]  kasan_report+0x141/0x180
[   29.039741]  ? kasan_atomics_helper+0xac7/0x5450
[   29.039793]  kasan_check_range+0x10c/0x1c0
[   29.039821]  __kasan_check_write+0x18/0x20
[   29.039849]  kasan_atomics_helper+0xac7/0x5450
[   29.039875]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   29.039900]  ? __kmalloc_cache_noprof+0x189/0x420
[   29.039929]  ? kasan_atomics+0x152/0x310
[   29.039959]  kasan_atomics+0x1dc/0x310
[   29.039985]  ? __pfx_kasan_atomics+0x10/0x10
[   29.040013]  ? __pfx_read_tsc+0x10/0x10
[   29.040037]  ? ktime_get_ts64+0x86/0x230
[   29.040068]  kunit_try_run_case+0x1a5/0x480
[   29.040098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.040124]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   29.040157]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   29.040199]  ? __kthread_parkme+0x82/0x180
[   29.040226]  ? preempt_count_sub+0x50/0x80
[   29.040255]  ? __pfx_kunit_try_run_case+0x10/0x10
[   29.040282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.040309]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   29.040336]  kthread+0x337/0x6f0
[   29.040359]  ? trace_preempt_on+0x20/0xc0
[   29.040386]  ? __pfx_kthread+0x10/0x10
[   29.040410]  ? _raw_spin_unlock_irq+0x47/0x80
[   29.040434]  ? calculate_sigpending+0x7b/0xa0
[   29.040486]  ? __pfx_kthread+0x10/0x10
[   29.040512]  ret_from_fork+0x116/0x1d0
[   29.040535]  ? __pfx_kthread+0x10/0x10
[   29.040559]  ret_from_fork_asm+0x1a/0x30
[   29.040594]  </TASK>
[   29.040610] 
[   29.052602] Allocated by task 294:
[   29.052912]  kasan_save_stack+0x45/0x70
[   29.053191]  kasan_save_track+0x18/0x40
[   29.053398]  kasan_save_alloc_info+0x3b/0x50
[   29.054411]  __kasan_kmalloc+0xb7/0xc0
[   29.054619]  __kmalloc_cache_noprof+0x189/0x420
[   29.055191]  kasan_atomics+0x95/0x310
[   29.055396]  kunit_try_run_case+0x1a5/0x480
[   29.055884]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   29.056295]  kthread+0x337/0x6f0
[   29.056606]  ret_from_fork+0x116/0x1d0
[   29.056915]  ret_from_fork_asm+0x1a/0x30
[   29.057335] 
[   29.057521] The buggy address belongs to the object at ffff888102338080
[   29.057521]  which belongs to the cache kmalloc-64 of size 64
[   29.058199] The buggy address is located 0 bytes to the right of
[   29.058199]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   29.058816] 
[   29.058986] The buggy address belongs to the physical page:
[   29.059324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   29.060024] flags: 0x200000000000000(node=0|zone=2)
[   29.060295] page_type: f5(slab)
[   29.060597] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   29.061145] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.061641] page dumped because: kasan: bad access detected
[   29.061941] 
[   29.062088] Memory state around the buggy address:
[   29.062467]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.062742]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.063295] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.063816]                                      ^
[   29.064026]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.064396]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.064676] ==================================================================
[   28.744322] ==================================================================
[   28.745803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   28.746320] Write of size 4 at addr ffff8881023380b0 by task kunit_try_catch/294
[   28.746820] 
[   28.747064] CPU: 0 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc2-next-20250620 #1 PREEMPT(voluntary) 
[   28.747208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   28.747244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   28.747294] Call Trace:
[   28.747378]  <TASK>
[   28.747449]  dump_stack_lvl+0x73/0xb0
[   28.747530]  print_report+0xd1/0x650
[   28.747587]  ? __virt_addr_valid+0x1db/0x2d0
[   28.747843]  ? kasan_atomics_helper+0x4b3a/0x5450
[   28.747892]  ? kasan_complete_mode_report_info+0x2a/0x200
[   28.747938]  ? kasan_atomics_helper+0x4b3a/0x5450
[   28.747975]  kasan_report+0x141/0x180
[   28.748013]  ? kasan_atomics_helper+0x4b3a/0x5450
[   28.748055]  __asan_report_store4_noabort+0x1b/0x30
[   28.748096]  kasan_atomics_helper+0x4b3a/0x5450
[   28.748132]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   28.748172]  ? __kmalloc_cache_noprof+0x189/0x420
[   28.748213]  ? kasan_atomics+0x152/0x310
[   28.748260]  kasan_atomics+0x1dc/0x310
[   28.748296]  ? __pfx_kasan_atomics+0x10/0x10
[   28.748333]  ? __pfx_read_tsc+0x10/0x10
[   28.748367]  ? ktime_get_ts64+0x86/0x230
[   28.748414]  kunit_try_run_case+0x1a5/0x480
[   28.748469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.748512]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   28.748556]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   28.748599]  ? __kthread_parkme+0x82/0x180
[   28.748641]  ? preempt_count_sub+0x50/0x80
[   28.748687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   28.748716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.748744]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   28.748771]  kthread+0x337/0x6f0
[   28.748794]  ? trace_preempt_on+0x20/0xc0
[   28.748821]  ? __pfx_kthread+0x10/0x10
[   28.748845]  ? _raw_spin_unlock_irq+0x47/0x80
[   28.748869]  ? calculate_sigpending+0x7b/0xa0
[   28.748897]  ? __pfx_kthread+0x10/0x10
[   28.748921]  ret_from_fork+0x116/0x1d0
[   28.748943]  ? __pfx_kthread+0x10/0x10
[   28.748966]  ret_from_fork_asm+0x1a/0x30
[   28.749001]  </TASK>
[   28.749016] 
[   28.759634] Allocated by task 294:
[   28.760084]  kasan_save_stack+0x45/0x70
[   28.760515]  kasan_save_track+0x18/0x40
[   28.760809]  kasan_save_alloc_info+0x3b/0x50
[   28.761024]  __kasan_kmalloc+0xb7/0xc0
[   28.761529]  __kmalloc_cache_noprof+0x189/0x420
[   28.761973]  kasan_atomics+0x95/0x310
[   28.762348]  kunit_try_run_case+0x1a5/0x480
[   28.762660]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   28.763125]  kthread+0x337/0x6f0
[   28.763469]  ret_from_fork+0x116/0x1d0
[   28.763665]  ret_from_fork_asm+0x1a/0x30
[   28.763998] 
[   28.764292] The buggy address belongs to the object at ffff888102338080
[   28.764292]  which belongs to the cache kmalloc-64 of size 64
[   28.765079] The buggy address is located 0 bytes to the right of
[   28.765079]  allocated 48-byte region [ffff888102338080, ffff8881023380b0)
[   28.765972] 
[   28.766127] The buggy address belongs to the physical page:
[   28.766640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102338
[   28.767215] flags: 0x200000000000000(node=0|zone=2)
[   28.767509] page_type: f5(slab)
[   28.767830] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   28.768430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   28.768989] page dumped because: kasan: bad access detected
[   28.769463] 
[   28.769634] Memory state around the buggy address:
[   28.770072]  ffff888102337f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.770618]  ffff888102338000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   28.771110] >ffff888102338080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   28.771739]                                      ^
[   28.772099]  ffff888102338100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.772436]  ffff888102338180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   28.772711] ==================================================================