Hay
Date
June 23, 2025, 7:07 a.m.

Environment
qemu-arm64
qemu-x86_64

[   36.904212] ==================================================================
[   36.904311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   36.904429] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.904558] 
[   36.904759] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.904957] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.905045] Hardware name: linux,dummy-virt (DT)
[   36.905122] Call trace:
[   36.905180]  show_stack+0x20/0x38 (C)
[   36.905307]  dump_stack_lvl+0x8c/0xd0
[   36.905648]  print_report+0x118/0x608
[   36.906018]  kasan_report+0xdc/0x128
[   36.906168]  __asan_report_load8_noabort+0x20/0x30
[   36.906460]  kasan_atomics_helper+0x3f04/0x4858
[   36.906616]  kasan_atomics+0x198/0x2e0
[   36.906842]  kunit_try_run_case+0x170/0x3f0
[   36.907023]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.907303]  kthread+0x328/0x630
[   36.907514]  ret_from_fork+0x10/0x20
[   36.907842] 
[   36.907914] Allocated by task 277:
[   36.907992]  kasan_save_stack+0x3c/0x68
[   36.908202]  kasan_save_track+0x20/0x40
[   36.908350]  kasan_save_alloc_info+0x40/0x58
[   36.908460]  __kasan_kmalloc+0xd4/0xd8
[   36.908611]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.908679]  kasan_atomics+0xb8/0x2e0
[   36.908728]  kunit_try_run_case+0x170/0x3f0
[   36.908777]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.908834]  kthread+0x328/0x630
[   36.908876]  ret_from_fork+0x10/0x20
[   36.908922] 
[   36.908947] The buggy address belongs to the object at fff00000c7805380
[   36.908947]  which belongs to the cache kmalloc-64 of size 64
[   36.909020] The buggy address is located 0 bytes to the right of
[   36.909020]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.909127] 
[   36.909153] The buggy address belongs to the physical page:
[   36.909193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.909256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.909314] page_type: f5(slab)
[   36.909361] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.909424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.909475] page dumped because: kasan: bad access detected
[   36.909514] 
[   36.909537] Memory state around the buggy address:
[   36.909576]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.909630]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.909683] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.909729]                                      ^
[   36.909772]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.909827]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.909876] ==================================================================
[   37.013113] ==================================================================
[   37.013221] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   37.013356] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   37.013493] 
[   37.013574] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.014399] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.014477] Hardware name: linux,dummy-virt (DT)
[   37.014556] Call trace:
[   37.014628]  show_stack+0x20/0x38 (C)
[   37.014750]  dump_stack_lvl+0x8c/0xd0
[   37.014925]  print_report+0x118/0x608
[   37.015060]  kasan_report+0xdc/0x128
[   37.015199]  __asan_report_load8_noabort+0x20/0x30
[   37.015348]  kasan_atomics_helper+0x3df4/0x4858
[   37.015494]  kasan_atomics+0x198/0x2e0
[   37.015603]  kunit_try_run_case+0x170/0x3f0
[   37.015736]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.015885]  kthread+0x328/0x630
[   37.016048]  ret_from_fork+0x10/0x20
[   37.016177] 
[   37.016299] Allocated by task 277:
[   37.016504]  kasan_save_stack+0x3c/0x68
[   37.016644]  kasan_save_track+0x20/0x40
[   37.016817]  kasan_save_alloc_info+0x40/0x58
[   37.016921]  __kasan_kmalloc+0xd4/0xd8
[   37.017020]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.017165]  kasan_atomics+0xb8/0x2e0
[   37.017282]  kunit_try_run_case+0x170/0x3f0
[   37.017396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.017503]  kthread+0x328/0x630
[   37.017609]  ret_from_fork+0x10/0x20
[   37.017727] 
[   37.017792] The buggy address belongs to the object at fff00000c7805380
[   37.017792]  which belongs to the cache kmalloc-64 of size 64
[   37.017944] The buggy address is located 0 bytes to the right of
[   37.017944]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   37.018135] 
[   37.018184] The buggy address belongs to the physical page:
[   37.018258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   37.018514] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.018625] page_type: f5(slab)
[   37.018738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.019126] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.019234] page dumped because: kasan: bad access detected
[   37.019368] 
[   37.019420] Memory state around the buggy address:
[   37.019497]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.019615]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.019722] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.019813]                                      ^
[   37.019978]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.020433]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.020543] ==================================================================
[   36.503305] ==================================================================
[   36.503570] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   36.503745] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.504006] 
[   36.504154] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.504368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.504527] Hardware name: linux,dummy-virt (DT)
[   36.504645] Call trace:
[   36.504798]  show_stack+0x20/0x38 (C)
[   36.505112]  dump_stack_lvl+0x8c/0xd0
[   36.505262]  print_report+0x118/0x608
[   36.505384]  kasan_report+0xdc/0x128
[   36.506196]  kasan_check_range+0x100/0x1a8
[   36.508923]  __kasan_check_write+0x20/0x30
[   36.509135]  kasan_atomics_helper+0x99c/0x4858
[   36.509654]  kasan_atomics+0x198/0x2e0
[   36.509867]  kunit_try_run_case+0x170/0x3f0
[   36.510101]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.510254]  kthread+0x328/0x630
[   36.510367]  ret_from_fork+0x10/0x20
[   36.510492] 
[   36.510543] Allocated by task 277:
[   36.510624]  kasan_save_stack+0x3c/0x68
[   36.510725]  kasan_save_track+0x20/0x40
[   36.510857]  kasan_save_alloc_info+0x40/0x58
[   36.510978]  __kasan_kmalloc+0xd4/0xd8
[   36.511190]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.511386]  kasan_atomics+0xb8/0x2e0
[   36.511662]  kunit_try_run_case+0x170/0x3f0
[   36.511842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.511965]  kthread+0x328/0x630
[   36.512085]  ret_from_fork+0x10/0x20
[   36.512242] 
[   36.512334] The buggy address belongs to the object at fff00000c7805380
[   36.512334]  which belongs to the cache kmalloc-64 of size 64
[   36.512475] The buggy address is located 0 bytes to the right of
[   36.512475]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.512698] 
[   36.512836] The buggy address belongs to the physical page:
[   36.512925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.513114] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.513442] page_type: f5(slab)
[   36.513584] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.514272] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.514377] page dumped because: kasan: bad access detected
[   36.514476] 
[   36.514547] Memory state around the buggy address:
[   36.514657]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.514782]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.514895] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.515054]                                      ^
[   36.515163]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.515284]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.515390] ==================================================================
[   36.843660] ==================================================================
[   36.843771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   36.844138] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.844574] 
[   36.844672] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.845463] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.845544] Hardware name: linux,dummy-virt (DT)
[   36.845796] Call trace:
[   36.845893]  show_stack+0x20/0x38 (C)
[   36.846081]  dump_stack_lvl+0x8c/0xd0
[   36.846375]  print_report+0x118/0x608
[   36.846521]  kasan_report+0xdc/0x128
[   36.846940]  kasan_check_range+0x100/0x1a8
[   36.847159]  __kasan_check_write+0x20/0x30
[   36.847486]  kasan_atomics_helper+0x11f8/0x4858
[   36.847685]  kasan_atomics+0x198/0x2e0
[   36.848143]  kunit_try_run_case+0x170/0x3f0
[   36.849194]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.849498]  kthread+0x328/0x630
[   36.849778]  ret_from_fork+0x10/0x20
[   36.850048] 
[   36.850120] Allocated by task 277:
[   36.850482]  kasan_save_stack+0x3c/0x68
[   36.850796]  kasan_save_track+0x20/0x40
[   36.851178]  kasan_save_alloc_info+0x40/0x58
[   36.851632]  __kasan_kmalloc+0xd4/0xd8
[   36.851781]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.852180]  kasan_atomics+0xb8/0x2e0
[   36.852333]  kunit_try_run_case+0x170/0x3f0
[   36.852438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.852729]  kthread+0x328/0x630
[   36.852900]  ret_from_fork+0x10/0x20
[   36.853377] 
[   36.853436] The buggy address belongs to the object at fff00000c7805380
[   36.853436]  which belongs to the cache kmalloc-64 of size 64
[   36.853648] The buggy address is located 0 bytes to the right of
[   36.853648]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.854386] 
[   36.854462] The buggy address belongs to the physical page:
[   36.854601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.854963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.855295] page_type: f5(slab)
[   36.855415] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.855813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.855949] page dumped because: kasan: bad access detected
[   36.856127] 
[   36.856358] Memory state around the buggy address:
[   36.856469]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.856611]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.856992] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.857106]                                      ^
[   36.857626]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.857938]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.858229] ==================================================================
[   36.632630] ==================================================================
[   36.632737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   36.632860] Read of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.632980] 
[   36.634514] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.635763] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.635846] Hardware name: linux,dummy-virt (DT)
[   36.636058] Call trace:
[   36.636122]  show_stack+0x20/0x38 (C)
[   36.636916]  dump_stack_lvl+0x8c/0xd0
[   36.637496]  print_report+0x118/0x608
[   36.638198]  kasan_report+0xdc/0x128
[   36.638359]  __asan_report_load4_noabort+0x20/0x30
[   36.639087]  kasan_atomics_helper+0x3dd8/0x4858
[   36.639232]  kasan_atomics+0x198/0x2e0
[   36.639370]  kunit_try_run_case+0x170/0x3f0
[   36.639522]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.640154]  kthread+0x328/0x630
[   36.640343]  ret_from_fork+0x10/0x20
[   36.640710] 
[   36.640820] Allocated by task 277:
[   36.640903]  kasan_save_stack+0x3c/0x68
[   36.641010]  kasan_save_track+0x20/0x40
[   36.641596]  kasan_save_alloc_info+0x40/0x58
[   36.641790]  __kasan_kmalloc+0xd4/0xd8
[   36.641994]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.642125]  kasan_atomics+0xb8/0x2e0
[   36.642233]  kunit_try_run_case+0x170/0x3f0
[   36.642603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.643411]  kthread+0x328/0x630
[   36.643604]  ret_from_fork+0x10/0x20
[   36.643856] 
[   36.643973] The buggy address belongs to the object at fff00000c7805380
[   36.643973]  which belongs to the cache kmalloc-64 of size 64
[   36.644144] The buggy address is located 0 bytes to the right of
[   36.644144]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.644514] 
[   36.644590] The buggy address belongs to the physical page:
[   36.644891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.645227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.645508] page_type: f5(slab)
[   36.645736] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.646003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.646134] page dumped because: kasan: bad access detected
[   36.646287] 
[   36.646335] Memory state around the buggy address:
[   36.646414]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.646572]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.647202] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.647324]                                      ^
[   36.647509]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.647648]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.647844] ==================================================================
[   36.756664] ==================================================================
[   36.756773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   36.757102] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.757444] 
[   36.757555] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.757766] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.757954] Hardware name: linux,dummy-virt (DT)
[   36.758616] Call trace:
[   36.758736]  show_stack+0x20/0x38 (C)
[   36.758922]  dump_stack_lvl+0x8c/0xd0
[   36.759064]  print_report+0x118/0x608
[   36.759220]  kasan_report+0xdc/0x128
[   36.759579]  kasan_check_range+0x100/0x1a8
[   36.759826]  __kasan_check_write+0x20/0x30
[   36.759992]  kasan_atomics_helper+0xf20/0x4858
[   36.760213]  kasan_atomics+0x198/0x2e0
[   36.760561]  kunit_try_run_case+0x170/0x3f0
[   36.760686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.760818]  kthread+0x328/0x630
[   36.760926]  ret_from_fork+0x10/0x20
[   36.761068] 
[   36.761116] Allocated by task 277:
[   36.761199]  kasan_save_stack+0x3c/0x68
[   36.761357]  kasan_save_track+0x20/0x40
[   36.761473]  kasan_save_alloc_info+0x40/0x58
[   36.762242]  __kasan_kmalloc+0xd4/0xd8
[   36.762523]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.762855]  kasan_atomics+0xb8/0x2e0
[   36.763114]  kunit_try_run_case+0x170/0x3f0
[   36.764169]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.764460]  kthread+0x328/0x630
[   36.764754]  ret_from_fork+0x10/0x20
[   36.764847] 
[   36.764960] The buggy address belongs to the object at fff00000c7805380
[   36.764960]  which belongs to the cache kmalloc-64 of size 64
[   36.765208] The buggy address is located 0 bytes to the right of
[   36.765208]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.765508] 
[   36.765563] The buggy address belongs to the physical page:
[   36.765673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.766016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.766515] page_type: f5(slab)
[   36.767821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.767954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.768086] page dumped because: kasan: bad access detected
[   36.768399] 
[   36.770393] Memory state around the buggy address:
[   36.770503]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.770642]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.770762] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.770813]                                      ^
[   36.770860]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.770915]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.770960] ==================================================================
[   36.516863] ==================================================================
[   36.516966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   36.517105] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.518853]  kasan_atomics_helper+0xa04/0x4858
[   36.521392]  kthread+0x328/0x630
[   36.522280] 
[   36.522376] The buggy address belongs to the physical page:
[   36.522507] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.522680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.522832] page_type: f5(slab)
[   36.522939] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.523267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.523410] page dumped because: kasan: bad access detected
[   36.523492] 
[   36.523549] Memory state around the buggy address:
[   36.523673]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.523803]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.523976] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.524121]                                      ^
[   36.524221]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.524415]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.524704] ==================================================================
[   36.832338] ==================================================================
[   36.832441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   36.832570] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.832804] 
[   36.832876] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.833317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.833515] Hardware name: linux,dummy-virt (DT)
[   36.833665] Call trace:
[   36.833734]  show_stack+0x20/0x38 (C)
[   36.834008]  dump_stack_lvl+0x8c/0xd0
[   36.834147]  print_report+0x118/0x608
[   36.834401]  kasan_report+0xdc/0x128
[   36.834530]  kasan_check_range+0x100/0x1a8
[   36.834727]  __kasan_check_write+0x20/0x30
[   36.834912]  kasan_atomics_helper+0x1190/0x4858
[   36.835134]  kasan_atomics+0x198/0x2e0
[   36.835251]  kunit_try_run_case+0x170/0x3f0
[   36.835397]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.835776]  kthread+0x328/0x630
[   36.835904]  ret_from_fork+0x10/0x20
[   36.836041] 
[   36.836107] Allocated by task 277:
[   36.836194]  kasan_save_stack+0x3c/0x68
[   36.836411]  kasan_save_track+0x20/0x40
[   36.836521]  kasan_save_alloc_info+0x40/0x58
[   36.836618]  __kasan_kmalloc+0xd4/0xd8
[   36.836713]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.836887]  kasan_atomics+0xb8/0x2e0
[   36.837073]  kunit_try_run_case+0x170/0x3f0
[   36.837302]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.837419]  kthread+0x328/0x630
[   36.837508]  ret_from_fork+0x10/0x20
[   36.837604] 
[   36.837663] The buggy address belongs to the object at fff00000c7805380
[   36.837663]  which belongs to the cache kmalloc-64 of size 64
[   36.837919] The buggy address is located 0 bytes to the right of
[   36.837919]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.838120] 
[   36.838174] The buggy address belongs to the physical page:
[   36.838304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.838648] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.838779] page_type: f5(slab)
[   36.838928] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.839154] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.839299] page dumped because: kasan: bad access detected
[   36.839409] 
[   36.839460] Memory state around the buggy address:
[   36.839555]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.839705]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.839996] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.840150]                                      ^
[   36.840247]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.840361]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.840457] ==================================================================
[   36.995972] ==================================================================
[   36.996102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   36.996219] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.996336] 
[   36.996407] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.996619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.996745] Hardware name: linux,dummy-virt (DT)
[   36.997551] Call trace:
[   36.997756]  show_stack+0x20/0x38 (C)
[   36.997891]  dump_stack_lvl+0x8c/0xd0
[   36.998007]  print_report+0x118/0x608
[   37.000181]  kasan_report+0xdc/0x128
[   37.000338]  kasan_check_range+0x100/0x1a8
[   37.000460]  __kasan_check_write+0x20/0x30
[   37.001532]  kasan_atomics_helper+0x1644/0x4858
[   37.002114]  kasan_atomics+0x198/0x2e0
[   37.003001]  kunit_try_run_case+0x170/0x3f0
[   37.003686]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.004093]  kthread+0x328/0x630
[   37.004216]  ret_from_fork+0x10/0x20
[   37.004335] 
[   37.004388] Allocated by task 277:
[   37.005261]  kasan_save_stack+0x3c/0x68
[   37.005389]  kasan_save_track+0x20/0x40
[   37.006073]  kasan_save_alloc_info+0x40/0x58
[   37.006389]  __kasan_kmalloc+0xd4/0xd8
[   37.006567]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.006856]  kasan_atomics+0xb8/0x2e0
[   37.007020]  kunit_try_run_case+0x170/0x3f0
[   37.007500]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.007642]  kthread+0x328/0x630
[   37.007772]  ret_from_fork+0x10/0x20
[   37.007866] 
[   37.007915] The buggy address belongs to the object at fff00000c7805380
[   37.007915]  which belongs to the cache kmalloc-64 of size 64
[   37.008481] The buggy address is located 0 bytes to the right of
[   37.008481]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   37.008834] 
[   37.008892] The buggy address belongs to the physical page:
[   37.009008] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   37.009170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.009530] page_type: f5(slab)
[   37.010781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.010922] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.011054] page dumped because: kasan: bad access detected
[   37.011145] 
[   37.011205] Memory state around the buggy address:
[   37.011295]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.011419]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.011522] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.011682]                                      ^
[   37.011833]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.011949]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.012066] ==================================================================
[   36.679044] ==================================================================
[   36.679146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   36.681521] Read of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.681646] 
[   36.681719] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.681913] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.681979] Hardware name: linux,dummy-virt (DT)
[   36.682088] Call trace:
[   36.682156]  show_stack+0x20/0x38 (C)
[   36.682685]  dump_stack_lvl+0x8c/0xd0
[   36.682836]  print_report+0x118/0x608
[   36.682966]  kasan_report+0xdc/0x128
[   36.683169]  __asan_report_load4_noabort+0x20/0x30
[   36.683660]  kasan_atomics_helper+0x3e04/0x4858
[   36.683828]  kasan_atomics+0x198/0x2e0
[   36.684000]  kunit_try_run_case+0x170/0x3f0
[   36.684309]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.684458]  kthread+0x328/0x630
[   36.684632]  ret_from_fork+0x10/0x20
[   36.684933] 
[   36.684984] Allocated by task 277:
[   36.685086]  kasan_save_stack+0x3c/0x68
[   36.685205]  kasan_save_track+0x20/0x40
[   36.685325]  kasan_save_alloc_info+0x40/0x58
[   36.686136]  __kasan_kmalloc+0xd4/0xd8
[   36.686254]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.686376]  kasan_atomics+0xb8/0x2e0
[   36.686616]  kunit_try_run_case+0x170/0x3f0
[   36.686723]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.686854]  kthread+0x328/0x630
[   36.686969]  ret_from_fork+0x10/0x20
[   36.687102] 
[   36.687396] The buggy address belongs to the object at fff00000c7805380
[   36.687396]  which belongs to the cache kmalloc-64 of size 64
[   36.687639] The buggy address is located 0 bytes to the right of
[   36.687639]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.687874] 
[   36.687991] The buggy address belongs to the physical page:
[   36.688091] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.688355] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.688574] page_type: f5(slab)
[   36.688684] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.688846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.689174] page dumped because: kasan: bad access detected
[   36.689431] 
[   36.689553] Memory state around the buggy address:
[   36.689639]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.689770]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.689907] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.690014]                                      ^
[   36.690132]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.690525]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.690788] ==================================================================
[   36.796598] ==================================================================
[   36.796720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   36.796843] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.796968] 
[   36.797057] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.797258] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.797327] Hardware name: linux,dummy-virt (DT)
[   36.799164] Call trace:
[   36.799252]  show_stack+0x20/0x38 (C)
[   36.799775]  dump_stack_lvl+0x8c/0xd0
[   36.799937]  print_report+0x118/0x608
[   36.800163]  kasan_report+0xdc/0x128
[   36.800322]  kasan_check_range+0x100/0x1a8
[   36.800446]  __kasan_check_write+0x20/0x30
[   36.800558]  kasan_atomics_helper+0x1058/0x4858
[   36.800680]  kasan_atomics+0x198/0x2e0
[   36.800805]  kunit_try_run_case+0x170/0x3f0
[   36.801151]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.802135]  kthread+0x328/0x630
[   36.802313]  ret_from_fork+0x10/0x20
[   36.802781] 
[   36.802840] Allocated by task 277:
[   36.802913]  kasan_save_stack+0x3c/0x68
[   36.803016]  kasan_save_track+0x20/0x40
[   36.803773]  kasan_save_alloc_info+0x40/0x58
[   36.804196]  __kasan_kmalloc+0xd4/0xd8
[   36.804746]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.805013]  kasan_atomics+0xb8/0x2e0
[   36.805526]  kunit_try_run_case+0x170/0x3f0
[   36.805829]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.806353]  kthread+0x328/0x630
[   36.806695]  ret_from_fork+0x10/0x20
[   36.807165] 
[   36.807221] The buggy address belongs to the object at fff00000c7805380
[   36.807221]  which belongs to the cache kmalloc-64 of size 64
[   36.807360] The buggy address is located 0 bytes to the right of
[   36.807360]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.808295] 
[   36.808731] The buggy address belongs to the physical page:
[   36.808918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.809103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.809655] page_type: f5(slab)
[   36.809831] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.810499] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.811086] page dumped because: kasan: bad access detected
[   36.811804] 
[   36.812357] Memory state around the buggy address:
[   36.812657]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.813149]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.813303] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.813401]                                      ^
[   36.813737]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.813863]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.814263] ==================================================================
[   36.525961] ==================================================================
[   36.526090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   36.526305] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.526620] 
[   36.526770] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.527055] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.527131] Hardware name: linux,dummy-virt (DT)
[   36.527354] Call trace:
[   36.527447]  show_stack+0x20/0x38 (C)
[   36.527689]  dump_stack_lvl+0x8c/0xd0
[   36.527813]  print_report+0x118/0x608
[   36.527929]  kasan_report+0xdc/0x128
[   36.528118]  kasan_check_range+0x100/0x1a8
[   36.528313]  __kasan_check_write+0x20/0x30
[   36.528462]  kasan_atomics_helper+0xa6c/0x4858
[   36.528595]  kasan_atomics+0x198/0x2e0
[   36.528759]  kunit_try_run_case+0x170/0x3f0
[   36.529749]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.530406]  kthread+0x328/0x630
[   36.530832]  ret_from_fork+0x10/0x20
[   36.531167] 
[   36.531255] Allocated by task 277:
[   36.531529]  kasan_save_stack+0x3c/0x68
[   36.531697]  kasan_save_track+0x20/0x40
[   36.533686]  ret_from_fork+0x10/0x20
[   36.535716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.535923] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.536108] page_type: f5(slab)
[   36.536296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.536419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.536520] page dumped because: kasan: bad access detected
[   36.536632] 
[   36.536810] Memory state around the buggy address:
[   36.536904]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.537110]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.537233] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.539134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   36.540706]  show_stack+0x20/0x38 (C)
[   36.543792]  kasan_save_track+0x20/0x40
[   36.546827] The buggy address is located 0 bytes to the right of
[   36.546827]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.547763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.547882] page_type: f5(slab)
[   36.547989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.548134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.548236] page dumped because: kasan: bad access detected
[   36.548316] 
[   36.549636] Memory state around the buggy address:
[   36.549759]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.549934]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.550064] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.550171]                                      ^
[   36.550431]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.550665]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.550792] ==================================================================
[   36.713958] ==================================================================
[   36.714227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   36.714504] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.714818] 
[   36.714891] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.715195] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.715267] Hardware name: linux,dummy-virt (DT)
[   36.715374] Call trace:
[   36.715435]  show_stack+0x20/0x38 (C)
[   36.715588]  dump_stack_lvl+0x8c/0xd0
[   36.715723]  print_report+0x118/0x608
[   36.715849]  kasan_report+0xdc/0x128
[   36.715966]  kasan_check_range+0x100/0x1a8
[   36.716108]  __kasan_check_write+0x20/0x30
[   36.716284]  kasan_atomics_helper+0xe44/0x4858
[   36.716614]  kasan_atomics+0x198/0x2e0
[   36.716737]  kunit_try_run_case+0x170/0x3f0
[   36.716894]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.717136]  kthread+0x328/0x630
[   36.717306]  ret_from_fork+0x10/0x20
[   36.717448] 
[   36.717511] Allocated by task 277:
[   36.718319]  kasan_save_stack+0x3c/0x68
[   36.718586]  kasan_save_track+0x20/0x40
[   36.719059]  kasan_save_alloc_info+0x40/0x58
[   36.719194]  __kasan_kmalloc+0xd4/0xd8
[   36.719298]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.719415]  kasan_atomics+0xb8/0x2e0
[   36.721090]  kunit_try_run_case+0x170/0x3f0
[   36.721583]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.722196]  kthread+0x328/0x630
[   36.722296]  ret_from_fork+0x10/0x20
[   36.722395] 
[   36.723294] The buggy address belongs to the object at fff00000c7805380
[   36.723294]  which belongs to the cache kmalloc-64 of size 64
[   36.724128] The buggy address is located 0 bytes to the right of
[   36.724128]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.724731] 
[   36.725173] The buggy address belongs to the physical page:
[   36.725293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.725418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.725700] page_type: f5(slab)
[   36.726606] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.727460] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.727565] page dumped because: kasan: bad access detected
[   36.727610] 
[   36.727635] Memory state around the buggy address:
[   36.727699]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.727807]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.727922] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.728126]                                      ^
[   36.728386]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.728544]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.728906] ==================================================================
[   36.729753] ==================================================================
[   36.729810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   36.729899] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.730000] 
[   36.730076] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.730302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.730378] Hardware name: linux,dummy-virt (DT)
[   36.730453] Call trace:
[   36.730517]  show_stack+0x20/0x38 (C)
[   36.731170]  dump_stack_lvl+0x8c/0xd0
[   36.731284]  print_report+0x118/0x608
[   36.731355]  kasan_report+0xdc/0x128
[   36.731447]  __asan_report_store8_noabort+0x20/0x30
[   36.731690]  kasan_atomics_helper+0x3e5c/0x4858
[   36.731826]  kasan_atomics+0x198/0x2e0
[   36.732182]  kunit_try_run_case+0x170/0x3f0
[   36.732321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.732584]  kthread+0x328/0x630
[   36.732740]  ret_from_fork+0x10/0x20
[   36.732860] 
[   36.732908] Allocated by task 277:
[   36.733079]  kasan_save_stack+0x3c/0x68
[   36.733487]  kasan_save_track+0x20/0x40
[   36.733629]  kasan_save_alloc_info+0x40/0x58
[   36.733730]  __kasan_kmalloc+0xd4/0xd8
[   36.733850]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.733977]  kasan_atomics+0xb8/0x2e0
[   36.734526]  kunit_try_run_case+0x170/0x3f0
[   36.734782]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.734915]  kthread+0x328/0x630
[   36.735013]  ret_from_fork+0x10/0x20
[   36.735142] 
[   36.735190] The buggy address belongs to the object at fff00000c7805380
[   36.735190]  which belongs to the cache kmalloc-64 of size 64
[   36.735595] The buggy address is located 0 bytes to the right of
[   36.735595]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.735816] 
[   36.735886] The buggy address belongs to the physical page:
[   36.735964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.736134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.736266] page_type: f5(slab)
[   36.736737] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.736897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.737151] page dumped because: kasan: bad access detected
[   36.737235] 
[   36.737320] Memory state around the buggy address:
[   36.737409]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.737528]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.737632] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.737727]                                      ^
[   36.737824]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.737963]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.738083] ==================================================================
[   36.910197] ==================================================================
[   36.910293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   36.910477] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.910654] 
[   36.910822] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.911453] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.911616] Hardware name: linux,dummy-virt (DT)
[   36.911715] Call trace:
[   36.911883]  show_stack+0x20/0x38 (C)
[   36.912067]  dump_stack_lvl+0x8c/0xd0
[   36.912461]  print_report+0x118/0x608
[   36.912599]  kasan_report+0xdc/0x128
[   36.912730]  kasan_check_range+0x100/0x1a8
[   36.912852]  __kasan_check_write+0x20/0x30
[   36.913153]  kasan_atomics_helper+0x1414/0x4858
[   36.913293]  kasan_atomics+0x198/0x2e0
[   36.913441]  kunit_try_run_case+0x170/0x3f0
[   36.913571]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.913715]  kthread+0x328/0x630
[   36.913825]  ret_from_fork+0x10/0x20
[   36.913941] 
[   36.913994] Allocated by task 277:
[   36.914509]  kasan_save_stack+0x3c/0x68
[   36.914641]  kasan_save_track+0x20/0x40
[   36.915477]  kasan_save_alloc_info+0x40/0x58
[   36.915864]  __kasan_kmalloc+0xd4/0xd8
[   36.916193]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.916411]  kasan_atomics+0xb8/0x2e0
[   36.916634]  kunit_try_run_case+0x170/0x3f0
[   36.916746]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.917333]  kthread+0x328/0x630
[   36.917507]  ret_from_fork+0x10/0x20
[   36.918004] 
[   36.918160] The buggy address belongs to the object at fff00000c7805380
[   36.918160]  which belongs to the cache kmalloc-64 of size 64
[   36.918821] The buggy address is located 0 bytes to the right of
[   36.918821]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.918986] 
[   36.919314] The buggy address belongs to the physical page:
[   36.919451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.919577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.919951] page_type: f5(slab)
[   36.920287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.920649] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.920758] page dumped because: kasan: bad access detected
[   36.920936] 
[   36.921007] Memory state around the buggy address:
[   36.921397]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.921516]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.922214] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.922328]                                      ^
[   36.922418]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.922764]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.923149] ==================================================================
[   36.480591] ==================================================================
[   36.480922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   36.481467] Read of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.481659] 
[   36.481735] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.481931] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.481999] Hardware name: linux,dummy-virt (DT)
[   36.482095] Call trace:
[   36.482150]  show_stack+0x20/0x38 (C)
[   36.482271]  dump_stack_lvl+0x8c/0xd0
[   36.482390]  print_report+0x118/0x608
[   36.482529]  kasan_report+0xdc/0x128
[   36.489268]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.491413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.496129] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.498187]  kunit_try_run_case+0x170/0x3f0
[   36.499138]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.499249]  kasan_atomics+0xb8/0x2e0
[   36.499348]  kunit_try_run_case+0x170/0x3f0
[   36.499445]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.499615]  kthread+0x328/0x630
[   36.499750]  ret_from_fork+0x10/0x20
[   36.499934] 
[   36.499995] The buggy address belongs to the object at fff00000c7805380
[   36.499995]  which belongs to the cache kmalloc-64 of size 64
[   36.500345] The buggy address is located 0 bytes to the right of
[   36.500345]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.500500] 
[   36.500551] The buggy address belongs to the physical page:
[   36.500629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.500794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.500914] page_type: f5(slab)
[   36.501063] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.501246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.501365] page dumped because: kasan: bad access detected
[   36.501505] 
[   36.501594] Memory state around the buggy address:
[   36.501688]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.501812]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.501951] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.502219]                                      ^
[   36.502320]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.502435]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.502529] ==================================================================
[   36.815119] ==================================================================
[   36.815217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   36.815326] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.815444] 
[   36.815524] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.816069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.816264] Hardware name: linux,dummy-virt (DT)
[   36.816477] Call trace:
[   36.816640]  show_stack+0x20/0x38 (C)
[   36.816834]  dump_stack_lvl+0x8c/0xd0
[   36.816962]  print_report+0x118/0x608
[   36.817102]  kasan_report+0xdc/0x128
[   36.817231]  kasan_check_range+0x100/0x1a8
[   36.817462]  __kasan_check_write+0x20/0x30
[   36.817619]  kasan_atomics_helper+0x10c0/0x4858
[   36.817753]  kasan_atomics+0x198/0x2e0
[   36.817928]  kunit_try_run_case+0x170/0x3f0
[   36.818131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.818425]  kthread+0x328/0x630
[   36.818658]  ret_from_fork+0x10/0x20
[   36.818882] 
[   36.818937] Allocated by task 277:
[   36.819043]  kasan_save_stack+0x3c/0x68
[   36.819237]  kasan_save_track+0x20/0x40
[   36.819339]  kasan_save_alloc_info+0x40/0x58
[   36.819550]  __kasan_kmalloc+0xd4/0xd8
[   36.819666]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.819808]  kasan_atomics+0xb8/0x2e0
[   36.819969]  kunit_try_run_case+0x170/0x3f0
[   36.820049]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.820347]  kthread+0x328/0x630
[   36.820450]  ret_from_fork+0x10/0x20
[   36.820711] 
[   36.820829] The buggy address belongs to the object at fff00000c7805380
[   36.820829]  which belongs to the cache kmalloc-64 of size 64
[   36.820990] The buggy address is located 0 bytes to the right of
[   36.820990]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.821435] 
[   36.821516] The buggy address belongs to the physical page:
[   36.821660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.821784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.821897] page_type: f5(slab)
[   36.822092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.822227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.822420] page dumped because: kasan: bad access detected
[   36.822514] 
[   36.822561] Memory state around the buggy address:
[   36.822672]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.822852]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.822998] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.823109]                                      ^
[   36.823204]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.823349]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.823443] ==================================================================
[   36.985326] ==================================================================
[   36.985451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   36.985622] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.985855] 
[   36.985965] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.986179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.986249] Hardware name: linux,dummy-virt (DT)
[   36.986321] Call trace:
[   36.986377]  show_stack+0x20/0x38 (C)
[   36.986493]  dump_stack_lvl+0x8c/0xd0
[   36.986629]  print_report+0x118/0x608
[   36.986763]  kasan_report+0xdc/0x128
[   36.986903]  __asan_report_load8_noabort+0x20/0x30
[   36.987066]  kasan_atomics_helper+0x3db0/0x4858
[   36.987203]  kasan_atomics+0x198/0x2e0
[   36.987355]  kunit_try_run_case+0x170/0x3f0
[   36.987501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.987652]  kthread+0x328/0x630
[   36.988088]  ret_from_fork+0x10/0x20
[   36.988280] 
[   36.988339] Allocated by task 277:
[   36.989212]  kasan_save_stack+0x3c/0x68
[   36.989347]  kasan_save_track+0x20/0x40
[   36.991017]  kasan_save_alloc_info+0x40/0x58
[   36.991173]  __kasan_kmalloc+0xd4/0xd8
[   36.991583]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.991703]  kasan_atomics+0xb8/0x2e0
[   36.991859]  kunit_try_run_case+0x170/0x3f0
[   36.992058]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.992193]  kthread+0x328/0x630
[   36.992285]  ret_from_fork+0x10/0x20
[   36.992382] 
[   36.992431] The buggy address belongs to the object at fff00000c7805380
[   36.992431]  which belongs to the cache kmalloc-64 of size 64
[   36.992740] The buggy address is located 0 bytes to the right of
[   36.992740]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.992953] 
[   36.993122] The buggy address belongs to the physical page:
[   36.993241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.993428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.993569] page_type: f5(slab)
[   36.993711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.994047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.994151] page dumped because: kasan: bad access detected
[   36.994231] 
[   36.994288] Memory state around the buggy address:
[   36.994444]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.994643]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.994761] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.994868]                                      ^
[   36.994986]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.995336]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.995502] ==================================================================
[   36.954893] ==================================================================
[   36.955005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   36.955165] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.955297] 
[   36.955369] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.955574] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.955646] Hardware name: linux,dummy-virt (DT)
[   36.955723] Call trace:
[   36.955780]  show_stack+0x20/0x38 (C)
[   36.955898]  dump_stack_lvl+0x8c/0xd0
[   36.956015]  print_report+0x118/0x608
[   36.956157]  kasan_report+0xdc/0x128
[   36.956269]  kasan_check_range+0x100/0x1a8
[   36.956386]  __kasan_check_write+0x20/0x30
[   36.956993]  kasan_atomics_helper+0x154c/0x4858
[   36.957148]  kasan_atomics+0x198/0x2e0
[   36.957291]  kunit_try_run_case+0x170/0x3f0
[   36.957442]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.958066]  kthread+0x328/0x630
[   36.958282]  ret_from_fork+0x10/0x20
[   36.958540] 
[   36.958650] Allocated by task 277:
[   36.958755]  kasan_save_stack+0x3c/0x68
[   36.959253]  kasan_save_track+0x20/0x40
[   36.959359]  kasan_save_alloc_info+0x40/0x58
[   36.959455]  __kasan_kmalloc+0xd4/0xd8
[   36.959554]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.959669]  kasan_atomics+0xb8/0x2e0
[   36.959834]  kunit_try_run_case+0x170/0x3f0
[   36.960051]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.960191]  kthread+0x328/0x630
[   36.960283]  ret_from_fork+0x10/0x20
[   36.960518] 
[   36.960656] The buggy address belongs to the object at fff00000c7805380
[   36.960656]  which belongs to the cache kmalloc-64 of size 64
[   36.960979] The buggy address is located 0 bytes to the right of
[   36.960979]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.961152] 
[   36.961203] The buggy address belongs to the physical page:
[   36.961279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.961399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.961512] page_type: f5(slab)
[   36.961705] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.962011] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.962128] page dumped because: kasan: bad access detected
[   36.962214] 
[   36.962272] Memory state around the buggy address:
[   36.962642]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.962816]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.962936] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.963049]                                      ^
[   36.963353]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.963476]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.963577] ==================================================================
[   36.771707] ==================================================================
[   36.772001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   36.772260] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.772392] 
[   36.772566] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.772917] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.773008] Hardware name: linux,dummy-virt (DT)
[   36.773465] Call trace:
[   36.773537]  show_stack+0x20/0x38 (C)
[   36.773677]  dump_stack_lvl+0x8c/0xd0
[   36.774057]  print_report+0x118/0x608
[   36.774540]  kasan_report+0xdc/0x128
[   36.774756]  kasan_check_range+0x100/0x1a8
[   36.774888]  __kasan_check_write+0x20/0x30
[   36.775024]  kasan_atomics_helper+0xf88/0x4858
[   36.775714]  kasan_atomics+0x198/0x2e0
[   36.776222]  kunit_try_run_case+0x170/0x3f0
[   36.776575]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.776915]  kthread+0x328/0x630
[   36.777307]  ret_from_fork+0x10/0x20
[   36.777769] 
[   36.777846] Allocated by task 277:
[   36.778109]  kasan_save_stack+0x3c/0x68
[   36.778222]  kasan_save_track+0x20/0x40
[   36.778321]  kasan_save_alloc_info+0x40/0x58
[   36.778479]  __kasan_kmalloc+0xd4/0xd8
[   36.778735]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.779148]  kasan_atomics+0xb8/0x2e0
[   36.779870]  kunit_try_run_case+0x170/0x3f0
[   36.780191]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.780339]  kthread+0x328/0x630
[   36.780494]  ret_from_fork+0x10/0x20
[   36.780599] 
[   36.780660] The buggy address belongs to the object at fff00000c7805380
[   36.780660]  which belongs to the cache kmalloc-64 of size 64
[   36.780800] The buggy address is located 0 bytes to the right of
[   36.780800]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.781011] 
[   36.781084] The buggy address belongs to the physical page:
[   36.781215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.781567] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.781728] page_type: f5(slab)
[   36.781821] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.781957] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.782336] page dumped because: kasan: bad access detected
[   36.782432] 
[   36.782550] Memory state around the buggy address:
[   36.782974]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.783109]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.783233] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.783612]                                      ^
[   36.783889]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.784230]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.784347] ==================================================================
[   36.964080] ==================================================================
[   36.964261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   36.964393] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.964508] 
[   36.964606] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.964944] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.965014] Hardware name: linux,dummy-virt (DT)
[   36.965115] Call trace:
[   36.965278]  show_stack+0x20/0x38 (C)
[   36.965580]  dump_stack_lvl+0x8c/0xd0
[   36.965701]  print_report+0x118/0x608
[   36.965999]  kasan_report+0xdc/0x128
[   36.966148]  kasan_check_range+0x100/0x1a8
[   36.966369]  __kasan_check_write+0x20/0x30
[   36.966651]  kasan_atomics_helper+0x15b4/0x4858
[   36.966813]  kasan_atomics+0x198/0x2e0
[   36.967530]  kunit_try_run_case+0x170/0x3f0
[   36.967714]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.968659]  kthread+0x328/0x630
[   36.968788]  ret_from_fork+0x10/0x20
[   36.969896] 
[   36.970063] Allocated by task 277:
[   36.970353]  kasan_save_stack+0x3c/0x68
[   36.970466]  kasan_save_track+0x20/0x40
[   36.971422]  kasan_save_alloc_info+0x40/0x58
[   36.972193]  __kasan_kmalloc+0xd4/0xd8
[   36.972359]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.972578]  kasan_atomics+0xb8/0x2e0
[   36.972846]  kunit_try_run_case+0x170/0x3f0
[   36.973703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.973861]  kthread+0x328/0x630
[   36.974663]  ret_from_fork+0x10/0x20
[   36.975391] 
[   36.975456] The buggy address belongs to the object at fff00000c7805380
[   36.975456]  which belongs to the cache kmalloc-64 of size 64
[   36.975599] The buggy address is located 0 bytes to the right of
[   36.975599]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.976306] 
[   36.976811] The buggy address belongs to the physical page:
[   36.977058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.977465] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.977674] page_type: f5(slab)
[   36.977764] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.977886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.979544] page dumped because: kasan: bad access detected
[   36.979910] 
[   36.979963] Memory state around the buggy address:
[   36.980061]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.981607]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.982519] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.982896]                                      ^
[   36.983294]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.983713]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.984135] ==================================================================
[   36.691694] ==================================================================
[   36.691795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   36.692057] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.692284] 
[   36.692360] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.692560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.692630] Hardware name: linux,dummy-virt (DT)
[   36.692704] Call trace:
[   36.692759]  show_stack+0x20/0x38 (C)
[   36.692876]  dump_stack_lvl+0x8c/0xd0
[   36.692987]  print_report+0x118/0x608
[   36.693129]  kasan_report+0xdc/0x128
[   36.693249]  kasan_check_range+0x100/0x1a8
[   36.693371]  __kasan_check_read+0x20/0x30
[   36.693481]  kasan_atomics_helper+0xdd4/0x4858
[   36.693602]  kasan_atomics+0x198/0x2e0
[   36.693717]  kunit_try_run_case+0x170/0x3f0
[   36.693834]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.693963]  kthread+0x328/0x630
[   36.694102]  ret_from_fork+0x10/0x20
[   36.694250] 
[   36.694310] Allocated by task 277:
[   36.694397]  kasan_save_stack+0x3c/0x68
[   36.694516]  kasan_save_track+0x20/0x40
[   36.695168]  kasan_save_alloc_info+0x40/0x58
[   36.695503]  __kasan_kmalloc+0xd4/0xd8
[   36.695622]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.695743]  kasan_atomics+0xb8/0x2e0
[   36.695844]  kunit_try_run_case+0x170/0x3f0
[   36.696703]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.696919]  kthread+0x328/0x630
[   36.697112]  ret_from_fork+0x10/0x20
[   36.697280] 
[   36.697346] The buggy address belongs to the object at fff00000c7805380
[   36.697346]  which belongs to the cache kmalloc-64 of size 64
[   36.698015] The buggy address is located 0 bytes to the right of
[   36.698015]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.698225] 
[   36.698339] The buggy address belongs to the physical page:
[   36.698416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.698539] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.698736] page_type: f5(slab)
[   36.699375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.699546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.699716] page dumped because: kasan: bad access detected
[   36.699803] 
[   36.699855] Memory state around the buggy address:
[   36.699934]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.700054]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.700163] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.700288]                                      ^
[   36.700532]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.700715]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.700810] ==================================================================
[   36.551976] ==================================================================
[   36.552098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   36.552217] Read of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.552341] 
[   36.552466] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.552687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.552982]  show_stack+0x20/0x38 (C)
[   36.555108]  kunit_try_run_case+0x170/0x3f0
[   36.556672]  __kasan_kmalloc+0xd4/0xd8
[   36.557734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.558109]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.560429] ==================================================================
[   36.701198] ==================================================================
[   36.701309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   36.701445] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.701570] 
[   36.701647] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.702521] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.703149] Hardware name: linux,dummy-virt (DT)
[   36.703435] Call trace:
[   36.703506]  show_stack+0x20/0x38 (C)
[   36.703820]  dump_stack_lvl+0x8c/0xd0
[   36.703949]  print_report+0x118/0x608
[   36.704136]  kasan_report+0xdc/0x128
[   36.704500]  __asan_report_load8_noabort+0x20/0x30
[   36.704667]  kasan_atomics_helper+0x3f58/0x4858
[   36.705047]  kasan_atomics+0x198/0x2e0
[   36.705356]  kunit_try_run_case+0x170/0x3f0
[   36.705477]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.705613]  kthread+0x328/0x630
[   36.705778]  ret_from_fork+0x10/0x20
[   36.705965] 
[   36.706076] Allocated by task 277:
[   36.706160]  kasan_save_stack+0x3c/0x68
[   36.706315]  kasan_save_track+0x20/0x40
[   36.707175]  kasan_save_alloc_info+0x40/0x58
[   36.707291]  __kasan_kmalloc+0xd4/0xd8
[   36.707414]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.707617]  kasan_atomics+0xb8/0x2e0
[   36.707928]  kunit_try_run_case+0x170/0x3f0
[   36.708062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.708337]  kthread+0x328/0x630
[   36.708563]  ret_from_fork+0x10/0x20
[   36.708829] 
[   36.708894] The buggy address belongs to the object at fff00000c7805380
[   36.708894]  which belongs to the cache kmalloc-64 of size 64
[   36.709189] The buggy address is located 0 bytes to the right of
[   36.709189]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.709346] 
[   36.709404] The buggy address belongs to the physical page:
[   36.709607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.709734] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.710011] page_type: f5(slab)
[   36.710259] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.710382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.710479] page dumped because: kasan: bad access detected
[   36.710616] 
[   36.710673] Memory state around the buggy address:
[   36.710806]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.710966]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.711739] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.712094]                                      ^
[   36.712532]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.712644]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.712994] ==================================================================
[   36.939363] ==================================================================
[   36.939497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   36.939610] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.939729] 
[   36.939799] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.939995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.940172] Hardware name: linux,dummy-virt (DT)
[   36.940382] Call trace:
[   36.940554]  show_stack+0x20/0x38 (C)
[   36.940875]  dump_stack_lvl+0x8c/0xd0
[   36.941162]  print_report+0x118/0x608
[   36.941415]  kasan_report+0xdc/0x128
[   36.941608]  kasan_check_range+0x100/0x1a8
[   36.941974]  __kasan_check_write+0x20/0x30
[   36.942211]  kasan_atomics_helper+0x14e4/0x4858
[   36.942336]  kasan_atomics+0x198/0x2e0
[   36.942453]  kunit_try_run_case+0x170/0x3f0
[   36.942621]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.942786]  kthread+0x328/0x630
[   36.943210]  ret_from_fork+0x10/0x20
[   36.943356] 
[   36.943415] Allocated by task 277:
[   36.943499]  kasan_save_stack+0x3c/0x68
[   36.943607]  kasan_save_track+0x20/0x40
[   36.943711]  kasan_save_alloc_info+0x40/0x58
[   36.943919]  __kasan_kmalloc+0xd4/0xd8
[   36.944048]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.944305]  kasan_atomics+0xb8/0x2e0
[   36.944526]  kunit_try_run_case+0x170/0x3f0
[   36.944636]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.944745]  kthread+0x328/0x630
[   36.944878]  ret_from_fork+0x10/0x20
[   36.945061] 
[   36.945119] The buggy address belongs to the object at fff00000c7805380
[   36.945119]  which belongs to the cache kmalloc-64 of size 64
[   36.945291] The buggy address is located 0 bytes to the right of
[   36.945291]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.945551] 
[   36.945660] The buggy address belongs to the physical page:
[   36.945760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.946477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.947242] page_type: f5(slab)
[   36.947873] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.948179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.949500] page dumped because: kasan: bad access detected
[   36.949597] 
[   36.949648] Memory state around the buggy address:
[   36.950391]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.950860]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.950973] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.951478]                                      ^
[   36.951610]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.951734]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.952418] ==================================================================
[   37.039236] ==================================================================
[   37.039348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   37.039606] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   37.039732] 
[   37.039809] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.040400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.040471] Hardware name: linux,dummy-virt (DT)
[   37.040547] Call trace:
[   37.040601]  show_stack+0x20/0x38 (C)
[   37.040719]  dump_stack_lvl+0x8c/0xd0
[   37.040829]  print_report+0x118/0x608
[   37.040955]  kasan_report+0xdc/0x128
[   37.041102]  kasan_check_range+0x100/0x1a8
[   37.041219]  __kasan_check_write+0x20/0x30
[   37.041397]  kasan_atomics_helper+0x175c/0x4858
[   37.041577]  kasan_atomics+0x198/0x2e0
[   37.041721]  kunit_try_run_case+0x170/0x3f0
[   37.041855]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.041980]  kthread+0x328/0x630
[   37.042147]  ret_from_fork+0x10/0x20
[   37.042290] 
[   37.042580] Allocated by task 277:
[   37.042673]  kasan_save_stack+0x3c/0x68
[   37.042783]  kasan_save_track+0x20/0x40
[   37.042875]  kasan_save_alloc_info+0x40/0x58
[   37.042960]  __kasan_kmalloc+0xd4/0xd8
[   37.043011]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.043127]  kasan_atomics+0xb8/0x2e0
[   37.043212]  kunit_try_run_case+0x170/0x3f0
[   37.043378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.043755]  kthread+0x328/0x630
[   37.044411]  ret_from_fork+0x10/0x20
[   37.044682] 
[   37.044745] The buggy address belongs to the object at fff00000c7805380
[   37.044745]  which belongs to the cache kmalloc-64 of size 64
[   37.045345] The buggy address is located 0 bytes to the right of
[   37.045345]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   37.045545] 
[   37.046051] The buggy address belongs to the physical page:
[   37.046480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   37.046780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.047338] page_type: f5(slab)
[   37.047481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.047715] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.047837] page dumped because: kasan: bad access detected
[   37.047921] 
[   37.048016] Memory state around the buggy address:
[   37.048197]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.048307]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.048489] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.048757]                                      ^
[   37.048957]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.049084]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.049181] ==================================================================
[   37.049520] ==================================================================
[   37.049628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   37.050716] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   37.050844] 
[   37.050886] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.051069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.051132] Hardware name: linux,dummy-virt (DT)
[   37.051196] Call trace:
[   37.051225]  show_stack+0x20/0x38 (C)
[   37.051290]  dump_stack_lvl+0x8c/0xd0
[   37.051349]  print_report+0x118/0x608
[   37.051413]  kasan_report+0xdc/0x128
[   37.051471]  __asan_report_load8_noabort+0x20/0x30
[   37.051532]  kasan_atomics_helper+0x3e20/0x4858
[   37.051591]  kasan_atomics+0x198/0x2e0
[   37.051646]  kunit_try_run_case+0x170/0x3f0
[   37.051704]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.051770]  kthread+0x328/0x630
[   37.051823]  ret_from_fork+0x10/0x20
[   37.051883] 
[   37.051909] Allocated by task 277:
[   37.051945]  kasan_save_stack+0x3c/0x68
[   37.052001]  kasan_save_track+0x20/0x40
[   37.052237]  kasan_save_alloc_info+0x40/0x58
[   37.052770]  __kasan_kmalloc+0xd4/0xd8
[   37.052870]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.052975]  kasan_atomics+0xb8/0x2e0
[   37.053087]  kunit_try_run_case+0x170/0x3f0
[   37.053196]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.053320]  kthread+0x328/0x630
[   37.053416]  ret_from_fork+0x10/0x20
[   37.053505] 
[   37.053556] The buggy address belongs to the object at fff00000c7805380
[   37.053556]  which belongs to the cache kmalloc-64 of size 64
[   37.053692] The buggy address is located 0 bytes to the right of
[   37.053692]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   37.055002] 
[   37.055108] The buggy address belongs to the physical page:
[   37.055195] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   37.055337] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.056509] page_type: f5(slab)
[   37.056902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.057042] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.058357] page dumped because: kasan: bad access detected
[   37.058486] 
[   37.058604] Memory state around the buggy address:
[   37.058689]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.058798]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.058996] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.059112]                                      ^
[   37.059892]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.060464]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.060607] ==================================================================
[   36.924069] ==================================================================
[   36.924170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   36.924280] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.924395] 
[   36.924461] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.924658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.924726] Hardware name: linux,dummy-virt (DT)
[   36.924795] Call trace:
[   36.924852]  show_stack+0x20/0x38 (C)
[   36.924967]  dump_stack_lvl+0x8c/0xd0
[   36.925107]  print_report+0x118/0x608
[   36.925228]  kasan_report+0xdc/0x128
[   36.925340]  kasan_check_range+0x100/0x1a8
[   36.925457]  __kasan_check_write+0x20/0x30
[   36.925573]  kasan_atomics_helper+0x147c/0x4858
[   36.925697]  kasan_atomics+0x198/0x2e0
[   36.925813]  kunit_try_run_case+0x170/0x3f0
[   36.931271]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.931428]  kthread+0x328/0x630
[   36.932555]  ret_from_fork+0x10/0x20
[   36.932712] 
[   36.932773] Allocated by task 277:
[   36.932999]  kasan_save_stack+0x3c/0x68
[   36.933809]  kasan_save_track+0x20/0x40
[   36.933976]  kasan_save_alloc_info+0x40/0x58
[   36.934605]  __kasan_kmalloc+0xd4/0xd8
[   36.934729]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.934868]  kasan_atomics+0xb8/0x2e0
[   36.934980]  kunit_try_run_case+0x170/0x3f0
[   36.935130]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.935353]  kthread+0x328/0x630
[   36.935506]  ret_from_fork+0x10/0x20
[   36.935644] 
[   36.935697] The buggy address belongs to the object at fff00000c7805380
[   36.935697]  which belongs to the cache kmalloc-64 of size 64
[   36.935928] The buggy address is located 0 bytes to the right of
[   36.935928]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.936145] 
[   36.936227] The buggy address belongs to the physical page:
[   36.936437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.936714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.936832] page_type: f5(slab)
[   36.936947] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.937101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.937213] page dumped because: kasan: bad access detected
[   36.937307] 
[   36.937366] Memory state around the buggy address:
[   36.937618]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.937781]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.938238] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.938433]                                      ^
[   36.938530]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.938776]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.938914] ==================================================================
[   37.021059] ==================================================================
[   37.021157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   37.021286] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   37.021583] 
[   37.021784] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.022349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.022444] Hardware name: linux,dummy-virt (DT)
[   37.022516] Call trace:
[   37.022637]  show_stack+0x20/0x38 (C)
[   37.022760]  dump_stack_lvl+0x8c/0xd0
[   37.022940]  print_report+0x118/0x608
[   37.023165]  kasan_report+0xdc/0x128
[   37.023287]  kasan_check_range+0x100/0x1a8
[   37.023418]  __kasan_check_write+0x20/0x30
[   37.023568]  kasan_atomics_helper+0x16d0/0x4858
[   37.023845]  kasan_atomics+0x198/0x2e0
[   37.024083]  kunit_try_run_case+0x170/0x3f0
[   37.024215]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.024348]  kthread+0x328/0x630
[   37.024456]  ret_from_fork+0x10/0x20
[   37.024571] 
[   37.024623] Allocated by task 277:
[   37.024726]  kasan_save_stack+0x3c/0x68
[   37.024979]  kasan_save_track+0x20/0x40
[   37.025113]  kasan_save_alloc_info+0x40/0x58
[   37.025265]  __kasan_kmalloc+0xd4/0xd8
[   37.025369]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.025484]  kasan_atomics+0xb8/0x2e0
[   37.025640]  kunit_try_run_case+0x170/0x3f0
[   37.025838]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.025971]  kthread+0x328/0x630
[   37.026081]  ret_from_fork+0x10/0x20
[   37.026175] 
[   37.026228] The buggy address belongs to the object at fff00000c7805380
[   37.026228]  which belongs to the cache kmalloc-64 of size 64
[   37.026363] The buggy address is located 0 bytes to the right of
[   37.026363]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   37.026772] 
[   37.026829] The buggy address belongs to the physical page:
[   37.026906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   37.027024] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.027158] page_type: f5(slab)
[   37.027301] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.027520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.027815] page dumped because: kasan: bad access detected
[   37.028064] 
[   37.028199] Memory state around the buggy address:
[   37.028279]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.028428]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.028537] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.028770]                                      ^
[   37.028900]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.029385]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.029984] ==================================================================
[   36.739783] ==================================================================
[   36.741079] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   36.741218] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.741334] 
[   36.741405] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.741607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.741762] Hardware name: linux,dummy-virt (DT)
[   36.741849] Call trace:
[   36.742380]  show_stack+0x20/0x38 (C)
[   36.742520]  dump_stack_lvl+0x8c/0xd0
[   36.743869]  print_report+0x118/0x608
[   36.743983]  kasan_report+0xdc/0x128
[   36.744487]  kasan_check_range+0x100/0x1a8
[   36.744679]  __kasan_check_write+0x20/0x30
[   36.744805]  kasan_atomics_helper+0xeb8/0x4858
[   36.744934]  kasan_atomics+0x198/0x2e0
[   36.745325]  kunit_try_run_case+0x170/0x3f0
[   36.745673]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.746365]  kthread+0x328/0x630
[   36.746758]  ret_from_fork+0x10/0x20
[   36.747603] 
[   36.747643] Allocated by task 277:
[   36.747705]  kasan_save_stack+0x3c/0x68
[   36.747815]  kasan_save_track+0x20/0x40
[   36.747878]  kasan_save_alloc_info+0x40/0x58
[   36.747929]  __kasan_kmalloc+0xd4/0xd8
[   36.747977]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.748055]  kasan_atomics+0xb8/0x2e0
[   36.748479]  kunit_try_run_case+0x170/0x3f0
[   36.748612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.748734]  kthread+0x328/0x630
[   36.749093]  ret_from_fork+0x10/0x20
[   36.749808] 
[   36.750210] The buggy address belongs to the object at fff00000c7805380
[   36.750210]  which belongs to the cache kmalloc-64 of size 64
[   36.750935] The buggy address is located 0 bytes to the right of
[   36.750935]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.751181] 
[   36.751236] The buggy address belongs to the physical page:
[   36.751660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.752177] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.752318] page_type: f5(slab)
[   36.752411] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.752537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.752880] page dumped because: kasan: bad access detected
[   36.753159] 
[   36.753257] Memory state around the buggy address:
[   36.753444]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.753985]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.754212] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.754873]                                      ^
[   36.755013]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.755332]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.755437] ==================================================================
[   37.030468] ==================================================================
[   37.030621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   37.030730] Read of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   37.030959] 
[   37.031040] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.031431] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.031535] Hardware name: linux,dummy-virt (DT)
[   37.031615] Call trace:
[   37.031710]  show_stack+0x20/0x38 (C)
[   37.031830]  dump_stack_lvl+0x8c/0xd0
[   37.032142]  print_report+0x118/0x608
[   37.032335]  kasan_report+0xdc/0x128
[   37.032497]  __asan_report_load8_noabort+0x20/0x30
[   37.032630]  kasan_atomics_helper+0x3e10/0x4858
[   37.033003]  kasan_atomics+0x198/0x2e0
[   37.033141]  kunit_try_run_case+0x170/0x3f0
[   37.033266]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.033469]  kthread+0x328/0x630
[   37.033673]  ret_from_fork+0x10/0x20
[   37.033788] 
[   37.033866] Allocated by task 277:
[   37.033983]  kasan_save_stack+0x3c/0x68
[   37.034159]  kasan_save_track+0x20/0x40
[   37.034436]  kasan_save_alloc_info+0x40/0x58
[   37.034630]  __kasan_kmalloc+0xd4/0xd8
[   37.034726]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.034909]  kasan_atomics+0xb8/0x2e0
[   37.035069]  kunit_try_run_case+0x170/0x3f0
[   37.035172]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.035276]  kthread+0x328/0x630
[   37.035380]  ret_from_fork+0x10/0x20
[   37.035516] 
[   37.035563] The buggy address belongs to the object at fff00000c7805380
[   37.035563]  which belongs to the cache kmalloc-64 of size 64
[   37.035945] The buggy address is located 0 bytes to the right of
[   37.035945]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   37.036194] 
[   37.036309] The buggy address belongs to the physical page:
[   37.036453] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   37.036750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.036871] page_type: f5(slab)
[   37.037016] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.037156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.037250] page dumped because: kasan: bad access detected
[   37.037344] 
[   37.037402] Memory state around the buggy address:
[   37.037487]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.037667]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.037821] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.037927]                                      ^
[   37.038007]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.038149]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.038477] ==================================================================
[   36.891690] ==================================================================
[   36.891886] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   36.892019] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.892731] 
[   36.892822] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.893042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.893126] Hardware name: linux,dummy-virt (DT)
[   36.893385] Call trace:
[   36.893488]  show_stack+0x20/0x38 (C)
[   36.893629]  dump_stack_lvl+0x8c/0xd0
[   36.893999]  print_report+0x118/0x608
[   36.894157]  kasan_report+0xdc/0x128
[   36.894350]  kasan_check_range+0x100/0x1a8
[   36.894495]  __kasan_check_write+0x20/0x30
[   36.894643]  kasan_atomics_helper+0x1384/0x4858
[   36.895132]  kasan_atomics+0x198/0x2e0
[   36.895457]  kunit_try_run_case+0x170/0x3f0
[   36.895599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.896052]  kthread+0x328/0x630
[   36.896484]  ret_from_fork+0x10/0x20
[   36.896854] 
[   36.897141] Allocated by task 277:
[   36.897221]  kasan_save_stack+0x3c/0x68
[   36.897417]  kasan_save_track+0x20/0x40
[   36.897718]  kasan_save_alloc_info+0x40/0x58
[   36.898114]  __kasan_kmalloc+0xd4/0xd8
[   36.898407]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.898661]  kasan_atomics+0xb8/0x2e0
[   36.898885]  kunit_try_run_case+0x170/0x3f0
[   36.899008]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.899463]  kthread+0x328/0x630
[   36.899570]  ret_from_fork+0x10/0x20
[   36.899683] 
[   36.899800] The buggy address belongs to the object at fff00000c7805380
[   36.899800]  which belongs to the cache kmalloc-64 of size 64
[   36.899942] The buggy address is located 0 bytes to the right of
[   36.899942]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.900133] 
[   36.900207] The buggy address belongs to the physical page:
[   36.900286] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.900409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.900521] page_type: f5(slab)
[   36.900610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.900731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.900827] page dumped because: kasan: bad access detected
[   36.900905] 
[   36.900952] Memory state around the buggy address:
[   36.901410]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.901750]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.901896] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.902118]                                      ^
[   36.902351]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.903323]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.903426] ==================================================================
[   36.785234] ==================================================================
[   36.785336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   36.785454] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.785575] 
[   36.785896] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.786734] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.786853] Hardware name: linux,dummy-virt (DT)
[   36.786932] Call trace:
[   36.787371]  show_stack+0x20/0x38 (C)
[   36.787690]  dump_stack_lvl+0x8c/0xd0
[   36.788101]  print_report+0x118/0x608
[   36.788628]  kasan_report+0xdc/0x128
[   36.789100]  kasan_check_range+0x100/0x1a8
[   36.789372]  __kasan_check_write+0x20/0x30
[   36.789628]  kasan_atomics_helper+0xff0/0x4858
[   36.789772]  kasan_atomics+0x198/0x2e0
[   36.789889]  kunit_try_run_case+0x170/0x3f0
[   36.790461]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.790762]  kthread+0x328/0x630
[   36.791019]  ret_from_fork+0x10/0x20
[   36.791202] 
[   36.791310] Allocated by task 277:
[   36.791382]  kasan_save_stack+0x3c/0x68
[   36.791486]  kasan_save_track+0x20/0x40
[   36.791581]  kasan_save_alloc_info+0x40/0x58
[   36.791689]  __kasan_kmalloc+0xd4/0xd8
[   36.791831]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.792107]  kasan_atomics+0xb8/0x2e0
[   36.792257]  kunit_try_run_case+0x170/0x3f0
[   36.792370]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.792636]  kthread+0x328/0x630
[   36.792801]  ret_from_fork+0x10/0x20
[   36.792900] 
[   36.792954] The buggy address belongs to the object at fff00000c7805380
[   36.792954]  which belongs to the cache kmalloc-64 of size 64
[   36.793104] The buggy address is located 0 bytes to the right of
[   36.793104]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.793278] 
[   36.793341] The buggy address belongs to the physical page:
[   36.793424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.794295] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.794494] page_type: f5(slab)
[   36.794694] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.794795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.794849] page dumped because: kasan: bad access detected
[   36.794909] 
[   36.794963] Memory state around the buggy address:
[   36.795016]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.795828]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.795969] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.796022]                                      ^
[   36.796098]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.796208]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.796260] ==================================================================
[   36.648826] ==================================================================
[   36.648929] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   36.649066] Write of size 4 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.649218] 
[   36.649352] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.649765] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.649926] Hardware name: linux,dummy-virt (DT)
[   36.650005] Call trace:
[   36.650089]  show_stack+0x20/0x38 (C)
[   36.650215]  dump_stack_lvl+0x8c/0xd0
[   36.650470]  print_report+0x118/0x608
[   36.651088]  kasan_report+0xdc/0x128
[   36.652131]  kasan_check_range+0x100/0x1a8
[   36.652559]  __kasan_check_write+0x20/0x30
[   36.653389]  kasan_atomics_helper+0xd3c/0x4858
[   36.653523]  kasan_atomics+0x198/0x2e0
[   36.654137]  kunit_try_run_case+0x170/0x3f0
[   36.655235]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.655717]  kthread+0x328/0x630
[   36.656349]  ret_from_fork+0x10/0x20
[   36.656479] 
[   36.657413] Allocated by task 277:
[   36.657727]  kasan_save_stack+0x3c/0x68
[   36.658275]  kasan_save_track+0x20/0x40
[   36.658447]  kasan_save_alloc_info+0x40/0x58
[   36.659244]  __kasan_kmalloc+0xd4/0xd8
[   36.659788]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.659905]  kasan_atomics+0xb8/0x2e0
[   36.660007]  kunit_try_run_case+0x170/0x3f0
[   36.661062]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.661766]  kthread+0x328/0x630
[   36.662068]  ret_from_fork+0x10/0x20
[   36.662852] 
[   36.662944] The buggy address belongs to the object at fff00000c7805380
[   36.662944]  which belongs to the cache kmalloc-64 of size 64
[   36.663256] The buggy address is located 0 bytes to the right of
[   36.663256]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.664203] 
[   36.664509] The buggy address belongs to the physical page:
[   36.664591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.664714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.664824] page_type: f5(slab)
[   36.667452] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.667987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.668283] page dumped because: kasan: bad access detected
[   36.668671] 
[   36.669265] Memory state around the buggy address:
[   36.669736]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.670499]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.670854] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.671769]                                      ^
[   36.671945]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.672074]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.673402] ==================================================================
[   37.063446] ==================================================================
[   37.063549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   37.063912] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   37.064063] 
[   37.064257] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   37.064841] Tainted: [B]=BAD_PAGE, [N]=TEST
[   37.064913] Hardware name: linux,dummy-virt (DT)
[   37.066414] Call trace:
[   37.066506]  show_stack+0x20/0x38 (C)
[   37.066678]  dump_stack_lvl+0x8c/0xd0
[   37.067271]  print_report+0x118/0x608
[   37.067497]  kasan_report+0xdc/0x128
[   37.067832]  kasan_check_range+0x100/0x1a8
[   37.067987]  __kasan_check_write+0x20/0x30
[   37.068173]  kasan_atomics_helper+0x17ec/0x4858
[   37.068356]  kasan_atomics+0x198/0x2e0
[   37.068478]  kunit_try_run_case+0x170/0x3f0
[   37.068612]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.069001]  kthread+0x328/0x630
[   37.069155]  ret_from_fork+0x10/0x20
[   37.069282] 
[   37.069330] Allocated by task 277:
[   37.069401]  kasan_save_stack+0x3c/0x68
[   37.069611]  kasan_save_track+0x20/0x40
[   37.069857]  kasan_save_alloc_info+0x40/0x58
[   37.069972]  __kasan_kmalloc+0xd4/0xd8
[   37.070729]  __kmalloc_cache_noprof+0x16c/0x3c0
[   37.070872]  kasan_atomics+0xb8/0x2e0
[   37.070987]  kunit_try_run_case+0x170/0x3f0
[   37.071124]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   37.071327]  kthread+0x328/0x630
[   37.071440]  ret_from_fork+0x10/0x20
[   37.071542] 
[   37.071603] The buggy address belongs to the object at fff00000c7805380
[   37.071603]  which belongs to the cache kmalloc-64 of size 64
[   37.071745] The buggy address is located 0 bytes to the right of
[   37.071745]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   37.071897] 
[   37.071953] The buggy address belongs to the physical page:
[   37.072047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   37.072635] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   37.073193] page_type: f5(slab)
[   37.073365] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   37.073569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   37.073675] page dumped because: kasan: bad access detected
[   37.074145] 
[   37.074198] Memory state around the buggy address:
[   37.074432]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.074926]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   37.075211] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   37.075547]                                      ^
[   37.075668]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.075775]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   37.075870] ==================================================================
[   36.877669] ==================================================================
[   36.877976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   36.878312] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.878498] 
[   36.878656] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.878868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.878943] Hardware name: linux,dummy-virt (DT)
[   36.879162] Call trace:
[   36.879223]  show_stack+0x20/0x38 (C)
[   36.879520]  dump_stack_lvl+0x8c/0xd0
[   36.879647]  print_report+0x118/0x608
[   36.880062]  kasan_report+0xdc/0x128
[   36.880301]  kasan_check_range+0x100/0x1a8
[   36.880469]  __kasan_check_write+0x20/0x30
[   36.880595]  kasan_atomics_helper+0x12d8/0x4858
[   36.880725]  kasan_atomics+0x198/0x2e0
[   36.880845]  kunit_try_run_case+0x170/0x3f0
[   36.880986]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.881164]  kthread+0x328/0x630
[   36.881738]  ret_from_fork+0x10/0x20
[   36.882110] 
[   36.882178] Allocated by task 277:
[   36.882272]  kasan_save_stack+0x3c/0x68
[   36.882448]  kasan_save_track+0x20/0x40
[   36.883188]  kasan_save_alloc_info+0x40/0x58
[   36.883635]  __kasan_kmalloc+0xd4/0xd8
[   36.884022]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.884191]  kasan_atomics+0xb8/0x2e0
[   36.884298]  kunit_try_run_case+0x170/0x3f0
[   36.884402]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.884514]  kthread+0x328/0x630
[   36.884599]  ret_from_fork+0x10/0x20
[   36.884786] 
[   36.885153] The buggy address belongs to the object at fff00000c7805380
[   36.885153]  which belongs to the cache kmalloc-64 of size 64
[   36.885359] The buggy address is located 0 bytes to the right of
[   36.885359]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.886207] 
[   36.886639] The buggy address belongs to the physical page:
[   36.886825] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.887155] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.887754] page_type: f5(slab)
[   36.887953] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.888299] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.888411] page dumped because: kasan: bad access detected
[   36.888492] 
[   36.889064] Memory state around the buggy address:
[   36.889801]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.890056]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.890172] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.890267]                                      ^
[   36.890414]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.890524]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.890624] ==================================================================
[   36.823905] ==================================================================
[   36.824081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   36.824267] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.824546] 
[   36.824682] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.824932] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.825079] Hardware name: linux,dummy-virt (DT)
[   36.825157] Call trace:
[   36.825353]  show_stack+0x20/0x38 (C)
[   36.825550]  dump_stack_lvl+0x8c/0xd0
[   36.825731]  print_report+0x118/0x608
[   36.825928]  kasan_report+0xdc/0x128
[   36.826067]  kasan_check_range+0x100/0x1a8
[   36.826193]  __kasan_check_write+0x20/0x30
[   36.826308]  kasan_atomics_helper+0x1128/0x4858
[   36.826427]  kasan_atomics+0x198/0x2e0
[   36.826600]  kunit_try_run_case+0x170/0x3f0
[   36.826727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.826898]  kthread+0x328/0x630
[   36.827141]  ret_from_fork+0x10/0x20
[   36.827280] 
[   36.827335] Allocated by task 277:
[   36.827407]  kasan_save_stack+0x3c/0x68
[   36.827606]  kasan_save_track+0x20/0x40
[   36.827746]  kasan_save_alloc_info+0x40/0x58
[   36.827895]  __kasan_kmalloc+0xd4/0xd8
[   36.828095]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.828206]  kasan_atomics+0xb8/0x2e0
[   36.828398]  kunit_try_run_case+0x170/0x3f0
[   36.828539]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.828664]  kthread+0x328/0x630
[   36.828756]  ret_from_fork+0x10/0x20
[   36.828920] 
[   36.829010] The buggy address belongs to the object at fff00000c7805380
[   36.829010]  which belongs to the cache kmalloc-64 of size 64
[   36.829177] The buggy address is located 0 bytes to the right of
[   36.829177]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.829365] 
[   36.829420] The buggy address belongs to the physical page:
[   36.829493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.829637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.829917] page_type: f5(slab)
[   36.830013] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.830153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.830272] page dumped because: kasan: bad access detected
[   36.830368] 
[   36.830479] Memory state around the buggy address:
[   36.830675]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.830810]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.830915] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.831011]                                      ^
[   36.831160]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.831282]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.831440] ==================================================================
[   36.859612] ==================================================================
[   36.859710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   36.859825] Write of size 8 at addr fff00000c78053b0 by task kunit_try_catch/277
[   36.859941] 
[   36.860817] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT 
[   36.861406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   36.861475] Hardware name: linux,dummy-virt (DT)
[   36.862044] Call trace:
[   36.862440]  show_stack+0x20/0x38 (C)
[   36.862739]  dump_stack_lvl+0x8c/0xd0
[   36.862869]  print_report+0x118/0x608
[   36.862988]  kasan_report+0xdc/0x128
[   36.864291]  kasan_check_range+0x100/0x1a8
[   36.865209]  __kasan_check_write+0x20/0x30
[   36.865674]  kasan_atomics_helper+0x126c/0x4858
[   36.865951]  kasan_atomics+0x198/0x2e0
[   36.866090]  kunit_try_run_case+0x170/0x3f0
[   36.866217]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.866656]  kthread+0x328/0x630
[   36.866983]  ret_from_fork+0x10/0x20
[   36.867225] 
[   36.867441] Allocated by task 277:
[   36.868047]  kasan_save_stack+0x3c/0x68
[   36.868382]  kasan_save_track+0x20/0x40
[   36.868734]  kasan_save_alloc_info+0x40/0x58
[   36.868890]  __kasan_kmalloc+0xd4/0xd8
[   36.869494]  __kmalloc_cache_noprof+0x16c/0x3c0
[   36.869625]  kasan_atomics+0xb8/0x2e0
[   36.869721]  kunit_try_run_case+0x170/0x3f0
[   36.869817]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   36.869928]  kthread+0x328/0x630
[   36.870018]  ret_from_fork+0x10/0x20
[   36.870822] 
[   36.871114] The buggy address belongs to the object at fff00000c7805380
[   36.871114]  which belongs to the cache kmalloc-64 of size 64
[   36.871688] The buggy address is located 0 bytes to the right of
[   36.871688]  allocated 48-byte region [fff00000c7805380, fff00000c78053b0)
[   36.871915] 
[   36.872198] The buggy address belongs to the physical page:
[   36.872360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x107805
[   36.872637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   36.873472] page_type: f5(slab)
[   36.873651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   36.873820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   36.874540] page dumped because: kasan: bad access detected
[   36.874771] 
[   36.874949] Memory state around the buggy address:
[   36.875049]  fff00000c7805280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.875878]  fff00000c7805300: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   36.875992] >fff00000c7805380: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   36.876337]                                      ^
[   36.876748]  fff00000c7805400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.876875]  fff00000c7805480: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   36.876972] ==================================================================

[   24.500418] ==================================================================
[   24.500727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   24.501751] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.502413] 
[   24.502539] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.502617] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.502636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.502667] Call Trace:
[   24.502689]  <TASK>
[   24.502712]  dump_stack_lvl+0x73/0xb0
[   24.502761]  print_report+0xd1/0x650
[   24.502794]  ? __virt_addr_valid+0x1db/0x2d0
[   24.502837]  ? kasan_atomics_helper+0x4b88/0x5450
[   24.502873]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.502913]  ? kasan_atomics_helper+0x4b88/0x5450
[   24.502949]  kasan_report+0x141/0x180
[   24.502981]  ? kasan_atomics_helper+0x4b88/0x5450
[   24.503016]  __asan_report_load4_noabort+0x18/0x20
[   24.503036]  kasan_atomics_helper+0x4b88/0x5450
[   24.503055]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.503073]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.503094]  ? trace_hardirqs_on+0x37/0xe0
[   24.503116]  ? kasan_atomics+0x152/0x310
[   24.503139]  kasan_atomics+0x1dc/0x310
[   24.503160]  ? __pfx_kasan_atomics+0x10/0x10
[   24.503180]  ? __pfx_kasan_atomics+0x10/0x10
[   24.503202]  kunit_try_run_case+0x1a5/0x480
[   24.503223]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.503243]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.503262]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.503282]  ? __kthread_parkme+0x82/0x180
[   24.503300]  ? preempt_count_sub+0x50/0x80
[   24.503320]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.503341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.503361]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.503399]  kthread+0x337/0x6f0
[   24.503419]  ? trace_preempt_on+0x20/0xc0
[   24.503439]  ? __pfx_kthread+0x10/0x10
[   24.503457]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.503475]  ? calculate_sigpending+0x7b/0xa0
[   24.503496]  ? __pfx_kthread+0x10/0x10
[   24.503515]  ret_from_fork+0x116/0x1d0
[   24.503532]  ? __pfx_kthread+0x10/0x10
[   24.503551]  ret_from_fork_asm+0x1a/0x30
[   24.503579]  </TASK>
[   24.503591] 
[   24.511155] Allocated by task 294:
[   24.511355]  kasan_save_stack+0x45/0x70
[   24.511647]  kasan_save_track+0x18/0x40
[   24.511933]  kasan_save_alloc_info+0x3b/0x50
[   24.512227]  __kasan_kmalloc+0xb7/0xc0
[   24.512507]  __kmalloc_cache_noprof+0x189/0x420
[   24.512815]  kasan_atomics+0x95/0x310
[   24.513005]  kunit_try_run_case+0x1a5/0x480
[   24.513168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.513475]  kthread+0x337/0x6f0
[   24.513696]  ret_from_fork+0x116/0x1d0
[   24.513993]  ret_from_fork_asm+0x1a/0x30
[   24.514248] 
[   24.514331] The buggy address belongs to the object at ffff888102c1c600
[   24.514331]  which belongs to the cache kmalloc-64 of size 64
[   24.515025] The buggy address is located 0 bytes to the right of
[   24.515025]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.515501] 
[   24.515599] The buggy address belongs to the physical page:
[   24.515862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.516344] flags: 0x200000000000000(node=0|zone=2)
[   24.516572] page_type: f5(slab)
[   24.516714] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.517337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.517642] page dumped because: kasan: bad access detected
[   24.517839] 
[   24.517985] Memory state around the buggy address:
[   24.518247]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.518540]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.518777] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.518999]                                      ^
[   24.519163]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.519388]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.519842] ==================================================================
[   25.763042] ==================================================================
[   25.763446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   25.763697] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.763920] 
[   25.764024] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.764097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.764118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.764153] Call Trace:
[   25.764179]  <TASK>
[   25.764205]  dump_stack_lvl+0x73/0xb0
[   25.764254]  print_report+0xd1/0x650
[   25.764296]  ? __virt_addr_valid+0x1db/0x2d0
[   25.764339]  ? kasan_atomics_helper+0x1e12/0x5450
[   25.764393]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.764471]  ? kasan_atomics_helper+0x1e12/0x5450
[   25.764508]  kasan_report+0x141/0x180
[   25.764545]  ? kasan_atomics_helper+0x1e12/0x5450
[   25.764586]  kasan_check_range+0x10c/0x1c0
[   25.764620]  __kasan_check_write+0x18/0x20
[   25.764657]  kasan_atomics_helper+0x1e12/0x5450
[   25.764697]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.764737]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.764781]  ? trace_hardirqs_on+0x37/0xe0
[   25.764820]  ? kasan_atomics+0x152/0x310
[   25.764862]  kasan_atomics+0x1dc/0x310
[   25.764899]  ? __pfx_kasan_atomics+0x10/0x10
[   25.764941]  ? __pfx_kasan_atomics+0x10/0x10
[   25.764990]  kunit_try_run_case+0x1a5/0x480
[   25.765036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.765078]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.765120]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.765165]  ? __kthread_parkme+0x82/0x180
[   25.765204]  ? preempt_count_sub+0x50/0x80
[   25.765250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.765316]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.765361]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.765416]  kthread+0x337/0x6f0
[   25.765455]  ? trace_preempt_on+0x20/0xc0
[   25.765499]  ? __pfx_kthread+0x10/0x10
[   25.765537]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.765590]  ? calculate_sigpending+0x7b/0xa0
[   25.765634]  ? __pfx_kthread+0x10/0x10
[   25.765674]  ret_from_fork+0x116/0x1d0
[   25.765708]  ? __pfx_kthread+0x10/0x10
[   25.765743]  ret_from_fork_asm+0x1a/0x30
[   25.765796]  </TASK>
[   25.765834] 
[   25.775705] Allocated by task 294:
[   25.776439]  kasan_save_stack+0x45/0x70
[   25.776646]  kasan_save_track+0x18/0x40
[   25.776823]  kasan_save_alloc_info+0x3b/0x50
[   25.777457]  __kasan_kmalloc+0xb7/0xc0
[   25.777635]  __kmalloc_cache_noprof+0x189/0x420
[   25.778151]  kasan_atomics+0x95/0x310
[   25.778485]  kunit_try_run_case+0x1a5/0x480
[   25.778653]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.779083]  kthread+0x337/0x6f0
[   25.779327]  ret_from_fork+0x116/0x1d0
[   25.779574]  ret_from_fork_asm+0x1a/0x30
[   25.779796] 
[   25.779944] The buggy address belongs to the object at ffff888102c1c600
[   25.779944]  which belongs to the cache kmalloc-64 of size 64
[   25.780292] The buggy address is located 0 bytes to the right of
[   25.780292]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.780998] 
[   25.781101] The buggy address belongs to the physical page:
[   25.781473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.781873] flags: 0x200000000000000(node=0|zone=2)
[   25.782132] page_type: f5(slab)
[   25.782359] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.782659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.782978] page dumped because: kasan: bad access detected
[   25.783465] 
[   25.783611] Memory state around the buggy address:
[   25.783785]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.784422]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.784663] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.784872]                                      ^
[   25.785219]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.785698]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.786229] ==================================================================
[   24.865304] ==================================================================
[   24.865857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   24.866434] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.866939] 
[   24.867070] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.867157] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.867184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.867222] Call Trace:
[   24.867251]  <TASK>
[   24.867277]  dump_stack_lvl+0x73/0xb0
[   24.867331]  print_report+0xd1/0x650
[   24.867369]  ? __virt_addr_valid+0x1db/0x2d0
[   24.867424]  ? kasan_atomics_helper+0xa2b/0x5450
[   24.867461]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.867508]  ? kasan_atomics_helper+0xa2b/0x5450
[   24.867550]  kasan_report+0x141/0x180
[   24.867589]  ? kasan_atomics_helper+0xa2b/0x5450
[   24.867640]  kasan_check_range+0x10c/0x1c0
[   24.867679]  __kasan_check_write+0x18/0x20
[   24.867720]  kasan_atomics_helper+0xa2b/0x5450
[   24.867757]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.867821]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.867897]  ? trace_hardirqs_on+0x37/0xe0
[   24.867939]  ? kasan_atomics+0x152/0x310
[   24.867989]  kasan_atomics+0x1dc/0x310
[   24.868034]  ? __pfx_kasan_atomics+0x10/0x10
[   24.868078]  ? __pfx_kasan_atomics+0x10/0x10
[   24.868129]  kunit_try_run_case+0x1a5/0x480
[   24.868175]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.868218]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.868261]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.868302]  ? __kthread_parkme+0x82/0x180
[   24.868338]  ? preempt_count_sub+0x50/0x80
[   24.868373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.868424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.868465]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.868503]  kthread+0x337/0x6f0
[   24.868538]  ? trace_preempt_on+0x20/0xc0
[   24.868578]  ? __pfx_kthread+0x10/0x10
[   24.868617]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.868657]  ? calculate_sigpending+0x7b/0xa0
[   24.868702]  ? __pfx_kthread+0x10/0x10
[   24.868742]  ret_from_fork+0x116/0x1d0
[   24.868779]  ? __pfx_kthread+0x10/0x10
[   24.868818]  ret_from_fork_asm+0x1a/0x30
[   24.868906]  </TASK>
[   24.868951] 
[   24.878420] Allocated by task 294:
[   24.878713]  kasan_save_stack+0x45/0x70
[   24.879076]  kasan_save_track+0x18/0x40
[   24.879338]  kasan_save_alloc_info+0x3b/0x50
[   24.879536]  __kasan_kmalloc+0xb7/0xc0
[   24.879686]  __kmalloc_cache_noprof+0x189/0x420
[   24.879885]  kasan_atomics+0x95/0x310
[   24.880035]  kunit_try_run_case+0x1a5/0x480
[   24.880227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.880453]  kthread+0x337/0x6f0
[   24.880712]  ret_from_fork+0x116/0x1d0
[   24.881050]  ret_from_fork_asm+0x1a/0x30
[   24.881362] 
[   24.881526] The buggy address belongs to the object at ffff888102c1c600
[   24.881526]  which belongs to the cache kmalloc-64 of size 64
[   24.882356] The buggy address is located 0 bytes to the right of
[   24.882356]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.883232] 
[   24.883392] The buggy address belongs to the physical page:
[   24.883746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.884030] flags: 0x200000000000000(node=0|zone=2)
[   24.884399] page_type: f5(slab)
[   24.884643] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.884942] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.885171] page dumped because: kasan: bad access detected
[   24.885346] 
[   24.885443] Memory state around the buggy address:
[   24.885607]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.885848]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.886359] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.886935]                                      ^
[   24.887272]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.887722]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.888210] ==================================================================
[   25.455049] ==================================================================
[   25.455616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   25.456009] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.456396] 
[   25.456565] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.456648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.456673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.456710] Call Trace:
[   25.456737]  <TASK>
[   25.456767]  dump_stack_lvl+0x73/0xb0
[   25.456819]  print_report+0xd1/0x650
[   25.456854]  ? __virt_addr_valid+0x1db/0x2d0
[   25.456879]  ? kasan_atomics_helper+0x164f/0x5450
[   25.456897]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.456920]  ? kasan_atomics_helper+0x164f/0x5450
[   25.456938]  kasan_report+0x141/0x180
[   25.456958]  ? kasan_atomics_helper+0x164f/0x5450
[   25.456996]  kasan_check_range+0x10c/0x1c0
[   25.457016]  __kasan_check_write+0x18/0x20
[   25.457036]  kasan_atomics_helper+0x164f/0x5450
[   25.457056]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.457075]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.457096]  ? trace_hardirqs_on+0x37/0xe0
[   25.457114]  ? kasan_atomics+0x152/0x310
[   25.457137]  kasan_atomics+0x1dc/0x310
[   25.457157]  ? __pfx_kasan_atomics+0x10/0x10
[   25.457177]  ? __pfx_kasan_atomics+0x10/0x10
[   25.457200]  kunit_try_run_case+0x1a5/0x480
[   25.457221]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.457240]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.457260]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.457280]  ? __kthread_parkme+0x82/0x180
[   25.457298]  ? preempt_count_sub+0x50/0x80
[   25.457318]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.457339]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.457360]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.457399]  kthread+0x337/0x6f0
[   25.457452]  ? trace_preempt_on+0x20/0xc0
[   25.457487]  ? __pfx_kthread+0x10/0x10
[   25.457521]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.457559]  ? calculate_sigpending+0x7b/0xa0
[   25.457603]  ? __pfx_kthread+0x10/0x10
[   25.457645]  ret_from_fork+0x116/0x1d0
[   25.457683]  ? __pfx_kthread+0x10/0x10
[   25.457721]  ret_from_fork_asm+0x1a/0x30
[   25.457782]  </TASK>
[   25.457807] 
[   25.465650] Allocated by task 294:
[   25.465913]  kasan_save_stack+0x45/0x70
[   25.466223]  kasan_save_track+0x18/0x40
[   25.466544]  kasan_save_alloc_info+0x3b/0x50
[   25.466975]  __kasan_kmalloc+0xb7/0xc0
[   25.467188]  __kmalloc_cache_noprof+0x189/0x420
[   25.467462]  kasan_atomics+0x95/0x310
[   25.467614]  kunit_try_run_case+0x1a5/0x480
[   25.467772]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.467952]  kthread+0x337/0x6f0
[   25.468090]  ret_from_fork+0x116/0x1d0
[   25.468236]  ret_from_fork_asm+0x1a/0x30
[   25.468590] 
[   25.468727] The buggy address belongs to the object at ffff888102c1c600
[   25.468727]  which belongs to the cache kmalloc-64 of size 64
[   25.469520] The buggy address is located 0 bytes to the right of
[   25.469520]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.470304] 
[   25.470484] The buggy address belongs to the physical page:
[   25.470841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.471198] flags: 0x200000000000000(node=0|zone=2)
[   25.471437] page_type: f5(slab)
[   25.471615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.471850] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.472341] page dumped because: kasan: bad access detected
[   25.472723] 
[   25.472837] Memory state around the buggy address:
[   25.473039]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.473259]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.473485] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.473697]                                      ^
[   25.473878]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.474336]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.474802] ==================================================================
[   25.786901] ==================================================================
[   25.787445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   25.788043] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.788406] 
[   25.788525] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.788607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.788632] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.788672] Call Trace:
[   25.788700]  <TASK>
[   25.788728]  dump_stack_lvl+0x73/0xb0
[   25.788782]  print_report+0xd1/0x650
[   25.788823]  ? __virt_addr_valid+0x1db/0x2d0
[   25.788863]  ? kasan_atomics_helper+0x1eaa/0x5450
[   25.788901]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.788938]  ? kasan_atomics_helper+0x1eaa/0x5450
[   25.788975]  kasan_report+0x141/0x180
[   25.789011]  ? kasan_atomics_helper+0x1eaa/0x5450
[   25.789054]  kasan_check_range+0x10c/0x1c0
[   25.789095]  __kasan_check_write+0x18/0x20
[   25.789132]  kasan_atomics_helper+0x1eaa/0x5450
[   25.789165]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.789195]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.789226]  ? trace_hardirqs_on+0x37/0xe0
[   25.789255]  ? kasan_atomics+0x152/0x310
[   25.789290]  kasan_atomics+0x1dc/0x310
[   25.789319]  ? __pfx_kasan_atomics+0x10/0x10
[   25.789351]  ? __pfx_kasan_atomics+0x10/0x10
[   25.789405]  kunit_try_run_case+0x1a5/0x480
[   25.789442]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.789474]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.789531]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.789567]  ? __kthread_parkme+0x82/0x180
[   25.789599]  ? preempt_count_sub+0x50/0x80
[   25.789632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.789668]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.789708]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.789746]  kthread+0x337/0x6f0
[   25.789775]  ? trace_preempt_on+0x20/0xc0
[   25.789807]  ? __pfx_kthread+0x10/0x10
[   25.789837]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.789896]  ? calculate_sigpending+0x7b/0xa0
[   25.789937]  ? __pfx_kthread+0x10/0x10
[   25.789970]  ret_from_fork+0x116/0x1d0
[   25.790002]  ? __pfx_kthread+0x10/0x10
[   25.790052]  ret_from_fork_asm+0x1a/0x30
[   25.790105]  </TASK>
[   25.790129] 
[   25.798107] Allocated by task 294:
[   25.798267]  kasan_save_stack+0x45/0x70
[   25.798531]  kasan_save_track+0x18/0x40
[   25.798837]  kasan_save_alloc_info+0x3b/0x50
[   25.799188]  __kasan_kmalloc+0xb7/0xc0
[   25.799465]  __kmalloc_cache_noprof+0x189/0x420
[   25.799791]  kasan_atomics+0x95/0x310
[   25.800066]  kunit_try_run_case+0x1a5/0x480
[   25.800408]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.800900]  kthread+0x337/0x6f0
[   25.801159]  ret_from_fork+0x116/0x1d0
[   25.801434]  ret_from_fork_asm+0x1a/0x30
[   25.801656] 
[   25.801750] The buggy address belongs to the object at ffff888102c1c600
[   25.801750]  which belongs to the cache kmalloc-64 of size 64
[   25.802100] The buggy address is located 0 bytes to the right of
[   25.802100]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.802807] 
[   25.803011] The buggy address belongs to the physical page:
[   25.803354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.804218] flags: 0x200000000000000(node=0|zone=2)
[   25.804822] page_type: f5(slab)
[   25.805849] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.806186] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.806437] page dumped because: kasan: bad access detected
[   25.807530] 
[   25.808057] Memory state around the buggy address:
[   25.808250]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.808646]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.809016] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.809311]                                      ^
[   25.809635]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.810207]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.810549] ==================================================================
[   25.287253] ==================================================================
[   25.287591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   25.287878] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.288171] 
[   25.288321] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.288400] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.288421] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.288454] Call Trace:
[   25.288479]  <TASK>
[   25.288503]  dump_stack_lvl+0x73/0xb0
[   25.288547]  print_report+0xd1/0x650
[   25.288584]  ? __virt_addr_valid+0x1db/0x2d0
[   25.288624]  ? kasan_atomics_helper+0x49ce/0x5450
[   25.288658]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.288702]  ? kasan_atomics_helper+0x49ce/0x5450
[   25.288741]  kasan_report+0x141/0x180
[   25.288779]  ? kasan_atomics_helper+0x49ce/0x5450
[   25.288824]  __asan_report_load4_noabort+0x18/0x20
[   25.288901]  kasan_atomics_helper+0x49ce/0x5450
[   25.288947]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.288986]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.289020]  ? trace_hardirqs_on+0x37/0xe0
[   25.289053]  ? kasan_atomics+0x152/0x310
[   25.289094]  kasan_atomics+0x1dc/0x310
[   25.289131]  ? __pfx_kasan_atomics+0x10/0x10
[   25.289173]  ? __pfx_kasan_atomics+0x10/0x10
[   25.289224]  kunit_try_run_case+0x1a5/0x480
[   25.289272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.289314]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.289358]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.289416]  ? __kthread_parkme+0x82/0x180
[   25.289456]  ? preempt_count_sub+0x50/0x80
[   25.289501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.289547]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.289590]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.289631]  kthread+0x337/0x6f0
[   25.289659]  ? trace_preempt_on+0x20/0xc0
[   25.289692]  ? __pfx_kthread+0x10/0x10
[   25.289725]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.289762]  ? calculate_sigpending+0x7b/0xa0
[   25.289798]  ? __pfx_kthread+0x10/0x10
[   25.289864]  ret_from_fork+0x116/0x1d0
[   25.289902]  ? __pfx_kthread+0x10/0x10
[   25.289938]  ret_from_fork_asm+0x1a/0x30
[   25.289995]  </TASK>
[   25.290025] 
[   25.300114] Allocated by task 294:
[   25.300289]  kasan_save_stack+0x45/0x70
[   25.300463]  kasan_save_track+0x18/0x40
[   25.300647]  kasan_save_alloc_info+0x3b/0x50
[   25.301289]  __kasan_kmalloc+0xb7/0xc0
[   25.301566]  __kmalloc_cache_noprof+0x189/0x420
[   25.301765]  kasan_atomics+0x95/0x310
[   25.302217]  kunit_try_run_case+0x1a5/0x480
[   25.302625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.302914]  kthread+0x337/0x6f0
[   25.303418]  ret_from_fork+0x116/0x1d0
[   25.303707]  ret_from_fork_asm+0x1a/0x30
[   25.304012] 
[   25.304109] The buggy address belongs to the object at ffff888102c1c600
[   25.304109]  which belongs to the cache kmalloc-64 of size 64
[   25.304604] The buggy address is located 0 bytes to the right of
[   25.304604]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.305199] 
[   25.305814] The buggy address belongs to the physical page:
[   25.306028] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.306671] flags: 0x200000000000000(node=0|zone=2)
[   25.306967] page_type: f5(slab)
[   25.307154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.307525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.307935] page dumped because: kasan: bad access detected
[   25.308206] 
[   25.308364] Memory state around the buggy address:
[   25.308616]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.309083]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.309448] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.309764]                                      ^
[   25.310039]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.310420]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.310681] ==================================================================
[   24.787345] ==================================================================
[   24.787745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   24.788041] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.788532] 
[   24.788691] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.788770] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.788793] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.788830] Call Trace:
[   24.789160]  <TASK>
[   24.789186]  dump_stack_lvl+0x73/0xb0
[   24.789222]  print_report+0xd1/0x650
[   24.789241]  ? __virt_addr_valid+0x1db/0x2d0
[   24.789261]  ? kasan_atomics_helper+0x860/0x5450
[   24.789279]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.789301]  ? kasan_atomics_helper+0x860/0x5450
[   24.789319]  kasan_report+0x141/0x180
[   24.789338]  ? kasan_atomics_helper+0x860/0x5450
[   24.789360]  kasan_check_range+0x10c/0x1c0
[   24.789397]  __kasan_check_write+0x18/0x20
[   24.789421]  kasan_atomics_helper+0x860/0x5450
[   24.789441]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.789460]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.789481]  ? trace_hardirqs_on+0x37/0xe0
[   24.789499]  ? kasan_atomics+0x152/0x310
[   24.789522]  kasan_atomics+0x1dc/0x310
[   24.789541]  ? __pfx_kasan_atomics+0x10/0x10
[   24.789561]  ? __pfx_kasan_atomics+0x10/0x10
[   24.789584]  kunit_try_run_case+0x1a5/0x480
[   24.789606]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.789625]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.789645]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.789664]  ? __kthread_parkme+0x82/0x180
[   24.789682]  ? preempt_count_sub+0x50/0x80
[   24.789702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.789723]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.789743]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.789763]  kthread+0x337/0x6f0
[   24.789780]  ? trace_preempt_on+0x20/0xc0
[   24.789799]  ? __pfx_kthread+0x10/0x10
[   24.789817]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.789858]  ? calculate_sigpending+0x7b/0xa0
[   24.789881]  ? __pfx_kthread+0x10/0x10
[   24.789900]  ret_from_fork+0x116/0x1d0
[   24.789917]  ? __pfx_kthread+0x10/0x10
[   24.789935]  ret_from_fork_asm+0x1a/0x30
[   24.789962]  </TASK>
[   24.789974] 
[   24.801630] Allocated by task 294:
[   24.801776]  kasan_save_stack+0x45/0x70
[   24.802045]  kasan_save_track+0x18/0x40
[   24.802246]  kasan_save_alloc_info+0x3b/0x50
[   24.802496]  __kasan_kmalloc+0xb7/0xc0
[   24.802688]  __kmalloc_cache_noprof+0x189/0x420
[   24.802904]  kasan_atomics+0x95/0x310
[   24.803119]  kunit_try_run_case+0x1a5/0x480
[   24.803348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.804052]  kthread+0x337/0x6f0
[   24.804192]  ret_from_fork+0x116/0x1d0
[   24.804591]  ret_from_fork_asm+0x1a/0x30
[   24.804868] 
[   24.805277] The buggy address belongs to the object at ffff888102c1c600
[   24.805277]  which belongs to the cache kmalloc-64 of size 64
[   24.805807] The buggy address is located 0 bytes to the right of
[   24.805807]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.806496] 
[   24.806661] The buggy address belongs to the physical page:
[   24.807372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.807733] flags: 0x200000000000000(node=0|zone=2)
[   24.808128] page_type: f5(slab)
[   24.808256] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.808799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.809358] page dumped because: kasan: bad access detected
[   24.809796] 
[   24.809916] Memory state around the buggy address:
[   24.810083]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.810559]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.811326] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.811614]                                      ^
[   24.811890]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.812465]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.813037] ==================================================================
[   25.005462] ==================================================================
[   25.005953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   25.006541] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.006993] 
[   25.007159] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.007255] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.007277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.007307] Call Trace:
[   25.007330]  <TASK>
[   25.007356]  dump_stack_lvl+0x73/0xb0
[   25.007427]  print_report+0xd1/0x650
[   25.007469]  ? __virt_addr_valid+0x1db/0x2d0
[   25.007514]  ? kasan_atomics_helper+0xde0/0x5450
[   25.007552]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.007599]  ? kasan_atomics_helper+0xde0/0x5450
[   25.007640]  kasan_report+0x141/0x180
[   25.007682]  ? kasan_atomics_helper+0xde0/0x5450
[   25.007733]  kasan_check_range+0x10c/0x1c0
[   25.007776]  __kasan_check_write+0x18/0x20
[   25.007819]  kasan_atomics_helper+0xde0/0x5450
[   25.007899]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.007943]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.007989]  ? trace_hardirqs_on+0x37/0xe0
[   25.008030]  ? kasan_atomics+0x152/0x310
[   25.008080]  kasan_atomics+0x1dc/0x310
[   25.008124]  ? __pfx_kasan_atomics+0x10/0x10
[   25.008168]  ? __pfx_kasan_atomics+0x10/0x10
[   25.008221]  kunit_try_run_case+0x1a5/0x480
[   25.008266]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.008307]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.008349]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.008398]  ? __kthread_parkme+0x82/0x180
[   25.008434]  ? preempt_count_sub+0x50/0x80
[   25.008493]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.008535]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.008574]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.008625]  kthread+0x337/0x6f0
[   25.008660]  ? trace_preempt_on+0x20/0xc0
[   25.008699]  ? __pfx_kthread+0x10/0x10
[   25.008736]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.008775]  ? calculate_sigpending+0x7b/0xa0
[   25.008819]  ? __pfx_kthread+0x10/0x10
[   25.008901]  ret_from_fork+0x116/0x1d0
[   25.008937]  ? __pfx_kthread+0x10/0x10
[   25.008974]  ret_from_fork_asm+0x1a/0x30
[   25.009028]  </TASK>
[   25.009052] 
[   25.017285] Allocated by task 294:
[   25.017540]  kasan_save_stack+0x45/0x70
[   25.017879]  kasan_save_track+0x18/0x40
[   25.018181]  kasan_save_alloc_info+0x3b/0x50
[   25.018535]  __kasan_kmalloc+0xb7/0xc0
[   25.018762]  __kmalloc_cache_noprof+0x189/0x420
[   25.019090]  kasan_atomics+0x95/0x310
[   25.019235]  kunit_try_run_case+0x1a5/0x480
[   25.019401]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.019574]  kthread+0x337/0x6f0
[   25.019702]  ret_from_fork+0x116/0x1d0
[   25.019873]  ret_from_fork_asm+0x1a/0x30
[   25.020027] 
[   25.020149] The buggy address belongs to the object at ffff888102c1c600
[   25.020149]  which belongs to the cache kmalloc-64 of size 64
[   25.020493] The buggy address is located 0 bytes to the right of
[   25.020493]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.021070] 
[   25.021230] The buggy address belongs to the physical page:
[   25.021623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.022185] flags: 0x200000000000000(node=0|zone=2)
[   25.022573] page_type: f5(slab)
[   25.022866] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.023359] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.023867] page dumped because: kasan: bad access detected
[   25.024237] 
[   25.024394] Memory state around the buggy address:
[   25.024727]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.025213]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.025612] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.025873]                                      ^
[   25.026232]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.026541]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.026773] ==================================================================
[   25.543046] ==================================================================
[   25.543555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   25.544072] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.544724] 
[   25.544891] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.544969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.544988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.545017] Call Trace:
[   25.545054]  <TASK>
[   25.545079]  dump_stack_lvl+0x73/0xb0
[   25.545129]  print_report+0xd1/0x650
[   25.545169]  ? __virt_addr_valid+0x1db/0x2d0
[   25.545213]  ? kasan_atomics_helper+0x18b1/0x5450
[   25.545253]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.545297]  ? kasan_atomics_helper+0x18b1/0x5450
[   25.545339]  kasan_report+0x141/0x180
[   25.545394]  ? kasan_atomics_helper+0x18b1/0x5450
[   25.545434]  kasan_check_range+0x10c/0x1c0
[   25.545468]  __kasan_check_write+0x18/0x20
[   25.545499]  kasan_atomics_helper+0x18b1/0x5450
[   25.545532]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.545563]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.545598]  ? trace_hardirqs_on+0x37/0xe0
[   25.545629]  ? kasan_atomics+0x152/0x310
[   25.545664]  kasan_atomics+0x1dc/0x310
[   25.545696]  ? __pfx_kasan_atomics+0x10/0x10
[   25.545732]  ? __pfx_kasan_atomics+0x10/0x10
[   25.545774]  kunit_try_run_case+0x1a5/0x480
[   25.545814]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.545880]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.545917]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.545952]  ? __kthread_parkme+0x82/0x180
[   25.545991]  ? preempt_count_sub+0x50/0x80
[   25.546046]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.546096]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.546146]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.546195]  kthread+0x337/0x6f0
[   25.546233]  ? trace_preempt_on+0x20/0xc0
[   25.546276]  ? __pfx_kthread+0x10/0x10
[   25.546319]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.546360]  ? calculate_sigpending+0x7b/0xa0
[   25.546422]  ? __pfx_kthread+0x10/0x10
[   25.546468]  ret_from_fork+0x116/0x1d0
[   25.546509]  ? __pfx_kthread+0x10/0x10
[   25.546553]  ret_from_fork_asm+0x1a/0x30
[   25.546616]  </TASK>
[   25.546641] 
[   25.557967] Allocated by task 294:
[   25.558145]  kasan_save_stack+0x45/0x70
[   25.558309]  kasan_save_track+0x18/0x40
[   25.558615]  kasan_save_alloc_info+0x3b/0x50
[   25.558893]  __kasan_kmalloc+0xb7/0xc0
[   25.559069]  __kmalloc_cache_noprof+0x189/0x420
[   25.559259]  kasan_atomics+0x95/0x310
[   25.560493]  kunit_try_run_case+0x1a5/0x480
[   25.560860]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.561111]  kthread+0x337/0x6f0
[   25.561265]  ret_from_fork+0x116/0x1d0
[   25.561449]  ret_from_fork_asm+0x1a/0x30
[   25.561635] 
[   25.561737] The buggy address belongs to the object at ffff888102c1c600
[   25.561737]  which belongs to the cache kmalloc-64 of size 64
[   25.562748] The buggy address is located 0 bytes to the right of
[   25.562748]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.563100] 
[   25.563158] The buggy address belongs to the physical page:
[   25.563252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.563393] flags: 0x200000000000000(node=0|zone=2)
[   25.564192] page_type: f5(slab)
[   25.564342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.564739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.565105] page dumped because: kasan: bad access detected
[   25.565341] 
[   25.565450] Memory state around the buggy address:
[   25.565670]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.565895]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.566134] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.566439]                                      ^
[   25.566746]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.567206]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.567509] ==================================================================
[   25.637711] ==================================================================
[   25.638296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   25.638602] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.639989] 
[   25.640114] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.640164] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.640177] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.640196] Call Trace:
[   25.640211]  <TASK>
[   25.640231]  dump_stack_lvl+0x73/0xb0
[   25.640278]  print_report+0xd1/0x650
[   25.640315]  ? __virt_addr_valid+0x1db/0x2d0
[   25.640351]  ? kasan_atomics_helper+0x1b22/0x5450
[   25.640521]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.640554]  ? kasan_atomics_helper+0x1b22/0x5450
[   25.640584]  kasan_report+0x141/0x180
[   25.640605]  ? kasan_atomics_helper+0x1b22/0x5450
[   25.640628]  kasan_check_range+0x10c/0x1c0
[   25.640648]  __kasan_check_write+0x18/0x20
[   25.640667]  kasan_atomics_helper+0x1b22/0x5450
[   25.640687]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.640707]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.640728]  ? trace_hardirqs_on+0x37/0xe0
[   25.640747]  ? kasan_atomics+0x152/0x310
[   25.640770]  kasan_atomics+0x1dc/0x310
[   25.640790]  ? __pfx_kasan_atomics+0x10/0x10
[   25.640810]  ? __pfx_kasan_atomics+0x10/0x10
[   25.640858]  kunit_try_run_case+0x1a5/0x480
[   25.640881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.640901]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.640920]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.640940]  ? __kthread_parkme+0x82/0x180
[   25.640957]  ? preempt_count_sub+0x50/0x80
[   25.640978]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.640998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.641019]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.641039]  kthread+0x337/0x6f0
[   25.641056]  ? trace_preempt_on+0x20/0xc0
[   25.641075]  ? __pfx_kthread+0x10/0x10
[   25.641093]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.641112]  ? calculate_sigpending+0x7b/0xa0
[   25.641132]  ? __pfx_kthread+0x10/0x10
[   25.641151]  ret_from_fork+0x116/0x1d0
[   25.641168]  ? __pfx_kthread+0x10/0x10
[   25.641186]  ret_from_fork_asm+0x1a/0x30
[   25.641213]  </TASK>
[   25.641224] 
[   25.653124] Allocated by task 294:
[   25.653547]  kasan_save_stack+0x45/0x70
[   25.653779]  kasan_save_track+0x18/0x40
[   25.654073]  kasan_save_alloc_info+0x3b/0x50
[   25.654352]  __kasan_kmalloc+0xb7/0xc0
[   25.654608]  __kmalloc_cache_noprof+0x189/0x420
[   25.655298]  kasan_atomics+0x95/0x310
[   25.655509]  kunit_try_run_case+0x1a5/0x480
[   25.655643]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.656117]  kthread+0x337/0x6f0
[   25.656321]  ret_from_fork+0x116/0x1d0
[   25.656729]  ret_from_fork_asm+0x1a/0x30
[   25.657196] 
[   25.657293] The buggy address belongs to the object at ffff888102c1c600
[   25.657293]  which belongs to the cache kmalloc-64 of size 64
[   25.657937] The buggy address is located 0 bytes to the right of
[   25.657937]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.658700] 
[   25.658786] The buggy address belongs to the physical page:
[   25.659190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.660037] flags: 0x200000000000000(node=0|zone=2)
[   25.660279] page_type: f5(slab)
[   25.660416] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.660960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.661521] page dumped because: kasan: bad access detected
[   25.661805] 
[   25.662094] Memory state around the buggy address:
[   25.662577]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.662904]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.663725] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.664035]                                      ^
[   25.664513]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.664824]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.665187] ==================================================================
[   26.002100] ==================================================================
[   26.002650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   26.003212] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   26.003872] 
[   26.004066] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   26.004309] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.004346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.004392] Call Trace:
[   26.004872]  <TASK>
[   26.004903]  dump_stack_lvl+0x73/0xb0
[   26.004941]  print_report+0xd1/0x650
[   26.004963]  ? __virt_addr_valid+0x1db/0x2d0
[   26.004984]  ? kasan_atomics_helper+0x224c/0x5450
[   26.005003]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.005025]  ? kasan_atomics_helper+0x224c/0x5450
[   26.005044]  kasan_report+0x141/0x180
[   26.005064]  ? kasan_atomics_helper+0x224c/0x5450
[   26.005086]  kasan_check_range+0x10c/0x1c0
[   26.005107]  __kasan_check_write+0x18/0x20
[   26.005127]  kasan_atomics_helper+0x224c/0x5450
[   26.005147]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.005166]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.005186]  ? trace_hardirqs_on+0x37/0xe0
[   26.005205]  ? kasan_atomics+0x152/0x310
[   26.005227]  kasan_atomics+0x1dc/0x310
[   26.005246]  ? __pfx_kasan_atomics+0x10/0x10
[   26.005266]  ? __pfx_kasan_atomics+0x10/0x10
[   26.005289]  kunit_try_run_case+0x1a5/0x480
[   26.005309]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.005329]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.005348]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.005368]  ? __kthread_parkme+0x82/0x180
[   26.005408]  ? preempt_count_sub+0x50/0x80
[   26.005443]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.005483]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.005524]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.005568]  kthread+0x337/0x6f0
[   26.005604]  ? trace_preempt_on+0x20/0xc0
[   26.005642]  ? __pfx_kthread+0x10/0x10
[   26.005662]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.005681]  ? calculate_sigpending+0x7b/0xa0
[   26.005702]  ? __pfx_kthread+0x10/0x10
[   26.005721]  ret_from_fork+0x116/0x1d0
[   26.005739]  ? __pfx_kthread+0x10/0x10
[   26.005757]  ret_from_fork_asm+0x1a/0x30
[   26.005784]  </TASK>
[   26.005795] 
[   26.015812] Allocated by task 294:
[   26.016082]  kasan_save_stack+0x45/0x70
[   26.016374]  kasan_save_track+0x18/0x40
[   26.016571]  kasan_save_alloc_info+0x3b/0x50
[   26.016730]  __kasan_kmalloc+0xb7/0xc0
[   26.017107]  __kmalloc_cache_noprof+0x189/0x420
[   26.017431]  kasan_atomics+0x95/0x310
[   26.017694]  kunit_try_run_case+0x1a5/0x480
[   26.017853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.018049]  kthread+0x337/0x6f0
[   26.018200]  ret_from_fork+0x116/0x1d0
[   26.018356]  ret_from_fork_asm+0x1a/0x30
[   26.018540] 
[   26.018635] The buggy address belongs to the object at ffff888102c1c600
[   26.018635]  which belongs to the cache kmalloc-64 of size 64
[   26.019473] The buggy address is located 0 bytes to the right of
[   26.019473]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   26.020198] 
[   26.020407] The buggy address belongs to the physical page:
[   26.020723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   26.021407] flags: 0x200000000000000(node=0|zone=2)
[   26.021545] page_type: f5(slab)
[   26.021621] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.021740] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.022645] page dumped because: kasan: bad access detected
[   26.023313] 
[   26.023645] Memory state around the buggy address:
[   26.024085]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.024414]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.024871] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.025237]                                      ^
[   26.025592]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.026241]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.026541] ==================================================================
[   25.881346] ==================================================================
[   25.881770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   25.882508] Read of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.883023] 
[   25.883152] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.883235] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.883261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.883300] Call Trace:
[   25.883328]  <TASK>
[   25.883357]  dump_stack_lvl+0x73/0xb0
[   25.883426]  print_report+0xd1/0x650
[   25.883469]  ? __virt_addr_valid+0x1db/0x2d0
[   25.883512]  ? kasan_atomics_helper+0x4f98/0x5450
[   25.883552]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.883597]  ? kasan_atomics_helper+0x4f98/0x5450
[   25.883639]  kasan_report+0x141/0x180
[   25.883680]  ? kasan_atomics_helper+0x4f98/0x5450
[   25.883730]  __asan_report_load8_noabort+0x18/0x20
[   25.883775]  kasan_atomics_helper+0x4f98/0x5450
[   25.883813]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.883859]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.883897]  ? trace_hardirqs_on+0x37/0xe0
[   25.883933]  ? kasan_atomics+0x152/0x310
[   25.883971]  kasan_atomics+0x1dc/0x310
[   25.884004]  ? __pfx_kasan_atomics+0x10/0x10
[   25.884045]  ? __pfx_kasan_atomics+0x10/0x10
[   25.884090]  kunit_try_run_case+0x1a5/0x480
[   25.884136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.884178]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.884221]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.884265]  ? __kthread_parkme+0x82/0x180
[   25.884304]  ? preempt_count_sub+0x50/0x80
[   25.884349]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.884410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.884456]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.884499]  kthread+0x337/0x6f0
[   25.884539]  ? trace_preempt_on+0x20/0xc0
[   25.884581]  ? __pfx_kthread+0x10/0x10
[   25.884620]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.884657]  ? calculate_sigpending+0x7b/0xa0
[   25.884701]  ? __pfx_kthread+0x10/0x10
[   25.884742]  ret_from_fork+0x116/0x1d0
[   25.884780]  ? __pfx_kthread+0x10/0x10
[   25.884819]  ret_from_fork_asm+0x1a/0x30
[   25.884872]  </TASK>
[   25.884892] 
[   25.893270] Allocated by task 294:
[   25.893541]  kasan_save_stack+0x45/0x70
[   25.893823]  kasan_save_track+0x18/0x40
[   25.894071]  kasan_save_alloc_info+0x3b/0x50
[   25.894243]  __kasan_kmalloc+0xb7/0xc0
[   25.894494]  __kmalloc_cache_noprof+0x189/0x420
[   25.894718]  kasan_atomics+0x95/0x310
[   25.895000]  kunit_try_run_case+0x1a5/0x480
[   25.895213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.895530]  kthread+0x337/0x6f0
[   25.895727]  ret_from_fork+0x116/0x1d0
[   25.896023]  ret_from_fork_asm+0x1a/0x30
[   25.896191] 
[   25.896325] The buggy address belongs to the object at ffff888102c1c600
[   25.896325]  which belongs to the cache kmalloc-64 of size 64
[   25.896827] The buggy address is located 0 bytes to the right of
[   25.896827]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.897301] 
[   25.897413] The buggy address belongs to the physical page:
[   25.897589] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.897831] flags: 0x200000000000000(node=0|zone=2)
[   25.898189] page_type: f5(slab)
[   25.898459] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.898967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.899408] page dumped because: kasan: bad access detected
[   25.899587] 
[   25.899673] Memory state around the buggy address:
[   25.899870]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.900288]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.900737] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.901991]                                      ^
[   25.902364]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.902721]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.904351] ==================================================================
[   25.218016] ==================================================================
[   25.218755] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   25.219288] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.219765] 
[   25.219981] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.220063] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.220085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.220117] Call Trace:
[   25.220144]  <TASK>
[   25.220172]  dump_stack_lvl+0x73/0xb0
[   25.220228]  print_report+0xd1/0x650
[   25.220271]  ? __virt_addr_valid+0x1db/0x2d0
[   25.220315]  ? kasan_atomics_helper+0x1217/0x5450
[   25.220353]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.220414]  ? kasan_atomics_helper+0x1217/0x5450
[   25.220456]  kasan_report+0x141/0x180
[   25.220499]  ? kasan_atomics_helper+0x1217/0x5450
[   25.220550]  kasan_check_range+0x10c/0x1c0
[   25.220594]  __kasan_check_write+0x18/0x20
[   25.220638]  kasan_atomics_helper+0x1217/0x5450
[   25.220683]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.220724]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.220769]  ? trace_hardirqs_on+0x37/0xe0
[   25.220806]  ? kasan_atomics+0x152/0x310
[   25.220881]  kasan_atomics+0x1dc/0x310
[   25.220919]  ? __pfx_kasan_atomics+0x10/0x10
[   25.220983]  ? __pfx_kasan_atomics+0x10/0x10
[   25.221027]  kunit_try_run_case+0x1a5/0x480
[   25.221081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.221123]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.221171]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.221216]  ? __kthread_parkme+0x82/0x180
[   25.221266]  ? preempt_count_sub+0x50/0x80
[   25.221308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.221349]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.221404]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.221448]  kthread+0x337/0x6f0
[   25.221486]  ? trace_preempt_on+0x20/0xc0
[   25.221526]  ? __pfx_kthread+0x10/0x10
[   25.221564]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.221604]  ? calculate_sigpending+0x7b/0xa0
[   25.221649]  ? __pfx_kthread+0x10/0x10
[   25.221693]  ret_from_fork+0x116/0x1d0
[   25.221729]  ? __pfx_kthread+0x10/0x10
[   25.221765]  ret_from_fork_asm+0x1a/0x30
[   25.221855]  </TASK>
[   25.221881] 
[   25.230067] Allocated by task 294:
[   25.230348]  kasan_save_stack+0x45/0x70
[   25.230696]  kasan_save_track+0x18/0x40
[   25.231014]  kasan_save_alloc_info+0x3b/0x50
[   25.231218]  __kasan_kmalloc+0xb7/0xc0
[   25.231370]  __kmalloc_cache_noprof+0x189/0x420
[   25.231712]  kasan_atomics+0x95/0x310
[   25.232016]  kunit_try_run_case+0x1a5/0x480
[   25.232230]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.232553]  kthread+0x337/0x6f0
[   25.232788]  ret_from_fork+0x116/0x1d0
[   25.233014]  ret_from_fork_asm+0x1a/0x30
[   25.233292] 
[   25.233431] The buggy address belongs to the object at ffff888102c1c600
[   25.233431]  which belongs to the cache kmalloc-64 of size 64
[   25.233877] The buggy address is located 0 bytes to the right of
[   25.233877]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.234572] 
[   25.234729] The buggy address belongs to the physical page:
[   25.235120] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.235639] flags: 0x200000000000000(node=0|zone=2)
[   25.235819] page_type: f5(slab)
[   25.235987] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.236218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.236452] page dumped because: kasan: bad access detected
[   25.236627] 
[   25.236711] Memory state around the buggy address:
[   25.236896]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.237108]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.237576] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.238078]                                      ^
[   25.238449]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.238971]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.239417] ==================================================================
[   25.688466] ==================================================================
[   25.688849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   25.689432] Read of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.689731] 
[   25.689846] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.689929] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.689953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.689990] Call Trace:
[   25.690029]  <TASK>
[   25.690060]  dump_stack_lvl+0x73/0xb0
[   25.690120]  print_report+0xd1/0x650
[   25.690153]  ? __virt_addr_valid+0x1db/0x2d0
[   25.690185]  ? kasan_atomics_helper+0x4f30/0x5450
[   25.690214]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.690255]  ? kasan_atomics_helper+0x4f30/0x5450
[   25.690289]  kasan_report+0x141/0x180
[   25.690326]  ? kasan_atomics_helper+0x4f30/0x5450
[   25.690394]  __asan_report_load8_noabort+0x18/0x20
[   25.690445]  kasan_atomics_helper+0x4f30/0x5450
[   25.690493]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.690538]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.690587]  ? trace_hardirqs_on+0x37/0xe0
[   25.690630]  ? kasan_atomics+0x152/0x310
[   25.690683]  kasan_atomics+0x1dc/0x310
[   25.690731]  ? __pfx_kasan_atomics+0x10/0x10
[   25.690780]  ? __pfx_kasan_atomics+0x10/0x10
[   25.690833]  kunit_try_run_case+0x1a5/0x480
[   25.690881]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.690927]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.690973]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.691021]  ? __kthread_parkme+0x82/0x180
[   25.691060]  ? preempt_count_sub+0x50/0x80
[   25.691126]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.691163]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.691202]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.691242]  kthread+0x337/0x6f0
[   25.691280]  ? trace_preempt_on+0x20/0xc0
[   25.691322]  ? __pfx_kthread+0x10/0x10
[   25.691363]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.691417]  ? calculate_sigpending+0x7b/0xa0
[   25.691463]  ? __pfx_kthread+0x10/0x10
[   25.691506]  ret_from_fork+0x116/0x1d0
[   25.691546]  ? __pfx_kthread+0x10/0x10
[   25.691585]  ret_from_fork_asm+0x1a/0x30
[   25.691646]  </TASK>
[   25.691673] 
[   25.701564] Allocated by task 294:
[   25.702320]  kasan_save_stack+0x45/0x70
[   25.702546]  kasan_save_track+0x18/0x40
[   25.702711]  kasan_save_alloc_info+0x3b/0x50
[   25.702900]  __kasan_kmalloc+0xb7/0xc0
[   25.703061]  __kmalloc_cache_noprof+0x189/0x420
[   25.703230]  kasan_atomics+0x95/0x310
[   25.703387]  kunit_try_run_case+0x1a5/0x480
[   25.703548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.703729]  kthread+0x337/0x6f0
[   25.703857]  ret_from_fork+0x116/0x1d0
[   25.703937]  ret_from_fork_asm+0x1a/0x30
[   25.704015] 
[   25.704060] The buggy address belongs to the object at ffff888102c1c600
[   25.704060]  which belongs to the cache kmalloc-64 of size 64
[   25.704238] The buggy address is located 0 bytes to the right of
[   25.704238]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.704644] 
[   25.704817] The buggy address belongs to the physical page:
[   25.705299] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.705928] flags: 0x200000000000000(node=0|zone=2)
[   25.706333] page_type: f5(slab)
[   25.706659] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.707263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.707781] page dumped because: kasan: bad access detected
[   25.708254] 
[   25.708428] Memory state around the buggy address:
[   25.708812]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.709315]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.709602] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.710416]                                      ^
[   25.710729]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.711174]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.711575] ==================================================================
[   25.240339] ==================================================================
[   25.240890] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   25.241302] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.241589] 
[   25.241739] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.241822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.241877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.241917] Call Trace:
[   25.241946]  <TASK>
[   25.241974]  dump_stack_lvl+0x73/0xb0
[   25.242040]  print_report+0xd1/0x650
[   25.242089]  ? __virt_addr_valid+0x1db/0x2d0
[   25.242137]  ? kasan_atomics_helper+0x49e8/0x5450
[   25.242181]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.242231]  ? kasan_atomics_helper+0x49e8/0x5450
[   25.242273]  kasan_report+0x141/0x180
[   25.242318]  ? kasan_atomics_helper+0x49e8/0x5450
[   25.242372]  __asan_report_load4_noabort+0x18/0x20
[   25.242428]  kasan_atomics_helper+0x49e8/0x5450
[   25.242494]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.242539]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.242580]  ? trace_hardirqs_on+0x37/0xe0
[   25.242618]  ? kasan_atomics+0x152/0x310
[   25.242661]  kasan_atomics+0x1dc/0x310
[   25.242698]  ? __pfx_kasan_atomics+0x10/0x10
[   25.242740]  ? __pfx_kasan_atomics+0x10/0x10
[   25.242807]  kunit_try_run_case+0x1a5/0x480
[   25.242897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.242944]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.242998]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.243046]  ? __kthread_parkme+0x82/0x180
[   25.243086]  ? preempt_count_sub+0x50/0x80
[   25.243130]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.243174]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.243217]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.243259]  kthread+0x337/0x6f0
[   25.243294]  ? trace_preempt_on+0x20/0xc0
[   25.243336]  ? __pfx_kthread+0x10/0x10
[   25.243389]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.243434]  ? calculate_sigpending+0x7b/0xa0
[   25.243479]  ? __pfx_kthread+0x10/0x10
[   25.243520]  ret_from_fork+0x116/0x1d0
[   25.243560]  ? __pfx_kthread+0x10/0x10
[   25.243600]  ret_from_fork_asm+0x1a/0x30
[   25.243659]  </TASK>
[   25.243684] 
[   25.251938] Allocated by task 294:
[   25.252090]  kasan_save_stack+0x45/0x70
[   25.252255]  kasan_save_track+0x18/0x40
[   25.252455]  kasan_save_alloc_info+0x3b/0x50
[   25.252762]  __kasan_kmalloc+0xb7/0xc0
[   25.253063]  __kmalloc_cache_noprof+0x189/0x420
[   25.253396]  kasan_atomics+0x95/0x310
[   25.253659]  kunit_try_run_case+0x1a5/0x480
[   25.253980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.254372]  kthread+0x337/0x6f0
[   25.254634]  ret_from_fork+0x116/0x1d0
[   25.254820]  ret_from_fork_asm+0x1a/0x30
[   25.255079] 
[   25.255172] The buggy address belongs to the object at ffff888102c1c600
[   25.255172]  which belongs to the cache kmalloc-64 of size 64
[   25.255704] The buggy address is located 0 bytes to the right of
[   25.255704]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.256404] 
[   25.256502] The buggy address belongs to the physical page:
[   25.256679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.257204] flags: 0x200000000000000(node=0|zone=2)
[   25.257562] page_type: f5(slab)
[   25.257812] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.258113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.258353] page dumped because: kasan: bad access detected
[   25.258757] 
[   25.258946] Memory state around the buggy address:
[   25.259284]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.259753]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.259999] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.260257]                                      ^
[   25.260590]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.261071]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.261491] ==================================================================
[   24.760585] ==================================================================
[   24.761109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   24.762149] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.762411] 
[   24.763292] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.763352] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.763366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.763403] Call Trace:
[   24.763428]  <TASK>
[   24.763452]  dump_stack_lvl+0x73/0xb0
[   24.763503]  print_report+0xd1/0x650
[   24.763540]  ? __virt_addr_valid+0x1db/0x2d0
[   24.763613]  ? kasan_atomics_helper+0x7c7/0x5450
[   24.763651]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.763694]  ? kasan_atomics_helper+0x7c7/0x5450
[   24.763741]  kasan_report+0x141/0x180
[   24.763773]  ? kasan_atomics_helper+0x7c7/0x5450
[   24.763803]  kasan_check_range+0x10c/0x1c0
[   24.763835]  __kasan_check_write+0x18/0x20
[   24.763869]  kasan_atomics_helper+0x7c7/0x5450
[   24.763890]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.763910]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.763930]  ? trace_hardirqs_on+0x37/0xe0
[   24.763949]  ? kasan_atomics+0x152/0x310
[   24.763971]  kasan_atomics+0x1dc/0x310
[   24.763991]  ? __pfx_kasan_atomics+0x10/0x10
[   24.764011]  ? __pfx_kasan_atomics+0x10/0x10
[   24.764034]  kunit_try_run_case+0x1a5/0x480
[   24.764055]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.764074]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.764094]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.764113]  ? __kthread_parkme+0x82/0x180
[   24.764131]  ? preempt_count_sub+0x50/0x80
[   24.764152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.764172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.764193]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.764213]  kthread+0x337/0x6f0
[   24.764230]  ? trace_preempt_on+0x20/0xc0
[   24.764249]  ? __pfx_kthread+0x10/0x10
[   24.764267]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.764285]  ? calculate_sigpending+0x7b/0xa0
[   24.764305]  ? __pfx_kthread+0x10/0x10
[   24.764324]  ret_from_fork+0x116/0x1d0
[   24.764341]  ? __pfx_kthread+0x10/0x10
[   24.764358]  ret_from_fork_asm+0x1a/0x30
[   24.764401]  </TASK>
[   24.764415] 
[   24.773185] Allocated by task 294:
[   24.773341]  kasan_save_stack+0x45/0x70
[   24.773630]  kasan_save_track+0x18/0x40
[   24.773943]  kasan_save_alloc_info+0x3b/0x50
[   24.774254]  __kasan_kmalloc+0xb7/0xc0
[   24.774445]  __kmalloc_cache_noprof+0x189/0x420
[   24.774612]  kasan_atomics+0x95/0x310
[   24.774759]  kunit_try_run_case+0x1a5/0x480
[   24.774912]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.775255]  kthread+0x337/0x6f0
[   24.775525]  ret_from_fork+0x116/0x1d0
[   24.775807]  ret_from_fork_asm+0x1a/0x30
[   24.777502] 
[   24.778142] The buggy address belongs to the object at ffff888102c1c600
[   24.778142]  which belongs to the cache kmalloc-64 of size 64
[   24.779074] The buggy address is located 0 bytes to the right of
[   24.779074]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.779582] 
[   24.779680] The buggy address belongs to the physical page:
[   24.780396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.780970] flags: 0x200000000000000(node=0|zone=2)
[   24.781142] page_type: f5(slab)
[   24.781298] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.781778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.782105] page dumped because: kasan: bad access detected
[   24.782344] 
[   24.782446] Memory state around the buggy address:
[   24.782744]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.783045]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.783853] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.784642]                                      ^
[   24.785038]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.785314]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.785720] ==================================================================
[   24.700618] ==================================================================
[   24.701122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   24.701764] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.702888] 
[   24.703085] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.703165] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.703186] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.703221] Call Trace:
[   24.703246]  <TASK>
[   24.703273]  dump_stack_lvl+0x73/0xb0
[   24.703329]  print_report+0xd1/0x650
[   24.703371]  ? __virt_addr_valid+0x1db/0x2d0
[   24.703435]  ? kasan_atomics_helper+0x697/0x5450
[   24.703475]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.703522]  ? kasan_atomics_helper+0x697/0x5450
[   24.703556]  kasan_report+0x141/0x180
[   24.703590]  ? kasan_atomics_helper+0x697/0x5450
[   24.703633]  kasan_check_range+0x10c/0x1c0
[   24.703671]  __kasan_check_write+0x18/0x20
[   24.703705]  kasan_atomics_helper+0x697/0x5450
[   24.703742]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.703780]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.703821]  ? trace_hardirqs_on+0x37/0xe0
[   24.703855]  ? kasan_atomics+0x152/0x310
[   24.703897]  kasan_atomics+0x1dc/0x310
[   24.703937]  ? __pfx_kasan_atomics+0x10/0x10
[   24.703971]  ? __pfx_kasan_atomics+0x10/0x10
[   24.704017]  kunit_try_run_case+0x1a5/0x480
[   24.704058]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.704098]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.704141]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.704184]  ? __kthread_parkme+0x82/0x180
[   24.704224]  ? preempt_count_sub+0x50/0x80
[   24.704268]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.704306]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.704344]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.704396]  kthread+0x337/0x6f0
[   24.704434]  ? trace_preempt_on+0x20/0xc0
[   24.704472]  ? __pfx_kthread+0x10/0x10
[   24.704505]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.704540]  ? calculate_sigpending+0x7b/0xa0
[   24.704582]  ? __pfx_kthread+0x10/0x10
[   24.704622]  ret_from_fork+0x116/0x1d0
[   24.704660]  ? __pfx_kthread+0x10/0x10
[   24.704700]  ret_from_fork_asm+0x1a/0x30
[   24.704760]  </TASK>
[   24.704784] 
[   24.718724] Allocated by task 294:
[   24.718861]  kasan_save_stack+0x45/0x70
[   24.719064]  kasan_save_track+0x18/0x40
[   24.719532]  kasan_save_alloc_info+0x3b/0x50
[   24.720161]  __kasan_kmalloc+0xb7/0xc0
[   24.720364]  __kmalloc_cache_noprof+0x189/0x420
[   24.720530]  kasan_atomics+0x95/0x310
[   24.721092]  kunit_try_run_case+0x1a5/0x480
[   24.721319]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.721491]  kthread+0x337/0x6f0
[   24.721749]  ret_from_fork+0x116/0x1d0
[   24.722342]  ret_from_fork_asm+0x1a/0x30
[   24.722682] 
[   24.722978] The buggy address belongs to the object at ffff888102c1c600
[   24.722978]  which belongs to the cache kmalloc-64 of size 64
[   24.723762] The buggy address is located 0 bytes to the right of
[   24.723762]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.724815] 
[   24.724940] The buggy address belongs to the physical page:
[   24.725149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.725697] flags: 0x200000000000000(node=0|zone=2)
[   24.726425] page_type: f5(slab)
[   24.726770] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.727352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.727579] page dumped because: kasan: bad access detected
[   24.727918] 
[   24.728414] Memory state around the buggy address:
[   24.728656]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.728996]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.729264] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.729691]                                      ^
[   24.729954]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.730441]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.730831] ==================================================================
[   25.196682] ==================================================================
[   25.197241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   25.197763] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.198111] 
[   25.198229] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.198312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.198338] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.198373] Call Trace:
[   25.198415]  <TASK>
[   25.198444]  dump_stack_lvl+0x73/0xb0
[   25.198497]  print_report+0xd1/0x650
[   25.198540]  ? __virt_addr_valid+0x1db/0x2d0
[   25.198583]  ? kasan_atomics_helper+0x4a02/0x5450
[   25.198624]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.198670]  ? kasan_atomics_helper+0x4a02/0x5450
[   25.198711]  kasan_report+0x141/0x180
[   25.198754]  ? kasan_atomics_helper+0x4a02/0x5450
[   25.198805]  __asan_report_load4_noabort+0x18/0x20
[   25.198905]  kasan_atomics_helper+0x4a02/0x5450
[   25.198953]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.198994]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.199040]  ? trace_hardirqs_on+0x37/0xe0
[   25.199082]  ? kasan_atomics+0x152/0x310
[   25.199133]  kasan_atomics+0x1dc/0x310
[   25.199178]  ? __pfx_kasan_atomics+0x10/0x10
[   25.199223]  ? __pfx_kasan_atomics+0x10/0x10
[   25.199273]  kunit_try_run_case+0x1a5/0x480
[   25.199319]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.199353]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.199408]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.199447]  ? __kthread_parkme+0x82/0x180
[   25.199505]  ? preempt_count_sub+0x50/0x80
[   25.199548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.199589]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.199630]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.199671]  kthread+0x337/0x6f0
[   25.199705]  ? trace_preempt_on+0x20/0xc0
[   25.199766]  ? __pfx_kthread+0x10/0x10
[   25.199804]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.199871]  ? calculate_sigpending+0x7b/0xa0
[   25.199902]  ? __pfx_kthread+0x10/0x10
[   25.199922]  ret_from_fork+0x116/0x1d0
[   25.199941]  ? __pfx_kthread+0x10/0x10
[   25.199959]  ret_from_fork_asm+0x1a/0x30
[   25.199987]  </TASK>
[   25.199999] 
[   25.208090] Allocated by task 294:
[   25.208363]  kasan_save_stack+0x45/0x70
[   25.208669]  kasan_save_track+0x18/0x40
[   25.208973]  kasan_save_alloc_info+0x3b/0x50
[   25.209288]  __kasan_kmalloc+0xb7/0xc0
[   25.209584]  __kmalloc_cache_noprof+0x189/0x420
[   25.209933]  kasan_atomics+0x95/0x310
[   25.210180]  kunit_try_run_case+0x1a5/0x480
[   25.210495]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.210692]  kthread+0x337/0x6f0
[   25.210996]  ret_from_fork+0x116/0x1d0
[   25.211287]  ret_from_fork_asm+0x1a/0x30
[   25.211507] 
[   25.211596] The buggy address belongs to the object at ffff888102c1c600
[   25.211596]  which belongs to the cache kmalloc-64 of size 64
[   25.212133] The buggy address is located 0 bytes to the right of
[   25.212133]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.212494] 
[   25.212585] The buggy address belongs to the physical page:
[   25.212761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.213023] flags: 0x200000000000000(node=0|zone=2)
[   25.213310] page_type: f5(slab)
[   25.213572] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.214089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.214629] page dumped because: kasan: bad access detected
[   25.215048] 
[   25.215207] Memory state around the buggy address:
[   25.215473]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.215699]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.215941] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.216148]                                      ^
[   25.216317]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.216760]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.217238] ==================================================================
[   24.732578] ==================================================================
[   24.732827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   24.733364] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.733733] 
[   24.734144] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.734288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.734302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.734321] Call Trace:
[   24.734337]  <TASK>
[   24.734359]  dump_stack_lvl+0x73/0xb0
[   24.734425]  print_report+0xd1/0x650
[   24.734465]  ? __virt_addr_valid+0x1db/0x2d0
[   24.734610]  ? kasan_atomics_helper+0x72f/0x5450
[   24.734734]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.734760]  ? kasan_atomics_helper+0x72f/0x5450
[   24.734780]  kasan_report+0x141/0x180
[   24.734801]  ? kasan_atomics_helper+0x72f/0x5450
[   24.734823]  kasan_check_range+0x10c/0x1c0
[   24.734855]  __kasan_check_write+0x18/0x20
[   24.734875]  kasan_atomics_helper+0x72f/0x5450
[   24.734895]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.734917]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.734938]  ? trace_hardirqs_on+0x37/0xe0
[   24.734956]  ? kasan_atomics+0x152/0x310
[   24.734979]  kasan_atomics+0x1dc/0x310
[   24.734998]  ? __pfx_kasan_atomics+0x10/0x10
[   24.735018]  ? __pfx_kasan_atomics+0x10/0x10
[   24.735041]  kunit_try_run_case+0x1a5/0x480
[   24.735063]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.735082]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.735101]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.735121]  ? __kthread_parkme+0x82/0x180
[   24.735138]  ? preempt_count_sub+0x50/0x80
[   24.735159]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.735179]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.735200]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.735220]  kthread+0x337/0x6f0
[   24.735237]  ? trace_preempt_on+0x20/0xc0
[   24.735257]  ? __pfx_kthread+0x10/0x10
[   24.735275]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.735294]  ? calculate_sigpending+0x7b/0xa0
[   24.735314]  ? __pfx_kthread+0x10/0x10
[   24.735333]  ret_from_fork+0x116/0x1d0
[   24.735350]  ? __pfx_kthread+0x10/0x10
[   24.735368]  ret_from_fork_asm+0x1a/0x30
[   24.735415]  </TASK>
[   24.735427] 
[   24.747446] Allocated by task 294:
[   24.747693]  kasan_save_stack+0x45/0x70
[   24.747989]  kasan_save_track+0x18/0x40
[   24.748672]  kasan_save_alloc_info+0x3b/0x50
[   24.748904]  __kasan_kmalloc+0xb7/0xc0
[   24.749037]  __kmalloc_cache_noprof+0x189/0x420
[   24.749451]  kasan_atomics+0x95/0x310
[   24.749718]  kunit_try_run_case+0x1a5/0x480
[   24.750203]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.750491]  kthread+0x337/0x6f0
[   24.750631]  ret_from_fork+0x116/0x1d0
[   24.750895]  ret_from_fork_asm+0x1a/0x30
[   24.751560] 
[   24.751686] The buggy address belongs to the object at ffff888102c1c600
[   24.751686]  which belongs to the cache kmalloc-64 of size 64
[   24.752033] The buggy address is located 0 bytes to the right of
[   24.752033]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.752832] 
[   24.753239] The buggy address belongs to the physical page:
[   24.753619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.754149] flags: 0x200000000000000(node=0|zone=2)
[   24.754512] page_type: f5(slab)
[   24.754651] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.755355] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.755785] page dumped because: kasan: bad access detected
[   24.756375] 
[   24.756495] Memory state around the buggy address:
[   24.756658]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.757438]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.757761] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.758365]                                      ^
[   24.758619]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.759301]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.759810] ==================================================================
[   25.568231] ==================================================================
[   25.568701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   25.569201] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.569524] 
[   25.569639] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.569712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.569734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.569768] Call Trace:
[   25.569795]  <TASK>
[   25.569823]  dump_stack_lvl+0x73/0xb0
[   25.569909]  print_report+0xd1/0x650
[   25.569953]  ? __virt_addr_valid+0x1db/0x2d0
[   25.569987]  ? kasan_atomics_helper+0x194a/0x5450
[   25.570032]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.570109]  ? kasan_atomics_helper+0x194a/0x5450
[   25.570146]  kasan_report+0x141/0x180
[   25.570185]  ? kasan_atomics_helper+0x194a/0x5450
[   25.570238]  kasan_check_range+0x10c/0x1c0
[   25.570279]  __kasan_check_write+0x18/0x20
[   25.570317]  kasan_atomics_helper+0x194a/0x5450
[   25.570357]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.570414]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.570464]  ? trace_hardirqs_on+0x37/0xe0
[   25.570509]  ? kasan_atomics+0x152/0x310
[   25.570560]  kasan_atomics+0x1dc/0x310
[   25.570602]  ? __pfx_kasan_atomics+0x10/0x10
[   25.570640]  ? __pfx_kasan_atomics+0x10/0x10
[   25.570686]  kunit_try_run_case+0x1a5/0x480
[   25.570731]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.570773]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.570817]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.570902]  ? __kthread_parkme+0x82/0x180
[   25.570947]  ? preempt_count_sub+0x50/0x80
[   25.570994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.571039]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.571083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.571127]  kthread+0x337/0x6f0
[   25.571163]  ? trace_preempt_on+0x20/0xc0
[   25.571196]  ? __pfx_kthread+0x10/0x10
[   25.571225]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.571256]  ? calculate_sigpending+0x7b/0xa0
[   25.571293]  ? __pfx_kthread+0x10/0x10
[   25.571331]  ret_from_fork+0x116/0x1d0
[   25.571368]  ? __pfx_kthread+0x10/0x10
[   25.571422]  ret_from_fork_asm+0x1a/0x30
[   25.571481]  </TASK>
[   25.571504] 
[   25.579414] Allocated by task 294:
[   25.579662]  kasan_save_stack+0x45/0x70
[   25.579979]  kasan_save_track+0x18/0x40
[   25.580277]  kasan_save_alloc_info+0x3b/0x50
[   25.580585]  __kasan_kmalloc+0xb7/0xc0
[   25.580858]  __kmalloc_cache_noprof+0x189/0x420
[   25.581106]  kasan_atomics+0x95/0x310
[   25.581273]  kunit_try_run_case+0x1a5/0x480
[   25.581531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.581780]  kthread+0x337/0x6f0
[   25.582007]  ret_from_fork+0x116/0x1d0
[   25.582263]  ret_from_fork_asm+0x1a/0x30
[   25.582493] 
[   25.582599] The buggy address belongs to the object at ffff888102c1c600
[   25.582599]  which belongs to the cache kmalloc-64 of size 64
[   25.583069] The buggy address is located 0 bytes to the right of
[   25.583069]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.583718] 
[   25.583814] The buggy address belongs to the physical page:
[   25.584122] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.584477] flags: 0x200000000000000(node=0|zone=2)
[   25.584772] page_type: f5(slab)
[   25.585023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.585296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.585652] page dumped because: kasan: bad access detected
[   25.585985] 
[   25.586136] Memory state around the buggy address:
[   25.586365]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.586732]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.587003] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.587215]                                      ^
[   25.587389]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.587820]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.588301] ==================================================================
[   24.679741] ==================================================================
[   24.680300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   24.681115] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.681622] 
[   24.681799] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.681894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.681920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.681959] Call Trace:
[   24.681988]  <TASK>
[   24.682027]  dump_stack_lvl+0x73/0xb0
[   24.682091]  print_report+0xd1/0x650
[   24.682140]  ? __virt_addr_valid+0x1db/0x2d0
[   24.682190]  ? kasan_atomics_helper+0x5fe/0x5450
[   24.682231]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.682279]  ? kasan_atomics_helper+0x5fe/0x5450
[   24.682317]  kasan_report+0x141/0x180
[   24.682357]  ? kasan_atomics_helper+0x5fe/0x5450
[   24.682425]  kasan_check_range+0x10c/0x1c0
[   24.682469]  __kasan_check_write+0x18/0x20
[   24.682510]  kasan_atomics_helper+0x5fe/0x5450
[   24.682555]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.682601]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.682649]  ? trace_hardirqs_on+0x37/0xe0
[   24.682693]  ? kasan_atomics+0x152/0x310
[   24.682747]  kasan_atomics+0x1dc/0x310
[   24.682789]  ? __pfx_kasan_atomics+0x10/0x10
[   24.682824]  ? __pfx_kasan_atomics+0x10/0x10
[   24.682869]  kunit_try_run_case+0x1a5/0x480
[   24.682911]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.682952]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.682995]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.683039]  ? __kthread_parkme+0x82/0x180
[   24.683078]  ? preempt_count_sub+0x50/0x80
[   24.683136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.683160]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.683181]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.683202]  kthread+0x337/0x6f0
[   24.683220]  ? trace_preempt_on+0x20/0xc0
[   24.683240]  ? __pfx_kthread+0x10/0x10
[   24.683258]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.683277]  ? calculate_sigpending+0x7b/0xa0
[   24.683298]  ? __pfx_kthread+0x10/0x10
[   24.683316]  ret_from_fork+0x116/0x1d0
[   24.683333]  ? __pfx_kthread+0x10/0x10
[   24.683351]  ret_from_fork_asm+0x1a/0x30
[   24.683395]  </TASK>
[   24.683410] 
[   24.690835] Allocated by task 294:
[   24.690999]  kasan_save_stack+0x45/0x70
[   24.691162]  kasan_save_track+0x18/0x40
[   24.691309]  kasan_save_alloc_info+0x3b/0x50
[   24.691691]  __kasan_kmalloc+0xb7/0xc0
[   24.691999]  __kmalloc_cache_noprof+0x189/0x420
[   24.692327]  kasan_atomics+0x95/0x310
[   24.692614]  kunit_try_run_case+0x1a5/0x480
[   24.692899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.693336]  kthread+0x337/0x6f0
[   24.693601]  ret_from_fork+0x116/0x1d0
[   24.693870]  ret_from_fork_asm+0x1a/0x30
[   24.694154] 
[   24.694298] The buggy address belongs to the object at ffff888102c1c600
[   24.694298]  which belongs to the cache kmalloc-64 of size 64
[   24.695038] The buggy address is located 0 bytes to the right of
[   24.695038]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.695549] 
[   24.695651] The buggy address belongs to the physical page:
[   24.695857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.696317] flags: 0x200000000000000(node=0|zone=2)
[   24.696582] page_type: f5(slab)
[   24.696718] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.697048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.697475] page dumped because: kasan: bad access detected
[   24.697715] 
[   24.697862] Memory state around the buggy address:
[   24.698149]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.698492]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.699002] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.699297]                                      ^
[   24.699563]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.699783]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.699991] ==================================================================
[   25.589095] ==================================================================
[   25.589552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   25.589997] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.590412] 
[   25.590580] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.590665] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.590692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.590721] Call Trace:
[   25.590745]  <TASK>
[   25.590769]  dump_stack_lvl+0x73/0xb0
[   25.590818]  print_report+0xd1/0x650
[   25.590889]  ? __virt_addr_valid+0x1db/0x2d0
[   25.590930]  ? kasan_atomics_helper+0x19e3/0x5450
[   25.590966]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.591004]  ? kasan_atomics_helper+0x19e3/0x5450
[   25.591035]  kasan_report+0x141/0x180
[   25.591070]  ? kasan_atomics_helper+0x19e3/0x5450
[   25.591116]  kasan_check_range+0x10c/0x1c0
[   25.591156]  __kasan_check_write+0x18/0x20
[   25.591195]  kasan_atomics_helper+0x19e3/0x5450
[   25.591235]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.591270]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.591311]  ? trace_hardirqs_on+0x37/0xe0
[   25.591345]  ? kasan_atomics+0x152/0x310
[   25.591406]  kasan_atomics+0x1dc/0x310
[   25.591447]  ? __pfx_kasan_atomics+0x10/0x10
[   25.591486]  ? __pfx_kasan_atomics+0x10/0x10
[   25.591528]  kunit_try_run_case+0x1a5/0x480
[   25.591571]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.591607]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.591647]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.591683]  ? __kthread_parkme+0x82/0x180
[   25.591719]  ? preempt_count_sub+0x50/0x80
[   25.591759]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.591797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.591869]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.591912]  kthread+0x337/0x6f0
[   25.591948]  ? trace_preempt_on+0x20/0xc0
[   25.591987]  ? __pfx_kthread+0x10/0x10
[   25.592021]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.592059]  ? calculate_sigpending+0x7b/0xa0
[   25.592100]  ? __pfx_kthread+0x10/0x10
[   25.592138]  ret_from_fork+0x116/0x1d0
[   25.592174]  ? __pfx_kthread+0x10/0x10
[   25.592209]  ret_from_fork_asm+0x1a/0x30
[   25.592262]  </TASK>
[   25.592285] 
[   25.602997] Allocated by task 294:
[   25.603245]  kasan_save_stack+0x45/0x70
[   25.603438]  kasan_save_track+0x18/0x40
[   25.603691]  kasan_save_alloc_info+0x3b/0x50
[   25.604048]  __kasan_kmalloc+0xb7/0xc0
[   25.604206]  __kmalloc_cache_noprof+0x189/0x420
[   25.604529]  kasan_atomics+0x95/0x310
[   25.604702]  kunit_try_run_case+0x1a5/0x480
[   25.605073]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.605276]  kthread+0x337/0x6f0
[   25.605519]  ret_from_fork+0x116/0x1d0
[   25.605702]  ret_from_fork_asm+0x1a/0x30
[   25.605982] 
[   25.606093] The buggy address belongs to the object at ffff888102c1c600
[   25.606093]  which belongs to the cache kmalloc-64 of size 64
[   25.606562] The buggy address is located 0 bytes to the right of
[   25.606562]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.607095] 
[   25.607290] The buggy address belongs to the physical page:
[   25.607656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.607909] flags: 0x200000000000000(node=0|zone=2)
[   25.608083] page_type: f5(slab)
[   25.608221] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.608462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.608686] page dumped because: kasan: bad access detected
[   25.608862] 
[   25.608969] Memory state around the buggy address:
[   25.609291]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.609758]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.610437] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.611104]                                      ^
[   25.611277]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.611506]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.611719] ==================================================================
[   25.612473] ==================================================================
[   25.612961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   25.613556] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.614067] 
[   25.614243] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.614328] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.614355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.614409] Call Trace:
[   25.614437]  <TASK>
[   25.614463]  dump_stack_lvl+0x73/0xb0
[   25.614519]  print_report+0xd1/0x650
[   25.614562]  ? __virt_addr_valid+0x1db/0x2d0
[   25.614608]  ? kasan_atomics_helper+0x1a7f/0x5450
[   25.614649]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.614700]  ? kasan_atomics_helper+0x1a7f/0x5450
[   25.614746]  kasan_report+0x141/0x180
[   25.614790]  ? kasan_atomics_helper+0x1a7f/0x5450
[   25.614840]  kasan_check_range+0x10c/0x1c0
[   25.614888]  __kasan_check_write+0x18/0x20
[   25.614934]  kasan_atomics_helper+0x1a7f/0x5450
[   25.614977]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.615020]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.615063]  ? trace_hardirqs_on+0x37/0xe0
[   25.615105]  ? kasan_atomics+0x152/0x310
[   25.615153]  kasan_atomics+0x1dc/0x310
[   25.615192]  ? __pfx_kasan_atomics+0x10/0x10
[   25.615234]  ? __pfx_kasan_atomics+0x10/0x10
[   25.615284]  kunit_try_run_case+0x1a5/0x480
[   25.615329]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.615372]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.615421]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.615468]  ? __kthread_parkme+0x82/0x180
[   25.615501]  ? preempt_count_sub+0x50/0x80
[   25.615538]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.615576]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.615620]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.615664]  kthread+0x337/0x6f0
[   25.615700]  ? trace_preempt_on+0x20/0xc0
[   25.615741]  ? __pfx_kthread+0x10/0x10
[   25.615780]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.615819]  ? calculate_sigpending+0x7b/0xa0
[   25.615861]  ? __pfx_kthread+0x10/0x10
[   25.615902]  ret_from_fork+0x116/0x1d0
[   25.615940]  ? __pfx_kthread+0x10/0x10
[   25.615979]  ret_from_fork_asm+0x1a/0x30
[   25.616040]  </TASK>
[   25.616064] 
[   25.624552] Allocated by task 294:
[   25.624710]  kasan_save_stack+0x45/0x70
[   25.624902]  kasan_save_track+0x18/0x40
[   25.625171]  kasan_save_alloc_info+0x3b/0x50
[   25.625617]  __kasan_kmalloc+0xb7/0xc0
[   25.625914]  __kmalloc_cache_noprof+0x189/0x420
[   25.626760]  kasan_atomics+0x95/0x310
[   25.627286]  kunit_try_run_case+0x1a5/0x480
[   25.627949]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.628172]  kthread+0x337/0x6f0
[   25.628313]  ret_from_fork+0x116/0x1d0
[   25.628476]  ret_from_fork_asm+0x1a/0x30
[   25.628631] 
[   25.628723] The buggy address belongs to the object at ffff888102c1c600
[   25.628723]  which belongs to the cache kmalloc-64 of size 64
[   25.630026] The buggy address is located 0 bytes to the right of
[   25.630026]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.630977] 
[   25.631132] The buggy address belongs to the physical page:
[   25.632017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.632452] flags: 0x200000000000000(node=0|zone=2)
[   25.632682] page_type: f5(slab)
[   25.633220] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.633754] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.633990] page dumped because: kasan: bad access detected
[   25.634180] 
[   25.634264] Memory state around the buggy address:
[   25.634796]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.635094]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.635370] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.635588]                                      ^
[   25.635751]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.636366]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.636974] ==================================================================
[   25.811553] ==================================================================
[   25.811999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   25.813158] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.813499] 
[   25.813714] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.813822] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.813875] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.813911] Call Trace:
[   25.813937]  <TASK>
[   25.813962]  dump_stack_lvl+0x73/0xb0
[   25.814028]  print_report+0xd1/0x650
[   25.814078]  ? __virt_addr_valid+0x1db/0x2d0
[   25.814132]  ? kasan_atomics_helper+0x1f43/0x5450
[   25.814173]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.814243]  ? kasan_atomics_helper+0x1f43/0x5450
[   25.814297]  kasan_report+0x141/0x180
[   25.814342]  ? kasan_atomics_helper+0x1f43/0x5450
[   25.814406]  kasan_check_range+0x10c/0x1c0
[   25.814448]  __kasan_check_write+0x18/0x20
[   25.814487]  kasan_atomics_helper+0x1f43/0x5450
[   25.814527]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.814561]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.814611]  ? trace_hardirqs_on+0x37/0xe0
[   25.814664]  ? kasan_atomics+0x152/0x310
[   25.814700]  kasan_atomics+0x1dc/0x310
[   25.814720]  ? __pfx_kasan_atomics+0x10/0x10
[   25.814742]  ? __pfx_kasan_atomics+0x10/0x10
[   25.814765]  kunit_try_run_case+0x1a5/0x480
[   25.814787]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.814807]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.814857]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.814881]  ? __kthread_parkme+0x82/0x180
[   25.814900]  ? preempt_count_sub+0x50/0x80
[   25.814920]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.814941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.814962]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.814982]  kthread+0x337/0x6f0
[   25.815000]  ? trace_preempt_on+0x20/0xc0
[   25.815019]  ? __pfx_kthread+0x10/0x10
[   25.815038]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.815057]  ? calculate_sigpending+0x7b/0xa0
[   25.815078]  ? __pfx_kthread+0x10/0x10
[   25.815097]  ret_from_fork+0x116/0x1d0
[   25.815114]  ? __pfx_kthread+0x10/0x10
[   25.815132]  ret_from_fork_asm+0x1a/0x30
[   25.815161]  </TASK>
[   25.815173] 
[   25.823721] Allocated by task 294:
[   25.824007]  kasan_save_stack+0x45/0x70
[   25.824176]  kasan_save_track+0x18/0x40
[   25.824323]  kasan_save_alloc_info+0x3b/0x50
[   25.824634]  __kasan_kmalloc+0xb7/0xc0
[   25.824921]  __kmalloc_cache_noprof+0x189/0x420
[   25.825285]  kasan_atomics+0x95/0x310
[   25.825545]  kunit_try_run_case+0x1a5/0x480
[   25.825817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.826119]  kthread+0x337/0x6f0
[   25.826357]  ret_from_fork+0x116/0x1d0
[   25.826576]  ret_from_fork_asm+0x1a/0x30
[   25.826771] 
[   25.826921] The buggy address belongs to the object at ffff888102c1c600
[   25.826921]  which belongs to the cache kmalloc-64 of size 64
[   25.827431] The buggy address is located 0 bytes to the right of
[   25.827431]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.828106] 
[   25.828226] The buggy address belongs to the physical page:
[   25.828590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.829014] flags: 0x200000000000000(node=0|zone=2)
[   25.829224] page_type: f5(slab)
[   25.829487] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.829742] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.829964] page dumped because: kasan: bad access detected
[   25.830186] 
[   25.830279] Memory state around the buggy address:
[   25.830554]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.831055]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.831594] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.831829]                                      ^
[   25.832195]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.832495]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.832832] ==================================================================
[   24.521025] ==================================================================
[   24.522103] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   24.522638] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.523113] 
[   24.523231] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.523315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.523342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.523395] Call Trace:
[   24.523424]  <TASK>
[   24.523455]  dump_stack_lvl+0x73/0xb0
[   24.523508]  print_report+0xd1/0x650
[   24.523551]  ? __virt_addr_valid+0x1db/0x2d0
[   24.523596]  ? kasan_atomics_helper+0x4b6e/0x5450
[   24.523636]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.523679]  ? kasan_atomics_helper+0x4b6e/0x5450
[   24.523718]  kasan_report+0x141/0x180
[   24.523754]  ? kasan_atomics_helper+0x4b6e/0x5450
[   24.523802]  __asan_report_store4_noabort+0x1b/0x30
[   24.523838]  kasan_atomics_helper+0x4b6e/0x5450
[   24.523872]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.523903]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.523938]  ? trace_hardirqs_on+0x37/0xe0
[   24.523973]  ? kasan_atomics+0x152/0x310
[   24.524018]  kasan_atomics+0x1dc/0x310
[   24.524059]  ? __pfx_kasan_atomics+0x10/0x10
[   24.524102]  ? __pfx_kasan_atomics+0x10/0x10
[   24.524151]  kunit_try_run_case+0x1a5/0x480
[   24.524196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.524234]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.524276]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.524320]  ? __kthread_parkme+0x82/0x180
[   24.524359]  ? preempt_count_sub+0x50/0x80
[   24.524417]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.524463]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.524508]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.524552]  kthread+0x337/0x6f0
[   24.524590]  ? trace_preempt_on+0x20/0xc0
[   24.524626]  ? __pfx_kthread+0x10/0x10
[   24.524655]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.524689]  ? calculate_sigpending+0x7b/0xa0
[   24.524728]  ? __pfx_kthread+0x10/0x10
[   24.524767]  ret_from_fork+0x116/0x1d0
[   24.524803]  ? __pfx_kthread+0x10/0x10
[   24.524856]  ret_from_fork_asm+0x1a/0x30
[   24.524910]  </TASK>
[   24.524929] 
[   24.533449] Allocated by task 294:
[   24.533728]  kasan_save_stack+0x45/0x70
[   24.534090]  kasan_save_track+0x18/0x40
[   24.534398]  kasan_save_alloc_info+0x3b/0x50
[   24.534715]  __kasan_kmalloc+0xb7/0xc0
[   24.537294]  __kmalloc_cache_noprof+0x189/0x420
[   24.537706]  kasan_atomics+0x95/0x310
[   24.538065]  kunit_try_run_case+0x1a5/0x480
[   24.538396]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.538764]  kthread+0x337/0x6f0
[   24.539068]  ret_from_fork+0x116/0x1d0
[   24.539350]  ret_from_fork_asm+0x1a/0x30
[   24.539623] 
[   24.539712] The buggy address belongs to the object at ffff888102c1c600
[   24.539712]  which belongs to the cache kmalloc-64 of size 64
[   24.541309] The buggy address is located 0 bytes to the right of
[   24.541309]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.542545] 
[   24.542820] The buggy address belongs to the physical page:
[   24.543113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.543591] flags: 0x200000000000000(node=0|zone=2)
[   24.543842] page_type: f5(slab)
[   24.543975] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.544258] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.545193] page dumped because: kasan: bad access detected
[   24.545656] 
[   24.545745] Memory state around the buggy address:
[   24.546193]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.546467]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.547280] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.547556]                                      ^
[   24.547840]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.548248]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.548617] ==================================================================
[   25.174618] ==================================================================
[   25.175125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   25.175601] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.175922] 
[   25.176034] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.176117] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.176141] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.176174] Call Trace:
[   25.176198]  <TASK>
[   25.176221]  dump_stack_lvl+0x73/0xb0
[   25.176268]  print_report+0xd1/0x650
[   25.176306]  ? __virt_addr_valid+0x1db/0x2d0
[   25.176348]  ? kasan_atomics_helper+0x1148/0x5450
[   25.176403]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.176454]  ? kasan_atomics_helper+0x1148/0x5450
[   25.176488]  kasan_report+0x141/0x180
[   25.176526]  ? kasan_atomics_helper+0x1148/0x5450
[   25.176571]  kasan_check_range+0x10c/0x1c0
[   25.176610]  __kasan_check_write+0x18/0x20
[   25.176661]  kasan_atomics_helper+0x1148/0x5450
[   25.176703]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.176760]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.176806]  ? trace_hardirqs_on+0x37/0xe0
[   25.176873]  ? kasan_atomics+0x152/0x310
[   25.176924]  kasan_atomics+0x1dc/0x310
[   25.176967]  ? __pfx_kasan_atomics+0x10/0x10
[   25.177006]  ? __pfx_kasan_atomics+0x10/0x10
[   25.177052]  kunit_try_run_case+0x1a5/0x480
[   25.177096]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.177137]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.177179]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.177219]  ? __kthread_parkme+0x82/0x180
[   25.177278]  ? preempt_count_sub+0x50/0x80
[   25.177317]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.177362]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.177420]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.177465]  kthread+0x337/0x6f0
[   25.177505]  ? trace_preempt_on+0x20/0xc0
[   25.177548]  ? __pfx_kthread+0x10/0x10
[   25.177589]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.177631]  ? calculate_sigpending+0x7b/0xa0
[   25.177661]  ? __pfx_kthread+0x10/0x10
[   25.177681]  ret_from_fork+0x116/0x1d0
[   25.177699]  ? __pfx_kthread+0x10/0x10
[   25.177718]  ret_from_fork_asm+0x1a/0x30
[   25.177746]  </TASK>
[   25.177757] 
[   25.186005] Allocated by task 294:
[   25.186303]  kasan_save_stack+0x45/0x70
[   25.186647]  kasan_save_track+0x18/0x40
[   25.186866]  kasan_save_alloc_info+0x3b/0x50
[   25.187189]  __kasan_kmalloc+0xb7/0xc0
[   25.187421]  __kmalloc_cache_noprof+0x189/0x420
[   25.187686]  kasan_atomics+0x95/0x310
[   25.187907]  kunit_try_run_case+0x1a5/0x480
[   25.188173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.188399]  kthread+0x337/0x6f0
[   25.188660]  ret_from_fork+0x116/0x1d0
[   25.188876]  ret_from_fork_asm+0x1a/0x30
[   25.189096] 
[   25.189210] The buggy address belongs to the object at ffff888102c1c600
[   25.189210]  which belongs to the cache kmalloc-64 of size 64
[   25.189726] The buggy address is located 0 bytes to the right of
[   25.189726]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.190122] 
[   25.190222] The buggy address belongs to the physical page:
[   25.190424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.190681] flags: 0x200000000000000(node=0|zone=2)
[   25.190913] page_type: f5(slab)
[   25.191169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.191682] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.192196] page dumped because: kasan: bad access detected
[   25.192568] 
[   25.192705] Memory state around the buggy address:
[   25.193051]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.193513]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.193737] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.193980]                                      ^
[   25.194162]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.194622]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.195112] ==================================================================
[   25.150303] ==================================================================
[   25.151008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   25.151598] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.152145] 
[   25.152346] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.152446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.152474] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.152527] Call Trace:
[   25.152555]  <TASK>
[   25.152583]  dump_stack_lvl+0x73/0xb0
[   25.152637]  print_report+0xd1/0x650
[   25.152674]  ? __virt_addr_valid+0x1db/0x2d0
[   25.152711]  ? kasan_atomics_helper+0x4a1c/0x5450
[   25.152747]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.152810]  ? kasan_atomics_helper+0x4a1c/0x5450
[   25.152881]  kasan_report+0x141/0x180
[   25.152922]  ? kasan_atomics_helper+0x4a1c/0x5450
[   25.152968]  __asan_report_load4_noabort+0x18/0x20
[   25.153010]  kasan_atomics_helper+0x4a1c/0x5450
[   25.153067]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.153109]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.153150]  ? trace_hardirqs_on+0x37/0xe0
[   25.153190]  ? kasan_atomics+0x152/0x310
[   25.153238]  kasan_atomics+0x1dc/0x310
[   25.153295]  ? __pfx_kasan_atomics+0x10/0x10
[   25.153339]  ? __pfx_kasan_atomics+0x10/0x10
[   25.153399]  kunit_try_run_case+0x1a5/0x480
[   25.153440]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.153464]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.153488]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.153508]  ? __kthread_parkme+0x82/0x180
[   25.153527]  ? preempt_count_sub+0x50/0x80
[   25.153548]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.153568]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.153603]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.153643]  kthread+0x337/0x6f0
[   25.153677]  ? trace_preempt_on+0x20/0xc0
[   25.153737]  ? __pfx_kthread+0x10/0x10
[   25.153775]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.153816]  ? calculate_sigpending+0x7b/0xa0
[   25.153906]  ? __pfx_kthread+0x10/0x10
[   25.153945]  ret_from_fork+0x116/0x1d0
[   25.153981]  ? __pfx_kthread+0x10/0x10
[   25.154029]  ret_from_fork_asm+0x1a/0x30
[   25.154089]  </TASK>
[   25.154103] 
[   25.162358] Allocated by task 294:
[   25.162650]  kasan_save_stack+0x45/0x70
[   25.162950]  kasan_save_track+0x18/0x40
[   25.163150]  kasan_save_alloc_info+0x3b/0x50
[   25.163442]  __kasan_kmalloc+0xb7/0xc0
[   25.163696]  __kmalloc_cache_noprof+0x189/0x420
[   25.163993]  kasan_atomics+0x95/0x310
[   25.164278]  kunit_try_run_case+0x1a5/0x480
[   25.164482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.164697]  kthread+0x337/0x6f0
[   25.164950]  ret_from_fork+0x116/0x1d0
[   25.165222]  ret_from_fork_asm+0x1a/0x30
[   25.165520] 
[   25.165689] The buggy address belongs to the object at ffff888102c1c600
[   25.165689]  which belongs to the cache kmalloc-64 of size 64
[   25.166254] The buggy address is located 0 bytes to the right of
[   25.166254]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.166717] 
[   25.166861] The buggy address belongs to the physical page:
[   25.167081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.167353] flags: 0x200000000000000(node=0|zone=2)
[   25.167713] page_type: f5(slab)
[   25.167993] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.168471] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.168962] page dumped because: kasan: bad access detected
[   25.169327] 
[   25.169648] Memory state around the buggy address:
[   25.170952]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.171462]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.172477] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.172901]                                      ^
[   25.173176]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.173489]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.173860] ==================================================================
[   25.949224] ==================================================================
[   25.949593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   25.950279] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.950819] 
[   25.951046] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.951127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.951154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.951193] Call Trace:
[   25.951221]  <TASK>
[   25.951251]  dump_stack_lvl+0x73/0xb0
[   25.951303]  print_report+0xd1/0x650
[   25.951345]  ? __virt_addr_valid+0x1db/0x2d0
[   25.951401]  ? kasan_atomics_helper+0x218a/0x5450
[   25.951444]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.951493]  ? kasan_atomics_helper+0x218a/0x5450
[   25.951535]  kasan_report+0x141/0x180
[   25.951579]  ? kasan_atomics_helper+0x218a/0x5450
[   25.951630]  kasan_check_range+0x10c/0x1c0
[   25.951675]  __kasan_check_write+0x18/0x20
[   25.951720]  kasan_atomics_helper+0x218a/0x5450
[   25.951764]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.951806]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.951849]  ? trace_hardirqs_on+0x37/0xe0
[   25.951890]  ? kasan_atomics+0x152/0x310
[   25.951940]  kasan_atomics+0x1dc/0x310
[   25.951982]  ? __pfx_kasan_atomics+0x10/0x10
[   25.952025]  ? __pfx_kasan_atomics+0x10/0x10
[   25.952075]  kunit_try_run_case+0x1a5/0x480
[   25.952120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.952161]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.952204]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.952248]  ? __kthread_parkme+0x82/0x180
[   25.952286]  ? preempt_count_sub+0x50/0x80
[   25.952331]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.952387]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.952425]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.952459]  kthread+0x337/0x6f0
[   25.952487]  ? trace_preempt_on+0x20/0xc0
[   25.952523]  ? __pfx_kthread+0x10/0x10
[   25.952557]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.952594]  ? calculate_sigpending+0x7b/0xa0
[   25.952637]  ? __pfx_kthread+0x10/0x10
[   25.952678]  ret_from_fork+0x116/0x1d0
[   25.952715]  ? __pfx_kthread+0x10/0x10
[   25.952755]  ret_from_fork_asm+0x1a/0x30
[   25.952814]  </TASK>
[   25.952844] 
[   25.961914] Allocated by task 294:
[   25.962129]  kasan_save_stack+0x45/0x70
[   25.962590]  kasan_save_track+0x18/0x40
[   25.963958]  kasan_save_alloc_info+0x3b/0x50
[   25.964251]  __kasan_kmalloc+0xb7/0xc0
[   25.964414]  __kmalloc_cache_noprof+0x189/0x420
[   25.964584]  kasan_atomics+0x95/0x310
[   25.964732]  kunit_try_run_case+0x1a5/0x480
[   25.965973]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.966274]  kthread+0x337/0x6f0
[   25.966480]  ret_from_fork+0x116/0x1d0
[   25.966678]  ret_from_fork_asm+0x1a/0x30
[   25.967333] 
[   25.967460] The buggy address belongs to the object at ffff888102c1c600
[   25.967460]  which belongs to the cache kmalloc-64 of size 64
[   25.967801] The buggy address is located 0 bytes to the right of
[   25.967801]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.969278] 
[   25.969775] The buggy address belongs to the physical page:
[   25.970181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.970608] flags: 0x200000000000000(node=0|zone=2)
[   25.972573] page_type: f5(slab)
[   25.972744] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.972950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.973560] page dumped because: kasan: bad access detected
[   25.973820] 
[   25.974410] Memory state around the buggy address:
[   25.974678]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.975144]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.975440] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.975784]                                      ^
[   25.976429]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.976779]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.977310] ==================================================================
[   25.102590] ==================================================================
[   25.103178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   25.103671] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.103989] 
[   25.104117] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.104209] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.104236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.104275] Call Trace:
[   25.104304]  <TASK>
[   25.104332]  dump_stack_lvl+0x73/0xb0
[   25.104397]  print_report+0xd1/0x650
[   25.104437]  ? __virt_addr_valid+0x1db/0x2d0
[   25.104475]  ? kasan_atomics_helper+0x4a36/0x5450
[   25.104514]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.104560]  ? kasan_atomics_helper+0x4a36/0x5450
[   25.104599]  kasan_report+0x141/0x180
[   25.104636]  ? kasan_atomics_helper+0x4a36/0x5450
[   25.104686]  __asan_report_load4_noabort+0x18/0x20
[   25.104729]  kasan_atomics_helper+0x4a36/0x5450
[   25.104773]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.104816]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.104874]  ? trace_hardirqs_on+0x37/0xe0
[   25.104915]  ? kasan_atomics+0x152/0x310
[   25.104966]  kasan_atomics+0x1dc/0x310
[   25.105010]  ? __pfx_kasan_atomics+0x10/0x10
[   25.105054]  ? __pfx_kasan_atomics+0x10/0x10
[   25.105106]  kunit_try_run_case+0x1a5/0x480
[   25.105153]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.105196]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.105239]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.105281]  ? __kthread_parkme+0x82/0x180
[   25.105317]  ? preempt_count_sub+0x50/0x80
[   25.105356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.105412]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.105459]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.105505]  kthread+0x337/0x6f0
[   25.105544]  ? trace_preempt_on+0x20/0xc0
[   25.105587]  ? __pfx_kthread+0x10/0x10
[   25.105619]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.105640]  ? calculate_sigpending+0x7b/0xa0
[   25.105662]  ? __pfx_kthread+0x10/0x10
[   25.105680]  ret_from_fork+0x116/0x1d0
[   25.105699]  ? __pfx_kthread+0x10/0x10
[   25.105717]  ret_from_fork_asm+0x1a/0x30
[   25.105745]  </TASK>
[   25.105763] 
[   25.114582] Allocated by task 294:
[   25.114752]  kasan_save_stack+0x45/0x70
[   25.115102]  kasan_save_track+0x18/0x40
[   25.115400]  kasan_save_alloc_info+0x3b/0x50
[   25.115720]  __kasan_kmalloc+0xb7/0xc0
[   25.116033]  __kmalloc_cache_noprof+0x189/0x420
[   25.116367]  kasan_atomics+0x95/0x310
[   25.116590]  kunit_try_run_case+0x1a5/0x480
[   25.116922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.117211]  kthread+0x337/0x6f0
[   25.117391]  ret_from_fork+0x116/0x1d0
[   25.117545]  ret_from_fork_asm+0x1a/0x30
[   25.117750] 
[   25.117931] The buggy address belongs to the object at ffff888102c1c600
[   25.117931]  which belongs to the cache kmalloc-64 of size 64
[   25.118535] The buggy address is located 0 bytes to the right of
[   25.118535]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.119243] 
[   25.119402] The buggy address belongs to the physical page:
[   25.119731] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.120092] flags: 0x200000000000000(node=0|zone=2)
[   25.120338] page_type: f5(slab)
[   25.120497] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.120762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.121051] page dumped because: kasan: bad access detected
[   25.121251] 
[   25.121353] Memory state around the buggy address:
[   25.121665]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.122164]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.122676] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.123177]                                      ^
[   25.123514]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.124000]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.124425] ==================================================================
[   25.712159] ==================================================================
[   25.712530] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   25.712822] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.713319] 
[   25.713563] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.713675] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.713702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.713753] Call Trace:
[   25.713782]  <TASK>
[   25.713810]  dump_stack_lvl+0x73/0xb0
[   25.713896]  print_report+0xd1/0x650
[   25.713938]  ? __virt_addr_valid+0x1db/0x2d0
[   25.713978]  ? kasan_atomics_helper+0x1ce1/0x5450
[   25.714025]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.714071]  ? kasan_atomics_helper+0x1ce1/0x5450
[   25.714112]  kasan_report+0x141/0x180
[   25.714152]  ? kasan_atomics_helper+0x1ce1/0x5450
[   25.714242]  kasan_check_range+0x10c/0x1c0
[   25.714324]  __kasan_check_write+0x18/0x20
[   25.714414]  kasan_atomics_helper+0x1ce1/0x5450
[   25.714481]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.714539]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.714590]  ? trace_hardirqs_on+0x37/0xe0
[   25.714628]  ? kasan_atomics+0x152/0x310
[   25.714678]  kasan_atomics+0x1dc/0x310
[   25.714734]  ? __pfx_kasan_atomics+0x10/0x10
[   25.714778]  ? __pfx_kasan_atomics+0x10/0x10
[   25.714879]  kunit_try_run_case+0x1a5/0x480
[   25.714949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.714998]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.715044]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.715085]  ? __kthread_parkme+0x82/0x180
[   25.715124]  ? preempt_count_sub+0x50/0x80
[   25.715192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.715233]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.715292]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.715326]  kthread+0x337/0x6f0
[   25.715345]  ? trace_preempt_on+0x20/0xc0
[   25.715365]  ? __pfx_kthread+0x10/0x10
[   25.715401]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.715422]  ? calculate_sigpending+0x7b/0xa0
[   25.715444]  ? __pfx_kthread+0x10/0x10
[   25.715463]  ret_from_fork+0x116/0x1d0
[   25.715481]  ? __pfx_kthread+0x10/0x10
[   25.715499]  ret_from_fork_asm+0x1a/0x30
[   25.715526]  </TASK>
[   25.715538] 
[   25.724543] Allocated by task 294:
[   25.724700]  kasan_save_stack+0x45/0x70
[   25.724895]  kasan_save_track+0x18/0x40
[   25.725045]  kasan_save_alloc_info+0x3b/0x50
[   25.725208]  __kasan_kmalloc+0xb7/0xc0
[   25.725485]  __kmalloc_cache_noprof+0x189/0x420
[   25.725874]  kasan_atomics+0x95/0x310
[   25.726186]  kunit_try_run_case+0x1a5/0x480
[   25.726559]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.727032]  kthread+0x337/0x6f0
[   25.727338]  ret_from_fork+0x116/0x1d0
[   25.727625]  ret_from_fork_asm+0x1a/0x30
[   25.728016] 
[   25.728173] The buggy address belongs to the object at ffff888102c1c600
[   25.728173]  which belongs to the cache kmalloc-64 of size 64
[   25.728644] The buggy address is located 0 bytes to the right of
[   25.728644]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.729089] 
[   25.729272] The buggy address belongs to the physical page:
[   25.729681] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.730317] flags: 0x200000000000000(node=0|zone=2)
[   25.730696] page_type: f5(slab)
[   25.731000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.731439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.731674] page dumped because: kasan: bad access detected
[   25.731882] 
[   25.731968] Memory state around the buggy address:
[   25.732134]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.732568]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.733079] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.733542]                                      ^
[   25.733934]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.734583]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.734904] ==================================================================
[   25.079691] ==================================================================
[   25.080930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   25.081340] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.081909] 
[   25.082100] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.082179] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.082199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.082229] Call Trace:
[   25.082253]  <TASK>
[   25.082277]  dump_stack_lvl+0x73/0xb0
[   25.082325]  print_report+0xd1/0x650
[   25.082407]  ? __virt_addr_valid+0x1db/0x2d0
[   25.082447]  ? kasan_atomics_helper+0xfa9/0x5450
[   25.082501]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.082548]  ? kasan_atomics_helper+0xfa9/0x5450
[   25.082587]  kasan_report+0x141/0x180
[   25.082642]  ? kasan_atomics_helper+0xfa9/0x5450
[   25.082690]  kasan_check_range+0x10c/0x1c0
[   25.082726]  __kasan_check_write+0x18/0x20
[   25.082766]  kasan_atomics_helper+0xfa9/0x5450
[   25.082806]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.082883]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.082930]  ? trace_hardirqs_on+0x37/0xe0
[   25.082970]  ? kasan_atomics+0x152/0x310
[   25.083034]  kasan_atomics+0x1dc/0x310
[   25.083070]  ? __pfx_kasan_atomics+0x10/0x10
[   25.083109]  ? __pfx_kasan_atomics+0x10/0x10
[   25.083159]  kunit_try_run_case+0x1a5/0x480
[   25.083203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.083242]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.083299]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.083340]  ? __kthread_parkme+0x82/0x180
[   25.083389]  ? preempt_count_sub+0x50/0x80
[   25.083436]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.083478]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.083538]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.083580]  kthread+0x337/0x6f0
[   25.083617]  ? trace_preempt_on+0x20/0xc0
[   25.083659]  ? __pfx_kthread+0x10/0x10
[   25.083697]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.083750]  ? calculate_sigpending+0x7b/0xa0
[   25.083793]  ? __pfx_kthread+0x10/0x10
[   25.083863]  ret_from_fork+0x116/0x1d0
[   25.083894]  ? __pfx_kthread+0x10/0x10
[   25.083914]  ret_from_fork_asm+0x1a/0x30
[   25.083943]  </TASK>
[   25.083956] 
[   25.092072] Allocated by task 294:
[   25.092340]  kasan_save_stack+0x45/0x70
[   25.092649]  kasan_save_track+0x18/0x40
[   25.092964]  kasan_save_alloc_info+0x3b/0x50
[   25.093271]  __kasan_kmalloc+0xb7/0xc0
[   25.093472]  __kmalloc_cache_noprof+0x189/0x420
[   25.093794]  kasan_atomics+0x95/0x310
[   25.093973]  kunit_try_run_case+0x1a5/0x480
[   25.094154]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.094521]  kthread+0x337/0x6f0
[   25.094803]  ret_from_fork+0x116/0x1d0
[   25.095112]  ret_from_fork_asm+0x1a/0x30
[   25.095415] 
[   25.095575] The buggy address belongs to the object at ffff888102c1c600
[   25.095575]  which belongs to the cache kmalloc-64 of size 64
[   25.096181] The buggy address is located 0 bytes to the right of
[   25.096181]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.096655] 
[   25.096784] The buggy address belongs to the physical page:
[   25.097183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.097654] flags: 0x200000000000000(node=0|zone=2)
[   25.097918] page_type: f5(slab)
[   25.098089] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.098612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.099002] page dumped because: kasan: bad access detected
[   25.099309] 
[   25.099460] Memory state around the buggy address:
[   25.099740]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.100200]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.100599] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.100976]                                      ^
[   25.101243]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.101656]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.102035] ==================================================================
[   24.983301] ==================================================================
[   24.983851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   24.984416] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.984955] 
[   24.985116] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.985215] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.985240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.985274] Call Trace:
[   24.985299]  <TASK>
[   24.985325]  dump_stack_lvl+0x73/0xb0
[   24.985393]  print_report+0xd1/0x650
[   24.985452]  ? __virt_addr_valid+0x1db/0x2d0
[   24.985492]  ? kasan_atomics_helper+0xd47/0x5450
[   24.985529]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.985576]  ? kasan_atomics_helper+0xd47/0x5450
[   24.985618]  kasan_report+0x141/0x180
[   24.985663]  ? kasan_atomics_helper+0xd47/0x5450
[   24.985713]  kasan_check_range+0x10c/0x1c0
[   24.985760]  __kasan_check_write+0x18/0x20
[   24.985804]  kasan_atomics_helper+0xd47/0x5450
[   24.985877]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.985924]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.985968]  ? trace_hardirqs_on+0x37/0xe0
[   24.986020]  ? kasan_atomics+0x152/0x310
[   24.986077]  kasan_atomics+0x1dc/0x310
[   24.986126]  ? __pfx_kasan_atomics+0x10/0x10
[   24.986173]  ? __pfx_kasan_atomics+0x10/0x10
[   24.986225]  kunit_try_run_case+0x1a5/0x480
[   24.986277]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.986323]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.986370]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.986425]  ? __kthread_parkme+0x82/0x180
[   24.986467]  ? preempt_count_sub+0x50/0x80
[   24.986510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.986557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.986605]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.986652]  kthread+0x337/0x6f0
[   24.986713]  ? trace_preempt_on+0x20/0xc0
[   24.986757]  ? __pfx_kthread+0x10/0x10
[   24.986793]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.986866]  ? calculate_sigpending+0x7b/0xa0
[   24.986914]  ? __pfx_kthread+0x10/0x10
[   24.986959]  ret_from_fork+0x116/0x1d0
[   24.986994]  ? __pfx_kthread+0x10/0x10
[   24.987044]  ret_from_fork_asm+0x1a/0x30
[   24.987096]  </TASK>
[   24.987118] 
[   24.995185] Allocated by task 294:
[   24.995480]  kasan_save_stack+0x45/0x70
[   24.995783]  kasan_save_track+0x18/0x40
[   24.996094]  kasan_save_alloc_info+0x3b/0x50
[   24.996451]  __kasan_kmalloc+0xb7/0xc0
[   24.996737]  __kmalloc_cache_noprof+0x189/0x420
[   24.996933]  kasan_atomics+0x95/0x310
[   24.997085]  kunit_try_run_case+0x1a5/0x480
[   24.997244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.997437]  kthread+0x337/0x6f0
[   24.997572]  ret_from_fork+0x116/0x1d0
[   24.997714]  ret_from_fork_asm+0x1a/0x30
[   24.997978] 
[   24.998149] The buggy address belongs to the object at ffff888102c1c600
[   24.998149]  which belongs to the cache kmalloc-64 of size 64
[   24.998991] The buggy address is located 0 bytes to the right of
[   24.998991]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.999763] 
[   24.999926] The buggy address belongs to the physical page:
[   25.000307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.000594] flags: 0x200000000000000(node=0|zone=2)
[   25.000776] page_type: f5(slab)
[   25.000947] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.001179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.001409] page dumped because: kasan: bad access detected
[   25.001695] 
[   25.001861] Memory state around the buggy address:
[   25.002215]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.002666]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.003165] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.003631]                                      ^
[   25.004025]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.004655]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.004984] ==================================================================
[   24.441666] ==================================================================
[   24.442421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   24.442904] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.443391] 
[   24.443595] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.443679] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.443703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.443739] Call Trace:
[   24.443764]  <TASK>
[   24.443797]  dump_stack_lvl+0x73/0xb0
[   24.443851]  print_report+0xd1/0x650
[   24.443883]  ? __virt_addr_valid+0x1db/0x2d0
[   24.443939]  ? kasan_atomics_helper+0x4bbc/0x5450
[   24.443969]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.443993]  ? kasan_atomics_helper+0x4bbc/0x5450
[   24.444025]  kasan_report+0x141/0x180
[   24.444047]  ? kasan_atomics_helper+0x4bbc/0x5450
[   24.444068]  __asan_report_load4_noabort+0x18/0x20
[   24.444098]  kasan_atomics_helper+0x4bbc/0x5450
[   24.444129]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.444156]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.444186]  ? trace_hardirqs_on+0x37/0xe0
[   24.444206]  ? kasan_atomics+0x152/0x310
[   24.444228]  kasan_atomics+0x1dc/0x310
[   24.444246]  ? __pfx_kasan_atomics+0x10/0x10
[   24.444265]  ? __pfx_kasan_atomics+0x10/0x10
[   24.444287]  kunit_try_run_case+0x1a5/0x480
[   24.444308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.444327]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.444346]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.444365]  ? __kthread_parkme+0x82/0x180
[   24.444400]  ? preempt_count_sub+0x50/0x80
[   24.444422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.444442]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.444462]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.444482]  kthread+0x337/0x6f0
[   24.444498]  ? trace_preempt_on+0x20/0xc0
[   24.444517]  ? __pfx_kthread+0x10/0x10
[   24.444535]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.444552]  ? calculate_sigpending+0x7b/0xa0
[   24.444573]  ? __pfx_kthread+0x10/0x10
[   24.444591]  ret_from_fork+0x116/0x1d0
[   24.444608]  ? __pfx_kthread+0x10/0x10
[   24.444625]  ret_from_fork_asm+0x1a/0x30
[   24.444653]  </TASK>
[   24.444665] 
[   24.457754] Allocated by task 294:
[   24.458019]  kasan_save_stack+0x45/0x70
[   24.458465]  kasan_save_track+0x18/0x40
[   24.458681]  kasan_save_alloc_info+0x3b/0x50
[   24.459420]  __kasan_kmalloc+0xb7/0xc0
[   24.459607]  __kmalloc_cache_noprof+0x189/0x420
[   24.460016]  kasan_atomics+0x95/0x310
[   24.460362]  kunit_try_run_case+0x1a5/0x480
[   24.460798]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.461078]  kthread+0x337/0x6f0
[   24.461200]  ret_from_fork+0x116/0x1d0
[   24.461596]  ret_from_fork_asm+0x1a/0x30
[   24.462005] 
[   24.462359] The buggy address belongs to the object at ffff888102c1c600
[   24.462359]  which belongs to the cache kmalloc-64 of size 64
[   24.462773] The buggy address is located 0 bytes to the right of
[   24.462773]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.463795] 
[   24.464344] The buggy address belongs to the physical page:
[   24.464521] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.464993] flags: 0x200000000000000(node=0|zone=2)
[   24.465210] page_type: f5(slab)
[   24.465598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.466040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.466505] page dumped because: kasan: bad access detected
[   24.466838] 
[   24.467140] Memory state around the buggy address:
[   24.467475]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.467744]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.468527] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.468908]                                      ^
[   24.469082]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.469510]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.469808] ==================================================================
[   25.055777] ==================================================================
[   25.056236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   25.056764] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.057311] 
[   25.057499] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.057606] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.057647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.057685] Call Trace:
[   25.057714]  <TASK>
[   25.057742]  dump_stack_lvl+0x73/0xb0
[   25.057796]  print_report+0xd1/0x650
[   25.057891]  ? __virt_addr_valid+0x1db/0x2d0
[   25.057964]  ? kasan_atomics_helper+0xf10/0x5450
[   25.058004]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.058075]  ? kasan_atomics_helper+0xf10/0x5450
[   25.058117]  kasan_report+0x141/0x180
[   25.058162]  ? kasan_atomics_helper+0xf10/0x5450
[   25.058212]  kasan_check_range+0x10c/0x1c0
[   25.058251]  __kasan_check_write+0x18/0x20
[   25.058291]  kasan_atomics_helper+0xf10/0x5450
[   25.058358]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.058424]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.058473]  ? trace_hardirqs_on+0x37/0xe0
[   25.058514]  ? kasan_atomics+0x152/0x310
[   25.058589]  kasan_atomics+0x1dc/0x310
[   25.058632]  ? __pfx_kasan_atomics+0x10/0x10
[   25.058694]  ? __pfx_kasan_atomics+0x10/0x10
[   25.058735]  kunit_try_run_case+0x1a5/0x480
[   25.058762]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.058786]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.058807]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.058860]  ? __kthread_parkme+0x82/0x180
[   25.058886]  ? preempt_count_sub+0x50/0x80
[   25.058908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.058930]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.058954]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.058976]  kthread+0x337/0x6f0
[   25.058995]  ? trace_preempt_on+0x20/0xc0
[   25.059016]  ? __pfx_kthread+0x10/0x10
[   25.059036]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.059056]  ? calculate_sigpending+0x7b/0xa0
[   25.059076]  ? __pfx_kthread+0x10/0x10
[   25.059095]  ret_from_fork+0x116/0x1d0
[   25.059112]  ? __pfx_kthread+0x10/0x10
[   25.059130]  ret_from_fork_asm+0x1a/0x30
[   25.059157]  </TASK>
[   25.059169] 
[   25.068258] Allocated by task 294:
[   25.068423]  kasan_save_stack+0x45/0x70
[   25.068588]  kasan_save_track+0x18/0x40
[   25.068736]  kasan_save_alloc_info+0x3b/0x50
[   25.068894]  __kasan_kmalloc+0xb7/0xc0
[   25.069040]  __kmalloc_cache_noprof+0x189/0x420
[   25.069203]  kasan_atomics+0x95/0x310
[   25.069522]  kunit_try_run_case+0x1a5/0x480
[   25.069910]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.070346]  kthread+0x337/0x6f0
[   25.070673]  ret_from_fork+0x116/0x1d0
[   25.071054]  ret_from_fork_asm+0x1a/0x30
[   25.071397] 
[   25.071587] The buggy address belongs to the object at ffff888102c1c600
[   25.071587]  which belongs to the cache kmalloc-64 of size 64
[   25.072550] The buggy address is located 0 bytes to the right of
[   25.072550]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.072919] 
[   25.073010] The buggy address belongs to the physical page:
[   25.073409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.073986] flags: 0x200000000000000(node=0|zone=2)
[   25.074212] page_type: f5(slab)
[   25.074353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.074589] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.074808] page dumped because: kasan: bad access detected
[   25.075155] 
[   25.075299] Memory state around the buggy address:
[   25.075724]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.076284]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.076827] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.077328]                                      ^
[   25.077654]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.078086]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.078729] ==================================================================
[   25.521778] ==================================================================
[   25.523338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   25.523624] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.523864] 
[   25.524022] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.524096] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.524119] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.524155] Call Trace:
[   25.524183]  <TASK>
[   25.524210]  dump_stack_lvl+0x73/0xb0
[   25.524264]  print_report+0xd1/0x650
[   25.524306]  ? __virt_addr_valid+0x1db/0x2d0
[   25.524348]  ? kasan_atomics_helper+0x1818/0x5450
[   25.524403]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.524452]  ? kasan_atomics_helper+0x1818/0x5450
[   25.524493]  kasan_report+0x141/0x180
[   25.524536]  ? kasan_atomics_helper+0x1818/0x5450
[   25.524585]  kasan_check_range+0x10c/0x1c0
[   25.524628]  __kasan_check_write+0x18/0x20
[   25.524672]  kasan_atomics_helper+0x1818/0x5450
[   25.524711]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.524748]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.524785]  ? trace_hardirqs_on+0x37/0xe0
[   25.524822]  ? kasan_atomics+0x152/0x310
[   25.524906]  kasan_atomics+0x1dc/0x310
[   25.524949]  ? __pfx_kasan_atomics+0x10/0x10
[   25.524990]  ? __pfx_kasan_atomics+0x10/0x10
[   25.525030]  kunit_try_run_case+0x1a5/0x480
[   25.525071]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.525110]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.525151]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.525194]  ? __kthread_parkme+0x82/0x180
[   25.525234]  ? preempt_count_sub+0x50/0x80
[   25.525279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.525323]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.525369]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.525427]  kthread+0x337/0x6f0
[   25.525468]  ? trace_preempt_on+0x20/0xc0
[   25.525512]  ? __pfx_kthread+0x10/0x10
[   25.525553]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.525594]  ? calculate_sigpending+0x7b/0xa0
[   25.525638]  ? __pfx_kthread+0x10/0x10
[   25.525680]  ret_from_fork+0x116/0x1d0
[   25.525718]  ? __pfx_kthread+0x10/0x10
[   25.525759]  ret_from_fork_asm+0x1a/0x30
[   25.525819]  </TASK>
[   25.525868] 
[   25.533951] Allocated by task 294:
[   25.534169]  kasan_save_stack+0x45/0x70
[   25.534453]  kasan_save_track+0x18/0x40
[   25.534624]  kasan_save_alloc_info+0x3b/0x50
[   25.534786]  __kasan_kmalloc+0xb7/0xc0
[   25.534962]  __kmalloc_cache_noprof+0x189/0x420
[   25.535130]  kasan_atomics+0x95/0x310
[   25.535279]  kunit_try_run_case+0x1a5/0x480
[   25.535525]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.535897]  kthread+0x337/0x6f0
[   25.536147]  ret_from_fork+0x116/0x1d0
[   25.536434]  ret_from_fork_asm+0x1a/0x30
[   25.536724] 
[   25.536888] The buggy address belongs to the object at ffff888102c1c600
[   25.536888]  which belongs to the cache kmalloc-64 of size 64
[   25.537611] The buggy address is located 0 bytes to the right of
[   25.537611]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.538135] 
[   25.538234] The buggy address belongs to the physical page:
[   25.538449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.538943] flags: 0x200000000000000(node=0|zone=2)
[   25.539247] page_type: f5(slab)
[   25.539497] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.539732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.539986] page dumped because: kasan: bad access detected
[   25.540193] 
[   25.540278] Memory state around the buggy address:
[   25.540453]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.540669]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.540905] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.541117]                                      ^
[   25.541281]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.541671]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.542164] ==================================================================
[   24.471031] ==================================================================
[   24.472299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   24.472741] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.472957] 
[   24.473068] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.473141] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.473160] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.473188] Call Trace:
[   24.473208]  <TASK>
[   24.473228]  dump_stack_lvl+0x73/0xb0
[   24.473270]  print_report+0xd1/0x650
[   24.473299]  ? __virt_addr_valid+0x1db/0x2d0
[   24.473330]  ? kasan_atomics_helper+0x4ba2/0x5450
[   24.473357]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.473413]  ? kasan_atomics_helper+0x4ba2/0x5450
[   24.473443]  kasan_report+0x141/0x180
[   24.473474]  ? kasan_atomics_helper+0x4ba2/0x5450
[   24.473509]  __asan_report_store4_noabort+0x1b/0x30
[   24.474071]  kasan_atomics_helper+0x4ba2/0x5450
[   24.474272]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.474295]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.474318]  ? trace_hardirqs_on+0x37/0xe0
[   24.474338]  ? kasan_atomics+0x152/0x310
[   24.474362]  kasan_atomics+0x1dc/0x310
[   24.474401]  ? __pfx_kasan_atomics+0x10/0x10
[   24.474425]  ? __pfx_kasan_atomics+0x10/0x10
[   24.474449]  kunit_try_run_case+0x1a5/0x480
[   24.474472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.474492]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.474512]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.474533]  ? __kthread_parkme+0x82/0x180
[   24.474552]  ? preempt_count_sub+0x50/0x80
[   24.474573]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.474594]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.474615]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.474637]  kthread+0x337/0x6f0
[   24.474654]  ? trace_preempt_on+0x20/0xc0
[   24.474674]  ? __pfx_kthread+0x10/0x10
[   24.474693]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.474712]  ? calculate_sigpending+0x7b/0xa0
[   24.474733]  ? __pfx_kthread+0x10/0x10
[   24.474752]  ret_from_fork+0x116/0x1d0
[   24.474771]  ? __pfx_kthread+0x10/0x10
[   24.474789]  ret_from_fork_asm+0x1a/0x30
[   24.474818]  </TASK>
[   24.474831] 
[   24.484640] Allocated by task 294:
[   24.485005]  kasan_save_stack+0x45/0x70
[   24.485307]  kasan_save_track+0x18/0x40
[   24.485593]  kasan_save_alloc_info+0x3b/0x50
[   24.486057]  __kasan_kmalloc+0xb7/0xc0
[   24.486791]  __kmalloc_cache_noprof+0x189/0x420
[   24.487375]  kasan_atomics+0x95/0x310
[   24.487682]  kunit_try_run_case+0x1a5/0x480
[   24.488033]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.488474]  kthread+0x337/0x6f0
[   24.488628]  ret_from_fork+0x116/0x1d0
[   24.488814]  ret_from_fork_asm+0x1a/0x30
[   24.489284] 
[   24.489445] The buggy address belongs to the object at ffff888102c1c600
[   24.489445]  which belongs to the cache kmalloc-64 of size 64
[   24.490640] The buggy address is located 0 bytes to the right of
[   24.490640]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.491546] 
[   24.491683] The buggy address belongs to the physical page:
[   24.492001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.492593] flags: 0x200000000000000(node=0|zone=2)
[   24.492884] page_type: f5(slab)
[   24.493243] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.493686] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.494107] page dumped because: kasan: bad access detected
[   24.494373] 
[   24.495027] Memory state around the buggy address:
[   24.495449]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.495943]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.496446] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.496914]                                      ^
[   24.497361]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.497821]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.498372] ==================================================================
[   24.889095] ==================================================================
[   24.889411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   24.889947] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.890267] 
[   24.890398] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.890482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.890509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.890546] Call Trace:
[   24.890575]  <TASK>
[   24.890603]  dump_stack_lvl+0x73/0xb0
[   24.890657]  print_report+0xd1/0x650
[   24.890701]  ? __virt_addr_valid+0x1db/0x2d0
[   24.890742]  ? kasan_atomics_helper+0xac7/0x5450
[   24.890780]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.890858]  ? kasan_atomics_helper+0xac7/0x5450
[   24.890904]  kasan_report+0x141/0x180
[   24.890948]  ? kasan_atomics_helper+0xac7/0x5450
[   24.890999]  kasan_check_range+0x10c/0x1c0
[   24.891045]  __kasan_check_write+0x18/0x20
[   24.891088]  kasan_atomics_helper+0xac7/0x5450
[   24.891131]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.891173]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.891217]  ? trace_hardirqs_on+0x37/0xe0
[   24.891257]  ? kasan_atomics+0x152/0x310
[   24.891307]  kasan_atomics+0x1dc/0x310
[   24.891351]  ? __pfx_kasan_atomics+0x10/0x10
[   24.891403]  ? __pfx_kasan_atomics+0x10/0x10
[   24.891468]  kunit_try_run_case+0x1a5/0x480
[   24.891510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.891560]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.891598]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.891640]  ? __kthread_parkme+0x82/0x180
[   24.891689]  ? preempt_count_sub+0x50/0x80
[   24.891740]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.891778]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.891816]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.891884]  kthread+0x337/0x6f0
[   24.891918]  ? trace_preempt_on+0x20/0xc0
[   24.891957]  ? __pfx_kthread+0x10/0x10
[   24.892010]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.892051]  ? calculate_sigpending+0x7b/0xa0
[   24.892101]  ? __pfx_kthread+0x10/0x10
[   24.892135]  ret_from_fork+0x116/0x1d0
[   24.892171]  ? __pfx_kthread+0x10/0x10
[   24.892205]  ret_from_fork_asm+0x1a/0x30
[   24.892264]  </TASK>
[   24.892288] 
[   24.902058] Allocated by task 294:
[   24.902297]  kasan_save_stack+0x45/0x70
[   24.902522]  kasan_save_track+0x18/0x40
[   24.902702]  kasan_save_alloc_info+0x3b/0x50
[   24.902938]  __kasan_kmalloc+0xb7/0xc0
[   24.903136]  __kmalloc_cache_noprof+0x189/0x420
[   24.904183]  kasan_atomics+0x95/0x310
[   24.905660]  kunit_try_run_case+0x1a5/0x480
[   24.906022]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.906471]  kthread+0x337/0x6f0
[   24.906749]  ret_from_fork+0x116/0x1d0
[   24.907059]  ret_from_fork_asm+0x1a/0x30
[   24.907345] 
[   24.907513] The buggy address belongs to the object at ffff888102c1c600
[   24.907513]  which belongs to the cache kmalloc-64 of size 64
[   24.908043] The buggy address is located 0 bytes to the right of
[   24.908043]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.908502] 
[   24.908637] The buggy address belongs to the physical page:
[   24.909027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.909543] flags: 0x200000000000000(node=0|zone=2)
[   24.909907] page_type: f5(slab)
[   24.910171] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.910442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.910990] page dumped because: kasan: bad access detected
[   24.911357] 
[   24.911515] Memory state around the buggy address:
[   24.911779]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.912237]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.912613] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.913037]                                      ^
[   24.913334]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.913630]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.914108] ==================================================================
[   25.358946] ==================================================================
[   25.359472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   25.359827] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.360132] 
[   25.360298] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.360392] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.360417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.360453] Call Trace:
[   25.360479]  <TASK>
[   25.360506]  dump_stack_lvl+0x73/0xb0
[   25.360560]  print_report+0xd1/0x650
[   25.360596]  ? __virt_addr_valid+0x1db/0x2d0
[   25.360637]  ? kasan_atomics_helper+0x1467/0x5450
[   25.360697]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.360742]  ? kasan_atomics_helper+0x1467/0x5450
[   25.360782]  kasan_report+0x141/0x180
[   25.360825]  ? kasan_atomics_helper+0x1467/0x5450
[   25.360888]  kasan_check_range+0x10c/0x1c0
[   25.360928]  __kasan_check_write+0x18/0x20
[   25.360963]  kasan_atomics_helper+0x1467/0x5450
[   25.361003]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.361040]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.361083]  ? trace_hardirqs_on+0x37/0xe0
[   25.361121]  ? kasan_atomics+0x152/0x310
[   25.361164]  kasan_atomics+0x1dc/0x310
[   25.361227]  ? __pfx_kasan_atomics+0x10/0x10
[   25.361266]  ? __pfx_kasan_atomics+0x10/0x10
[   25.361314]  kunit_try_run_case+0x1a5/0x480
[   25.361360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.361413]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.361436]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.361457]  ? __kthread_parkme+0x82/0x180
[   25.361476]  ? preempt_count_sub+0x50/0x80
[   25.361497]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.361518]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.361538]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.361558]  kthread+0x337/0x6f0
[   25.361576]  ? trace_preempt_on+0x20/0xc0
[   25.361596]  ? __pfx_kthread+0x10/0x10
[   25.361613]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.361632]  ? calculate_sigpending+0x7b/0xa0
[   25.361652]  ? __pfx_kthread+0x10/0x10
[   25.361670]  ret_from_fork+0x116/0x1d0
[   25.361687]  ? __pfx_kthread+0x10/0x10
[   25.361706]  ret_from_fork_asm+0x1a/0x30
[   25.361733]  </TASK>
[   25.361744] 
[   25.369797] Allocated by task 294:
[   25.370080]  kasan_save_stack+0x45/0x70
[   25.370411]  kasan_save_track+0x18/0x40
[   25.370725]  kasan_save_alloc_info+0x3b/0x50
[   25.371154]  __kasan_kmalloc+0xb7/0xc0
[   25.371446]  __kmalloc_cache_noprof+0x189/0x420
[   25.371758]  kasan_atomics+0x95/0x310
[   25.372106]  kunit_try_run_case+0x1a5/0x480
[   25.372265]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.372460]  kthread+0x337/0x6f0
[   25.372599]  ret_from_fork+0x116/0x1d0
[   25.372741]  ret_from_fork_asm+0x1a/0x30
[   25.373092] 
[   25.373233] The buggy address belongs to the object at ffff888102c1c600
[   25.373233]  which belongs to the cache kmalloc-64 of size 64
[   25.374037] The buggy address is located 0 bytes to the right of
[   25.374037]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.374596] 
[   25.374697] The buggy address belongs to the physical page:
[   25.374874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.375118] flags: 0x200000000000000(node=0|zone=2)
[   25.375299] page_type: f5(slab)
[   25.375546] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.376119] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.376620] page dumped because: kasan: bad access detected
[   25.377011] 
[   25.377114] Memory state around the buggy address:
[   25.377358]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.377686]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.378243] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.378607]                                      ^
[   25.378786]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.379007]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.379219] ==================================================================
[   24.957861] ==================================================================
[   24.958412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   24.958896] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.959227] 
[   24.959357] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.959446] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.959471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.959505] Call Trace:
[   24.959533]  <TASK>
[   24.959561]  dump_stack_lvl+0x73/0xb0
[   24.959614]  print_report+0xd1/0x650
[   24.959655]  ? __virt_addr_valid+0x1db/0x2d0
[   24.959698]  ? kasan_atomics_helper+0x4a84/0x5450
[   24.959738]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.959786]  ? kasan_atomics_helper+0x4a84/0x5450
[   24.959854]  kasan_report+0x141/0x180
[   24.959901]  ? kasan_atomics_helper+0x4a84/0x5450
[   24.959953]  __asan_report_load4_noabort+0x18/0x20
[   24.959997]  kasan_atomics_helper+0x4a84/0x5450
[   24.960041]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.960114]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.960162]  ? trace_hardirqs_on+0x37/0xe0
[   24.960203]  ? kasan_atomics+0x152/0x310
[   24.960254]  kasan_atomics+0x1dc/0x310
[   24.960297]  ? __pfx_kasan_atomics+0x10/0x10
[   24.960342]  ? __pfx_kasan_atomics+0x10/0x10
[   24.960402]  kunit_try_run_case+0x1a5/0x480
[   24.960441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.960481]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.960523]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.960564]  ? __kthread_parkme+0x82/0x180
[   24.960605]  ? preempt_count_sub+0x50/0x80
[   24.960651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.960697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.960740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.960783]  kthread+0x337/0x6f0
[   24.960821]  ? trace_preempt_on+0x20/0xc0
[   24.960897]  ? __pfx_kthread+0x10/0x10
[   24.960939]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.960980]  ? calculate_sigpending+0x7b/0xa0
[   24.961025]  ? __pfx_kthread+0x10/0x10
[   24.961068]  ret_from_fork+0x116/0x1d0
[   24.961105]  ? __pfx_kthread+0x10/0x10
[   24.961145]  ret_from_fork_asm+0x1a/0x30
[   24.961207]  </TASK>
[   24.961231] 
[   24.972913] Allocated by task 294:
[   24.973193]  kasan_save_stack+0x45/0x70
[   24.973499]  kasan_save_track+0x18/0x40
[   24.973776]  kasan_save_alloc_info+0x3b/0x50
[   24.974086]  __kasan_kmalloc+0xb7/0xc0
[   24.974443]  __kmalloc_cache_noprof+0x189/0x420
[   24.974773]  kasan_atomics+0x95/0x310
[   24.975026]  kunit_try_run_case+0x1a5/0x480
[   24.975189]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.975371]  kthread+0x337/0x6f0
[   24.975554]  ret_from_fork+0x116/0x1d0
[   24.975700]  ret_from_fork_asm+0x1a/0x30
[   24.975880] 
[   24.976018] The buggy address belongs to the object at ffff888102c1c600
[   24.976018]  which belongs to the cache kmalloc-64 of size 64
[   24.976789] The buggy address is located 0 bytes to the right of
[   24.976789]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.977623] 
[   24.977784] The buggy address belongs to the physical page:
[   24.978193] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.978501] flags: 0x200000000000000(node=0|zone=2)
[   24.978681] page_type: f5(slab)
[   24.978818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.979329] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.979858] page dumped because: kasan: bad access detected
[   24.980194] 
[   24.980283] Memory state around the buggy address:
[   24.980461]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.980680]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.981148] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.981606]                                      ^
[   24.981956]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.982293]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.982531] ==================================================================
[   24.577315] ==================================================================
[   24.577611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   24.578414] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.578711] 
[   24.579148] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.579210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.579228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.579259] Call Trace:
[   24.579285]  <TASK>
[   24.579313]  dump_stack_lvl+0x73/0xb0
[   24.579459]  print_report+0xd1/0x650
[   24.579501]  ? __virt_addr_valid+0x1db/0x2d0
[   24.579542]  ? kasan_atomics_helper+0x4b54/0x5450
[   24.579582]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.579626]  ? kasan_atomics_helper+0x4b54/0x5450
[   24.579668]  kasan_report+0x141/0x180
[   24.579711]  ? kasan_atomics_helper+0x4b54/0x5450
[   24.579761]  __asan_report_load4_noabort+0x18/0x20
[   24.579799]  kasan_atomics_helper+0x4b54/0x5450
[   24.579824]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.579855]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.579878]  ? trace_hardirqs_on+0x37/0xe0
[   24.579897]  ? kasan_atomics+0x152/0x310
[   24.579920]  kasan_atomics+0x1dc/0x310
[   24.579939]  ? __pfx_kasan_atomics+0x10/0x10
[   24.579960]  ? __pfx_kasan_atomics+0x10/0x10
[   24.579982]  kunit_try_run_case+0x1a5/0x480
[   24.580004]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.580024]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.580044]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.580068]  ? __kthread_parkme+0x82/0x180
[   24.580094]  ? preempt_count_sub+0x50/0x80
[   24.580114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.580135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.580155]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.580176]  kthread+0x337/0x6f0
[   24.580193]  ? trace_preempt_on+0x20/0xc0
[   24.580212]  ? __pfx_kthread+0x10/0x10
[   24.580230]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.580249]  ? calculate_sigpending+0x7b/0xa0
[   24.580269]  ? __pfx_kthread+0x10/0x10
[   24.580288]  ret_from_fork+0x116/0x1d0
[   24.580306]  ? __pfx_kthread+0x10/0x10
[   24.580324]  ret_from_fork_asm+0x1a/0x30
[   24.580353]  </TASK>
[   24.580365] 
[   24.591107] Allocated by task 294:
[   24.591452]  kasan_save_stack+0x45/0x70
[   24.591825]  kasan_save_track+0x18/0x40
[   24.592145]  kasan_save_alloc_info+0x3b/0x50
[   24.592354]  __kasan_kmalloc+0xb7/0xc0
[   24.592493]  __kmalloc_cache_noprof+0x189/0x420
[   24.592964]  kasan_atomics+0x95/0x310
[   24.593346]  kunit_try_run_case+0x1a5/0x480
[   24.593619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.594095]  kthread+0x337/0x6f0
[   24.594412]  ret_from_fork+0x116/0x1d0
[   24.594575]  ret_from_fork_asm+0x1a/0x30
[   24.594997] 
[   24.595161] The buggy address belongs to the object at ffff888102c1c600
[   24.595161]  which belongs to the cache kmalloc-64 of size 64
[   24.595898] The buggy address is located 0 bytes to the right of
[   24.595898]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.596692] 
[   24.597112] The buggy address belongs to the physical page:
[   24.597472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.597917] flags: 0x200000000000000(node=0|zone=2)
[   24.598288] page_type: f5(slab)
[   24.598687] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.599312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.599607] page dumped because: kasan: bad access detected
[   24.599948] 
[   24.600082] Memory state around the buggy address:
[   24.600483]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.600843]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.601372] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.601808]                                      ^
[   24.602309]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.602806]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.603213] ==================================================================
[   25.735754] ==================================================================
[   25.736104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   25.736529] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.736956] 
[   25.737081] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.737166] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.737191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.737230] Call Trace:
[   25.737259]  <TASK>
[   25.737288]  dump_stack_lvl+0x73/0xb0
[   25.737342]  print_report+0xd1/0x650
[   25.737399]  ? __virt_addr_valid+0x1db/0x2d0
[   25.737437]  ? kasan_atomics_helper+0x1d7a/0x5450
[   25.737472]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.737514]  ? kasan_atomics_helper+0x1d7a/0x5450
[   25.737551]  kasan_report+0x141/0x180
[   25.737594]  ? kasan_atomics_helper+0x1d7a/0x5450
[   25.737644]  kasan_check_range+0x10c/0x1c0
[   25.737700]  __kasan_check_write+0x18/0x20
[   25.737739]  kasan_atomics_helper+0x1d7a/0x5450
[   25.737780]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.737821]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.737919]  ? trace_hardirqs_on+0x37/0xe0
[   25.737974]  ? kasan_atomics+0x152/0x310
[   25.738038]  kasan_atomics+0x1dc/0x310
[   25.738086]  ? __pfx_kasan_atomics+0x10/0x10
[   25.738135]  ? __pfx_kasan_atomics+0x10/0x10
[   25.738186]  kunit_try_run_case+0x1a5/0x480
[   25.738237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.738282]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.738327]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.738387]  ? __kthread_parkme+0x82/0x180
[   25.738429]  ? preempt_count_sub+0x50/0x80
[   25.738469]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.738508]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.738553]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.738597]  kthread+0x337/0x6f0
[   25.738669]  ? trace_preempt_on+0x20/0xc0
[   25.738743]  ? __pfx_kthread+0x10/0x10
[   25.738819]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.738918]  ? calculate_sigpending+0x7b/0xa0
[   25.738982]  ? __pfx_kthread+0x10/0x10
[   25.739025]  ret_from_fork+0x116/0x1d0
[   25.739060]  ? __pfx_kthread+0x10/0x10
[   25.739099]  ret_from_fork_asm+0x1a/0x30
[   25.739157]  </TASK>
[   25.739181] 
[   25.752029] Allocated by task 294:
[   25.752418]  kasan_save_stack+0x45/0x70
[   25.752696]  kasan_save_track+0x18/0x40
[   25.753052]  kasan_save_alloc_info+0x3b/0x50
[   25.753417]  __kasan_kmalloc+0xb7/0xc0
[   25.753604]  __kmalloc_cache_noprof+0x189/0x420
[   25.753894]  kasan_atomics+0x95/0x310
[   25.754403]  kunit_try_run_case+0x1a5/0x480
[   25.754856]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.755240]  kthread+0x337/0x6f0
[   25.755513]  ret_from_fork+0x116/0x1d0
[   25.755693]  ret_from_fork_asm+0x1a/0x30
[   25.755985] 
[   25.756124] The buggy address belongs to the object at ffff888102c1c600
[   25.756124]  which belongs to the cache kmalloc-64 of size 64
[   25.756565] The buggy address is located 0 bytes to the right of
[   25.756565]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.757194] 
[   25.757294] The buggy address belongs to the physical page:
[   25.757669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.758262] flags: 0x200000000000000(node=0|zone=2)
[   25.758573] page_type: f5(slab)
[   25.758857] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.759153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.759497] page dumped because: kasan: bad access detected
[   25.759853] 
[   25.760044] Memory state around the buggy address:
[   25.760204]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.760480]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.760927] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.761280]                                      ^
[   25.761572]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.761988]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.762280] ==================================================================
[   24.550175] ==================================================================
[   24.550521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   24.551116] Read of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.551697] 
[   24.551814] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.551893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.551919] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.551956] Call Trace:
[   24.551981]  <TASK>
[   24.552009]  dump_stack_lvl+0x73/0xb0
[   24.552062]  print_report+0xd1/0x650
[   24.552104]  ? __virt_addr_valid+0x1db/0x2d0
[   24.552137]  ? kasan_atomics_helper+0x3df/0x5450
[   24.552162]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.552193]  ? kasan_atomics_helper+0x3df/0x5450
[   24.552218]  kasan_report+0x141/0x180
[   24.552244]  ? kasan_atomics_helper+0x3df/0x5450
[   24.552281]  kasan_check_range+0x10c/0x1c0
[   24.552309]  __kasan_check_read+0x15/0x20
[   24.552330]  kasan_atomics_helper+0x3df/0x5450
[   24.552349]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.552368]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.552443]  ? trace_hardirqs_on+0x37/0xe0
[   24.552481]  ? kasan_atomics+0x152/0x310
[   24.552542]  kasan_atomics+0x1dc/0x310
[   24.552600]  ? __pfx_kasan_atomics+0x10/0x10
[   24.552658]  ? __pfx_kasan_atomics+0x10/0x10
[   24.552712]  kunit_try_run_case+0x1a5/0x480
[   24.552777]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.552866]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.552927]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.552974]  ? __kthread_parkme+0x82/0x180
[   24.553025]  ? preempt_count_sub+0x50/0x80
[   24.553049]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.553084]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.553106]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.553126]  kthread+0x337/0x6f0
[   24.553144]  ? trace_preempt_on+0x20/0xc0
[   24.553164]  ? __pfx_kthread+0x10/0x10
[   24.553182]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.553201]  ? calculate_sigpending+0x7b/0xa0
[   24.553222]  ? __pfx_kthread+0x10/0x10
[   24.553241]  ret_from_fork+0x116/0x1d0
[   24.553259]  ? __pfx_kthread+0x10/0x10
[   24.553277]  ret_from_fork_asm+0x1a/0x30
[   24.553305]  </TASK>
[   24.553318] 
[   24.564077] Allocated by task 294:
[   24.564315]  kasan_save_stack+0x45/0x70
[   24.564522]  kasan_save_track+0x18/0x40
[   24.564767]  kasan_save_alloc_info+0x3b/0x50
[   24.565013]  __kasan_kmalloc+0xb7/0xc0
[   24.565913]  __kmalloc_cache_noprof+0x189/0x420
[   24.566114]  kasan_atomics+0x95/0x310
[   24.566535]  kunit_try_run_case+0x1a5/0x480
[   24.566855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.567374]  kthread+0x337/0x6f0
[   24.567779]  ret_from_fork+0x116/0x1d0
[   24.568107]  ret_from_fork_asm+0x1a/0x30
[   24.568341] 
[   24.568443] The buggy address belongs to the object at ffff888102c1c600
[   24.568443]  which belongs to the cache kmalloc-64 of size 64
[   24.569316] The buggy address is located 0 bytes to the right of
[   24.569316]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.569877] 
[   24.569978] The buggy address belongs to the physical page:
[   24.570650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.571322] flags: 0x200000000000000(node=0|zone=2)
[   24.571686] page_type: f5(slab)
[   24.571824] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.572208] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.572826] page dumped because: kasan: bad access detected
[   24.573205] 
[   24.573310] Memory state around the buggy address:
[   24.573517]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.573783]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.574652] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.575244]                                      ^
[   24.575437]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.575840]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.576601] ==================================================================
[   24.655017] ==================================================================
[   24.655851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   24.656328] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.656774] 
[   24.656961] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.657039] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.657063] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.657100] Call Trace:
[   24.657125]  <TASK>
[   24.657150]  dump_stack_lvl+0x73/0xb0
[   24.657201]  print_report+0xd1/0x650
[   24.657241]  ? __virt_addr_valid+0x1db/0x2d0
[   24.657279]  ? kasan_atomics_helper+0x565/0x5450
[   24.657312]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.657354]  ? kasan_atomics_helper+0x565/0x5450
[   24.657404]  kasan_report+0x141/0x180
[   24.657442]  ? kasan_atomics_helper+0x565/0x5450
[   24.657486]  kasan_check_range+0x10c/0x1c0
[   24.657528]  __kasan_check_write+0x18/0x20
[   24.657568]  kasan_atomics_helper+0x565/0x5450
[   24.657612]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.657653]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.657698]  ? trace_hardirqs_on+0x37/0xe0
[   24.657738]  ? kasan_atomics+0x152/0x310
[   24.657776]  kasan_atomics+0x1dc/0x310
[   24.657814]  ? __pfx_kasan_atomics+0x10/0x10
[   24.657888]  ? __pfx_kasan_atomics+0x10/0x10
[   24.657935]  kunit_try_run_case+0x1a5/0x480
[   24.657984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.658035]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.658088]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.658137]  ? __kthread_parkme+0x82/0x180
[   24.658180]  ? preempt_count_sub+0x50/0x80
[   24.658223]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.658261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.658305]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.658350]  kthread+0x337/0x6f0
[   24.658403]  ? trace_preempt_on+0x20/0xc0
[   24.658447]  ? __pfx_kthread+0x10/0x10
[   24.658490]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.658533]  ? calculate_sigpending+0x7b/0xa0
[   24.658578]  ? __pfx_kthread+0x10/0x10
[   24.658620]  ret_from_fork+0x116/0x1d0
[   24.658660]  ? __pfx_kthread+0x10/0x10
[   24.658700]  ret_from_fork_asm+0x1a/0x30
[   24.658762]  </TASK>
[   24.658787] 
[   24.666910] Allocated by task 294:
[   24.667158]  kasan_save_stack+0x45/0x70
[   24.667924]  kasan_save_track+0x18/0x40
[   24.668249]  kasan_save_alloc_info+0x3b/0x50
[   24.668525]  __kasan_kmalloc+0xb7/0xc0
[   24.668694]  __kmalloc_cache_noprof+0x189/0x420
[   24.669420]  kasan_atomics+0x95/0x310
[   24.670828]  kunit_try_run_case+0x1a5/0x480
[   24.671198]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.671584]  kthread+0x337/0x6f0
[   24.671752]  ret_from_fork+0x116/0x1d0
[   24.672477]  ret_from_fork_asm+0x1a/0x30
[   24.673028] 
[   24.673206] The buggy address belongs to the object at ffff888102c1c600
[   24.673206]  which belongs to the cache kmalloc-64 of size 64
[   24.673656] The buggy address is located 0 bytes to the right of
[   24.673656]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.674713] 
[   24.674957] The buggy address belongs to the physical page:
[   24.675231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.675543] flags: 0x200000000000000(node=0|zone=2)
[   24.675753] page_type: f5(slab)
[   24.676273] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.676903] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.677114] page dumped because: kasan: bad access detected
[   24.677278] 
[   24.677338] Memory state around the buggy address:
[   24.677449]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.677567]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.677677] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.677784]                                      ^
[   24.677928]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.678188]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.678590] ==================================================================
[   25.403975] ==================================================================
[   25.404639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   25.404907] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.405859] 
[   25.406449] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.406556] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.406580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.406602] Call Trace:
[   25.406619]  <TASK>
[   25.406636]  dump_stack_lvl+0x73/0xb0
[   25.406669]  print_report+0xd1/0x650
[   25.406691]  ? __virt_addr_valid+0x1db/0x2d0
[   25.406713]  ? kasan_atomics_helper+0x151d/0x5450
[   25.406733]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.406758]  ? kasan_atomics_helper+0x151d/0x5450
[   25.406778]  kasan_report+0x141/0x180
[   25.406799]  ? kasan_atomics_helper+0x151d/0x5450
[   25.406825]  kasan_check_range+0x10c/0x1c0
[   25.406862]  __kasan_check_write+0x18/0x20
[   25.406898]  kasan_atomics_helper+0x151d/0x5450
[   25.406937]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.406978]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.407020]  ? trace_hardirqs_on+0x37/0xe0
[   25.407080]  ? kasan_atomics+0x152/0x310
[   25.407129]  kasan_atomics+0x1dc/0x310
[   25.407166]  ? __pfx_kasan_atomics+0x10/0x10
[   25.407209]  ? __pfx_kasan_atomics+0x10/0x10
[   25.407259]  kunit_try_run_case+0x1a5/0x480
[   25.407302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.407330]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.407350]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.407369]  ? __kthread_parkme+0x82/0x180
[   25.407406]  ? preempt_count_sub+0x50/0x80
[   25.407427]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.407448]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.407469]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.407489]  kthread+0x337/0x6f0
[   25.407506]  ? trace_preempt_on+0x20/0xc0
[   25.407525]  ? __pfx_kthread+0x10/0x10
[   25.407543]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.407561]  ? calculate_sigpending+0x7b/0xa0
[   25.407581]  ? __pfx_kthread+0x10/0x10
[   25.407599]  ret_from_fork+0x116/0x1d0
[   25.407616]  ? __pfx_kthread+0x10/0x10
[   25.407634]  ret_from_fork_asm+0x1a/0x30
[   25.407661]  </TASK>
[   25.407672] 
[   25.415610] Allocated by task 294:
[   25.415763]  kasan_save_stack+0x45/0x70
[   25.415925]  kasan_save_track+0x18/0x40
[   25.416216]  kasan_save_alloc_info+0x3b/0x50
[   25.416543]  __kasan_kmalloc+0xb7/0xc0
[   25.416821]  __kmalloc_cache_noprof+0x189/0x420
[   25.417141]  kasan_atomics+0x95/0x310
[   25.417496]  kunit_try_run_case+0x1a5/0x480
[   25.418651]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.419650]  kthread+0x337/0x6f0
[   25.420354]  ret_from_fork+0x116/0x1d0
[   25.420518]  ret_from_fork_asm+0x1a/0x30
[   25.420961] 
[   25.421124] The buggy address belongs to the object at ffff888102c1c600
[   25.421124]  which belongs to the cache kmalloc-64 of size 64
[   25.421760] The buggy address is located 0 bytes to the right of
[   25.421760]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.422725] 
[   25.422968] The buggy address belongs to the physical page:
[   25.423215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.423536] flags: 0x200000000000000(node=0|zone=2)
[   25.423748] page_type: f5(slab)
[   25.424281] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.424621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.425305] page dumped because: kasan: bad access detected
[   25.425705] 
[   25.425822] Memory state around the buggy address:
[   25.426346]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.426600]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.427076] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.427553]                                      ^
[   25.427886]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.428446]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.429305] ==================================================================
[   25.665931] ==================================================================
[   25.667266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   25.667677] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.668261] 
[   25.668751] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.668893] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.668913] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.668933] Call Trace:
[   25.668949]  <TASK>
[   25.668965]  dump_stack_lvl+0x73/0xb0
[   25.668996]  print_report+0xd1/0x650
[   25.669016]  ? __virt_addr_valid+0x1db/0x2d0
[   25.669036]  ? kasan_atomics_helper+0x1c18/0x5450
[   25.669054]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.669076]  ? kasan_atomics_helper+0x1c18/0x5450
[   25.669095]  kasan_report+0x141/0x180
[   25.669114]  ? kasan_atomics_helper+0x1c18/0x5450
[   25.669137]  kasan_check_range+0x10c/0x1c0
[   25.669156]  __kasan_check_write+0x18/0x20
[   25.669176]  kasan_atomics_helper+0x1c18/0x5450
[   25.669196]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.669214]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.669235]  ? trace_hardirqs_on+0x37/0xe0
[   25.669253]  ? kasan_atomics+0x152/0x310
[   25.669275]  kasan_atomics+0x1dc/0x310
[   25.669295]  ? __pfx_kasan_atomics+0x10/0x10
[   25.669315]  ? __pfx_kasan_atomics+0x10/0x10
[   25.669338]  kunit_try_run_case+0x1a5/0x480
[   25.669360]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.669396]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.669418]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.669438]  ? __kthread_parkme+0x82/0x180
[   25.669456]  ? preempt_count_sub+0x50/0x80
[   25.669477]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.669498]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.669519]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.669540]  kthread+0x337/0x6f0
[   25.669557]  ? trace_preempt_on+0x20/0xc0
[   25.669576]  ? __pfx_kthread+0x10/0x10
[   25.669595]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.669613]  ? calculate_sigpending+0x7b/0xa0
[   25.669633]  ? __pfx_kthread+0x10/0x10
[   25.669652]  ret_from_fork+0x116/0x1d0
[   25.669669]  ? __pfx_kthread+0x10/0x10
[   25.669687]  ret_from_fork_asm+0x1a/0x30
[   25.669715]  </TASK>
[   25.669726] 
[   25.677793] Allocated by task 294:
[   25.678081]  kasan_save_stack+0x45/0x70
[   25.678410]  kasan_save_track+0x18/0x40
[   25.678808]  kasan_save_alloc_info+0x3b/0x50
[   25.679095]  __kasan_kmalloc+0xb7/0xc0
[   25.679241]  __kmalloc_cache_noprof+0x189/0x420
[   25.679423]  kasan_atomics+0x95/0x310
[   25.679572]  kunit_try_run_case+0x1a5/0x480
[   25.679772]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.680206]  kthread+0x337/0x6f0
[   25.680474]  ret_from_fork+0x116/0x1d0
[   25.680742]  ret_from_fork_asm+0x1a/0x30
[   25.681046] 
[   25.681208] The buggy address belongs to the object at ffff888102c1c600
[   25.681208]  which belongs to the cache kmalloc-64 of size 64
[   25.681676] The buggy address is located 0 bytes to the right of
[   25.681676]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.682597] 
[   25.682787] The buggy address belongs to the physical page:
[   25.682974] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.683214] flags: 0x200000000000000(node=0|zone=2)
[   25.683412] page_type: f5(slab)
[   25.683648] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.684236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.684733] page dumped because: kasan: bad access detected
[   25.685131] 
[   25.685216] Memory state around the buggy address:
[   25.685391]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.685623]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.686112] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.686665]                                      ^
[   25.687039]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.687477]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.687693] ==================================================================
[   25.475628] ==================================================================
[   25.476358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   25.476902] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.477375] 
[   25.477561] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.477676] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.477704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.477741] Call Trace:
[   25.477766]  <TASK>
[   25.477809]  dump_stack_lvl+0x73/0xb0
[   25.477860]  print_report+0xd1/0x650
[   25.477899]  ? __virt_addr_valid+0x1db/0x2d0
[   25.477939]  ? kasan_atomics_helper+0x16e7/0x5450
[   25.477978]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.478037]  ? kasan_atomics_helper+0x16e7/0x5450
[   25.478084]  kasan_report+0x141/0x180
[   25.478130]  ? kasan_atomics_helper+0x16e7/0x5450
[   25.478186]  kasan_check_range+0x10c/0x1c0
[   25.478233]  __kasan_check_write+0x18/0x20
[   25.478277]  kasan_atomics_helper+0x16e7/0x5450
[   25.478325]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.478371]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.478435]  ? trace_hardirqs_on+0x37/0xe0
[   25.478480]  ? kasan_atomics+0x152/0x310
[   25.478527]  kasan_atomics+0x1dc/0x310
[   25.478570]  ? __pfx_kasan_atomics+0x10/0x10
[   25.478614]  ? __pfx_kasan_atomics+0x10/0x10
[   25.478665]  kunit_try_run_case+0x1a5/0x480
[   25.478717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.478763]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.478810]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.478854]  ? __kthread_parkme+0x82/0x180
[   25.478919]  ? preempt_count_sub+0x50/0x80
[   25.478967]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.479016]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.479065]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.479111]  kthread+0x337/0x6f0
[   25.479151]  ? trace_preempt_on+0x20/0xc0
[   25.479194]  ? __pfx_kthread+0x10/0x10
[   25.479234]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.479277]  ? calculate_sigpending+0x7b/0xa0
[   25.479321]  ? __pfx_kthread+0x10/0x10
[   25.479364]  ret_from_fork+0x116/0x1d0
[   25.479424]  ? __pfx_kthread+0x10/0x10
[   25.479466]  ret_from_fork_asm+0x1a/0x30
[   25.479525]  </TASK>
[   25.479549] 
[   25.490655] Allocated by task 294:
[   25.490819]  kasan_save_stack+0x45/0x70
[   25.491009]  kasan_save_track+0x18/0x40
[   25.491158]  kasan_save_alloc_info+0x3b/0x50
[   25.491531]  __kasan_kmalloc+0xb7/0xc0
[   25.491888]  __kmalloc_cache_noprof+0x189/0x420
[   25.492240]  kasan_atomics+0x95/0x310
[   25.492525]  kunit_try_run_case+0x1a5/0x480
[   25.492909]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.493303]  kthread+0x337/0x6f0
[   25.493625]  ret_from_fork+0x116/0x1d0
[   25.493962]  ret_from_fork_asm+0x1a/0x30
[   25.494186] 
[   25.494287] The buggy address belongs to the object at ffff888102c1c600
[   25.494287]  which belongs to the cache kmalloc-64 of size 64
[   25.494796] The buggy address is located 0 bytes to the right of
[   25.494796]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.495498] 
[   25.495645] The buggy address belongs to the physical page:
[   25.495821] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.496310] flags: 0x200000000000000(node=0|zone=2)
[   25.496509] page_type: f5(slab)
[   25.496648] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.497142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.497458] page dumped because: kasan: bad access detected
[   25.497741] 
[   25.497854] Memory state around the buggy address:
[   25.498195]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.498536]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.498968] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.499305]                                      ^
[   25.499486]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.499702]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.500191] ==================================================================
[   24.813872] ==================================================================
[   24.814308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   24.814584] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.815682] 
[   24.815963] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.816047] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.816073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.816105] Call Trace:
[   24.816216]  <TASK>
[   24.816236]  dump_stack_lvl+0x73/0xb0
[   24.816270]  print_report+0xd1/0x650
[   24.816295]  ? __virt_addr_valid+0x1db/0x2d0
[   24.816327]  ? kasan_atomics_helper+0x8f9/0x5450
[   24.816346]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.816369]  ? kasan_atomics_helper+0x8f9/0x5450
[   24.816407]  kasan_report+0x141/0x180
[   24.816428]  ? kasan_atomics_helper+0x8f9/0x5450
[   24.816451]  kasan_check_range+0x10c/0x1c0
[   24.816471]  __kasan_check_write+0x18/0x20
[   24.816490]  kasan_atomics_helper+0x8f9/0x5450
[   24.816511]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.816530]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.816550]  ? trace_hardirqs_on+0x37/0xe0
[   24.816569]  ? kasan_atomics+0x152/0x310
[   24.816591]  kasan_atomics+0x1dc/0x310
[   24.816611]  ? __pfx_kasan_atomics+0x10/0x10
[   24.816630]  ? __pfx_kasan_atomics+0x10/0x10
[   24.816653]  kunit_try_run_case+0x1a5/0x480
[   24.816674]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.816693]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.816713]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.816733]  ? __kthread_parkme+0x82/0x180
[   24.816751]  ? preempt_count_sub+0x50/0x80
[   24.816772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.816793]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.816812]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.816837]  kthread+0x337/0x6f0
[   24.816869]  ? trace_preempt_on+0x20/0xc0
[   24.816888]  ? __pfx_kthread+0x10/0x10
[   24.816906]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.816924]  ? calculate_sigpending+0x7b/0xa0
[   24.816944]  ? __pfx_kthread+0x10/0x10
[   24.816963]  ret_from_fork+0x116/0x1d0
[   24.816980]  ? __pfx_kthread+0x10/0x10
[   24.816998]  ret_from_fork_asm+0x1a/0x30
[   24.817026]  </TASK>
[   24.817037] 
[   24.828371] Allocated by task 294:
[   24.828585]  kasan_save_stack+0x45/0x70
[   24.828861]  kasan_save_track+0x18/0x40
[   24.829635]  kasan_save_alloc_info+0x3b/0x50
[   24.829846]  __kasan_kmalloc+0xb7/0xc0
[   24.830002]  __kmalloc_cache_noprof+0x189/0x420
[   24.830535]  kasan_atomics+0x95/0x310
[   24.830691]  kunit_try_run_case+0x1a5/0x480
[   24.831261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.831610]  kthread+0x337/0x6f0
[   24.831973]  ret_from_fork+0x116/0x1d0
[   24.832129]  ret_from_fork_asm+0x1a/0x30
[   24.832512] 
[   24.832675] The buggy address belongs to the object at ffff888102c1c600
[   24.832675]  which belongs to the cache kmalloc-64 of size 64
[   24.833224] The buggy address is located 0 bytes to the right of
[   24.833224]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.833844] 
[   24.833982] The buggy address belongs to the physical page:
[   24.834239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.835076] flags: 0x200000000000000(node=0|zone=2)
[   24.835375] page_type: f5(slab)
[   24.835768] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.836286] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.836740] page dumped because: kasan: bad access detected
[   24.837130] 
[   24.837214] Memory state around the buggy address:
[   24.837683]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.838079]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.838587] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.838962]                                      ^
[   24.839405]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.839674]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.840288] ==================================================================
[   25.833492] ==================================================================
[   25.833864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   25.834523] Read of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.834971] 
[   25.835147] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.835231] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.835256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.835291] Call Trace:
[   25.835326]  <TASK>
[   25.835353]  dump_stack_lvl+0x73/0xb0
[   25.835433]  print_report+0xd1/0x650
[   25.835474]  ? __virt_addr_valid+0x1db/0x2d0
[   25.835513]  ? kasan_atomics_helper+0x4f71/0x5450
[   25.835553]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.835594]  ? kasan_atomics_helper+0x4f71/0x5450
[   25.835635]  kasan_report+0x141/0x180
[   25.835675]  ? kasan_atomics_helper+0x4f71/0x5450
[   25.835725]  __asan_report_load8_noabort+0x18/0x20
[   25.835770]  kasan_atomics_helper+0x4f71/0x5450
[   25.835813]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.835861]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.835908]  ? trace_hardirqs_on+0x37/0xe0
[   25.835943]  ? kasan_atomics+0x152/0x310
[   25.836005]  kasan_atomics+0x1dc/0x310
[   25.836049]  ? __pfx_kasan_atomics+0x10/0x10
[   25.836091]  ? __pfx_kasan_atomics+0x10/0x10
[   25.836142]  kunit_try_run_case+0x1a5/0x480
[   25.836188]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.836231]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.836274]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.836317]  ? __kthread_parkme+0x82/0x180
[   25.836353]  ? preempt_count_sub+0x50/0x80
[   25.836412]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.836457]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.836511]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.836553]  kthread+0x337/0x6f0
[   25.836588]  ? trace_preempt_on+0x20/0xc0
[   25.836634]  ? __pfx_kthread+0x10/0x10
[   25.836674]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.836726]  ? calculate_sigpending+0x7b/0xa0
[   25.836769]  ? __pfx_kthread+0x10/0x10
[   25.836807]  ret_from_fork+0x116/0x1d0
[   25.836849]  ? __pfx_kthread+0x10/0x10
[   25.836898]  ret_from_fork_asm+0x1a/0x30
[   25.836953]  </TASK>
[   25.836976] 
[   25.845343] Allocated by task 294:
[   25.845629]  kasan_save_stack+0x45/0x70
[   25.845981]  kasan_save_track+0x18/0x40
[   25.846229]  kasan_save_alloc_info+0x3b/0x50
[   25.846469]  __kasan_kmalloc+0xb7/0xc0
[   25.846629]  __kmalloc_cache_noprof+0x189/0x420
[   25.846964]  kasan_atomics+0x95/0x310
[   25.847255]  kunit_try_run_case+0x1a5/0x480
[   25.847578]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.847863]  kthread+0x337/0x6f0
[   25.848158]  ret_from_fork+0x116/0x1d0
[   25.848309]  ret_from_fork_asm+0x1a/0x30
[   25.848572] 
[   25.848720] The buggy address belongs to the object at ffff888102c1c600
[   25.848720]  which belongs to the cache kmalloc-64 of size 64
[   25.849486] The buggy address is located 0 bytes to the right of
[   25.849486]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.850301] 
[   25.850406] The buggy address belongs to the physical page:
[   25.850590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.850841] flags: 0x200000000000000(node=0|zone=2)
[   25.851024] page_type: f5(slab)
[   25.851161] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.851418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.851929] page dumped because: kasan: bad access detected
[   25.852291] 
[   25.852443] Memory state around the buggy address:
[   25.852784]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.853279]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.853765] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.854282]                                      ^
[   25.854597]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.854839]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.855307] ==================================================================
[   24.629667] ==================================================================
[   24.630702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   24.631749] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.632356] 
[   24.632510] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.632593] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.632612] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.632646] Call Trace:
[   24.632672]  <TASK>
[   24.632697]  dump_stack_lvl+0x73/0xb0
[   24.632749]  print_report+0xd1/0x650
[   24.632787]  ? __virt_addr_valid+0x1db/0x2d0
[   24.632821]  ? kasan_atomics_helper+0x4b3a/0x5450
[   24.632853]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.633200]  ? kasan_atomics_helper+0x4b3a/0x5450
[   24.633228]  kasan_report+0x141/0x180
[   24.633250]  ? kasan_atomics_helper+0x4b3a/0x5450
[   24.633283]  __asan_report_store4_noabort+0x1b/0x30
[   24.633339]  kasan_atomics_helper+0x4b3a/0x5450
[   24.633360]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.633397]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.633421]  ? trace_hardirqs_on+0x37/0xe0
[   24.633440]  ? kasan_atomics+0x152/0x310
[   24.633463]  kasan_atomics+0x1dc/0x310
[   24.633482]  ? __pfx_kasan_atomics+0x10/0x10
[   24.633502]  ? __pfx_kasan_atomics+0x10/0x10
[   24.633525]  kunit_try_run_case+0x1a5/0x480
[   24.633547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.633566]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.633585]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.633605]  ? __kthread_parkme+0x82/0x180
[   24.633623]  ? preempt_count_sub+0x50/0x80
[   24.633644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.633665]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.633685]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.633706]  kthread+0x337/0x6f0
[   24.633723]  ? trace_preempt_on+0x20/0xc0
[   24.633742]  ? __pfx_kthread+0x10/0x10
[   24.633760]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.633778]  ? calculate_sigpending+0x7b/0xa0
[   24.633798]  ? __pfx_kthread+0x10/0x10
[   24.633817]  ret_from_fork+0x116/0x1d0
[   24.633847]  ? __pfx_kthread+0x10/0x10
[   24.633868]  ret_from_fork_asm+0x1a/0x30
[   24.633896]  </TASK>
[   24.633908] 
[   24.644263] Allocated by task 294:
[   24.644526]  kasan_save_stack+0x45/0x70
[   24.644804]  kasan_save_track+0x18/0x40
[   24.645652]  kasan_save_alloc_info+0x3b/0x50
[   24.645932]  __kasan_kmalloc+0xb7/0xc0
[   24.646157]  __kmalloc_cache_noprof+0x189/0x420
[   24.646422]  kasan_atomics+0x95/0x310
[   24.646698]  kunit_try_run_case+0x1a5/0x480
[   24.646938]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.647564]  kthread+0x337/0x6f0
[   24.647720]  ret_from_fork+0x116/0x1d0
[   24.648001]  ret_from_fork_asm+0x1a/0x30
[   24.648209] 
[   24.648306] The buggy address belongs to the object at ffff888102c1c600
[   24.648306]  which belongs to the cache kmalloc-64 of size 64
[   24.648820] The buggy address is located 0 bytes to the right of
[   24.648820]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.649355] 
[   24.649509] The buggy address belongs to the physical page:
[   24.649776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.650033] flags: 0x200000000000000(node=0|zone=2)
[   24.650226] page_type: f5(slab)
[   24.650491] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.651009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.651278] page dumped because: kasan: bad access detected
[   24.651640] 
[   24.651783] Memory state around the buggy address:
[   24.652076]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.652409]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.652709] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.653074]                                      ^
[   24.653401]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.653669]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.653957] ==================================================================
[   25.905976] ==================================================================
[   25.906268] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   25.906547] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.906795] 
[   25.906971] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.907061] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.907086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.907127] Call Trace:
[   25.907154]  <TASK>
[   25.907183]  dump_stack_lvl+0x73/0xb0
[   25.907235]  print_report+0xd1/0x650
[   25.907275]  ? __virt_addr_valid+0x1db/0x2d0
[   25.907318]  ? kasan_atomics_helper+0x20c8/0x5450
[   25.907358]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.908037]  ? kasan_atomics_helper+0x20c8/0x5450
[   25.908087]  kasan_report+0x141/0x180
[   25.908128]  ? kasan_atomics_helper+0x20c8/0x5450
[   25.908173]  kasan_check_range+0x10c/0x1c0
[   25.908211]  __kasan_check_write+0x18/0x20
[   25.908250]  kasan_atomics_helper+0x20c8/0x5450
[   25.908284]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.908321]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.908363]  ? trace_hardirqs_on+0x37/0xe0
[   25.908416]  ? kasan_atomics+0x152/0x310
[   25.908465]  kasan_atomics+0x1dc/0x310
[   25.908508]  ? __pfx_kasan_atomics+0x10/0x10
[   25.908552]  ? __pfx_kasan_atomics+0x10/0x10
[   25.908604]  kunit_try_run_case+0x1a5/0x480
[   25.908651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.908694]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.908737]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.908781]  ? __kthread_parkme+0x82/0x180
[   25.908819]  ? preempt_count_sub+0x50/0x80
[   25.908863]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.908908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.908954]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.908995]  kthread+0x337/0x6f0
[   25.909034]  ? trace_preempt_on+0x20/0xc0
[   25.909075]  ? __pfx_kthread+0x10/0x10
[   25.909116]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.909167]  ? calculate_sigpending+0x7b/0xa0
[   25.909205]  ? __pfx_kthread+0x10/0x10
[   25.909237]  ret_from_fork+0x116/0x1d0
[   25.909271]  ? __pfx_kthread+0x10/0x10
[   25.909307]  ret_from_fork_asm+0x1a/0x30
[   25.909352]  </TASK>
[   25.909365] 
[   25.918099] Allocated by task 294:
[   25.918286]  kasan_save_stack+0x45/0x70
[   25.918521]  kasan_save_track+0x18/0x40
[   25.918737]  kasan_save_alloc_info+0x3b/0x50
[   25.918991]  __kasan_kmalloc+0xb7/0xc0
[   25.919263]  __kmalloc_cache_noprof+0x189/0x420
[   25.919597]  kasan_atomics+0x95/0x310
[   25.919746]  kunit_try_run_case+0x1a5/0x480
[   25.919904]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.920115]  kthread+0x337/0x6f0
[   25.920252]  ret_from_fork+0x116/0x1d0
[   25.920426]  ret_from_fork_asm+0x1a/0x30
[   25.920781] 
[   25.920942] The buggy address belongs to the object at ffff888102c1c600
[   25.920942]  which belongs to the cache kmalloc-64 of size 64
[   25.921681] The buggy address is located 0 bytes to the right of
[   25.921681]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.922601] 
[   25.922684] The buggy address belongs to the physical page:
[   25.922985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.923289] flags: 0x200000000000000(node=0|zone=2)
[   25.923599] page_type: f5(slab)
[   25.923836] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.924354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.924589] page dumped because: kasan: bad access detected
[   25.924915] 
[   25.925038] Memory state around the buggy address:
[   25.925352]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.925793]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.926125] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.926565]                                      ^
[   25.926743]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.926972]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.927184] ==================================================================
[   25.978027] ==================================================================
[   25.978467] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   25.978754] Read of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.979222] 
[   25.980159] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.980254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.980278] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.980437] Call Trace:
[   25.980473]  <TASK>
[   25.980565]  dump_stack_lvl+0x73/0xb0
[   25.980607]  print_report+0xd1/0x650
[   25.980629]  ? __virt_addr_valid+0x1db/0x2d0
[   25.980649]  ? kasan_atomics_helper+0x4fa5/0x5450
[   25.980669]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.980691]  ? kasan_atomics_helper+0x4fa5/0x5450
[   25.980710]  kasan_report+0x141/0x180
[   25.980729]  ? kasan_atomics_helper+0x4fa5/0x5450
[   25.980752]  __asan_report_load8_noabort+0x18/0x20
[   25.980773]  kasan_atomics_helper+0x4fa5/0x5450
[   25.980793]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.980813]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.980855]  ? trace_hardirqs_on+0x37/0xe0
[   25.980875]  ? kasan_atomics+0x152/0x310
[   25.980898]  kasan_atomics+0x1dc/0x310
[   25.980917]  ? __pfx_kasan_atomics+0x10/0x10
[   25.980937]  ? __pfx_kasan_atomics+0x10/0x10
[   25.980959]  kunit_try_run_case+0x1a5/0x480
[   25.980980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.981000]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.981019]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.981039]  ? __kthread_parkme+0x82/0x180
[   25.981056]  ? preempt_count_sub+0x50/0x80
[   25.981077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.981098]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.981118]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.981138]  kthread+0x337/0x6f0
[   25.981156]  ? trace_preempt_on+0x20/0xc0
[   25.981176]  ? __pfx_kthread+0x10/0x10
[   25.981194]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.981213]  ? calculate_sigpending+0x7b/0xa0
[   25.981233]  ? __pfx_kthread+0x10/0x10
[   25.981252]  ret_from_fork+0x116/0x1d0
[   25.981269]  ? __pfx_kthread+0x10/0x10
[   25.981287]  ret_from_fork_asm+0x1a/0x30
[   25.981313]  </TASK>
[   25.981324] 
[   25.990760] Allocated by task 294:
[   25.990999]  kasan_save_stack+0x45/0x70
[   25.991363]  kasan_save_track+0x18/0x40
[   25.991696]  kasan_save_alloc_info+0x3b/0x50
[   25.991953]  __kasan_kmalloc+0xb7/0xc0
[   25.992102]  __kmalloc_cache_noprof+0x189/0x420
[   25.992268]  kasan_atomics+0x95/0x310
[   25.992457]  kunit_try_run_case+0x1a5/0x480
[   25.992752]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.993121]  kthread+0x337/0x6f0
[   25.993366]  ret_from_fork+0x116/0x1d0
[   25.993724]  ret_from_fork_asm+0x1a/0x30
[   25.994054] 
[   25.994216] The buggy address belongs to the object at ffff888102c1c600
[   25.994216]  which belongs to the cache kmalloc-64 of size 64
[   25.994592] The buggy address is located 0 bytes to the right of
[   25.994592]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.995101] 
[   25.995262] The buggy address belongs to the physical page:
[   25.995719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.996250] flags: 0x200000000000000(node=0|zone=2)
[   25.996609] page_type: f5(slab)
[   25.996899] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.997374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.997765] page dumped because: kasan: bad access detected
[   25.998151] 
[   25.998324] Memory state around the buggy address:
[   25.998627]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.999095]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.999336] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.999727]                                      ^
[   26.000183]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.000660]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.001069] ==================================================================
[   25.501024] ==================================================================
[   25.501346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   25.501805] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.502139] 
[   25.502319] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.502420] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.502451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.502487] Call Trace:
[   25.502515]  <TASK>
[   25.502544]  dump_stack_lvl+0x73/0xb0
[   25.502596]  print_report+0xd1/0x650
[   25.502636]  ? __virt_addr_valid+0x1db/0x2d0
[   25.502676]  ? kasan_atomics_helper+0x177f/0x5450
[   25.502713]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.502756]  ? kasan_atomics_helper+0x177f/0x5450
[   25.502792]  kasan_report+0x141/0x180
[   25.502865]  ? kasan_atomics_helper+0x177f/0x5450
[   25.502918]  kasan_check_range+0x10c/0x1c0
[   25.502962]  __kasan_check_write+0x18/0x20
[   25.502998]  kasan_atomics_helper+0x177f/0x5450
[   25.503034]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.503071]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.503111]  ? trace_hardirqs_on+0x37/0xe0
[   25.503150]  ? kasan_atomics+0x152/0x310
[   25.503196]  kasan_atomics+0x1dc/0x310
[   25.503239]  ? __pfx_kasan_atomics+0x10/0x10
[   25.503282]  ? __pfx_kasan_atomics+0x10/0x10
[   25.503327]  kunit_try_run_case+0x1a5/0x480
[   25.503370]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.503423]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.503461]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.503505]  ? __kthread_parkme+0x82/0x180
[   25.503545]  ? preempt_count_sub+0x50/0x80
[   25.503591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.503637]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.503682]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.503722]  kthread+0x337/0x6f0
[   25.503752]  ? trace_preempt_on+0x20/0xc0
[   25.503786]  ? __pfx_kthread+0x10/0x10
[   25.503822]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.503890]  ? calculate_sigpending+0x7b/0xa0
[   25.503931]  ? __pfx_kthread+0x10/0x10
[   25.503970]  ret_from_fork+0x116/0x1d0
[   25.504004]  ? __pfx_kthread+0x10/0x10
[   25.504041]  ret_from_fork_asm+0x1a/0x30
[   25.504101]  </TASK>
[   25.504126] 
[   25.512037] Allocated by task 294:
[   25.512305]  kasan_save_stack+0x45/0x70
[   25.512590]  kasan_save_track+0x18/0x40
[   25.512875]  kasan_save_alloc_info+0x3b/0x50
[   25.513140]  __kasan_kmalloc+0xb7/0xc0
[   25.513345]  __kmalloc_cache_noprof+0x189/0x420
[   25.513641]  kasan_atomics+0x95/0x310
[   25.513788]  kunit_try_run_case+0x1a5/0x480
[   25.513976]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.514181]  kthread+0x337/0x6f0
[   25.514348]  ret_from_fork+0x116/0x1d0
[   25.514625]  ret_from_fork_asm+0x1a/0x30
[   25.514940] 
[   25.515089] The buggy address belongs to the object at ffff888102c1c600
[   25.515089]  which belongs to the cache kmalloc-64 of size 64
[   25.515852] The buggy address is located 0 bytes to the right of
[   25.515852]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.516321] 
[   25.516480] The buggy address belongs to the physical page:
[   25.516717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.517064] flags: 0x200000000000000(node=0|zone=2)
[   25.517247] page_type: f5(slab)
[   25.517480] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.517970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.518341] page dumped because: kasan: bad access detected
[   25.518585] 
[   25.518675] Memory state around the buggy address:
[   25.518863]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.519082]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.519298] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.519707]                                      ^
[   25.520044]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.520543]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.521028] ==================================================================
[   25.125258] ==================================================================
[   25.125854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   25.126402] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.126956] 
[   25.127148] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.127230] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.127256] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.127292] Call Trace:
[   25.127331]  <TASK>
[   25.127360]  dump_stack_lvl+0x73/0xb0
[   25.127440]  print_report+0xd1/0x650
[   25.127493]  ? __virt_addr_valid+0x1db/0x2d0
[   25.127546]  ? kasan_atomics_helper+0x1079/0x5450
[   25.127596]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.127652]  ? kasan_atomics_helper+0x1079/0x5450
[   25.127697]  kasan_report+0x141/0x180
[   25.127749]  ? kasan_atomics_helper+0x1079/0x5450
[   25.127808]  kasan_check_range+0x10c/0x1c0
[   25.127901]  __kasan_check_write+0x18/0x20
[   25.127947]  kasan_atomics_helper+0x1079/0x5450
[   25.127999]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.128051]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.128105]  ? trace_hardirqs_on+0x37/0xe0
[   25.128147]  ? kasan_atomics+0x152/0x310
[   25.128199]  kasan_atomics+0x1dc/0x310
[   25.128234]  ? __pfx_kasan_atomics+0x10/0x10
[   25.128270]  ? __pfx_kasan_atomics+0x10/0x10
[   25.128316]  kunit_try_run_case+0x1a5/0x480
[   25.128362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.128415]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.128458]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.128503]  ? __kthread_parkme+0x82/0x180
[   25.128544]  ? preempt_count_sub+0x50/0x80
[   25.128590]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.128636]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.128682]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.128728]  kthread+0x337/0x6f0
[   25.128765]  ? trace_preempt_on+0x20/0xc0
[   25.128808]  ? __pfx_kthread+0x10/0x10
[   25.128879]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.128923]  ? calculate_sigpending+0x7b/0xa0
[   25.128968]  ? __pfx_kthread+0x10/0x10
[   25.129012]  ret_from_fork+0x116/0x1d0
[   25.129051]  ? __pfx_kthread+0x10/0x10
[   25.129092]  ret_from_fork_asm+0x1a/0x30
[   25.129153]  </TASK>
[   25.129178] 
[   25.137781] Allocated by task 294:
[   25.138128]  kasan_save_stack+0x45/0x70
[   25.138543]  kasan_save_track+0x18/0x40
[   25.138894]  kasan_save_alloc_info+0x3b/0x50
[   25.139191]  __kasan_kmalloc+0xb7/0xc0
[   25.139341]  __kmalloc_cache_noprof+0x189/0x420
[   25.139502]  kasan_atomics+0x95/0x310
[   25.139735]  kunit_try_run_case+0x1a5/0x480
[   25.140107]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.140565]  kthread+0x337/0x6f0
[   25.140908]  ret_from_fork+0x116/0x1d0
[   25.141244]  ret_from_fork_asm+0x1a/0x30
[   25.141551] 
[   25.141709] The buggy address belongs to the object at ffff888102c1c600
[   25.141709]  which belongs to the cache kmalloc-64 of size 64
[   25.142588] The buggy address is located 0 bytes to the right of
[   25.142588]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.143491] 
[   25.143669] The buggy address belongs to the physical page:
[   25.144073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.144654] flags: 0x200000000000000(node=0|zone=2)
[   25.144853] page_type: f5(slab)
[   25.145116] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.145643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.146007] page dumped because: kasan: bad access detected
[   25.146200] 
[   25.146281] Memory state around the buggy address:
[   25.146433]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.146971]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.147488] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.148027]                                      ^
[   25.148468]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.149049]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.149553] ==================================================================
[   25.312091] ==================================================================
[   25.312867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   25.313364] Read of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.313769] 
[   25.313933] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.314027] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.314054] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.314093] Call Trace:
[   25.314121]  <TASK>
[   25.314168]  dump_stack_lvl+0x73/0xb0
[   25.314226]  print_report+0xd1/0x650
[   25.314266]  ? __virt_addr_valid+0x1db/0x2d0
[   25.314305]  ? kasan_atomics_helper+0x13b5/0x5450
[   25.314340]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.314401]  ? kasan_atomics_helper+0x13b5/0x5450
[   25.314463]  kasan_report+0x141/0x180
[   25.314504]  ? kasan_atomics_helper+0x13b5/0x5450
[   25.314554]  kasan_check_range+0x10c/0x1c0
[   25.314593]  __kasan_check_read+0x15/0x20
[   25.314634]  kasan_atomics_helper+0x13b5/0x5450
[   25.314676]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.314721]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.314784]  ? trace_hardirqs_on+0x37/0xe0
[   25.314825]  ? kasan_atomics+0x152/0x310
[   25.314869]  kasan_atomics+0x1dc/0x310
[   25.314909]  ? __pfx_kasan_atomics+0x10/0x10
[   25.314948]  ? __pfx_kasan_atomics+0x10/0x10
[   25.314997]  kunit_try_run_case+0x1a5/0x480
[   25.315044]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.315088]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.315126]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.315165]  ? __kthread_parkme+0x82/0x180
[   25.315204]  ? preempt_count_sub+0x50/0x80
[   25.315248]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.315313]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.315362]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.315418]  kthread+0x337/0x6f0
[   25.315458]  ? trace_preempt_on+0x20/0xc0
[   25.315498]  ? __pfx_kthread+0x10/0x10
[   25.315518]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.315537]  ? calculate_sigpending+0x7b/0xa0
[   25.315559]  ? __pfx_kthread+0x10/0x10
[   25.315578]  ret_from_fork+0x116/0x1d0
[   25.315596]  ? __pfx_kthread+0x10/0x10
[   25.315614]  ret_from_fork_asm+0x1a/0x30
[   25.315642]  </TASK>
[   25.315653] 
[   25.324010] Allocated by task 294:
[   25.324373]  kasan_save_stack+0x45/0x70
[   25.324686]  kasan_save_track+0x18/0x40
[   25.325507]  kasan_save_alloc_info+0x3b/0x50
[   25.325728]  __kasan_kmalloc+0xb7/0xc0
[   25.326175]  __kmalloc_cache_noprof+0x189/0x420
[   25.326430]  kasan_atomics+0x95/0x310
[   25.326579]  kunit_try_run_case+0x1a5/0x480
[   25.326740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.326922]  kthread+0x337/0x6f0
[   25.327060]  ret_from_fork+0x116/0x1d0
[   25.327319]  ret_from_fork_asm+0x1a/0x30
[   25.327619] 
[   25.327766] The buggy address belongs to the object at ffff888102c1c600
[   25.327766]  which belongs to the cache kmalloc-64 of size 64
[   25.328527] The buggy address is located 0 bytes to the right of
[   25.328527]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.329503] 
[   25.329641] The buggy address belongs to the physical page:
[   25.329833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.330321] flags: 0x200000000000000(node=0|zone=2)
[   25.330578] page_type: f5(slab)
[   25.330829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.331101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.331328] page dumped because: kasan: bad access detected
[   25.331703] 
[   25.331841] Memory state around the buggy address:
[   25.332266]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.332665]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.333224] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.333534]                                      ^
[   25.333762]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.334182]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.334429] ==================================================================
[   24.914778] ==================================================================
[   24.915245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   24.915631] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.916050] 
[   24.916217] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.916300] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.916327] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.916364] Call Trace:
[   24.916447]  <TASK>
[   24.916493]  dump_stack_lvl+0x73/0xb0
[   24.916546]  print_report+0xd1/0x650
[   24.916599]  ? __virt_addr_valid+0x1db/0x2d0
[   24.916633]  ? kasan_atomics_helper+0xb6a/0x5450
[   24.916668]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.916707]  ? kasan_atomics_helper+0xb6a/0x5450
[   24.916745]  kasan_report+0x141/0x180
[   24.916801]  ? kasan_atomics_helper+0xb6a/0x5450
[   24.916874]  kasan_check_range+0x10c/0x1c0
[   24.916919]  __kasan_check_write+0x18/0x20
[   24.916962]  kasan_atomics_helper+0xb6a/0x5450
[   24.917004]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.917045]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.917090]  ? trace_hardirqs_on+0x37/0xe0
[   24.917130]  ? kasan_atomics+0x152/0x310
[   24.917180]  kasan_atomics+0x1dc/0x310
[   24.917223]  ? __pfx_kasan_atomics+0x10/0x10
[   24.917267]  ? __pfx_kasan_atomics+0x10/0x10
[   24.917312]  kunit_try_run_case+0x1a5/0x480
[   24.917358]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.917414]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.917458]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.917502]  ? __kthread_parkme+0x82/0x180
[   24.917541]  ? preempt_count_sub+0x50/0x80
[   24.917586]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.917627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.917650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.917672]  kthread+0x337/0x6f0
[   24.917689]  ? trace_preempt_on+0x20/0xc0
[   24.917709]  ? __pfx_kthread+0x10/0x10
[   24.917727]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.917745]  ? calculate_sigpending+0x7b/0xa0
[   24.917769]  ? __pfx_kthread+0x10/0x10
[   24.917803]  ret_from_fork+0x116/0x1d0
[   24.917861]  ? __pfx_kthread+0x10/0x10
[   24.917893]  ret_from_fork_asm+0x1a/0x30
[   24.917947]  </TASK>
[   24.917968] 
[   24.926314] Allocated by task 294:
[   24.926638]  kasan_save_stack+0x45/0x70
[   24.927003]  kasan_save_track+0x18/0x40
[   24.927288]  kasan_save_alloc_info+0x3b/0x50
[   24.927589]  __kasan_kmalloc+0xb7/0xc0
[   24.927880]  __kmalloc_cache_noprof+0x189/0x420
[   24.928126]  kasan_atomics+0x95/0x310
[   24.928281]  kunit_try_run_case+0x1a5/0x480
[   24.928536]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.928955]  kthread+0x337/0x6f0
[   24.929210]  ret_from_fork+0x116/0x1d0
[   24.929486]  ret_from_fork_asm+0x1a/0x30
[   24.929742] 
[   24.929918] The buggy address belongs to the object at ffff888102c1c600
[   24.929918]  which belongs to the cache kmalloc-64 of size 64
[   24.930311] The buggy address is located 0 bytes to the right of
[   24.930311]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.931172] 
[   24.931324] The buggy address belongs to the physical page:
[   24.931531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.931920] flags: 0x200000000000000(node=0|zone=2)
[   24.932237] page_type: f5(slab)
[   24.932514] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.932905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.933201] page dumped because: kasan: bad access detected
[   24.933396] 
[   24.933552] Memory state around the buggy address:
[   24.933907]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.934372]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.935242] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.935482]                                      ^
[   24.935646]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.935862]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.936074] ==================================================================
[   25.429805] ==================================================================
[   25.430527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   25.431410] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.431709] 
[   25.431867] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.431946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.431960] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.431980] Call Trace:
[   25.431995]  <TASK>
[   25.432011]  dump_stack_lvl+0x73/0xb0
[   25.432042]  print_report+0xd1/0x650
[   25.432062]  ? __virt_addr_valid+0x1db/0x2d0
[   25.432083]  ? kasan_atomics_helper+0x15b6/0x5450
[   25.432117]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.432140]  ? kasan_atomics_helper+0x15b6/0x5450
[   25.432159]  kasan_report+0x141/0x180
[   25.432178]  ? kasan_atomics_helper+0x15b6/0x5450
[   25.432201]  kasan_check_range+0x10c/0x1c0
[   25.432221]  __kasan_check_write+0x18/0x20
[   25.432241]  kasan_atomics_helper+0x15b6/0x5450
[   25.432261]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.432279]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.432300]  ? trace_hardirqs_on+0x37/0xe0
[   25.432319]  ? kasan_atomics+0x152/0x310
[   25.432341]  kasan_atomics+0x1dc/0x310
[   25.432360]  ? __pfx_kasan_atomics+0x10/0x10
[   25.432398]  ? __pfx_kasan_atomics+0x10/0x10
[   25.432728]  kunit_try_run_case+0x1a5/0x480
[   25.432756]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.432777]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.432798]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.432818]  ? __kthread_parkme+0x82/0x180
[   25.432859]  ? preempt_count_sub+0x50/0x80
[   25.432880]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.432901]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.432923]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.432944]  kthread+0x337/0x6f0
[   25.432962]  ? trace_preempt_on+0x20/0xc0
[   25.432982]  ? __pfx_kthread+0x10/0x10
[   25.433000]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.433018]  ? calculate_sigpending+0x7b/0xa0
[   25.433039]  ? __pfx_kthread+0x10/0x10
[   25.433057]  ret_from_fork+0x116/0x1d0
[   25.433074]  ? __pfx_kthread+0x10/0x10
[   25.433093]  ret_from_fork_asm+0x1a/0x30
[   25.433120]  </TASK>
[   25.433132] 
[   25.441741] Allocated by task 294:
[   25.442027]  kasan_save_stack+0x45/0x70
[   25.442342]  kasan_save_track+0x18/0x40
[   25.442654]  kasan_save_alloc_info+0x3b/0x50
[   25.443066]  __kasan_kmalloc+0xb7/0xc0
[   25.443309]  __kmalloc_cache_noprof+0x189/0x420
[   25.443615]  kasan_atomics+0x95/0x310
[   25.443886]  kunit_try_run_case+0x1a5/0x480
[   25.444059]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.444246]  kthread+0x337/0x6f0
[   25.444396]  ret_from_fork+0x116/0x1d0
[   25.444540]  ret_from_fork_asm+0x1a/0x30
[   25.444690] 
[   25.444843] The buggy address belongs to the object at ffff888102c1c600
[   25.444843]  which belongs to the cache kmalloc-64 of size 64
[   25.445831] The buggy address is located 0 bytes to the right of
[   25.445831]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.446899] 
[   25.446988] The buggy address belongs to the physical page:
[   25.447161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.447410] flags: 0x200000000000000(node=0|zone=2)
[   25.447588] page_type: f5(slab)
[   25.447723] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.448204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.448728] page dumped because: kasan: bad access detected
[   25.449201] 
[   25.449335] Memory state around the buggy address:
[   25.449676]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.451165]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.451659] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.452219]                                      ^
[   25.452589]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.453097]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.453815] ==================================================================
[   25.335125] ==================================================================
[   25.335820] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   25.336086] Read of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.336313] 
[   25.336448] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.336520] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.336547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.336584] Call Trace:
[   25.336612]  <TASK>
[   25.336640]  dump_stack_lvl+0x73/0xb0
[   25.336691]  print_report+0xd1/0x650
[   25.336733]  ? __virt_addr_valid+0x1db/0x2d0
[   25.336776]  ? kasan_atomics_helper+0x4eae/0x5450
[   25.336815]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.336856]  ? kasan_atomics_helper+0x4eae/0x5450
[   25.336897]  kasan_report+0x141/0x180
[   25.336987]  ? kasan_atomics_helper+0x4eae/0x5450
[   25.337041]  __asan_report_load8_noabort+0x18/0x20
[   25.337086]  kasan_atomics_helper+0x4eae/0x5450
[   25.337154]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.337189]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.337227]  ? trace_hardirqs_on+0x37/0xe0
[   25.337263]  ? kasan_atomics+0x152/0x310
[   25.337313]  kasan_atomics+0x1dc/0x310
[   25.337357]  ? __pfx_kasan_atomics+0x10/0x10
[   25.337423]  ? __pfx_kasan_atomics+0x10/0x10
[   25.337476]  kunit_try_run_case+0x1a5/0x480
[   25.337524]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.337564]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.337606]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.337649]  ? __kthread_parkme+0x82/0x180
[   25.337689]  ? preempt_count_sub+0x50/0x80
[   25.337734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.337781]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.337825]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.337868]  kthread+0x337/0x6f0
[   25.337906]  ? trace_preempt_on+0x20/0xc0
[   25.337947]  ? __pfx_kthread+0x10/0x10
[   25.337988]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.338042]  ? calculate_sigpending+0x7b/0xa0
[   25.338090]  ? __pfx_kthread+0x10/0x10
[   25.338138]  ret_from_fork+0x116/0x1d0
[   25.338180]  ? __pfx_kthread+0x10/0x10
[   25.338225]  ret_from_fork_asm+0x1a/0x30
[   25.338291]  </TASK>
[   25.338319] 
[   25.345932] Allocated by task 294:
[   25.346106]  kasan_save_stack+0x45/0x70
[   25.346286]  kasan_save_track+0x18/0x40
[   25.346588]  kasan_save_alloc_info+0x3b/0x50
[   25.346919]  __kasan_kmalloc+0xb7/0xc0
[   25.347211]  __kmalloc_cache_noprof+0x189/0x420
[   25.347658]  kasan_atomics+0x95/0x310
[   25.347964]  kunit_try_run_case+0x1a5/0x480
[   25.348269]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.348642]  kthread+0x337/0x6f0
[   25.348891]  ret_from_fork+0x116/0x1d0
[   25.349144]  ret_from_fork_asm+0x1a/0x30
[   25.349441] 
[   25.349591] The buggy address belongs to the object at ffff888102c1c600
[   25.349591]  which belongs to the cache kmalloc-64 of size 64
[   25.350055] The buggy address is located 0 bytes to the right of
[   25.350055]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.350440] 
[   25.350538] The buggy address belongs to the physical page:
[   25.350729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.350981] flags: 0x200000000000000(node=0|zone=2)
[   25.351156] page_type: f5(slab)
[   25.351336] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.351837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.352485] page dumped because: kasan: bad access detected
[   25.352845] 
[   25.353003] Memory state around the buggy address:
[   25.353335]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.353805]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.354302] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.354714]                                      ^
[   25.355012]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.356189]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.356626] ==================================================================
[   24.936759] ==================================================================
[   24.937302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   24.937786] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.938208] 
[   24.938353] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.938449] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.938476] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.938514] Call Trace:
[   24.938543]  <TASK>
[   24.938572]  dump_stack_lvl+0x73/0xb0
[   24.938626]  print_report+0xd1/0x650
[   24.938670]  ? __virt_addr_valid+0x1db/0x2d0
[   24.938710]  ? kasan_atomics_helper+0xc70/0x5450
[   24.938750]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.938796]  ? kasan_atomics_helper+0xc70/0x5450
[   24.938868]  kasan_report+0x141/0x180
[   24.938914]  ? kasan_atomics_helper+0xc70/0x5450
[   24.938965]  kasan_check_range+0x10c/0x1c0
[   24.939009]  __kasan_check_write+0x18/0x20
[   24.939052]  kasan_atomics_helper+0xc70/0x5450
[   24.939092]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.939132]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.939178]  ? trace_hardirqs_on+0x37/0xe0
[   24.939218]  ? kasan_atomics+0x152/0x310
[   24.939266]  kasan_atomics+0x1dc/0x310
[   24.939310]  ? __pfx_kasan_atomics+0x10/0x10
[   24.939354]  ? __pfx_kasan_atomics+0x10/0x10
[   24.939416]  kunit_try_run_case+0x1a5/0x480
[   24.939465]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.939508]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.939550]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.939595]  ? __kthread_parkme+0x82/0x180
[   24.939635]  ? preempt_count_sub+0x50/0x80
[   24.939681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.939726]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.939771]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.939815]  kthread+0x337/0x6f0
[   24.939879]  ? trace_preempt_on+0x20/0xc0
[   24.939923]  ? __pfx_kthread+0x10/0x10
[   24.939965]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.940006]  ? calculate_sigpending+0x7b/0xa0
[   24.940052]  ? __pfx_kthread+0x10/0x10
[   24.940125]  ret_from_fork+0x116/0x1d0
[   24.940163]  ? __pfx_kthread+0x10/0x10
[   24.940203]  ret_from_fork_asm+0x1a/0x30
[   24.940265]  </TASK>
[   24.940288] 
[   24.947869] Allocated by task 294:
[   24.948142]  kasan_save_stack+0x45/0x70
[   24.948444]  kasan_save_track+0x18/0x40
[   24.948722]  kasan_save_alloc_info+0x3b/0x50
[   24.949016]  __kasan_kmalloc+0xb7/0xc0
[   24.949283]  __kmalloc_cache_noprof+0x189/0x420
[   24.949527]  kasan_atomics+0x95/0x310
[   24.949758]  kunit_try_run_case+0x1a5/0x480
[   24.949998]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.950234]  kthread+0x337/0x6f0
[   24.950395]  ret_from_fork+0x116/0x1d0
[   24.950678]  ret_from_fork_asm+0x1a/0x30
[   24.950998] 
[   24.951125] The buggy address belongs to the object at ffff888102c1c600
[   24.951125]  which belongs to the cache kmalloc-64 of size 64
[   24.951776] The buggy address is located 0 bytes to the right of
[   24.951776]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.952154] 
[   24.952245] The buggy address belongs to the physical page:
[   24.952435] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.952678] flags: 0x200000000000000(node=0|zone=2)
[   24.952879] page_type: f5(slab)
[   24.953016] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.953249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.953593] page dumped because: kasan: bad access detected
[   24.953967] 
[   24.954129] Memory state around the buggy address:
[   24.954484]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.954989]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.955455] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.955923]                                      ^
[   24.956228]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.956670]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.957103] ==================================================================
[   25.262406] ==================================================================
[   25.262976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   25.263473] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.263948] 
[   25.264113] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.264187] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.264200] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.264220] Call Trace:
[   25.264234]  <TASK>
[   25.264249]  dump_stack_lvl+0x73/0xb0
[   25.264275]  print_report+0xd1/0x650
[   25.264295]  ? __virt_addr_valid+0x1db/0x2d0
[   25.264315]  ? kasan_atomics_helper+0x12e6/0x5450
[   25.264333]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.264356]  ? kasan_atomics_helper+0x12e6/0x5450
[   25.264421]  kasan_report+0x141/0x180
[   25.264461]  ? kasan_atomics_helper+0x12e6/0x5450
[   25.264500]  kasan_check_range+0x10c/0x1c0
[   25.264534]  __kasan_check_write+0x18/0x20
[   25.264572]  kasan_atomics_helper+0x12e6/0x5450
[   25.264611]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.264649]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.264692]  ? trace_hardirqs_on+0x37/0xe0
[   25.264731]  ? kasan_atomics+0x152/0x310
[   25.264780]  kasan_atomics+0x1dc/0x310
[   25.264823]  ? __pfx_kasan_atomics+0x10/0x10
[   25.264880]  ? __pfx_kasan_atomics+0x10/0x10
[   25.264931]  kunit_try_run_case+0x1a5/0x480
[   25.264980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.265021]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.265064]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.265108]  ? __kthread_parkme+0x82/0x180
[   25.265148]  ? preempt_count_sub+0x50/0x80
[   25.265192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.265238]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.265285]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.265330]  kthread+0x337/0x6f0
[   25.265369]  ? trace_preempt_on+0x20/0xc0
[   25.265427]  ? __pfx_kthread+0x10/0x10
[   25.265467]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.265509]  ? calculate_sigpending+0x7b/0xa0
[   25.265554]  ? __pfx_kthread+0x10/0x10
[   25.265597]  ret_from_fork+0x116/0x1d0
[   25.265636]  ? __pfx_kthread+0x10/0x10
[   25.265678]  ret_from_fork_asm+0x1a/0x30
[   25.265738]  </TASK>
[   25.265762] 
[   25.277354] Allocated by task 294:
[   25.277660]  kasan_save_stack+0x45/0x70
[   25.278048]  kasan_save_track+0x18/0x40
[   25.278407]  kasan_save_alloc_info+0x3b/0x50
[   25.278773]  __kasan_kmalloc+0xb7/0xc0
[   25.279087]  __kmalloc_cache_noprof+0x189/0x420
[   25.279364]  kasan_atomics+0x95/0x310
[   25.279533]  kunit_try_run_case+0x1a5/0x480
[   25.279760]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.280060]  kthread+0x337/0x6f0
[   25.280249]  ret_from_fork+0x116/0x1d0
[   25.280409]  ret_from_fork_asm+0x1a/0x30
[   25.280663] 
[   25.280806] The buggy address belongs to the object at ffff888102c1c600
[   25.280806]  which belongs to the cache kmalloc-64 of size 64
[   25.281310] The buggy address is located 0 bytes to the right of
[   25.281310]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.281714] 
[   25.281890] The buggy address belongs to the physical page:
[   25.282255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.282570] flags: 0x200000000000000(node=0|zone=2)
[   25.282923] page_type: f5(slab)
[   25.283071] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.283565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.283933] page dumped because: kasan: bad access detected
[   25.284205] 
[   25.284292] Memory state around the buggy address:
[   25.284559]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.284920]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.285290] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.285506]                                      ^
[   25.285796]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.286191]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.286539] ==================================================================
[   25.856285] ==================================================================
[   25.856807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   25.857312] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.857609] 
[   25.857792] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.857872] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.857897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.857931] Call Trace:
[   25.857965]  <TASK>
[   25.857995]  dump_stack_lvl+0x73/0xb0
[   25.858073]  print_report+0xd1/0x650
[   25.858121]  ? __virt_addr_valid+0x1db/0x2d0
[   25.858168]  ? kasan_atomics_helper+0x2006/0x5450
[   25.858211]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.858261]  ? kasan_atomics_helper+0x2006/0x5450
[   25.858303]  kasan_report+0x141/0x180
[   25.858349]  ? kasan_atomics_helper+0x2006/0x5450
[   25.858415]  kasan_check_range+0x10c/0x1c0
[   25.858459]  __kasan_check_write+0x18/0x20
[   25.858504]  kasan_atomics_helper+0x2006/0x5450
[   25.858551]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.858597]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.858645]  ? trace_hardirqs_on+0x37/0xe0
[   25.858686]  ? kasan_atomics+0x152/0x310
[   25.858739]  kasan_atomics+0x1dc/0x310
[   25.858785]  ? __pfx_kasan_atomics+0x10/0x10
[   25.858831]  ? __pfx_kasan_atomics+0x10/0x10
[   25.858900]  kunit_try_run_case+0x1a5/0x480
[   25.858949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.859013]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.859071]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.859115]  ? __kthread_parkme+0x82/0x180
[   25.859156]  ? preempt_count_sub+0x50/0x80
[   25.859202]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.859246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.859290]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.859334]  kthread+0x337/0x6f0
[   25.859373]  ? trace_preempt_on+0x20/0xc0
[   25.859428]  ? __pfx_kthread+0x10/0x10
[   25.859470]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.859509]  ? calculate_sigpending+0x7b/0xa0
[   25.859554]  ? __pfx_kthread+0x10/0x10
[   25.859595]  ret_from_fork+0x116/0x1d0
[   25.859633]  ? __pfx_kthread+0x10/0x10
[   25.859672]  ret_from_fork_asm+0x1a/0x30
[   25.859733]  </TASK>
[   25.859757] 
[   25.868613] Allocated by task 294:
[   25.868834]  kasan_save_stack+0x45/0x70
[   25.869082]  kasan_save_track+0x18/0x40
[   25.869251]  kasan_save_alloc_info+0x3b/0x50
[   25.871541]  __kasan_kmalloc+0xb7/0xc0
[   25.871912]  __kmalloc_cache_noprof+0x189/0x420
[   25.872260]  kasan_atomics+0x95/0x310
[   25.872559]  kunit_try_run_case+0x1a5/0x480
[   25.873192]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.873784]  kthread+0x337/0x6f0
[   25.874394]  ret_from_fork+0x116/0x1d0
[   25.874577]  ret_from_fork_asm+0x1a/0x30
[   25.874741] 
[   25.874829] The buggy address belongs to the object at ffff888102c1c600
[   25.874829]  which belongs to the cache kmalloc-64 of size 64
[   25.875475] The buggy address is located 0 bytes to the right of
[   25.875475]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.876087] 
[   25.876265] The buggy address belongs to the physical page:
[   25.876562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.876939] flags: 0x200000000000000(node=0|zone=2)
[   25.877157] page_type: f5(slab)
[   25.877407] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.877725] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.877945] page dumped because: kasan: bad access detected
[   25.878136] 
[   25.878223] Memory state around the buggy address:
[   25.878397]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.878619]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.879115] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.879588]                                      ^
[   25.879941]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.880450]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.880889] ==================================================================
[   26.027336] ==================================================================
[   26.027566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   26.027844] Read of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   26.028711] 
[   26.029442] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   26.029502] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.029516] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.029535] Call Trace:
[   26.029550]  <TASK>
[   26.029566]  dump_stack_lvl+0x73/0xb0
[   26.029597]  print_report+0xd1/0x650
[   26.029618]  ? __virt_addr_valid+0x1db/0x2d0
[   26.029638]  ? kasan_atomics_helper+0x5115/0x5450
[   26.029657]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.029679]  ? kasan_atomics_helper+0x5115/0x5450
[   26.029698]  kasan_report+0x141/0x180
[   26.029717]  ? kasan_atomics_helper+0x5115/0x5450
[   26.029739]  __asan_report_load8_noabort+0x18/0x20
[   26.029760]  kasan_atomics_helper+0x5115/0x5450
[   26.029779]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.029800]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.029820]  ? trace_hardirqs_on+0x37/0xe0
[   26.029976]  ? kasan_atomics+0x152/0x310
[   26.030048]  kasan_atomics+0x1dc/0x310
[   26.030120]  ? __pfx_kasan_atomics+0x10/0x10
[   26.030166]  ? __pfx_kasan_atomics+0x10/0x10
[   26.030213]  kunit_try_run_case+0x1a5/0x480
[   26.030252]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.030291]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.030329]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.030368]  ? __kthread_parkme+0x82/0x180
[   26.030421]  ? preempt_count_sub+0x50/0x80
[   26.030462]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.030497]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.030532]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.030572]  kthread+0x337/0x6f0
[   26.030608]  ? trace_preempt_on+0x20/0xc0
[   26.030651]  ? __pfx_kthread+0x10/0x10
[   26.030689]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.030719]  ? calculate_sigpending+0x7b/0xa0
[   26.030742]  ? __pfx_kthread+0x10/0x10
[   26.030760]  ret_from_fork+0x116/0x1d0
[   26.030778]  ? __pfx_kthread+0x10/0x10
[   26.030796]  ret_from_fork_asm+0x1a/0x30
[   26.030824]  </TASK>
[   26.030867] 
[   26.040878] Allocated by task 294:
[   26.041210]  kasan_save_stack+0x45/0x70
[   26.041555]  kasan_save_track+0x18/0x40
[   26.041887]  kasan_save_alloc_info+0x3b/0x50
[   26.042205]  __kasan_kmalloc+0xb7/0xc0
[   26.042428]  __kmalloc_cache_noprof+0x189/0x420
[   26.042752]  kasan_atomics+0x95/0x310
[   26.043070]  kunit_try_run_case+0x1a5/0x480
[   26.043351]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.043636]  kthread+0x337/0x6f0
[   26.043937]  ret_from_fork+0x116/0x1d0
[   26.044252]  ret_from_fork_asm+0x1a/0x30
[   26.044475] 
[   26.044639] The buggy address belongs to the object at ffff888102c1c600
[   26.044639]  which belongs to the cache kmalloc-64 of size 64
[   26.045297] The buggy address is located 0 bytes to the right of
[   26.045297]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   26.045978] 
[   26.046234] The buggy address belongs to the physical page:
[   26.046728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   26.047371] flags: 0x200000000000000(node=0|zone=2)
[   26.047680] page_type: f5(slab)
[   26.047875] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.048262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.048662] page dumped because: kasan: bad access detected
[   26.049030] 
[   26.049179] Memory state around the buggy address:
[   26.049431]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.049901]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.050197] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.050589]                                      ^
[   26.050930]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.051197]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.051667] ==================================================================
[   25.927762] ==================================================================
[   25.928014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   25.928250] Read of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.928611] 
[   25.928778] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.928858] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.928884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.928923] Call Trace:
[   25.928950]  <TASK>
[   25.928974]  dump_stack_lvl+0x73/0xb0
[   25.929029]  print_report+0xd1/0x650
[   25.929070]  ? __virt_addr_valid+0x1db/0x2d0
[   25.929110]  ? kasan_atomics_helper+0x4fb2/0x5450
[   25.929150]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.929198]  ? kasan_atomics_helper+0x4fb2/0x5450
[   25.929240]  kasan_report+0x141/0x180
[   25.929284]  ? kasan_atomics_helper+0x4fb2/0x5450
[   25.929335]  __asan_report_load8_noabort+0x18/0x20
[   25.929395]  kasan_atomics_helper+0x4fb2/0x5450
[   25.929441]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.929484]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.929529]  ? trace_hardirqs_on+0x37/0xe0
[   25.929567]  ? kasan_atomics+0x152/0x310
[   25.929617]  kasan_atomics+0x1dc/0x310
[   25.929660]  ? __pfx_kasan_atomics+0x10/0x10
[   25.929702]  ? __pfx_kasan_atomics+0x10/0x10
[   25.929751]  kunit_try_run_case+0x1a5/0x480
[   25.929798]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.929855]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.929895]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.929939]  ? __kthread_parkme+0x82/0x180
[   25.929979]  ? preempt_count_sub+0x50/0x80
[   25.930034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.930114]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.930164]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.930213]  kthread+0x337/0x6f0
[   25.930253]  ? trace_preempt_on+0x20/0xc0
[   25.930296]  ? __pfx_kthread+0x10/0x10
[   25.930340]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.930398]  ? calculate_sigpending+0x7b/0xa0
[   25.930447]  ? __pfx_kthread+0x10/0x10
[   25.930493]  ret_from_fork+0x116/0x1d0
[   25.930534]  ? __pfx_kthread+0x10/0x10
[   25.930578]  ret_from_fork_asm+0x1a/0x30
[   25.930643]  </TASK>
[   25.930669] 
[   25.939631] Allocated by task 294:
[   25.939861]  kasan_save_stack+0x45/0x70
[   25.940022]  kasan_save_track+0x18/0x40
[   25.940199]  kasan_save_alloc_info+0x3b/0x50
[   25.940360]  __kasan_kmalloc+0xb7/0xc0
[   25.940728]  __kmalloc_cache_noprof+0x189/0x420
[   25.941110]  kasan_atomics+0x95/0x310
[   25.941392]  kunit_try_run_case+0x1a5/0x480
[   25.941672]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.942090]  kthread+0x337/0x6f0
[   25.942260]  ret_from_fork+0x116/0x1d0
[   25.942534]  ret_from_fork_asm+0x1a/0x30
[   25.942699] 
[   25.942795] The buggy address belongs to the object at ffff888102c1c600
[   25.942795]  which belongs to the cache kmalloc-64 of size 64
[   25.943542] The buggy address is located 0 bytes to the right of
[   25.943542]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.944033] 
[   25.944179] The buggy address belongs to the physical page:
[   25.944541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.944949] flags: 0x200000000000000(node=0|zone=2)
[   25.945128] page_type: f5(slab)
[   25.945266] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.945667] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.946278] page dumped because: kasan: bad access detected
[   25.946545] 
[   25.946669] Memory state around the buggy address:
[   25.946979]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.947287]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.947605] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.947921]                                      ^
[   25.948135]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.948358]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.948582] ==================================================================
[   24.604022] ==================================================================
[   24.604961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   24.605124] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.605245] 
[   24.605300] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.605341] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.605353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.605371] Call Trace:
[   24.605408]  <TASK>
[   24.605424]  dump_stack_lvl+0x73/0xb0
[   24.605450]  print_report+0xd1/0x650
[   24.605469]  ? __virt_addr_valid+0x1db/0x2d0
[   24.605490]  ? kasan_atomics_helper+0x4a0/0x5450
[   24.605507]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.605529]  ? kasan_atomics_helper+0x4a0/0x5450
[   24.605548]  kasan_report+0x141/0x180
[   24.605567]  ? kasan_atomics_helper+0x4a0/0x5450
[   24.605589]  kasan_check_range+0x10c/0x1c0
[   24.605609]  __kasan_check_write+0x18/0x20
[   24.605629]  kasan_atomics_helper+0x4a0/0x5450
[   24.605648]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.605667]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.605688]  ? trace_hardirqs_on+0x37/0xe0
[   24.605706]  ? kasan_atomics+0x152/0x310
[   24.605728]  kasan_atomics+0x1dc/0x310
[   24.605747]  ? __pfx_kasan_atomics+0x10/0x10
[   24.605767]  ? __pfx_kasan_atomics+0x10/0x10
[   24.605790]  kunit_try_run_case+0x1a5/0x480
[   24.605810]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.605835]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.605867]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.605901]  ? __kthread_parkme+0x82/0x180
[   24.605935]  ? preempt_count_sub+0x50/0x80
[   24.605975]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.606347]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.606459]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.606536]  kthread+0x337/0x6f0
[   24.606575]  ? trace_preempt_on+0x20/0xc0
[   24.606788]  ? __pfx_kthread+0x10/0x10
[   24.606852]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.606879]  ? calculate_sigpending+0x7b/0xa0
[   24.606901]  ? __pfx_kthread+0x10/0x10
[   24.606920]  ret_from_fork+0x116/0x1d0
[   24.606939]  ? __pfx_kthread+0x10/0x10
[   24.606957]  ret_from_fork_asm+0x1a/0x30
[   24.606985]  </TASK>
[   24.606996] 
[   24.617627] Allocated by task 294:
[   24.617783]  kasan_save_stack+0x45/0x70
[   24.618292]  kasan_save_track+0x18/0x40
[   24.618905]  kasan_save_alloc_info+0x3b/0x50
[   24.619245]  __kasan_kmalloc+0xb7/0xc0
[   24.619433]  __kmalloc_cache_noprof+0x189/0x420
[   24.619603]  kasan_atomics+0x95/0x310
[   24.619753]  kunit_try_run_case+0x1a5/0x480
[   24.619941]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.620228]  kthread+0x337/0x6f0
[   24.620499]  ret_from_fork+0x116/0x1d0
[   24.620755]  ret_from_fork_asm+0x1a/0x30
[   24.620937] 
[   24.621093] The buggy address belongs to the object at ffff888102c1c600
[   24.621093]  which belongs to the cache kmalloc-64 of size 64
[   24.621841] The buggy address is located 0 bytes to the right of
[   24.621841]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.622496] 
[   24.622726] The buggy address belongs to the physical page:
[   24.623227] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.623751] flags: 0x200000000000000(node=0|zone=2)
[   24.624623] page_type: f5(slab)
[   24.624903] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.625450] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.625822] page dumped because: kasan: bad access detected
[   24.626200] 
[   24.626410] Memory state around the buggy address:
[   24.626615]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.627045]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.627433] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.627771]                                      ^
[   24.627986]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.628213]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.628573] ==================================================================
[   25.379848] ==================================================================
[   25.380427] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   25.380946] Write of size 8 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.381429] 
[   25.381598] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.381683] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.381711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.381749] Call Trace:
[   25.381776]  <TASK>
[   25.381804]  dump_stack_lvl+0x73/0xb0
[   25.381856]  print_report+0xd1/0x650
[   25.381899]  ? __virt_addr_valid+0x1db/0x2d0
[   25.381938]  ? kasan_atomics_helper+0x50d4/0x5450
[   25.381977]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.382032]  ? kasan_atomics_helper+0x50d4/0x5450
[   25.382080]  kasan_report+0x141/0x180
[   25.382146]  ? kasan_atomics_helper+0x50d4/0x5450
[   25.382194]  __asan_report_store8_noabort+0x1b/0x30
[   25.382245]  kasan_atomics_helper+0x50d4/0x5450
[   25.382288]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.382328]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.382390]  ? trace_hardirqs_on+0x37/0xe0
[   25.382436]  ? kasan_atomics+0x152/0x310
[   25.382490]  kasan_atomics+0x1dc/0x310
[   25.382538]  ? __pfx_kasan_atomics+0x10/0x10
[   25.382585]  ? __pfx_kasan_atomics+0x10/0x10
[   25.382641]  kunit_try_run_case+0x1a5/0x480
[   25.382692]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.382737]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.382784]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.382829]  ? __kthread_parkme+0x82/0x180
[   25.382869]  ? preempt_count_sub+0x50/0x80
[   25.382934]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.382979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.383022]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.383067]  kthread+0x337/0x6f0
[   25.383105]  ? trace_preempt_on+0x20/0xc0
[   25.383148]  ? __pfx_kthread+0x10/0x10
[   25.383187]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.383228]  ? calculate_sigpending+0x7b/0xa0
[   25.383271]  ? __pfx_kthread+0x10/0x10
[   25.383314]  ret_from_fork+0x116/0x1d0
[   25.383351]  ? __pfx_kthread+0x10/0x10
[   25.383404]  ret_from_fork_asm+0x1a/0x30
[   25.383466]  </TASK>
[   25.383490] 
[   25.392934] Allocated by task 294:
[   25.393092]  kasan_save_stack+0x45/0x70
[   25.393253]  kasan_save_track+0x18/0x40
[   25.394101]  kasan_save_alloc_info+0x3b/0x50
[   25.394328]  __kasan_kmalloc+0xb7/0xc0
[   25.394506]  __kmalloc_cache_noprof+0x189/0x420
[   25.394692]  kasan_atomics+0x95/0x310
[   25.394850]  kunit_try_run_case+0x1a5/0x480
[   25.395057]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.395281]  kthread+0x337/0x6f0
[   25.395440]  ret_from_fork+0x116/0x1d0
[   25.395603]  ret_from_fork_asm+0x1a/0x30
[   25.395780] 
[   25.396637] The buggy address belongs to the object at ffff888102c1c600
[   25.396637]  which belongs to the cache kmalloc-64 of size 64
[   25.397014] The buggy address is located 0 bytes to the right of
[   25.397014]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.398006] 
[   25.398158] The buggy address belongs to the physical page:
[   25.398394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.398609] flags: 0x200000000000000(node=0|zone=2)
[   25.399131] page_type: f5(slab)
[   25.399321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.399718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.400195] page dumped because: kasan: bad access detected
[   25.400395] 
[   25.400483] Memory state around the buggy address:
[   25.400672]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.401371]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.401728] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.402560]                                      ^
[   25.402822]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.403124]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.403416] ==================================================================
[   24.841145] ==================================================================
[   24.841927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   24.842633] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   24.843108] 
[   24.843235] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   24.843331] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.843356] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.843409] Call Trace:
[   24.843437]  <TASK>
[   24.843463]  dump_stack_lvl+0x73/0xb0
[   24.843517]  print_report+0xd1/0x650
[   24.843555]  ? __virt_addr_valid+0x1db/0x2d0
[   24.843582]  ? kasan_atomics_helper+0x992/0x5450
[   24.843601]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.843630]  ? kasan_atomics_helper+0x992/0x5450
[   24.843649]  kasan_report+0x141/0x180
[   24.843669]  ? kasan_atomics_helper+0x992/0x5450
[   24.843691]  kasan_check_range+0x10c/0x1c0
[   24.843711]  __kasan_check_write+0x18/0x20
[   24.843745]  kasan_atomics_helper+0x992/0x5450
[   24.843767]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.843787]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.843807]  ? trace_hardirqs_on+0x37/0xe0
[   24.843826]  ? kasan_atomics+0x152/0x310
[   24.843860]  kasan_atomics+0x1dc/0x310
[   24.843879]  ? __pfx_kasan_atomics+0x10/0x10
[   24.843900]  ? __pfx_kasan_atomics+0x10/0x10
[   24.843922]  kunit_try_run_case+0x1a5/0x480
[   24.843944]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.843963]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.843983]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.844003]  ? __kthread_parkme+0x82/0x180
[   24.844021]  ? preempt_count_sub+0x50/0x80
[   24.844041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.844062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.844083]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.844103]  kthread+0x337/0x6f0
[   24.844121]  ? trace_preempt_on+0x20/0xc0
[   24.844140]  ? __pfx_kthread+0x10/0x10
[   24.844158]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.844177]  ? calculate_sigpending+0x7b/0xa0
[   24.844196]  ? __pfx_kthread+0x10/0x10
[   24.844216]  ret_from_fork+0x116/0x1d0
[   24.844233]  ? __pfx_kthread+0x10/0x10
[   24.844251]  ret_from_fork_asm+0x1a/0x30
[   24.844278]  </TASK>
[   24.844290] 
[   24.854953] Allocated by task 294:
[   24.855112]  kasan_save_stack+0x45/0x70
[   24.855275]  kasan_save_track+0x18/0x40
[   24.855434]  kasan_save_alloc_info+0x3b/0x50
[   24.855593]  __kasan_kmalloc+0xb7/0xc0
[   24.855870]  __kmalloc_cache_noprof+0x189/0x420
[   24.856211]  kasan_atomics+0x95/0x310
[   24.856489]  kunit_try_run_case+0x1a5/0x480
[   24.856777]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.857170]  kthread+0x337/0x6f0
[   24.857417]  ret_from_fork+0x116/0x1d0
[   24.857657]  ret_from_fork_asm+0x1a/0x30
[   24.857978] 
[   24.858092] The buggy address belongs to the object at ffff888102c1c600
[   24.858092]  which belongs to the cache kmalloc-64 of size 64
[   24.858563] The buggy address is located 0 bytes to the right of
[   24.858563]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   24.859391] 
[   24.859490] The buggy address belongs to the physical page:
[   24.859667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   24.860163] flags: 0x200000000000000(node=0|zone=2)
[   24.860536] page_type: f5(slab)
[   24.860778] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.861206] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.861513] page dumped because: kasan: bad access detected
[   24.861935] 
[   24.862081] Memory state around the buggy address:
[   24.862286]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.862539]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.862769] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.863018]                                      ^
[   24.863347]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.863816]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.864296] ==================================================================
[   25.027334] ==================================================================
[   25.028137] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   25.029579] Write of size 4 at addr ffff888102c1c630 by task kunit_try_catch/294
[   25.030153] 
[   25.030606] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250623 #1 PREEMPT(voluntary) 
[   25.030672] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.030686] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.030706] Call Trace:
[   25.030722]  <TASK>
[   25.030738]  dump_stack_lvl+0x73/0xb0
[   25.030771]  print_report+0xd1/0x650
[   25.030791]  ? __virt_addr_valid+0x1db/0x2d0
[   25.030812]  ? kasan_atomics_helper+0xe78/0x5450
[   25.030835]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.030913]  ? kasan_atomics_helper+0xe78/0x5450
[   25.030955]  kasan_report+0x141/0x180
[   25.030998]  ? kasan_atomics_helper+0xe78/0x5450
[   25.031047]  kasan_check_range+0x10c/0x1c0
[   25.031092]  __kasan_check_write+0x18/0x20
[   25.031136]  kasan_atomics_helper+0xe78/0x5450
[   25.031177]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.031239]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.031600]  ? trace_hardirqs_on+0x37/0xe0
[   25.031652]  ? kasan_atomics+0x152/0x310
[   25.031702]  kasan_atomics+0x1dc/0x310
[   25.031746]  ? __pfx_kasan_atomics+0x10/0x10
[   25.031788]  ? __pfx_kasan_atomics+0x10/0x10
[   25.031847]  kunit_try_run_case+0x1a5/0x480
[   25.031897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.031936]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.032009]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.032073]  ? __kthread_parkme+0x82/0x180
[   25.032118]  ? preempt_count_sub+0x50/0x80
[   25.032166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.032213]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.032260]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.032304]  kthread+0x337/0x6f0
[   25.032342]  ? trace_preempt_on+0x20/0xc0
[   25.032399]  ? __pfx_kthread+0x10/0x10
[   25.032441]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.032482]  ? calculate_sigpending+0x7b/0xa0
[   25.032507]  ? __pfx_kthread+0x10/0x10
[   25.032527]  ret_from_fork+0x116/0x1d0
[   25.032545]  ? __pfx_kthread+0x10/0x10
[   25.032564]  ret_from_fork_asm+0x1a/0x30
[   25.032591]  </TASK>
[   25.032603] 
[   25.044024] Allocated by task 294:
[   25.044173]  kasan_save_stack+0x45/0x70
[   25.044496]  kasan_save_track+0x18/0x40
[   25.044724]  kasan_save_alloc_info+0x3b/0x50
[   25.045501]  __kasan_kmalloc+0xb7/0xc0
[   25.045699]  __kmalloc_cache_noprof+0x189/0x420
[   25.046079]  kasan_atomics+0x95/0x310
[   25.046271]  kunit_try_run_case+0x1a5/0x480
[   25.046503]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.046726]  kthread+0x337/0x6f0
[   25.047481]  ret_from_fork+0x116/0x1d0
[   25.047654]  ret_from_fork_asm+0x1a/0x30
[   25.047813] 
[   25.047971] The buggy address belongs to the object at ffff888102c1c600
[   25.047971]  which belongs to the cache kmalloc-64 of size 64
[   25.048481] The buggy address is located 0 bytes to the right of
[   25.048481]  allocated 48-byte region [ffff888102c1c600, ffff888102c1c630)
[   25.049115] 
[   25.049323] The buggy address belongs to the physical page:
[   25.049692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c1c
[   25.050245] flags: 0x200000000000000(node=0|zone=2)
[   25.050525] page_type: f5(slab)
[   25.050867] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.051190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.051435] page dumped because: kasan: bad access detected
[   25.051784] 
[   25.051984] Memory state around the buggy address:
[   25.052373]  ffff888102c1c500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.052911]  ffff888102c1c580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.053304] >ffff888102c1c600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.053663]                                      ^
[   25.053956]  ffff888102c1c680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.054555]  ffff888102c1c700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.054910] ==================================================================