Hay
Date
June 25, 2025, 8:08 a.m.

Environment
qemu-arm64
qemu-x86_64

[   29.503847] ==================================================================
[   29.503943] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   29.504673] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.504730] 
[   29.505097] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.505650] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.506507] Hardware name: linux,dummy-virt (DT)
[   29.506752] Call trace:
[   29.506781]  show_stack+0x20/0x38 (C)
[   29.507223]  dump_stack_lvl+0x8c/0xd0
[   29.507356]  print_report+0x118/0x608
[   29.507529]  kasan_report+0xdc/0x128
[   29.508187]  kasan_check_range+0x100/0x1a8
[   29.508406]  __kasan_check_write+0x20/0x30
[   29.508453]  kasan_atomics_helper+0x11f8/0x4858
[   29.508503]  kasan_atomics+0x198/0x2e0
[   29.509721]  kunit_try_run_case+0x170/0x3f0
[   29.510029]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.510511]  kthread+0x328/0x630
[   29.510964]  ret_from_fork+0x10/0x20
[   29.511261] 
[   29.511289] Allocated by task 277:
[   29.511322]  kasan_save_stack+0x3c/0x68
[   29.512221]  kasan_save_track+0x20/0x40
[   29.512381]  kasan_save_alloc_info+0x40/0x58
[   29.512989]  __kasan_kmalloc+0xd4/0xd8
[   29.513045]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.513089]  kasan_atomics+0xb8/0x2e0
[   29.513967]  kunit_try_run_case+0x170/0x3f0
[   29.514174]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.514568]  kthread+0x328/0x630
[   29.515138]  ret_from_fork+0x10/0x20
[   29.515191] 
[   29.515214] The buggy address belongs to the object at fff00000c787d680
[   29.515214]  which belongs to the cache kmalloc-64 of size 64
[   29.516358] The buggy address is located 0 bytes to the right of
[   29.516358]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.516590] 
[   29.516633] The buggy address belongs to the physical page:
[   29.516671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.517250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.517404] page_type: f5(slab)
[   29.517835] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.518708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.518764] page dumped because: kasan: bad access detected
[   29.519515] 
[   29.519566] Memory state around the buggy address:
[   29.520195]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.520404]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.520554] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.520886]                                      ^
[   29.520994]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.521041]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.521082] ==================================================================
[   29.314631] ==================================================================
[   29.314696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   29.314814] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.314866] 
[   29.314937] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.315023] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.315050] Hardware name: linux,dummy-virt (DT)
[   29.315120] Call trace:
[   29.315169]  show_stack+0x20/0x38 (C)
[   29.315248]  dump_stack_lvl+0x8c/0xd0
[   29.315323]  print_report+0x118/0x608
[   29.315411]  kasan_report+0xdc/0x128
[   29.315460]  __asan_report_load4_noabort+0x20/0x30
[   29.315617]  kasan_atomics_helper+0x3dd8/0x4858
[   29.315672]  kasan_atomics+0x198/0x2e0
[   29.315719]  kunit_try_run_case+0x170/0x3f0
[   29.316175]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.316324]  kthread+0x328/0x630
[   29.316454]  ret_from_fork+0x10/0x20
[   29.316581] 
[   29.316807] Allocated by task 277:
[   29.316843]  kasan_save_stack+0x3c/0x68
[   29.317044]  kasan_save_track+0x20/0x40
[   29.317175]  kasan_save_alloc_info+0x40/0x58
[   29.317279]  __kasan_kmalloc+0xd4/0xd8
[   29.317367]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.317591]  kasan_atomics+0xb8/0x2e0
[   29.317751]  kunit_try_run_case+0x170/0x3f0
[   29.317798]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.318066]  kthread+0x328/0x630
[   29.318153]  ret_from_fork+0x10/0x20
[   29.318410] 
[   29.318632] The buggy address belongs to the object at fff00000c787d680
[   29.318632]  which belongs to the cache kmalloc-64 of size 64
[   29.318770] The buggy address is located 0 bytes to the right of
[   29.318770]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.318912] 
[   29.319005] The buggy address belongs to the physical page:
[   29.319037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.319091] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.319290] page_type: f5(slab)
[   29.319458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.319517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.319585] page dumped because: kasan: bad access detected
[   29.319698] 
[   29.319892] Memory state around the buggy address:
[   29.320038]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.320097]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.320152] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.320194]                                      ^
[   29.320238]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.320308]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.320348] ==================================================================
[   29.213777] ==================================================================
[   29.213909] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   29.213993] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.214046] 
[   29.214110] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.214933]  kasan_report+0xdc/0x128
[   29.217467]  kunit_try_run_case+0x170/0x3f0
[   29.219586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.221241]                                      ^
[   29.223564] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.227213]  __kasan_kmalloc+0xd4/0xd8
[   29.227426]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.227605]  kasan_atomics+0xb8/0x2e0
[   29.227881]  kunit_try_run_case+0x170/0x3f0
[   29.227944]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.228329]  kthread+0x328/0x630
[   29.228372]  ret_from_fork+0x10/0x20
[   29.228423] 
[   29.228486] The buggy address belongs to the object at fff00000c787d680
[   29.228486]  which belongs to the cache kmalloc-64 of size 64
[   29.228582] The buggy address is located 0 bytes to the right of
[   29.228582]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.228647] 
[   29.228669] The buggy address belongs to the physical page:
[   29.228719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.228787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.228849] page_type: f5(slab)
[   29.228890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.228941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.228983] page dumped because: kasan: bad access detected
[   29.229026] 
[   29.229062] Memory state around the buggy address:
[   29.229096]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.229141]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.229186] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.229234]                                      ^
[   29.229272]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.229322]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.229375] ==================================================================
[   29.594732] ==================================================================
[   29.594778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   29.594827] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.594878] 
[   29.594917] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.595000] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.595027] Hardware name: linux,dummy-virt (DT)
[   29.595060] Call trace:
[   29.595083]  show_stack+0x20/0x38 (C)
[   29.595141]  dump_stack_lvl+0x8c/0xd0
[   29.595197]  print_report+0x118/0x608
[   29.595253]  kasan_report+0xdc/0x128
[   29.595300]  __asan_report_load8_noabort+0x20/0x30
[   29.595359]  kasan_atomics_helper+0x3e10/0x4858
[   29.595420]  kasan_atomics+0x198/0x2e0
[   29.595465]  kunit_try_run_case+0x170/0x3f0
[   29.595514]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.595568]  kthread+0x328/0x630
[   29.595611]  ret_from_fork+0x10/0x20
[   29.595660] 
[   29.595680] Allocated by task 277:
[   29.596224]  kasan_save_stack+0x3c/0x68
[   29.596433]  kasan_save_track+0x20/0x40
[   29.596532]  kasan_save_alloc_info+0x40/0x58
[   29.596786]  __kasan_kmalloc+0xd4/0xd8
[   29.596944]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.597021]  kasan_atomics+0xb8/0x2e0
[   29.597060]  kunit_try_run_case+0x170/0x3f0
[   29.597099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.597145]  kthread+0x328/0x630
[   29.597179]  ret_from_fork+0x10/0x20
[   29.597217] 
[   29.597239] The buggy address belongs to the object at fff00000c787d680
[   29.597239]  which belongs to the cache kmalloc-64 of size 64
[   29.597299] The buggy address is located 0 bytes to the right of
[   29.597299]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.597365] 
[   29.597388] The buggy address belongs to the physical page:
[   29.597430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.597483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.597677] page_type: f5(slab)
[   29.597847] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.597960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.598266] page dumped because: kasan: bad access detected
[   29.598632] 
[   29.598721] Memory state around the buggy address:
[   29.598757]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.598801]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.599200] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.599324]                                      ^
[   29.599542]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.599767]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.600000] ==================================================================
[   29.336870] ==================================================================
[   29.336916] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   29.336966] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.337328] 
[   29.337373] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.337471] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.337519] Hardware name: linux,dummy-virt (DT)
[   29.337609] Call trace:
[   29.337669]  show_stack+0x20/0x38 (C)
[   29.337989]  dump_stack_lvl+0x8c/0xd0
[   29.338054]  print_report+0x118/0x608
[   29.338161]  kasan_report+0xdc/0x128
[   29.338237]  __asan_report_load8_noabort+0x20/0x30
[   29.338304]  kasan_atomics_helper+0x3f58/0x4858
[   29.338548]  kasan_atomics+0x198/0x2e0
[   29.338619]  kunit_try_run_case+0x170/0x3f0
[   29.338808]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.338929]  kthread+0x328/0x630
[   29.339143]  ret_from_fork+0x10/0x20
[   29.339263] 
[   29.339313] Allocated by task 277:
[   29.339385]  kasan_save_stack+0x3c/0x68
[   29.339488]  kasan_save_track+0x20/0x40
[   29.339537]  kasan_save_alloc_info+0x40/0x58
[   29.339603]  __kasan_kmalloc+0xd4/0xd8
[   29.339680]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.340075]  kasan_atomics+0xb8/0x2e0
[   29.340189]  kunit_try_run_case+0x170/0x3f0
[   29.340293]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.340340]  kthread+0x328/0x630
[   29.340386]  ret_from_fork+0x10/0x20
[   29.340434] 
[   29.340456] The buggy address belongs to the object at fff00000c787d680
[   29.340456]  which belongs to the cache kmalloc-64 of size 64
[   29.341019] The buggy address is located 0 bytes to the right of
[   29.341019]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.341454] 
[   29.341492] The buggy address belongs to the physical page:
[   29.341560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.341673] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.341743] page_type: f5(slab)
[   29.341798] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.342152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.342239] page dumped because: kasan: bad access detected
[   29.342343] 
[   29.342739] Memory state around the buggy address:
[   29.342828]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.342969]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.343031] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.343106]                                      ^
[   29.343150]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.343196]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.343236] ==================================================================
[   29.576318] ==================================================================
[   29.576717] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   29.576786] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.576879] 
[   29.576949] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.577033] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.577061] Hardware name: linux,dummy-virt (DT)
[   29.577093] Call trace:
[   29.577116]  show_stack+0x20/0x38 (C)
[   29.577174]  dump_stack_lvl+0x8c/0xd0
[   29.577223]  print_report+0x118/0x608
[   29.577272]  kasan_report+0xdc/0x128
[   29.577320]  __asan_report_load8_noabort+0x20/0x30
[   29.577377]  kasan_atomics_helper+0x3db0/0x4858
[   29.577438]  kasan_atomics+0x198/0x2e0
[   29.577484]  kunit_try_run_case+0x170/0x3f0
[   29.577533]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.577588]  kthread+0x328/0x630
[   29.577632]  ret_from_fork+0x10/0x20
[   29.577680] 
[   29.577702] Allocated by task 277:
[   29.577731]  kasan_save_stack+0x3c/0x68
[   29.577771]  kasan_save_track+0x20/0x40
[   29.577811]  kasan_save_alloc_info+0x40/0x58
[   29.577858]  __kasan_kmalloc+0xd4/0xd8
[   29.577906]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.577948]  kasan_atomics+0xb8/0x2e0
[   29.577985]  kunit_try_run_case+0x170/0x3f0
[   29.578025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.578079]  kthread+0x328/0x630
[   29.578124]  ret_from_fork+0x10/0x20
[   29.578162] 
[   29.578183] The buggy address belongs to the object at fff00000c787d680
[   29.578183]  which belongs to the cache kmalloc-64 of size 64
[   29.578241] The buggy address is located 0 bytes to the right of
[   29.578241]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.578307] 
[   29.578336] The buggy address belongs to the physical page:
[   29.578371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.578435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.578483] page_type: f5(slab)
[   29.578520] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.578570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.578616] page dumped because: kasan: bad access detected
[   29.578649] 
[   29.578668] Memory state around the buggy address:
[   29.578967]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.579026]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.579072] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.579112]                                      ^
[   29.579148]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.579325]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.579453] ==================================================================
[   29.606945] ==================================================================
[   29.607114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   29.607174] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.607239] 
[   29.607270] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.607353] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.607662] Hardware name: linux,dummy-virt (DT)
[   29.607721] Call trace:
[   29.607747]  show_stack+0x20/0x38 (C)
[   29.607835]  dump_stack_lvl+0x8c/0xd0
[   29.608139]  print_report+0x118/0x608
[   29.608450]  kasan_report+0xdc/0x128
[   29.608626]  __asan_report_load8_noabort+0x20/0x30
[   29.608734]  kasan_atomics_helper+0x3e20/0x4858
[   29.608949]  kasan_atomics+0x198/0x2e0
[   29.609033]  kunit_try_run_case+0x170/0x3f0
[   29.609103]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.609162]  kthread+0x328/0x630
[   29.609226]  ret_from_fork+0x10/0x20
[   29.610219] 
[   29.610317] Allocated by task 277:
[   29.610407]  kasan_save_stack+0x3c/0x68
[   29.610461]  kasan_save_track+0x20/0x40
[   29.610511]  kasan_save_alloc_info+0x40/0x58
[   29.610566]  __kasan_kmalloc+0xd4/0xd8
[   29.610633]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.610675]  kasan_atomics+0xb8/0x2e0
[   29.610711]  kunit_try_run_case+0x170/0x3f0
[   29.610753]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.610815]  kthread+0x328/0x630
[   29.610853]  ret_from_fork+0x10/0x20
[   29.610891] 
[   29.610913] The buggy address belongs to the object at fff00000c787d680
[   29.610913]  which belongs to the cache kmalloc-64 of size 64
[   29.610972] The buggy address is located 0 bytes to the right of
[   29.610972]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.611037] 
[   29.611061] The buggy address belongs to the physical page:
[   29.611108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.611173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.611228] page_type: f5(slab)
[   29.611267] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.611317] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.611371] page dumped because: kasan: bad access detected
[   29.611412] 
[   29.611432] Memory state around the buggy address:
[   29.611465]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.611509]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.611552] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.611593]                                      ^
[   29.611625]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.611668]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.612157] ==================================================================
[   29.587024] ==================================================================
[   29.587109] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   29.587164] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.587216] 
[   29.587281] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.587366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.587407] Hardware name: linux,dummy-virt (DT)
[   29.587439] Call trace:
[   29.587715]  show_stack+0x20/0x38 (C)
[   29.588081]  dump_stack_lvl+0x8c/0xd0
[   29.588146]  print_report+0x118/0x608
[   29.588194]  kasan_report+0xdc/0x128
[   29.588241]  __asan_report_load8_noabort+0x20/0x30
[   29.588290]  kasan_atomics_helper+0x3df4/0x4858
[   29.588340]  kasan_atomics+0x198/0x2e0
[   29.588388]  kunit_try_run_case+0x170/0x3f0
[   29.588448]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.588503]  kthread+0x328/0x630
[   29.588545]  ret_from_fork+0x10/0x20
[   29.588594] 
[   29.588615] Allocated by task 277:
[   29.588645]  kasan_save_stack+0x3c/0x68
[   29.588688]  kasan_save_track+0x20/0x40
[   29.588726]  kasan_save_alloc_info+0x40/0x58
[   29.588764]  __kasan_kmalloc+0xd4/0xd8
[   29.588803]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.588844]  kasan_atomics+0xb8/0x2e0
[   29.588882]  kunit_try_run_case+0x170/0x3f0
[   29.588921]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.588966]  kthread+0x328/0x630
[   29.589000]  ret_from_fork+0x10/0x20
[   29.589038] 
[   29.589058] The buggy address belongs to the object at fff00000c787d680
[   29.589058]  which belongs to the cache kmalloc-64 of size 64
[   29.589116] The buggy address is located 0 bytes to the right of
[   29.589116]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.589181] 
[   29.589203] The buggy address belongs to the physical page:
[   29.589235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.589286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.589335] page_type: f5(slab)
[   29.589371] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.589433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.589473] page dumped because: kasan: bad access detected
[   29.589507] 
[   29.589526] Memory state around the buggy address:
[   29.589559]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.589603]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.589648] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.589687]                                      ^
[   29.589720]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.589763]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.589803] ==================================================================
[   29.542316] ==================================================================
[   29.542368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   29.542436] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.542494] 
[   29.542525] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.542614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.542641] Hardware name: linux,dummy-virt (DT)
[   29.542681] Call trace:
[   29.542704]  show_stack+0x20/0x38 (C)
[   29.542753]  dump_stack_lvl+0x8c/0xd0
[   29.542801]  print_report+0x118/0x608
[   29.542855]  kasan_report+0xdc/0x128
[   29.542904]  __asan_report_load8_noabort+0x20/0x30
[   29.542952]  kasan_atomics_helper+0x3f04/0x4858
[   29.543003]  kasan_atomics+0x198/0x2e0
[   29.543048]  kunit_try_run_case+0x170/0x3f0
[   29.543106]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.543171]  kthread+0x328/0x630
[   29.543224]  ret_from_fork+0x10/0x20
[   29.543283] 
[   29.543305] Allocated by task 277:
[   29.543334]  kasan_save_stack+0x3c/0x68
[   29.543376]  kasan_save_track+0x20/0x40
[   29.543425]  kasan_save_alloc_info+0x40/0x58
[   29.543465]  __kasan_kmalloc+0xd4/0xd8
[   29.543504]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.543544]  kasan_atomics+0xb8/0x2e0
[   29.543582]  kunit_try_run_case+0x170/0x3f0
[   29.543622]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.543677]  kthread+0x328/0x630
[   29.543713]  ret_from_fork+0x10/0x20
[   29.543751] 
[   29.543771] The buggy address belongs to the object at fff00000c787d680
[   29.543771]  which belongs to the cache kmalloc-64 of size 64
[   29.543830] The buggy address is located 0 bytes to the right of
[   29.543830]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.543895] 
[   29.543915] The buggy address belongs to the physical page:
[   29.543948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.544002] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.544048] page_type: f5(slab)
[   29.544085] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.544135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.544457] page dumped because: kasan: bad access detected
[   29.544510] 
[   29.544532] Memory state around the buggy address:
[   29.544565]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.544611]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.544655] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.544695]                                      ^
[   29.544992]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.545058]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.545098] ==================================================================
[   29.418851] ==================================================================
[   29.419502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   29.419676] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.419729] 
[   29.419768] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.420857] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.421206] Hardware name: linux,dummy-virt (DT)
[   29.421433] Call trace:
[   29.421489]  show_stack+0x20/0x38 (C)
[   29.422126]  dump_stack_lvl+0x8c/0xd0
[   29.422795]  print_report+0x118/0x608
[   29.423131]  kasan_report+0xdc/0x128
[   29.423280]  kasan_check_range+0x100/0x1a8
[   29.423357]  __kasan_check_write+0x20/0x30
[   29.424166]  kasan_atomics_helper+0xf88/0x4858
[   29.424341]  kasan_atomics+0x198/0x2e0
[   29.424533]  kunit_try_run_case+0x170/0x3f0
[   29.425193]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.425732]  kthread+0x328/0x630
[   29.426131]  ret_from_fork+0x10/0x20
[   29.426302] 
[   29.426907] Allocated by task 277:
[   29.427287]  kasan_save_stack+0x3c/0x68
[   29.427339]  kasan_save_track+0x20/0x40
[   29.427702]  kasan_save_alloc_info+0x40/0x58
[   29.428276]  __kasan_kmalloc+0xd4/0xd8
[   29.428685]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.428743]  kasan_atomics+0xb8/0x2e0
[   29.429741]  kunit_try_run_case+0x170/0x3f0
[   29.429823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.430830]  kthread+0x328/0x630
[   29.430892]  ret_from_fork+0x10/0x20
[   29.431101] 
[   29.431220] The buggy address belongs to the object at fff00000c787d680
[   29.431220]  which belongs to the cache kmalloc-64 of size 64
[   29.431475] The buggy address is located 0 bytes to the right of
[   29.431475]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.432040] 
[   29.432088] The buggy address belongs to the physical page:
[   29.432126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.432746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.433843] page_type: f5(slab)
[   29.434132] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.434423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.434847] page dumped because: kasan: bad access detected
[   29.434891] 
[   29.434939] Memory state around the buggy address:
[   29.434976]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.435912]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.436037] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.436078]                                      ^
[   29.436116]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.436569]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.436967] ==================================================================
[   29.545800] ==================================================================
[   29.545853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   29.545950] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.546044] 
[   29.546123] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.546292] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.546340] Hardware name: linux,dummy-virt (DT)
[   29.546387] Call trace:
[   29.546458]  show_stack+0x20/0x38 (C)
[   29.546524]  dump_stack_lvl+0x8c/0xd0
[   29.546572]  print_report+0x118/0x608
[   29.546624]  kasan_report+0xdc/0x128
[   29.546670]  kasan_check_range+0x100/0x1a8
[   29.546720]  __kasan_check_write+0x20/0x30
[   29.546764]  kasan_atomics_helper+0x1414/0x4858
[   29.546945]  kasan_atomics+0x198/0x2e0
[   29.547007]  kunit_try_run_case+0x170/0x3f0
[   29.547085]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.547142]  kthread+0x328/0x630
[   29.547191]  ret_from_fork+0x10/0x20
[   29.547240] 
[   29.547291] Allocated by task 277:
[   29.547322]  kasan_save_stack+0x3c/0x68
[   29.547363]  kasan_save_track+0x20/0x40
[   29.547414]  kasan_save_alloc_info+0x40/0x58
[   29.547630]  __kasan_kmalloc+0xd4/0xd8
[   29.547685]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.547728]  kasan_atomics+0xb8/0x2e0
[   29.547833]  kunit_try_run_case+0x170/0x3f0
[   29.547909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.548053]  kthread+0x328/0x630
[   29.548105]  ret_from_fork+0x10/0x20
[   29.548145] 
[   29.548166] The buggy address belongs to the object at fff00000c787d680
[   29.548166]  which belongs to the cache kmalloc-64 of size 64
[   29.548225] The buggy address is located 0 bytes to the right of
[   29.548225]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.548289] 
[   29.548310] The buggy address belongs to the physical page:
[   29.548833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.548967] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.549304] page_type: f5(slab)
[   29.549427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.549542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.549586] page dumped because: kasan: bad access detected
[   29.549619] 
[   29.549721] Memory state around the buggy address:
[   29.550082]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.550608]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.550672] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.550785]                                      ^
[   29.550907]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.550960]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.551064] ==================================================================
[   29.551651] ==================================================================
[   29.551794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   29.551891] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.552078] 
[   29.552414] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.552677] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.552785] Hardware name: linux,dummy-virt (DT)
[   29.552891] Call trace:
[   29.553035]  show_stack+0x20/0x38 (C)
[   29.553148]  dump_stack_lvl+0x8c/0xd0
[   29.553269]  print_report+0x118/0x608
[   29.553318]  kasan_report+0xdc/0x128
[   29.553365]  kasan_check_range+0x100/0x1a8
[   29.553422]  __kasan_check_write+0x20/0x30
[   29.553467]  kasan_atomics_helper+0x147c/0x4858
[   29.553817]  kasan_atomics+0x198/0x2e0
[   29.554027]  kunit_try_run_case+0x170/0x3f0
[   29.554102]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.554448]  kthread+0x328/0x630
[   29.554611]  ret_from_fork+0x10/0x20
[   29.554791] 
[   29.554814] Allocated by task 277:
[   29.554844]  kasan_save_stack+0x3c/0x68
[   29.555139]  kasan_save_track+0x20/0x40
[   29.555329]  kasan_save_alloc_info+0x40/0x58
[   29.555706]  __kasan_kmalloc+0xd4/0xd8
[   29.555785]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.555968]  kasan_atomics+0xb8/0x2e0
[   29.556062]  kunit_try_run_case+0x170/0x3f0
[   29.556180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.556229]  kthread+0x328/0x630
[   29.556288]  ret_from_fork+0x10/0x20
[   29.556327] 
[   29.556348] The buggy address belongs to the object at fff00000c787d680
[   29.556348]  which belongs to the cache kmalloc-64 of size 64
[   29.556567] The buggy address is located 0 bytes to the right of
[   29.556567]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.556810] 
[   29.556892] The buggy address belongs to the physical page:
[   29.556977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.557265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.557475] page_type: f5(slab)
[   29.557639] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.557732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.557775] page dumped because: kasan: bad access detected
[   29.557809] 
[   29.558035] Memory state around the buggy address:
[   29.558279]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.558404]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.558479] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.558824]                                      ^
[   29.558995]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.559070]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.559195] ==================================================================
[   29.559732] ==================================================================
[   29.559895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   29.560062] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.560151] 
[   29.560604] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.560769] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.560863] Hardware name: linux,dummy-virt (DT)
[   29.561077] Call trace:
[   29.561175]  show_stack+0x20/0x38 (C)
[   29.561289]  dump_stack_lvl+0x8c/0xd0
[   29.561359]  print_report+0x118/0x608
[   29.561459]  kasan_report+0xdc/0x128
[   29.561509]  kasan_check_range+0x100/0x1a8
[   29.561581]  __kasan_check_write+0x20/0x30
[   29.561726]  kasan_atomics_helper+0x14e4/0x4858
[   29.561854]  kasan_atomics+0x198/0x2e0
[   29.562001]  kunit_try_run_case+0x170/0x3f0
[   29.562112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.562175]  kthread+0x328/0x630
[   29.562221]  ret_from_fork+0x10/0x20
[   29.562281] 
[   29.562305] Allocated by task 277:
[   29.562334]  kasan_save_stack+0x3c/0x68
[   29.562377]  kasan_save_track+0x20/0x40
[   29.562429]  kasan_save_alloc_info+0x40/0x58
[   29.562469]  __kasan_kmalloc+0xd4/0xd8
[   29.562524]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.562566]  kasan_atomics+0xb8/0x2e0
[   29.562629]  kunit_try_run_case+0x170/0x3f0
[   29.562670]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.562716]  kthread+0x328/0x630
[   29.562765]  ret_from_fork+0x10/0x20
[   29.562809] 
[   29.562844] The buggy address belongs to the object at fff00000c787d680
[   29.562844]  which belongs to the cache kmalloc-64 of size 64
[   29.562903] The buggy address is located 0 bytes to the right of
[   29.562903]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.562967] 
[   29.562998] The buggy address belongs to the physical page:
[   29.563037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.563090] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.563136] page_type: f5(slab)
[   29.563186] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.563250] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.563295] page dumped because: kasan: bad access detected
[   29.563328] 
[   29.563355] Memory state around the buggy address:
[   29.563388]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.563443]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.563487] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.563525]                                      ^
[   29.563559]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.563603]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.563642] ==================================================================
[   29.307211] ==================================================================
[   29.307255] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858
[   29.307321] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.307505] 
[   29.307541] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.307626] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.307653] Hardware name: linux,dummy-virt (DT)
[   29.307684] Call trace:
[   29.307709]  show_stack+0x20/0x38 (C)
[   29.307757]  dump_stack_lvl+0x8c/0xd0
[   29.307971]  print_report+0x118/0x608
[   29.308059]  kasan_report+0xdc/0x128
[   29.308182]  kasan_check_range+0x100/0x1a8
[   29.308300]  __kasan_check_write+0x20/0x30
[   29.308629]  kasan_atomics_helper+0xca0/0x4858
[   29.308719]  kasan_atomics+0x198/0x2e0
[   29.308767]  kunit_try_run_case+0x170/0x3f0
[   29.308840]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.308895]  kthread+0x328/0x630
[   29.308939]  ret_from_fork+0x10/0x20
[   29.309132] 
[   29.309255] Allocated by task 277:
[   29.309350]  kasan_save_stack+0x3c/0x68
[   29.309652]  kasan_save_track+0x20/0x40
[   29.309812]  kasan_save_alloc_info+0x40/0x58
[   29.309894]  __kasan_kmalloc+0xd4/0xd8
[   29.309956]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.309997]  kasan_atomics+0xb8/0x2e0
[   29.310370]  kunit_try_run_case+0x170/0x3f0
[   29.310505]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.310786]  kthread+0x328/0x630
[   29.310890]  ret_from_fork+0x10/0x20
[   29.311058] 
[   29.311125] The buggy address belongs to the object at fff00000c787d680
[   29.311125]  which belongs to the cache kmalloc-64 of size 64
[   29.311257] The buggy address is located 0 bytes to the right of
[   29.311257]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.311321] 
[   29.311342] The buggy address belongs to the physical page:
[   29.311600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.311819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.312183] page_type: f5(slab)
[   29.312237] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.312316] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.312358] page dumped because: kasan: bad access detected
[   29.312438] 
[   29.312459] Memory state around the buggy address:
[   29.312695]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.312813]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.313166] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.313277]                                      ^
[   29.313358]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.313474]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.313619] ==================================================================
[   29.231448] ==================================================================
[   29.231510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   29.231563] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.231915] 
[   29.232064] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.232482] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.232618] Hardware name: linux,dummy-virt (DT)
[   29.232697] Call trace:
[   29.232799]  show_stack+0x20/0x38 (C)
[   29.232852]  dump_stack_lvl+0x8c/0xd0
[   29.233066]  print_report+0x118/0x608
[   29.233326]  kasan_report+0xdc/0x128
[   29.233579]  kasan_check_range+0x100/0x1a8
[   29.233702]  __kasan_check_write+0x20/0x30
[   29.233832]  kasan_atomics_helper+0x99c/0x4858
[   29.234038]  kasan_atomics+0x198/0x2e0
[   29.234233]  kunit_try_run_case+0x170/0x3f0
[   29.234321]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.234456]  kthread+0x328/0x630
[   29.234579]  ret_from_fork+0x10/0x20
[   29.234687] 
[   29.235085] Allocated by task 277:
[   29.235138]  kasan_save_stack+0x3c/0x68
[   29.235289]  kasan_save_track+0x20/0x40
[   29.235548]  kasan_save_alloc_info+0x40/0x58
[   29.235713]  __kasan_kmalloc+0xd4/0xd8
[   29.235925]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.236131]  kasan_atomics+0xb8/0x2e0
[   29.236170]  kunit_try_run_case+0x170/0x3f0
[   29.236418]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.236476]  kthread+0x328/0x630
[   29.236628]  ret_from_fork+0x10/0x20
[   29.236853] 
[   29.237033] The buggy address belongs to the object at fff00000c787d680
[   29.237033]  which belongs to the cache kmalloc-64 of size 64
[   29.237137] The buggy address is located 0 bytes to the right of
[   29.237137]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.237232] 
[   29.237462] The buggy address belongs to the physical page:
[   29.237671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.237784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.237973] page_type: f5(slab)
[   29.238114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.238204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.238463] page dumped because: kasan: bad access detected
[   29.239040] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.242936] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.243456]  kasan_check_range+0x100/0x1a8
[   29.244600]  kasan_save_stack+0x3c/0x68
[   29.246147] The buggy address is located 0 bytes to the right of
[   29.246147]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.246537] 
[   29.246645] The buggy address belongs to the physical page:
[   29.246721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.246920] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.247027] page_type: f5(slab)
[   29.247169] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.247221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.247269] page dumped because: kasan: bad access detected
[   29.247305] 
[   29.247325] Memory state around the buggy address:
[   29.247357]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.247412]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.247624] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.248135]                                      ^
[   29.248213]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.248320]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.248506] ==================================================================
[   29.371231] ==================================================================
[   29.371296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   29.372872] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.373138] 
[   29.373277] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.373997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.374483] Hardware name: linux,dummy-virt (DT)
[   29.374904] Call trace:
[   29.375084]  show_stack+0x20/0x38 (C)
[   29.375941]  dump_stack_lvl+0x8c/0xd0
[   29.376065]  print_report+0x118/0x608
[   29.376358]  kasan_report+0xdc/0x128
[   29.376506]  kasan_check_range+0x100/0x1a8
[   29.377477]  __kasan_check_write+0x20/0x30
[   29.377625]  kasan_atomics_helper+0xeb8/0x4858
[   29.377676]  kasan_atomics+0x198/0x2e0
[   29.378291]  kunit_try_run_case+0x170/0x3f0
[   29.378359]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.378426]  kthread+0x328/0x630
[   29.378471]  ret_from_fork+0x10/0x20
[   29.378522] 
[   29.380843] Allocated by task 277:
[   29.381090]  kasan_save_stack+0x3c/0x68
[   29.381359]  kasan_save_track+0x20/0x40
[   29.381471]  kasan_save_alloc_info+0x40/0x58
[   29.381622]  __kasan_kmalloc+0xd4/0xd8
[   29.382473]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.382580]  kasan_atomics+0xb8/0x2e0
[   29.382632]  kunit_try_run_case+0x170/0x3f0
[   29.382674]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.382720]  kthread+0x328/0x630
[   29.383548]  ret_from_fork+0x10/0x20
[   29.384062] 
[   29.384187] The buggy address belongs to the object at fff00000c787d680
[   29.384187]  which belongs to the cache kmalloc-64 of size 64
[   29.384740] The buggy address is located 0 bytes to the right of
[   29.384740]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.385426] 
[   29.386255] The buggy address belongs to the physical page:
[   29.386350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.386808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.386978] page_type: f5(slab)
[   29.387324] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.388189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.388969] page dumped because: kasan: bad access detected
[   29.389443] 
[   29.389575] Memory state around the buggy address:
[   29.389622]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.390387]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.390968] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.391049]                                      ^
[   29.391555]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.391699]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.391741] ==================================================================
[   29.064364] ==================================================================
[   29.064778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858
[   29.064899] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.065003] 
[   29.065127] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.065264] Hardware name: linux,dummy-virt (DT)
[   29.065298] Call trace:
[   29.065339]  show_stack+0x20/0x38 (C)
[   29.065515]  dump_stack_lvl+0x8c/0xd0
[   29.065754]  print_report+0x118/0x608
[   29.065829]  kasan_report+0xdc/0x128
[   29.065877]  kasan_check_range+0x100/0x1a8
[   29.065928]  __kasan_check_read+0x20/0x30
[   29.065975]  kasan_atomics_helper+0x1ec/0x4858
[   29.066023]  kasan_atomics+0x198/0x2e0
[   29.066070]  kunit_try_run_case+0x170/0x3f0
[   29.066121]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.066174]  kthread+0x328/0x630
[   29.066242]  ret_from_fork+0x10/0x20
[   29.066293] 
[   29.066313] Allocated by task 277:
[   29.066341]  kasan_save_stack+0x3c/0x68
[   29.066406]  kasan_save_track+0x20/0x40
[   29.066448]  kasan_save_alloc_info+0x40/0x58
[   29.066544]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.066586]  kasan_atomics+0xb8/0x2e0
[   29.066762]  ret_from_fork+0x10/0x20
[   29.066897] The buggy address is located 0 bytes to the right of
[   29.066897]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.066974] 
[   29.067030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.067082] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.067129] page_type: f5(slab)
[   29.067244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.068377] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.068872]                                      ^
[   29.069472]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.070644] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858
[   29.070926] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.075504] 
[   29.076729] 
[   29.077415] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.079754] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.080677]  __kasan_check_read+0x20/0x30
[   29.082266]  kasan_save_stack+0x3c/0x68
[   29.083753] The buggy address is located 0 bytes to the right of
[   29.083753]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.087568] 
[   29.087724] Hardware name: linux,dummy-virt (DT)
[   29.088694]  kasan_atomics_helper+0x40fc/0x4858
[   29.091219]  kthread+0x328/0x630
[   29.092705] page dumped because: kasan: bad access detected
[   29.093437] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.096083] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.097514]  kasan_atomics_helper+0x32c/0x4858
[   29.099259] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.101207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.103603]  kthread+0x328/0x630
[   29.104717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.106015] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.108560] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.109588]  __kasan_check_write+0x20/0x30
[   29.112289]  kasan_save_alloc_info+0x40/0x58
[   29.115367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.115842] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.119037] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.120743]  kasan_atomics+0x198/0x2e0
[   29.121729]  kasan_atomics+0xb8/0x2e0
[   29.122206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.124691]  kasan_atomics_helper+0x47c/0x4858
[   29.125518] The buggy address is located 0 bytes to the right of
[   29.125518]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.127710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.129726] 
[   29.131214] 
[   29.131450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.131897] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.133198] Hardware name: linux,dummy-virt (DT)
[   29.134071]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.136463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.138615] Hardware name: linux,dummy-virt (DT)
[   29.139845]  kunit_try_run_case+0x170/0x3f0
[   29.145732] The buggy address is located 0 bytes to the right of
[   29.145732]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.153649] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858
[   29.177973]  __kasan_kmalloc+0xd4/0xd8
[   29.179921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.181272]                                      ^
[   29.183738] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.186765]  kasan_atomics+0xb8/0x2e0
[   29.187568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.188488] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.190617]  show_stack+0x20/0x38 (C)
[   29.191801]  kasan_atomics+0x198/0x2e0
[   29.194685] The buggy address is located 0 bytes to the right of
[   29.194685]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.196894] ==================================================================
[   29.439276] ==================================================================
[   29.439335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   29.439391] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.442417] 
[   29.443090] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.443432] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.443516] Hardware name: linux,dummy-virt (DT)
[   29.443573] Call trace:
[   29.443637]  show_stack+0x20/0x38 (C)
[   29.443693]  dump_stack_lvl+0x8c/0xd0
[   29.444018]  print_report+0x118/0x608
[   29.444077]  kasan_report+0xdc/0x128
[   29.444123]  kasan_check_range+0x100/0x1a8
[   29.444172]  __kasan_check_write+0x20/0x30
[   29.444218]  kasan_atomics_helper+0xff0/0x4858
[   29.444268]  kasan_atomics+0x198/0x2e0
[   29.446042]  kunit_try_run_case+0x170/0x3f0
[   29.446307]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.447078]  kthread+0x328/0x630
[   29.447367]  ret_from_fork+0x10/0x20
[   29.447480] 
[   29.447901] Allocated by task 277:
[   29.448249]  kasan_save_stack+0x3c/0x68
[   29.448519]  kasan_save_track+0x20/0x40
[   29.448994]  kasan_save_alloc_info+0x40/0x58
[   29.449432]  __kasan_kmalloc+0xd4/0xd8
[   29.450329]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.450495]  kasan_atomics+0xb8/0x2e0
[   29.450714]  kunit_try_run_case+0x170/0x3f0
[   29.450804]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.450851]  kthread+0x328/0x630
[   29.451363]  ret_from_fork+0x10/0x20
[   29.451428] 
[   29.451968] The buggy address belongs to the object at fff00000c787d680
[   29.451968]  which belongs to the cache kmalloc-64 of size 64
[   29.452752] The buggy address is located 0 bytes to the right of
[   29.452752]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.453244] 
[   29.453275] The buggy address belongs to the physical page:
[   29.453826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.454265] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.454483] page_type: f5(slab)
[   29.454890] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.455633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.455949] page dumped because: kasan: bad access detected
[   29.455987] 
[   29.456460] Memory state around the buggy address:
[   29.456504]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.457167]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.457553] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.457912]                                      ^
[   29.458171]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.458220]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.458853] ==================================================================
[   29.527921] ==================================================================
[   29.527972] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   29.528021] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.528275] 
[   29.528337] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.528741] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.528881] Hardware name: linux,dummy-virt (DT)
[   29.528990] Call trace:
[   29.529135]  show_stack+0x20/0x38 (C)
[   29.529253]  dump_stack_lvl+0x8c/0xd0
[   29.529335]  print_report+0x118/0x608
[   29.529527]  kasan_report+0xdc/0x128
[   29.529577]  kasan_check_range+0x100/0x1a8
[   29.529632]  __kasan_check_write+0x20/0x30
[   29.529679]  kasan_atomics_helper+0x12d8/0x4858
[   29.530005]  kasan_atomics+0x198/0x2e0
[   29.530180]  kunit_try_run_case+0x170/0x3f0
[   29.530300]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.530690]  kthread+0x328/0x630
[   29.530884]  ret_from_fork+0x10/0x20
[   29.530979] 
[   29.531002] Allocated by task 277:
[   29.531032]  kasan_save_stack+0x3c/0x68
[   29.531373]  kasan_save_track+0x20/0x40
[   29.531496]  kasan_save_alloc_info+0x40/0x58
[   29.531610]  __kasan_kmalloc+0xd4/0xd8
[   29.531968]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.532020]  kasan_atomics+0xb8/0x2e0
[   29.532091]  kunit_try_run_case+0x170/0x3f0
[   29.532139]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.532186]  kthread+0x328/0x630
[   29.532449]  ret_from_fork+0x10/0x20
[   29.532579] 
[   29.532700] The buggy address belongs to the object at fff00000c787d680
[   29.532700]  which belongs to the cache kmalloc-64 of size 64
[   29.532835] The buggy address is located 0 bytes to the right of
[   29.532835]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.533032] 
[   29.533373] The buggy address belongs to the physical page:
[   29.533438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.533536] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.533611] page_type: f5(slab)
[   29.533647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.533895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.534032] page dumped because: kasan: bad access detected
[   29.534159] 
[   29.534237] Memory state around the buggy address:
[   29.534331]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.534698]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.534762] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.534814]                                      ^
[   29.534862]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.534922]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.534971] ==================================================================
[   29.461306] ==================================================================
[   29.461439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   29.461917] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.461993] 
[   29.462233] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.462851] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.462889] Hardware name: linux,dummy-virt (DT)
[   29.462924] Call trace:
[   29.462950]  show_stack+0x20/0x38 (C)
[   29.463413]  dump_stack_lvl+0x8c/0xd0
[   29.463483]  print_report+0x118/0x608
[   29.463532]  kasan_report+0xdc/0x128
[   29.463659]  kasan_check_range+0x100/0x1a8
[   29.463720]  __kasan_check_write+0x20/0x30
[   29.464092]  kasan_atomics_helper+0x1058/0x4858
[   29.464147]  kasan_atomics+0x198/0x2e0
[   29.464917]  kunit_try_run_case+0x170/0x3f0
[   29.464987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.465043]  kthread+0x328/0x630
[   29.465088]  ret_from_fork+0x10/0x20
[   29.465139] 
[   29.465160] Allocated by task 277:
[   29.465190]  kasan_save_stack+0x3c/0x68
[   29.465734]  kasan_save_track+0x20/0x40
[   29.465786]  kasan_save_alloc_info+0x40/0x58
[   29.465826]  __kasan_kmalloc+0xd4/0xd8
[   29.465867]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.465910]  kasan_atomics+0xb8/0x2e0
[   29.465948]  kunit_try_run_case+0x170/0x3f0
[   29.465988]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.466035]  kthread+0x328/0x630
[   29.466916]  ret_from_fork+0x10/0x20
[   29.466968] 
[   29.466990] The buggy address belongs to the object at fff00000c787d680
[   29.466990]  which belongs to the cache kmalloc-64 of size 64
[   29.467247] The buggy address is located 0 bytes to the right of
[   29.467247]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.467820] 
[   29.467931] The buggy address belongs to the physical page:
[   29.467970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.468028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.468079] page_type: f5(slab)
[   29.468119] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.468168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.468212] page dumped because: kasan: bad access detected
[   29.469037] 
[   29.469063] Memory state around the buggy address:
[   29.469108]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.469383]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.469443] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.469481]                                      ^
[   29.469517]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.469561]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.469601] ==================================================================
[   29.257249] ==================================================================
[   29.257697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858
[   29.257766] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.257819] 
[   29.258034] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.258133] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.258566] Hardware name: linux,dummy-virt (DT)
[   29.258739] Call trace:
[   29.258774]  show_stack+0x20/0x38 (C)
[   29.258828]  dump_stack_lvl+0x8c/0xd0
[   29.258879]  print_report+0x118/0x608
[   29.259183]  kasan_report+0xdc/0x128
[   29.259618]  kasan_check_range+0x100/0x1a8
[   29.259693]  __kasan_check_write+0x20/0x30
[   29.259741]  kasan_atomics_helper+0xad4/0x4858
[   29.259899]  kasan_atomics+0x198/0x2e0
[   29.260217]  kunit_try_run_case+0x170/0x3f0
[   29.260630]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.260893]  kthread+0x328/0x630
[   29.261035]  ret_from_fork+0x10/0x20
[   29.261201] 
[   29.261253] Allocated by task 277:
[   29.261285]  kasan_save_stack+0x3c/0x68
[   29.261762]  kasan_save_track+0x20/0x40
[   29.261829]  kasan_save_alloc_info+0x40/0x58
[   29.261894]  __kasan_kmalloc+0xd4/0xd8
[   29.262103]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.262481]  kasan_atomics+0xb8/0x2e0
[   29.262748]  kunit_try_run_case+0x170/0x3f0
[   29.263024]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.263083]  kthread+0x328/0x630
[   29.263475]  ret_from_fork+0x10/0x20
[   29.263557] 
[   29.263752] The buggy address belongs to the object at fff00000c787d680
[   29.263752]  which belongs to the cache kmalloc-64 of size 64
[   29.263987] The buggy address is located 0 bytes to the right of
[   29.263987]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.264222] 
[   29.264434] The buggy address belongs to the physical page:
[   29.264510] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.264678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.264783] page_type: f5(slab)
[   29.264929] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.265004] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.265055] page dumped because: kasan: bad access detected
[   29.265088] 
[   29.265109] Memory state around the buggy address:
[   29.265143]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.265433]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.265964] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.266027]                                      ^
[   29.266189]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.266369]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.266420] ==================================================================
[   29.277622] ==================================================================
[   29.277991] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   29.278099] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.278367] 
[   29.278420] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.278686] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.278730] Hardware name: linux,dummy-virt (DT)
[   29.278766] Call trace:
[   29.278929]  show_stack+0x20/0x38 (C)
[   29.279073]  dump_stack_lvl+0x8c/0xd0
[   29.279126]  print_report+0x118/0x608
[   29.279211]  kasan_report+0xdc/0x128
[   29.279291]  kasan_check_range+0x100/0x1a8
[   29.279346]  __kasan_check_write+0x20/0x30
[   29.279467]  kasan_atomics_helper+0xb70/0x4858
[   29.279522]  kasan_atomics+0x198/0x2e0
[   29.279569]  kunit_try_run_case+0x170/0x3f0
[   29.279941]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.280054]  kthread+0x328/0x630
[   29.280391]  ret_from_fork+0x10/0x20
[   29.280586] 
[   29.280613] Allocated by task 277:
[   29.280645]  kasan_save_stack+0x3c/0x68
[   29.280717]  kasan_save_track+0x20/0x40
[   29.280903]  kasan_save_alloc_info+0x40/0x58
[   29.281068]  __kasan_kmalloc+0xd4/0xd8
[   29.281289]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.281523]  kasan_atomics+0xb8/0x2e0
[   29.281583]  kunit_try_run_case+0x170/0x3f0
[   29.281625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.281872]  kthread+0x328/0x630
[   29.282150]  ret_from_fork+0x10/0x20
[   29.282410] 
[   29.282438] The buggy address belongs to the object at fff00000c787d680
[   29.282438]  which belongs to the cache kmalloc-64 of size 64
[   29.282621] The buggy address is located 0 bytes to the right of
[   29.282621]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.282913] 
[   29.282965] The buggy address belongs to the physical page:
[   29.283348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.283553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.283631] page_type: f5(slab)
[   29.284014] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.284277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.284512] page dumped because: kasan: bad access detected
[   29.284728] 
[   29.284845] Memory state around the buggy address:
[   29.284922]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.285208]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.285433] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.285508]                                      ^
[   29.285864]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.285981]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.286182] ==================================================================
[   29.492408] ==================================================================
[   29.492608] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   29.492680] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.492746] 
[   29.493094] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.493289] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.493317] Hardware name: linux,dummy-virt (DT)
[   29.493651] Call trace:
[   29.493688]  show_stack+0x20/0x38 (C)
[   29.493757]  dump_stack_lvl+0x8c/0xd0
[   29.493871]  print_report+0x118/0x608
[   29.494296]  kasan_report+0xdc/0x128
[   29.494863]  kasan_check_range+0x100/0x1a8
[   29.494939]  __kasan_check_write+0x20/0x30
[   29.494987]  kasan_atomics_helper+0x1190/0x4858
[   29.495525]  kasan_atomics+0x198/0x2e0
[   29.495716]  kunit_try_run_case+0x170/0x3f0
[   29.495770]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.495825]  kthread+0x328/0x630
[   29.495876]  ret_from_fork+0x10/0x20
[   29.495927] 
[   29.495949] Allocated by task 277:
[   29.495980]  kasan_save_stack+0x3c/0x68
[   29.496781]  kasan_save_track+0x20/0x40
[   29.496843]  kasan_save_alloc_info+0x40/0x58
[   29.496883]  __kasan_kmalloc+0xd4/0xd8
[   29.496923]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.496967]  kasan_atomics+0xb8/0x2e0
[   29.497190]  kunit_try_run_case+0x170/0x3f0
[   29.497450]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.497506]  kthread+0x328/0x630
[   29.497719]  ret_from_fork+0x10/0x20
[   29.497797] 
[   29.497819] The buggy address belongs to the object at fff00000c787d680
[   29.497819]  which belongs to the cache kmalloc-64 of size 64
[   29.498034] The buggy address is located 0 bytes to the right of
[   29.498034]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.498470] 
[   29.498594] The buggy address belongs to the physical page:
[   29.498769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.498832] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.499201] page_type: f5(slab)
[   29.499367] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.499543] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.499593] page dumped because: kasan: bad access detected
[   29.499931] 
[   29.499962] Memory state around the buggy address:
[   29.500294]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.500940]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.501163] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.501206]                                      ^
[   29.501243]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.501289]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.501724] ==================================================================
[   29.600587] ==================================================================
[   29.600634] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   29.600965] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.601031] 
[   29.601081] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.601173] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.601218] Hardware name: linux,dummy-virt (DT)
[   29.601255] Call trace:
[   29.601281]  show_stack+0x20/0x38 (C)
[   29.601329]  dump_stack_lvl+0x8c/0xd0
[   29.601719]  print_report+0x118/0x608
[   29.601783]  kasan_report+0xdc/0x128
[   29.601882]  kasan_check_range+0x100/0x1a8
[   29.602005]  __kasan_check_write+0x20/0x30
[   29.602053]  kasan_atomics_helper+0x175c/0x4858
[   29.602111]  kasan_atomics+0x198/0x2e0
[   29.602215]  kunit_try_run_case+0x170/0x3f0
[   29.602364]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.602431]  kthread+0x328/0x630
[   29.602474]  ret_from_fork+0x10/0x20
[   29.602871] 
[   29.602961] Allocated by task 277:
[   29.602998]  kasan_save_stack+0x3c/0x68
[   29.603295]  kasan_save_track+0x20/0x40
[   29.603351]  kasan_save_alloc_info+0x40/0x58
[   29.603564]  __kasan_kmalloc+0xd4/0xd8
[   29.603680]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.603723]  kasan_atomics+0xb8/0x2e0
[   29.603781]  kunit_try_run_case+0x170/0x3f0
[   29.603823]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.604327]  kthread+0x328/0x630
[   29.604434]  ret_from_fork+0x10/0x20
[   29.604796] 
[   29.604874] The buggy address belongs to the object at fff00000c787d680
[   29.604874]  which belongs to the cache kmalloc-64 of size 64
[   29.604955] The buggy address is located 0 bytes to the right of
[   29.604955]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.605044] 
[   29.605067] The buggy address belongs to the physical page:
[   29.605102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.605154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.605203] page_type: f5(slab)
[   29.605242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.605615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.605704] page dumped because: kasan: bad access detected
[   29.605778] 
[   29.605801] Memory state around the buggy address:
[   29.605835]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.605894]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.605940] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.605989]                                      ^
[   29.606025]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.606078]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.606119] ==================================================================
[   29.330744] ==================================================================
[   29.331117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   29.331178] Read of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.331229] 
[   29.331259] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.331513] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.331556] Hardware name: linux,dummy-virt (DT)
[   29.331589] Call trace:
[   29.331612]  show_stack+0x20/0x38 (C)
[   29.331690]  dump_stack_lvl+0x8c/0xd0
[   29.331755]  print_report+0x118/0x608
[   29.331810]  kasan_report+0xdc/0x128
[   29.331950]  kasan_check_range+0x100/0x1a8
[   29.332104]  __kasan_check_read+0x20/0x30
[   29.332212]  kasan_atomics_helper+0xdd4/0x4858
[   29.332282]  kasan_atomics+0x198/0x2e0
[   29.332330]  kunit_try_run_case+0x170/0x3f0
[   29.332378]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.332580]  kthread+0x328/0x630
[   29.332634]  ret_from_fork+0x10/0x20
[   29.332747] 
[   29.332880] Allocated by task 277:
[   29.332988]  kasan_save_stack+0x3c/0x68
[   29.333106]  kasan_save_track+0x20/0x40
[   29.333203]  kasan_save_alloc_info+0x40/0x58
[   29.333545]  __kasan_kmalloc+0xd4/0xd8
[   29.333690]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.333797]  kasan_atomics+0xb8/0x2e0
[   29.333848]  kunit_try_run_case+0x170/0x3f0
[   29.333888]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.333934]  kthread+0x328/0x630
[   29.333970]  ret_from_fork+0x10/0x20
[   29.334009] 
[   29.334144] The buggy address belongs to the object at fff00000c787d680
[   29.334144]  which belongs to the cache kmalloc-64 of size 64
[   29.334278] The buggy address is located 0 bytes to the right of
[   29.334278]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.334392] 
[   29.334473] The buggy address belongs to the physical page:
[   29.334506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.334692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.334821] page_type: f5(slab)
[   29.334920] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.335050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.335169] page dumped because: kasan: bad access detected
[   29.335284] 
[   29.335351] Memory state around the buggy address:
[   29.335385]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.335442]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.335803] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.335908]                                      ^
[   29.335975]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.336040]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.336360] ==================================================================
[   29.349785] ==================================================================
[   29.349845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   29.349896] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.349946] 
[   29.349979] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.350097] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.350137] Hardware name: linux,dummy-virt (DT)
[   29.350181] Call trace:
[   29.350299]  show_stack+0x20/0x38 (C)
[   29.350366]  dump_stack_lvl+0x8c/0xd0
[   29.350427]  print_report+0x118/0x608
[   29.350478]  kasan_report+0xdc/0x128
[   29.350526]  __asan_report_store8_noabort+0x20/0x30
[   29.350582]  kasan_atomics_helper+0x3e5c/0x4858
[   29.351981]  kasan_atomics+0x198/0x2e0
[   29.352311]  kunit_try_run_case+0x170/0x3f0
[   29.352984]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.353093]  kthread+0x328/0x630
[   29.353138]  ret_from_fork+0x10/0x20
[   29.353189] 
[   29.353536] Allocated by task 277:
[   29.353634]  kasan_save_stack+0x3c/0x68
[   29.354331]  kasan_save_track+0x20/0x40
[   29.355205]  kasan_save_alloc_info+0x40/0x58
[   29.355420]  __kasan_kmalloc+0xd4/0xd8
[   29.355852]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.355959]  kasan_atomics+0xb8/0x2e0
[   29.356773]  kunit_try_run_case+0x170/0x3f0
[   29.357167]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.357842]  kthread+0x328/0x630
[   29.358117]  ret_from_fork+0x10/0x20
[   29.358159] 
[   29.358182] The buggy address belongs to the object at fff00000c787d680
[   29.358182]  which belongs to the cache kmalloc-64 of size 64
[   29.358949] The buggy address is located 0 bytes to the right of
[   29.358949]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.359782] 
[   29.359955] The buggy address belongs to the physical page:
[   29.360221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.360760] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.361094] page_type: f5(slab)
[   29.361142] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.362163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.362419] page dumped because: kasan: bad access detected
[   29.362990] 
[   29.363050] Memory state around the buggy address:
[   29.363089]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.363365]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.363995] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.364422]                                      ^
[   29.364666]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.365098]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.365699] ==================================================================
[   29.320744] ==================================================================
[   29.320818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   29.321043] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.321095] 
[   29.321298] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.321508] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.321567] Hardware name: linux,dummy-virt (DT)
[   29.321600] Call trace:
[   29.321682]  show_stack+0x20/0x38 (C)
[   29.321734]  dump_stack_lvl+0x8c/0xd0
[   29.321800]  print_report+0x118/0x608
[   29.321885]  kasan_report+0xdc/0x128
[   29.321957]  kasan_check_range+0x100/0x1a8
[   29.322009]  __kasan_check_write+0x20/0x30
[   29.322056]  kasan_atomics_helper+0xd3c/0x4858
[   29.322115]  kasan_atomics+0x198/0x2e0
[   29.322162]  kunit_try_run_case+0x170/0x3f0
[   29.322347]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.322626]  kthread+0x328/0x630
[   29.322689]  ret_from_fork+0x10/0x20
[   29.322739] 
[   29.322844] Allocated by task 277:
[   29.323029]  kasan_save_stack+0x3c/0x68
[   29.323147]  kasan_save_track+0x20/0x40
[   29.323212]  kasan_save_alloc_info+0x40/0x58
[   29.323290]  __kasan_kmalloc+0xd4/0xd8
[   29.323357]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.323429]  kasan_atomics+0xb8/0x2e0
[   29.323506]  kunit_try_run_case+0x170/0x3f0
[   29.323548]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.323593]  kthread+0x328/0x630
[   29.323737]  ret_from_fork+0x10/0x20
[   29.323989] 
[   29.324106] The buggy address belongs to the object at fff00000c787d680
[   29.324106]  which belongs to the cache kmalloc-64 of size 64
[   29.324339] The buggy address is located 0 bytes to the right of
[   29.324339]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.324520] 
[   29.324590] The buggy address belongs to the physical page:
[   29.324668] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.324731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.324779] page_type: f5(slab)
[   29.324816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.324868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.324909] page dumped because: kasan: bad access detected
[   29.324942] 
[   29.324984] Memory state around the buggy address:
[   29.325018]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.325063]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.325318] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.325477]                                      ^
[   29.325800]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.325940]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.326019] ==================================================================
[   29.589936] ==================================================================
[   29.589976] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   29.590020] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.590069] 
[   29.590097] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.590180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.590207] Hardware name: linux,dummy-virt (DT)
[   29.590238] Call trace:
[   29.590261]  show_stack+0x20/0x38 (C)
[   29.590307]  dump_stack_lvl+0x8c/0xd0
[   29.590354]  print_report+0x118/0x608
[   29.590452]  kasan_report+0xdc/0x128
[   29.590551]  kasan_check_range+0x100/0x1a8
[   29.590641]  __kasan_check_write+0x20/0x30
[   29.590688]  kasan_atomics_helper+0x16d0/0x4858
[   29.590775]  kasan_atomics+0x198/0x2e0
[   29.590948]  kunit_try_run_case+0x170/0x3f0
[   29.591118]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.591240]  kthread+0x328/0x630
[   29.591316]  ret_from_fork+0x10/0x20
[   29.591551] 
[   29.591594] Allocated by task 277:
[   29.591624]  kasan_save_stack+0x3c/0x68
[   29.591668]  kasan_save_track+0x20/0x40
[   29.591731]  kasan_save_alloc_info+0x40/0x58
[   29.591771]  __kasan_kmalloc+0xd4/0xd8
[   29.591810]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.591851]  kasan_atomics+0xb8/0x2e0
[   29.591907]  kunit_try_run_case+0x170/0x3f0
[   29.591960]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.592006]  kthread+0x328/0x630
[   29.592041]  ret_from_fork+0x10/0x20
[   29.592079] 
[   29.592100] The buggy address belongs to the object at fff00000c787d680
[   29.592100]  which belongs to the cache kmalloc-64 of size 64
[   29.592159] The buggy address is located 0 bytes to the right of
[   29.592159]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.592429] 
[   29.592566] The buggy address belongs to the physical page:
[   29.592663] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.592802] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.592939] page_type: f5(slab)
[   29.593055] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.593139] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.593592] page dumped because: kasan: bad access detected
[   29.593634] 
[   29.593654] Memory state around the buggy address:
[   29.593699]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.593774]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.594161] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.594325]                                      ^
[   29.594418]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.594463]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.594504] ==================================================================
[   29.471440] ==================================================================
[   29.471494] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   29.471546] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.471597] 
[   29.471628] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.471713] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.472910] Hardware name: linux,dummy-virt (DT)
[   29.472987] Call trace:
[   29.473013]  show_stack+0x20/0x38 (C)
[   29.473457]  dump_stack_lvl+0x8c/0xd0
[   29.473523]  print_report+0x118/0x608
[   29.473902]  kasan_report+0xdc/0x128
[   29.474175]  kasan_check_range+0x100/0x1a8
[   29.474226]  __kasan_check_write+0x20/0x30
[   29.474306]  kasan_atomics_helper+0x10c0/0x4858
[   29.474358]  kasan_atomics+0x198/0x2e0
[   29.474417]  kunit_try_run_case+0x170/0x3f0
[   29.474467]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.474961]  kthread+0x328/0x630
[   29.475018]  ret_from_fork+0x10/0x20
[   29.475336] 
[   29.475366] Allocated by task 277:
[   29.475501]  kasan_save_stack+0x3c/0x68
[   29.475954]  kasan_save_track+0x20/0x40
[   29.476003]  kasan_save_alloc_info+0x40/0x58
[   29.476044]  __kasan_kmalloc+0xd4/0xd8
[   29.476212]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.476304]  kasan_atomics+0xb8/0x2e0
[   29.476723]  kunit_try_run_case+0x170/0x3f0
[   29.476769]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.476818]  kthread+0x328/0x630
[   29.476861]  ret_from_fork+0x10/0x20
[   29.476901] 
[   29.477375] The buggy address belongs to the object at fff00000c787d680
[   29.477375]  which belongs to the cache kmalloc-64 of size 64
[   29.477514] The buggy address is located 0 bytes to the right of
[   29.477514]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.477724] 
[   29.477747] The buggy address belongs to the physical page:
[   29.477874] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.477992] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.478314] page_type: f5(slab)
[   29.478359] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.478684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.478961] page dumped because: kasan: bad access detected
[   29.479001] 
[   29.479022] Memory state around the buggy address:
[   29.479058]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.479536]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.479670] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.479759]                                      ^
[   29.479796]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.480116]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.480164] ==================================================================
[   29.397948] ==================================================================
[   29.398011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   29.398076] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.399046] 
[   29.399263] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.399355] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.399383] Hardware name: linux,dummy-virt (DT)
[   29.399430] Call trace:
[   29.400728]  show_stack+0x20/0x38 (C)
[   29.400853]  dump_stack_lvl+0x8c/0xd0
[   29.400938]  print_report+0x118/0x608
[   29.401355]  kasan_report+0xdc/0x128
[   29.401795]  kasan_check_range+0x100/0x1a8
[   29.402761]  __kasan_check_write+0x20/0x30
[   29.403157]  kasan_atomics_helper+0xf20/0x4858
[   29.403494]  kasan_atomics+0x198/0x2e0
[   29.403544]  kunit_try_run_case+0x170/0x3f0
[   29.403603]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.403659]  kthread+0x328/0x630
[   29.405744]  ret_from_fork+0x10/0x20
[   29.406130] 
[   29.406211] Allocated by task 277:
[   29.406286]  kasan_save_stack+0x3c/0x68
[   29.406336]  kasan_save_track+0x20/0x40
[   29.406378]  kasan_save_alloc_info+0x40/0x58
[   29.406428]  __kasan_kmalloc+0xd4/0xd8
[   29.407105]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.407467]  kasan_atomics+0xb8/0x2e0
[   29.407721]  kunit_try_run_case+0x170/0x3f0
[   29.407764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.407810]  kthread+0x328/0x630
[   29.407846]  ret_from_fork+0x10/0x20
[   29.408493] 
[   29.408518] The buggy address belongs to the object at fff00000c787d680
[   29.408518]  which belongs to the cache kmalloc-64 of size 64
[   29.409377] The buggy address is located 0 bytes to the right of
[   29.409377]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.409918] 
[   29.410359] The buggy address belongs to the physical page:
[   29.410836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.411013] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.412049] page_type: f5(slab)
[   29.412174] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.412242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.412767] page dumped because: kasan: bad access detected
[   29.412942] 
[   29.413300] Memory state around the buggy address:
[   29.413600]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.414127]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.414180] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.414220]                                      ^
[   29.414257]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.414303]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.415655] ==================================================================
[   29.535228] ==================================================================
[   29.535416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   29.535568] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.535621] 
[   29.535678] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.535793] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.535840] Hardware name: linux,dummy-virt (DT)
[   29.536082] Call trace:
[   29.536133]  show_stack+0x20/0x38 (C)
[   29.536191]  dump_stack_lvl+0x8c/0xd0
[   29.536241]  print_report+0x118/0x608
[   29.536288]  kasan_report+0xdc/0x128
[   29.536419]  kasan_check_range+0x100/0x1a8
[   29.536599]  __kasan_check_write+0x20/0x30
[   29.536942]  kasan_atomics_helper+0x1384/0x4858
[   29.537091]  kasan_atomics+0x198/0x2e0
[   29.537572]  kunit_try_run_case+0x170/0x3f0
[   29.537705]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.538027]  kthread+0x328/0x630
[   29.538096]  ret_from_fork+0x10/0x20
[   29.538164] 
[   29.538208] Allocated by task 277:
[   29.538238]  kasan_save_stack+0x3c/0x68
[   29.538280]  kasan_save_track+0x20/0x40
[   29.538320]  kasan_save_alloc_info+0x40/0x58
[   29.538374]  __kasan_kmalloc+0xd4/0xd8
[   29.538425]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.538466]  kasan_atomics+0xb8/0x2e0
[   29.538505]  kunit_try_run_case+0x170/0x3f0
[   29.538884]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.538943]  kthread+0x328/0x630
[   29.539082]  ret_from_fork+0x10/0x20
[   29.539264] 
[   29.539409] The buggy address belongs to the object at fff00000c787d680
[   29.539409]  which belongs to the cache kmalloc-64 of size 64
[   29.539510] The buggy address is located 0 bytes to the right of
[   29.539510]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.539579] 
[   29.539611] The buggy address belongs to the physical page:
[   29.539931] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.540086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.540198] page_type: f5(slab)
[   29.540298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.540631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.540696] page dumped because: kasan: bad access detected
[   29.540730] 
[   29.540751] Memory state around the buggy address:
[   29.540942]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.540989]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.541033] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.541259]                                      ^
[   29.541337]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.541455]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.541842] ==================================================================
[   29.297232] ==================================================================
[   29.297302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858
[   29.297354] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.297812] 
[   29.297862] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.297958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.298500] Hardware name: linux,dummy-virt (DT)
[   29.298600] Call trace:
[   29.298628]  show_stack+0x20/0x38 (C)
[   29.298692]  dump_stack_lvl+0x8c/0xd0
[   29.298950]  print_report+0x118/0x608
[   29.299031]  kasan_report+0xdc/0x128
[   29.299082]  kasan_check_range+0x100/0x1a8
[   29.299525]  __kasan_check_write+0x20/0x30
[   29.299687]  kasan_atomics_helper+0xc08/0x4858
[   29.299747]  kasan_atomics+0x198/0x2e0
[   29.299804]  kunit_try_run_case+0x170/0x3f0
[   29.300202]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.300282]  kthread+0x328/0x630
[   29.300327]  ret_from_fork+0x10/0x20
[   29.300378] 
[   29.300413] Allocated by task 277:
[   29.300668]  kasan_save_stack+0x3c/0x68
[   29.300947]  kasan_save_track+0x20/0x40
[   29.300993]  kasan_save_alloc_info+0x40/0x58
[   29.301407]  __kasan_kmalloc+0xd4/0xd8
[   29.301517]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.301631]  kasan_atomics+0xb8/0x2e0
[   29.301939]  kunit_try_run_case+0x170/0x3f0
[   29.302054]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.302330]  kthread+0x328/0x630
[   29.302485]  ret_from_fork+0x10/0x20
[   29.302591] 
[   29.302616] The buggy address belongs to the object at fff00000c787d680
[   29.302616]  which belongs to the cache kmalloc-64 of size 64
[   29.302691] The buggy address is located 0 bytes to the right of
[   29.302691]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.302760] 
[   29.302784] The buggy address belongs to the physical page:
[   29.302833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.302885] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.302933] page_type: f5(slab)
[   29.302972] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.303022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.303063] page dumped because: kasan: bad access detected
[   29.303096] 
[   29.303146] Memory state around the buggy address:
[   29.303195]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.303253]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.303297] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.303348]                                      ^
[   29.303384]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.303439]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.303493] ==================================================================
[   29.343765] ==================================================================
[   29.343815] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   29.343903] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.343956] 
[   29.343988] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.344119] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.344149] Hardware name: linux,dummy-virt (DT)
[   29.344183] Call trace:
[   29.344209]  show_stack+0x20/0x38 (C)
[   29.344257]  dump_stack_lvl+0x8c/0xd0
[   29.344303]  print_report+0x118/0x608
[   29.344352]  kasan_report+0xdc/0x128
[   29.344686]  kasan_check_range+0x100/0x1a8
[   29.344819]  __kasan_check_write+0x20/0x30
[   29.344927]  kasan_atomics_helper+0xe44/0x4858
[   29.344980]  kasan_atomics+0x198/0x2e0
[   29.345185]  kunit_try_run_case+0x170/0x3f0
[   29.345290]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.345456]  kthread+0x328/0x630
[   29.345530]  ret_from_fork+0x10/0x20
[   29.345581] 
[   29.345731] Allocated by task 277:
[   29.345795]  kasan_save_stack+0x3c/0x68
[   29.345931]  kasan_save_track+0x20/0x40
[   29.346011]  kasan_save_alloc_info+0x40/0x58
[   29.346208]  __kasan_kmalloc+0xd4/0xd8
[   29.346448]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.346518]  kasan_atomics+0xb8/0x2e0
[   29.346607]  kunit_try_run_case+0x170/0x3f0
[   29.346709]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.346827]  kthread+0x328/0x630
[   29.346865]  ret_from_fork+0x10/0x20
[   29.346902] 
[   29.346925] The buggy address belongs to the object at fff00000c787d680
[   29.346925]  which belongs to the cache kmalloc-64 of size 64
[   29.346984] The buggy address is located 0 bytes to the right of
[   29.346984]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.347231] 
[   29.347281] The buggy address belongs to the physical page:
[   29.347350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.347446] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.347733] page_type: f5(slab)
[   29.347825] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.348017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.348061] page dumped because: kasan: bad access detected
[   29.348116] 
[   29.348137] Memory state around the buggy address:
[   29.348172]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.348215]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.348260] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.348301]                                      ^
[   29.348335]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.348380]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.348540] ==================================================================
[   29.287023] ==================================================================
[   29.287080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   29.287136] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.287196] 
[   29.287228] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.287318] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.287355] Hardware name: linux,dummy-virt (DT)
[   29.287389] Call trace:
[   29.287426]  show_stack+0x20/0x38 (C)
[   29.287476]  dump_stack_lvl+0x8c/0xd0
[   29.287534]  print_report+0x118/0x608
[   29.287584]  kasan_report+0xdc/0x128
[   29.287633]  __asan_report_load4_noabort+0x20/0x30
[   29.287682]  kasan_atomics_helper+0x3dbc/0x4858
[   29.287732]  kasan_atomics+0x198/0x2e0
[   29.287779]  kunit_try_run_case+0x170/0x3f0
[   29.287828]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.288559]  kthread+0x328/0x630
[   29.288643]  ret_from_fork+0x10/0x20
[   29.288748] 
[   29.289203] Allocated by task 277:
[   29.289242]  kasan_save_stack+0x3c/0x68
[   29.289626]  kasan_save_track+0x20/0x40
[   29.290034]  kasan_save_alloc_info+0x40/0x58
[   29.290094]  __kasan_kmalloc+0xd4/0xd8
[   29.290453]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.290531]  kasan_atomics+0xb8/0x2e0
[   29.290744]  kunit_try_run_case+0x170/0x3f0
[   29.290900]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.290962]  kthread+0x328/0x630
[   29.291332]  ret_from_fork+0x10/0x20
[   29.291427] 
[   29.291616] The buggy address belongs to the object at fff00000c787d680
[   29.291616]  which belongs to the cache kmalloc-64 of size 64
[   29.291836] The buggy address is located 0 bytes to the right of
[   29.291836]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.292281] 
[   29.292433] The buggy address belongs to the physical page:
[   29.292635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.292793] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.292918] page_type: f5(slab)
[   29.293205] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.293320] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.293616] page dumped because: kasan: bad access detected
[   29.293671] 
[   29.293691] Memory state around the buggy address:
[   29.293878]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.294118]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.294364] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.294607]                                      ^
[   29.294735]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.294896]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.295045] ==================================================================
[   29.249101] ==================================================================
[   29.249382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   29.249608] Write of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.249683] 
[   29.249717] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.249802] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.250020] Hardware name: linux,dummy-virt (DT)
[   29.250353] Call trace:
[   29.250499]  show_stack+0x20/0x38 (C)
[   29.250589]  dump_stack_lvl+0x8c/0xd0
[   29.250640]  print_report+0x118/0x608
[   29.251108]  kasan_report+0xdc/0x128
[   29.251281]  kasan_check_range+0x100/0x1a8
[   29.251507]  __kasan_check_write+0x20/0x30
[   29.251568]  kasan_atomics_helper+0xa6c/0x4858
[   29.251736]  kasan_atomics+0x198/0x2e0
[   29.251798]  kunit_try_run_case+0x170/0x3f0
[   29.252222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.252301]  kthread+0x328/0x630
[   29.252551]  ret_from_fork+0x10/0x20
[   29.252869] 
[   29.252992] Allocated by task 277:
[   29.253092]  kasan_save_stack+0x3c/0x68
[   29.253417]  kasan_save_track+0x20/0x40
[   29.253623]  kasan_save_alloc_info+0x40/0x58
[   29.253693]  __kasan_kmalloc+0xd4/0xd8
[   29.254037]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.254146]  kasan_atomics+0xb8/0x2e0
[   29.254391]  kunit_try_run_case+0x170/0x3f0
[   29.254498]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.254680]  kthread+0x328/0x630
[   29.254748]  ret_from_fork+0x10/0x20
[   29.254879] 
[   29.254904] The buggy address belongs to the object at fff00000c787d680
[   29.254904]  which belongs to the cache kmalloc-64 of size 64
[   29.254973] The buggy address is located 0 bytes to the right of
[   29.254973]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.255038] 
[   29.255069] The buggy address belongs to the physical page:
[   29.255123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.255190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.255239] page_type: f5(slab)
[   29.255291] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.255352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.255410] page dumped because: kasan: bad access detected
[   29.255460] 
[   29.255489] Memory state around the buggy address:
[   29.255523]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.255567]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.255611] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.255651]                                      ^
[   29.255694]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.255736]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.255784] ==================================================================
[   29.569927] ==================================================================
[   29.570003] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   29.570056] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.570152] 
[   29.570262] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.570349] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.570377] Hardware name: linux,dummy-virt (DT)
[   29.570422] Call trace:
[   29.570445]  show_stack+0x20/0x38 (C)
[   29.570493]  dump_stack_lvl+0x8c/0xd0
[   29.570539]  print_report+0x118/0x608
[   29.570586]  kasan_report+0xdc/0x128
[   29.570637]  kasan_check_range+0x100/0x1a8
[   29.570684]  __kasan_check_write+0x20/0x30
[   29.570728]  kasan_atomics_helper+0x15b4/0x4858
[   29.570778]  kasan_atomics+0x198/0x2e0
[   29.570970]  kunit_try_run_case+0x170/0x3f0
[   29.571069]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.571183]  kthread+0x328/0x630
[   29.571234]  ret_from_fork+0x10/0x20
[   29.571299] 
[   29.571474] Allocated by task 277:
[   29.571586]  kasan_save_stack+0x3c/0x68
[   29.571692]  kasan_save_track+0x20/0x40
[   29.571845]  kasan_save_alloc_info+0x40/0x58
[   29.571945]  __kasan_kmalloc+0xd4/0xd8
[   29.572066]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.572128]  kasan_atomics+0xb8/0x2e0
[   29.572201]  kunit_try_run_case+0x170/0x3f0
[   29.572242]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.572463]  kthread+0x328/0x630
[   29.572712]  ret_from_fork+0x10/0x20
[   29.572855] 
[   29.573004] The buggy address belongs to the object at fff00000c787d680
[   29.573004]  which belongs to the cache kmalloc-64 of size 64
[   29.573114] The buggy address is located 0 bytes to the right of
[   29.573114]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.573190] 
[   29.573211] The buggy address belongs to the physical page:
[   29.573245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.573631] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.573781] page_type: f5(slab)
[   29.573874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.574117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.574238] page dumped because: kasan: bad access detected
[   29.574369] 
[   29.574738] Memory state around the buggy address:
[   29.574837]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.575289]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.575518] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.575586]                                      ^
[   29.575736]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.575879]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.576124] ==================================================================
[   29.267557] ==================================================================
[   29.267811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858
[   29.267965] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.268019] 
[   29.268115] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.268254] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.268354] Hardware name: linux,dummy-virt (DT)
[   29.268389] Call trace:
[   29.268720]  show_stack+0x20/0x38 (C)
[   29.268947]  dump_stack_lvl+0x8c/0xd0
[   29.269292]  print_report+0x118/0x608
[   29.269522]  kasan_report+0xdc/0x128
[   29.269780]  __asan_report_load4_noabort+0x20/0x30
[   29.269980]  kasan_atomics_helper+0x3dcc/0x4858
[   29.270087]  kasan_atomics+0x198/0x2e0
[   29.270354]  kunit_try_run_case+0x170/0x3f0
[   29.270611]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.270699]  kthread+0x328/0x630
[   29.271089]  ret_from_fork+0x10/0x20
[   29.271157] 
[   29.271180] Allocated by task 277:
[   29.271432]  kasan_save_stack+0x3c/0x68
[   29.271594]  kasan_save_track+0x20/0x40
[   29.271882]  kasan_save_alloc_info+0x40/0x58
[   29.272149]  __kasan_kmalloc+0xd4/0xd8
[   29.272322]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.272468]  kasan_atomics+0xb8/0x2e0
[   29.272851]  kunit_try_run_case+0x170/0x3f0
[   29.272924]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.272987]  kthread+0x328/0x630
[   29.273180]  ret_from_fork+0x10/0x20
[   29.273415] 
[   29.273453] The buggy address belongs to the object at fff00000c787d680
[   29.273453]  which belongs to the cache kmalloc-64 of size 64
[   29.273514] The buggy address is located 0 bytes to the right of
[   29.273514]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.273657] 
[   29.273691] The buggy address belongs to the physical page:
[   29.273726] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.273799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.273850] page_type: f5(slab)
[   29.273903] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.273964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.274014] page dumped because: kasan: bad access detected
[   29.274048] 
[   29.274070] Memory state around the buggy address:
[   29.274103]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.274157]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.274202] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.274251]                                      ^
[   29.274287]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.274330]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.274369] ==================================================================
[   29.612753] ==================================================================
[   29.612804] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   29.612853] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.612948] 
[   29.613105] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.613247] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.613315] Hardware name: linux,dummy-virt (DT)
[   29.613348] Call trace:
[   29.613429]  show_stack+0x20/0x38 (C)
[   29.613482]  dump_stack_lvl+0x8c/0xd0
[   29.613557]  print_report+0x118/0x608
[   29.613611]  kasan_report+0xdc/0x128
[   29.613694]  kasan_check_range+0x100/0x1a8
[   29.613745]  __kasan_check_write+0x20/0x30
[   29.613789]  kasan_atomics_helper+0x17ec/0x4858
[   29.613892]  kasan_atomics+0x198/0x2e0
[   29.614078]  kunit_try_run_case+0x170/0x3f0
[   29.614152]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.614227]  kthread+0x328/0x630
[   29.614272]  ret_from_fork+0x10/0x20
[   29.614337] 
[   29.614366] Allocated by task 277:
[   29.614418]  kasan_save_stack+0x3c/0x68
[   29.614463]  kasan_save_track+0x20/0x40
[   29.614509]  kasan_save_alloc_info+0x40/0x58
[   29.614557]  __kasan_kmalloc+0xd4/0xd8
[   29.614603]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.614763]  kasan_atomics+0xb8/0x2e0
[   29.614812]  kunit_try_run_case+0x170/0x3f0
[   29.614909]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.614964]  kthread+0x328/0x630
[   29.614999]  ret_from_fork+0x10/0x20
[   29.615038] 
[   29.615062] The buggy address belongs to the object at fff00000c787d680
[   29.615062]  which belongs to the cache kmalloc-64 of size 64
[   29.615121] The buggy address is located 0 bytes to the right of
[   29.615121]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.615246] 
[   29.615272] The buggy address belongs to the physical page:
[   29.615408] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.615549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.615608] page_type: f5(slab)
[   29.615848] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.616064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.616129] page dumped because: kasan: bad access detected
[   29.616206] 
[   29.616235] Memory state around the buggy address:
[   29.616272]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.616333]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.616377] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.616810]                                      ^
[   29.616884]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.617265]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.617413] ==================================================================
[   29.326574] ==================================================================
[   29.326716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   29.326775] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.326841] 
[   29.326963] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.327198] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.327233] Hardware name: linux,dummy-virt (DT)
[   29.327294] Call trace:
[   29.327320]  show_stack+0x20/0x38 (C)
[   29.327455]  dump_stack_lvl+0x8c/0xd0
[   29.327508]  print_report+0x118/0x608
[   29.327605]  kasan_report+0xdc/0x128
[   29.327723]  __asan_report_load4_noabort+0x20/0x30
[   29.327839]  kasan_atomics_helper+0x3e04/0x4858
[   29.328014]  kasan_atomics+0x198/0x2e0
[   29.328066]  kunit_try_run_case+0x170/0x3f0
[   29.328131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.328186]  kthread+0x328/0x630
[   29.328520]  ret_from_fork+0x10/0x20
[   29.328637] 
[   29.328658] Allocated by task 277:
[   29.328729]  kasan_save_stack+0x3c/0x68
[   29.328829]  kasan_save_track+0x20/0x40
[   29.328874]  kasan_save_alloc_info+0x40/0x58
[   29.329057]  __kasan_kmalloc+0xd4/0xd8
[   29.329104]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.329173]  kasan_atomics+0xb8/0x2e0
[   29.329212]  kunit_try_run_case+0x170/0x3f0
[   29.329252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.329298]  kthread+0x328/0x630
[   29.329342]  ret_from_fork+0x10/0x20
[   29.329379] 
[   29.329431] The buggy address belongs to the object at fff00000c787d680
[   29.329431]  which belongs to the cache kmalloc-64 of size 64
[   29.329499] The buggy address is located 0 bytes to the right of
[   29.329499]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.329564] 
[   29.329594] The buggy address belongs to the physical page:
[   29.329635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.329684] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.329742] page_type: f5(slab)
[   29.329781] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.329847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.329890] page dumped because: kasan: bad access detected
[   29.329921] 
[   29.329940] Memory state around the buggy address:
[   29.329983]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.330034]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.330080] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.330129]                                      ^
[   29.330178]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.330237]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.330287] ==================================================================
[   29.304570] ==================================================================
[   29.304620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858
[   29.304669] Read of size 4 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.304719] 
[   29.304752] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.304834] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.304863] Hardware name: linux,dummy-virt (DT)
[   29.304896] Call trace:
[   29.304919]  show_stack+0x20/0x38 (C)
[   29.304970]  dump_stack_lvl+0x8c/0xd0
[   29.305019]  print_report+0x118/0x608
[   29.305068]  kasan_report+0xdc/0x128
[   29.305116]  __asan_report_load4_noabort+0x20/0x30
[   29.305166]  kasan_atomics_helper+0x3de4/0x4858
[   29.305216]  kasan_atomics+0x198/0x2e0
[   29.305263]  kunit_try_run_case+0x170/0x3f0
[   29.305313]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.305367]  kthread+0x328/0x630
[   29.305423]  ret_from_fork+0x10/0x20
[   29.305472] 
[   29.305493] Allocated by task 277:
[   29.305522]  kasan_save_stack+0x3c/0x68
[   29.305565]  kasan_save_track+0x20/0x40
[   29.305606]  kasan_save_alloc_info+0x40/0x58
[   29.305650]  __kasan_kmalloc+0xd4/0xd8
[   29.305691]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.305734]  kasan_atomics+0xb8/0x2e0
[   29.305773]  kunit_try_run_case+0x170/0x3f0
[   29.305812]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.305859]  kthread+0x328/0x630
[   29.305893]  ret_from_fork+0x10/0x20
[   29.305928] 
[   29.305950] The buggy address belongs to the object at fff00000c787d680
[   29.305950]  which belongs to the cache kmalloc-64 of size 64
[   29.306009] The buggy address is located 0 bytes to the right of
[   29.306009]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.306072] 
[   29.306092] The buggy address belongs to the physical page:
[   29.306124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.306176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.306224] page_type: f5(slab)
[   29.306264] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.306314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.306355] page dumped because: kasan: bad access detected
[   29.306386] 
[   29.306441] Memory state around the buggy address:
[   29.306474]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.306618]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.306728] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.306844]                                      ^
[   29.306902]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.306978]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.307024] ==================================================================
[   29.522444] ==================================================================
[   29.522497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   29.522549] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.522608] 
[   29.522641] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.522725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.524429] Hardware name: linux,dummy-virt (DT)
[   29.524789] Call trace:
[   29.524819]  show_stack+0x20/0x38 (C)
[   29.524870]  dump_stack_lvl+0x8c/0xd0
[   29.524953]  print_report+0x118/0x608
[   29.525000]  kasan_report+0xdc/0x128
[   29.525047]  kasan_check_range+0x100/0x1a8
[   29.525546]  __kasan_check_write+0x20/0x30
[   29.525592]  kasan_atomics_helper+0x126c/0x4858
[   29.525641]  kasan_atomics+0x198/0x2e0
[   29.525687]  kunit_try_run_case+0x170/0x3f0
[   29.525735]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.525789]  kthread+0x328/0x630
[   29.525832]  ret_from_fork+0x10/0x20
[   29.525881] 
[   29.525903] Allocated by task 277:
[   29.525933]  kasan_save_stack+0x3c/0x68
[   29.525975]  kasan_save_track+0x20/0x40
[   29.526014]  kasan_save_alloc_info+0x40/0x58
[   29.526053]  __kasan_kmalloc+0xd4/0xd8
[   29.526092]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.526134]  kasan_atomics+0xb8/0x2e0
[   29.526172]  kunit_try_run_case+0x170/0x3f0
[   29.526212]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.526258]  kthread+0x328/0x630
[   29.526293]  ret_from_fork+0x10/0x20
[   29.526331] 
[   29.526352] The buggy address belongs to the object at fff00000c787d680
[   29.526352]  which belongs to the cache kmalloc-64 of size 64
[   29.526424] The buggy address is located 0 bytes to the right of
[   29.526424]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.526510] 
[   29.526532] The buggy address belongs to the physical page:
[   29.526566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.526625] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.526671] page_type: f5(slab)
[   29.526709] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.526759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.526822] page dumped because: kasan: bad access detected
[   29.526861] 
[   29.526890] Memory state around the buggy address:
[   29.526929]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.526991]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.527040] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.527079]                                      ^
[   29.527113]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.527157]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.527207] ==================================================================
[   29.579596] ==================================================================
[   29.579638] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   29.579686] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.579782] 
[   29.579987] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.580358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.580388] Hardware name: linux,dummy-virt (DT)
[   29.580428] Call trace:
[   29.580529]  show_stack+0x20/0x38 (C)
[   29.580601]  dump_stack_lvl+0x8c/0xd0
[   29.580649]  print_report+0x118/0x608
[   29.580752]  kasan_report+0xdc/0x128
[   29.580960]  kasan_check_range+0x100/0x1a8
[   29.581051]  __kasan_check_write+0x20/0x30
[   29.581304]  kasan_atomics_helper+0x1644/0x4858
[   29.581357]  kasan_atomics+0x198/0x2e0
[   29.581509]  kunit_try_run_case+0x170/0x3f0
[   29.581741]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.581816]  kthread+0x328/0x630
[   29.581927]  ret_from_fork+0x10/0x20
[   29.582166] 
[   29.582259] Allocated by task 277:
[   29.582571]  kasan_save_stack+0x3c/0x68
[   29.582689]  kasan_save_track+0x20/0x40
[   29.582768]  kasan_save_alloc_info+0x40/0x58
[   29.582809]  __kasan_kmalloc+0xd4/0xd8
[   29.582849]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.583166]  kasan_atomics+0xb8/0x2e0
[   29.583265]  kunit_try_run_case+0x170/0x3f0
[   29.583429]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.583509]  kthread+0x328/0x630
[   29.583946]  ret_from_fork+0x10/0x20
[   29.584179] 
[   29.584257] The buggy address belongs to the object at fff00000c787d680
[   29.584257]  which belongs to the cache kmalloc-64 of size 64
[   29.584432] The buggy address is located 0 bytes to the right of
[   29.584432]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.584499] 
[   29.584520] The buggy address belongs to the physical page:
[   29.584554] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.584608] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.584676] page_type: f5(slab)
[   29.584716] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.584768] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.584809] page dumped because: kasan: bad access detected
[   29.585022] 
[   29.585087] Memory state around the buggy address:
[   29.585265]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.585386]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.585676] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.585879]                                      ^
[   29.586002]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.586077]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.586199] ==================================================================
[   29.481836] ==================================================================
[   29.482309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   29.482382] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.482445] 
[   29.482481] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.482566] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.483343] Hardware name: linux,dummy-virt (DT)
[   29.483389] Call trace:
[   29.483485]  show_stack+0x20/0x38 (C)
[   29.483537]  dump_stack_lvl+0x8c/0xd0
[   29.483585]  print_report+0x118/0x608
[   29.483631]  kasan_report+0xdc/0x128
[   29.484126]  kasan_check_range+0x100/0x1a8
[   29.484196]  __kasan_check_write+0x20/0x30
[   29.484246]  kasan_atomics_helper+0x1128/0x4858
[   29.484598]  kasan_atomics+0x198/0x2e0
[   29.484648]  kunit_try_run_case+0x170/0x3f0
[   29.485073]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.485588]  kthread+0x328/0x630
[   29.485644]  ret_from_fork+0x10/0x20
[   29.485833] 
[   29.485857] Allocated by task 277:
[   29.486299]  kasan_save_stack+0x3c/0x68
[   29.486381]  kasan_save_track+0x20/0x40
[   29.486560]  kasan_save_alloc_info+0x40/0x58
[   29.487026]  __kasan_kmalloc+0xd4/0xd8
[   29.487161]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.487204]  kasan_atomics+0xb8/0x2e0
[   29.487242]  kunit_try_run_case+0x170/0x3f0
[   29.487282]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.487328]  kthread+0x328/0x630
[   29.487848]  ret_from_fork+0x10/0x20
[   29.487930] 
[   29.487952] The buggy address belongs to the object at fff00000c787d680
[   29.487952]  which belongs to the cache kmalloc-64 of size 64
[   29.488367] The buggy address is located 0 bytes to the right of
[   29.488367]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.488586] 
[   29.488610] The buggy address belongs to the physical page:
[   29.488758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.488830] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.488889] page_type: f5(slab)
[   29.489038] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.489614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.489673] page dumped because: kasan: bad access detected
[   29.489958] 
[   29.489982] Memory state around the buggy address:
[   29.490218]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.490383]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.490453] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.490675]                                      ^
[   29.490941]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.490990]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.491320] ==================================================================
[   29.564708] ==================================================================
[   29.564760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   29.564812] Write of size 8 at addr fff00000c787d6b0 by task kunit_try_catch/277
[   29.564900] 
[   29.564937] CPU: 0 UID: 0 PID: 277 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT 
[   29.565035] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.565063] Hardware name: linux,dummy-virt (DT)
[   29.565131] Call trace:
[   29.565156]  show_stack+0x20/0x38 (C)
[   29.565205]  dump_stack_lvl+0x8c/0xd0
[   29.565279]  print_report+0x118/0x608
[   29.565335]  kasan_report+0xdc/0x128
[   29.565383]  kasan_check_range+0x100/0x1a8
[   29.565442]  __kasan_check_write+0x20/0x30
[   29.565487]  kasan_atomics_helper+0x154c/0x4858
[   29.565536]  kasan_atomics+0x198/0x2e0
[   29.565582]  kunit_try_run_case+0x170/0x3f0
[   29.565631]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.565684]  kthread+0x328/0x630
[   29.565726]  ret_from_fork+0x10/0x20
[   29.565774] 
[   29.565796] Allocated by task 277:
[   29.565824]  kasan_save_stack+0x3c/0x68
[   29.565866]  kasan_save_track+0x20/0x40
[   29.566097]  kasan_save_alloc_info+0x40/0x58
[   29.566216]  __kasan_kmalloc+0xd4/0xd8
[   29.566315]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.566412]  kasan_atomics+0xb8/0x2e0
[   29.566455]  kunit_try_run_case+0x170/0x3f0
[   29.566617]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.566831]  kthread+0x328/0x630
[   29.566907]  ret_from_fork+0x10/0x20
[   29.566947] 
[   29.567032] The buggy address belongs to the object at fff00000c787d680
[   29.567032]  which belongs to the cache kmalloc-64 of size 64
[   29.567148] The buggy address is located 0 bytes to the right of
[   29.567148]  allocated 48-byte region [fff00000c787d680, fff00000c787d6b0)
[   29.567215] 
[   29.567339] The buggy address belongs to the physical page:
[   29.567374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10787d
[   29.567435] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.567481] page_type: f5(slab)
[   29.567549] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   29.567713] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   29.567941] page dumped because: kasan: bad access detected
[   29.568005] 
[   29.568130] Memory state around the buggy address:
[   29.568338]  fff00000c787d580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.568487]  fff00000c787d600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   29.568721] >fff00000c787d680: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   29.568838]                                      ^
[   29.568918]  fff00000c787d700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.569065]  fff00000c787d780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.569170] ==================================================================

[   24.881342] ==================================================================
[   24.881616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   24.882408] Read of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.882925] 
[   24.883113] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.883222] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.883240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.883263] Call Trace:
[   24.883285]  <TASK>
[   24.883305]  dump_stack_lvl+0x73/0xb0
[   24.883333]  print_report+0xd1/0x650
[   24.883354]  ? __virt_addr_valid+0x1db/0x2d0
[   24.883379]  ? kasan_atomics_helper+0x4a1c/0x5450
[   24.883400]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.883425]  ? kasan_atomics_helper+0x4a1c/0x5450
[   24.883448]  kasan_report+0x141/0x180
[   24.883470]  ? kasan_atomics_helper+0x4a1c/0x5450
[   24.883497]  __asan_report_load4_noabort+0x18/0x20
[   24.883523]  kasan_atomics_helper+0x4a1c/0x5450
[   24.883545]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.883566]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.883593]  ? kasan_atomics+0x152/0x310
[   24.883619]  kasan_atomics+0x1dc/0x310
[   24.883641]  ? __pfx_kasan_atomics+0x10/0x10
[   24.883662]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.883685]  ? __pfx_read_tsc+0x10/0x10
[   24.883707]  ? ktime_get_ts64+0x86/0x230
[   24.883733]  kunit_try_run_case+0x1a5/0x480
[   24.883761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.883784]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.883805]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.883830]  ? __kthread_parkme+0x82/0x180
[   24.883851]  ? preempt_count_sub+0x50/0x80
[   24.883875]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.883899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.883923]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.883958]  kthread+0x337/0x6f0
[   24.883978]  ? trace_preempt_on+0x20/0xc0
[   24.884001]  ? __pfx_kthread+0x10/0x10
[   24.884021]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.884044]  ? calculate_sigpending+0x7b/0xa0
[   24.884068]  ? __pfx_kthread+0x10/0x10
[   24.884089]  ret_from_fork+0x116/0x1d0
[   24.884108]  ? __pfx_kthread+0x10/0x10
[   24.884140]  ret_from_fork_asm+0x1a/0x30
[   24.884171]  </TASK>
[   24.884182] 
[   24.893481] Allocated by task 294:
[   24.893642]  kasan_save_stack+0x45/0x70
[   24.893916]  kasan_save_track+0x18/0x40
[   24.894114]  kasan_save_alloc_info+0x3b/0x50
[   24.894403]  __kasan_kmalloc+0xb7/0xc0
[   24.894573]  __kmalloc_cache_noprof+0x189/0x420
[   24.894764]  kasan_atomics+0x95/0x310
[   24.894928]  kunit_try_run_case+0x1a5/0x480
[   24.895117]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.895690]  kthread+0x337/0x6f0
[   24.895847]  ret_from_fork+0x116/0x1d0
[   24.896015]  ret_from_fork_asm+0x1a/0x30
[   24.896347] 
[   24.896502] The buggy address belongs to the object at ffff8881039e9700
[   24.896502]  which belongs to the cache kmalloc-64 of size 64
[   24.897170] The buggy address is located 0 bytes to the right of
[   24.897170]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.897681] 
[   24.897843] The buggy address belongs to the physical page:
[   24.898121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.898606] flags: 0x200000000000000(node=0|zone=2)
[   24.898893] page_type: f5(slab)
[   24.899072] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.899508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.899867] page dumped because: kasan: bad access detected
[   24.900089] 
[   24.900210] Memory state around the buggy address:
[   24.900599]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.900962]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.901276] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.901686]                                      ^
[   24.901991]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.902294]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.902624] ==================================================================
[   25.059634] ==================================================================
[   25.060249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   25.060908] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.061587] 
[   25.061814] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.061863] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.061877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.061899] Call Trace:
[   25.061919]  <TASK>
[   25.061947]  dump_stack_lvl+0x73/0xb0
[   25.061976]  print_report+0xd1/0x650
[   25.061998]  ? __virt_addr_valid+0x1db/0x2d0
[   25.062021]  ? kasan_atomics_helper+0x1467/0x5450
[   25.062042]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.062067]  ? kasan_atomics_helper+0x1467/0x5450
[   25.062088]  kasan_report+0x141/0x180
[   25.062110]  ? kasan_atomics_helper+0x1467/0x5450
[   25.062135]  kasan_check_range+0x10c/0x1c0
[   25.062158]  __kasan_check_write+0x18/0x20
[   25.062180]  kasan_atomics_helper+0x1467/0x5450
[   25.062202]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.062223]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.062248]  ? kasan_atomics+0x152/0x310
[   25.062273]  kasan_atomics+0x1dc/0x310
[   25.062294]  ? __pfx_kasan_atomics+0x10/0x10
[   25.062315]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.062338]  ? __pfx_read_tsc+0x10/0x10
[   25.062361]  ? ktime_get_ts64+0x86/0x230
[   25.062386]  kunit_try_run_case+0x1a5/0x480
[   25.062411]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.062446]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.062467]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.062492]  ? __kthread_parkme+0x82/0x180
[   25.062523]  ? preempt_count_sub+0x50/0x80
[   25.062546]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.062570]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.062594]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.062617]  kthread+0x337/0x6f0
[   25.062637]  ? trace_preempt_on+0x20/0xc0
[   25.062661]  ? __pfx_kthread+0x10/0x10
[   25.062682]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.062705]  ? calculate_sigpending+0x7b/0xa0
[   25.062730]  ? __pfx_kthread+0x10/0x10
[   25.062750]  ret_from_fork+0x116/0x1d0
[   25.062770]  ? __pfx_kthread+0x10/0x10
[   25.062789]  ret_from_fork_asm+0x1a/0x30
[   25.062819]  </TASK>
[   25.062830] 
[   25.074913] Allocated by task 294:
[   25.075115]  kasan_save_stack+0x45/0x70
[   25.075365]  kasan_save_track+0x18/0x40
[   25.075544]  kasan_save_alloc_info+0x3b/0x50
[   25.075768]  __kasan_kmalloc+0xb7/0xc0
[   25.075897]  __kmalloc_cache_noprof+0x189/0x420
[   25.076054]  kasan_atomics+0x95/0x310
[   25.076214]  kunit_try_run_case+0x1a5/0x480
[   25.076420]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.076668]  kthread+0x337/0x6f0
[   25.076920]  ret_from_fork+0x116/0x1d0
[   25.077056]  ret_from_fork_asm+0x1a/0x30
[   25.077371] 
[   25.077469] The buggy address belongs to the object at ffff8881039e9700
[   25.077469]  which belongs to the cache kmalloc-64 of size 64
[   25.077831] The buggy address is located 0 bytes to the right of
[   25.077831]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.078474] 
[   25.078541] The buggy address belongs to the physical page:
[   25.078767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.079066] flags: 0x200000000000000(node=0|zone=2)
[   25.079294] page_type: f5(slab)
[   25.079523] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.079750] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.079982] page dumped because: kasan: bad access detected
[   25.080274] 
[   25.080342] Memory state around the buggy address:
[   25.080492]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.080699]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.080923] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.081393]                                      ^
[   25.081611]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.081923]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.082239] ==================================================================
[   24.538201] ==================================================================
[   24.538576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   24.539228] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.539575] 
[   24.539670] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.539721] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.539735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.539759] Call Trace:
[   24.540088]  <TASK>
[   24.540111]  dump_stack_lvl+0x73/0xb0
[   24.540142]  print_report+0xd1/0x650
[   24.540165]  ? __virt_addr_valid+0x1db/0x2d0
[   24.540189]  ? kasan_atomics_helper+0x8f9/0x5450
[   24.540210]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.540236]  ? kasan_atomics_helper+0x8f9/0x5450
[   24.540257]  kasan_report+0x141/0x180
[   24.540279]  ? kasan_atomics_helper+0x8f9/0x5450
[   24.540304]  kasan_check_range+0x10c/0x1c0
[   24.540326]  __kasan_check_write+0x18/0x20
[   24.540354]  kasan_atomics_helper+0x8f9/0x5450
[   24.540376]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.540398]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.540422]  ? kasan_atomics+0x152/0x310
[   24.540447]  kasan_atomics+0x1dc/0x310
[   24.540469]  ? __pfx_kasan_atomics+0x10/0x10
[   24.540490]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.540514]  ? __pfx_read_tsc+0x10/0x10
[   24.540537]  ? ktime_get_ts64+0x86/0x230
[   24.540563]  kunit_try_run_case+0x1a5/0x480
[   24.540591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.540614]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.540635]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.540660]  ? __kthread_parkme+0x82/0x180
[   24.540681]  ? preempt_count_sub+0x50/0x80
[   24.540705]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.540729]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.540752]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.540777]  kthread+0x337/0x6f0
[   24.540796]  ? trace_preempt_on+0x20/0xc0
[   24.540839]  ? __pfx_kthread+0x10/0x10
[   24.540862]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.540885]  ? calculate_sigpending+0x7b/0xa0
[   24.540909]  ? __pfx_kthread+0x10/0x10
[   24.540931]  ret_from_fork+0x116/0x1d0
[   24.540961]  ? __pfx_kthread+0x10/0x10
[   24.540982]  ret_from_fork_asm+0x1a/0x30
[   24.541012]  </TASK>
[   24.541024] 
[   24.552457] Allocated by task 294:
[   24.552647]  kasan_save_stack+0x45/0x70
[   24.553140]  kasan_save_track+0x18/0x40
[   24.553400]  kasan_save_alloc_info+0x3b/0x50
[   24.553700]  __kasan_kmalloc+0xb7/0xc0
[   24.554017]  __kmalloc_cache_noprof+0x189/0x420
[   24.554258]  kasan_atomics+0x95/0x310
[   24.554398]  kunit_try_run_case+0x1a5/0x480
[   24.554925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.555368]  kthread+0x337/0x6f0
[   24.555531]  ret_from_fork+0x116/0x1d0
[   24.555703]  ret_from_fork_asm+0x1a/0x30
[   24.556209] 
[   24.556335] The buggy address belongs to the object at ffff8881039e9700
[   24.556335]  which belongs to the cache kmalloc-64 of size 64
[   24.557263] The buggy address is located 0 bytes to the right of
[   24.557263]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.558085] 
[   24.558175] The buggy address belongs to the physical page:
[   24.558642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.559305] flags: 0x200000000000000(node=0|zone=2)
[   24.559590] page_type: f5(slab)
[   24.559903] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.560446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.560757] page dumped because: kasan: bad access detected
[   24.561241] 
[   24.561342] Memory state around the buggy address:
[   24.561793]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.562084]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.562399] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.563141]                                      ^
[   24.563542]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.564126]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.564441] ==================================================================
[   24.811326] ==================================================================
[   24.811693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   24.811945] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.812170] 
[   24.812279] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.812486] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.812503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.812528] Call Trace:
[   24.812551]  <TASK>
[   24.812573]  dump_stack_lvl+0x73/0xb0
[   24.812604]  print_report+0xd1/0x650
[   24.812626]  ? __virt_addr_valid+0x1db/0x2d0
[   24.812649]  ? kasan_atomics_helper+0xfa9/0x5450
[   24.812670]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.812696]  ? kasan_atomics_helper+0xfa9/0x5450
[   24.812716]  kasan_report+0x141/0x180
[   24.812739]  ? kasan_atomics_helper+0xfa9/0x5450
[   24.812764]  kasan_check_range+0x10c/0x1c0
[   24.812787]  __kasan_check_write+0x18/0x20
[   24.812809]  kasan_atomics_helper+0xfa9/0x5450
[   24.812831]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.812852]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.812877]  ? kasan_atomics+0x152/0x310
[   24.812902]  kasan_atomics+0x1dc/0x310
[   24.812923]  ? __pfx_kasan_atomics+0x10/0x10
[   24.812957]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.813479]  ? __pfx_read_tsc+0x10/0x10
[   24.813517]  ? ktime_get_ts64+0x86/0x230
[   24.813545]  kunit_try_run_case+0x1a5/0x480
[   24.813574]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.813597]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.813619]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.813644]  ? __kthread_parkme+0x82/0x180
[   24.813666]  ? preempt_count_sub+0x50/0x80
[   24.813690]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.813714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.813737]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.813761]  kthread+0x337/0x6f0
[   24.813780]  ? trace_preempt_on+0x20/0xc0
[   24.813804]  ? __pfx_kthread+0x10/0x10
[   24.813825]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.813849]  ? calculate_sigpending+0x7b/0xa0
[   24.813873]  ? __pfx_kthread+0x10/0x10
[   24.813896]  ret_from_fork+0x116/0x1d0
[   24.813916]  ? __pfx_kthread+0x10/0x10
[   24.813949]  ret_from_fork_asm+0x1a/0x30
[   24.813981]  </TASK>
[   24.813993] 
[   24.824579] Allocated by task 294:
[   24.825027]  kasan_save_stack+0x45/0x70
[   24.825343]  kasan_save_track+0x18/0x40
[   24.825533]  kasan_save_alloc_info+0x3b/0x50
[   24.825746]  __kasan_kmalloc+0xb7/0xc0
[   24.825918]  __kmalloc_cache_noprof+0x189/0x420
[   24.826155]  kasan_atomics+0x95/0x310
[   24.826360]  kunit_try_run_case+0x1a5/0x480
[   24.826732]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.826981]  kthread+0x337/0x6f0
[   24.827159]  ret_from_fork+0x116/0x1d0
[   24.827556]  ret_from_fork_asm+0x1a/0x30
[   24.827741] 
[   24.827819] The buggy address belongs to the object at ffff8881039e9700
[   24.827819]  which belongs to the cache kmalloc-64 of size 64
[   24.828274] The buggy address is located 0 bytes to the right of
[   24.828274]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.828784] 
[   24.828863] The buggy address belongs to the physical page:
[   24.829310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.829624] flags: 0x200000000000000(node=0|zone=2)
[   24.829781] page_type: f5(slab)
[   24.829896] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.830641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.830910] page dumped because: kasan: bad access detected
[   24.831357] 
[   24.831458] Memory state around the buggy address:
[   24.831825]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.832281]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.832700] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.832977]                                      ^
[   24.833420]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.833703]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.834139] ==================================================================
[   24.290349] ==================================================================
[   24.290722] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   24.291460] Read of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.291767] 
[   24.291972] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.292036] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.292050] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.292073] Call Trace:
[   24.292095]  <TASK>
[   24.292115]  dump_stack_lvl+0x73/0xb0
[   24.292143]  print_report+0xd1/0x650
[   24.292174]  ? __virt_addr_valid+0x1db/0x2d0
[   24.292198]  ? kasan_atomics_helper+0x3df/0x5450
[   24.292229]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.292255]  ? kasan_atomics_helper+0x3df/0x5450
[   24.292276]  kasan_report+0x141/0x180
[   24.292297]  ? kasan_atomics_helper+0x3df/0x5450
[   24.292337]  kasan_check_range+0x10c/0x1c0
[   24.292361]  __kasan_check_read+0x15/0x20
[   24.292383]  kasan_atomics_helper+0x3df/0x5450
[   24.292415]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.292436]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.292461]  ? kasan_atomics+0x152/0x310
[   24.292495]  kasan_atomics+0x1dc/0x310
[   24.292517]  ? __pfx_kasan_atomics+0x10/0x10
[   24.292538]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.292571]  ? __pfx_read_tsc+0x10/0x10
[   24.292594]  ? ktime_get_ts64+0x86/0x230
[   24.292619]  kunit_try_run_case+0x1a5/0x480
[   24.292647]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.292678]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.292698]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.292724]  ? __kthread_parkme+0x82/0x180
[   24.292755]  ? preempt_count_sub+0x50/0x80
[   24.292778]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.292804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.292907]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.292932]  kthread+0x337/0x6f0
[   24.293140]  ? trace_preempt_on+0x20/0xc0
[   24.293176]  ? __pfx_kthread+0x10/0x10
[   24.293198]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.293222]  ? calculate_sigpending+0x7b/0xa0
[   24.293257]  ? __pfx_kthread+0x10/0x10
[   24.293278]  ret_from_fork+0x116/0x1d0
[   24.293297]  ? __pfx_kthread+0x10/0x10
[   24.293318]  ret_from_fork_asm+0x1a/0x30
[   24.293357]  </TASK>
[   24.293368] 
[   24.302516] Allocated by task 294:
[   24.302750]  kasan_save_stack+0x45/0x70
[   24.303066]  kasan_save_track+0x18/0x40
[   24.303305]  kasan_save_alloc_info+0x3b/0x50
[   24.303508]  __kasan_kmalloc+0xb7/0xc0
[   24.303697]  __kmalloc_cache_noprof+0x189/0x420
[   24.304011]  kasan_atomics+0x95/0x310
[   24.304146]  kunit_try_run_case+0x1a5/0x480
[   24.304287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.304461]  kthread+0x337/0x6f0
[   24.304576]  ret_from_fork+0x116/0x1d0
[   24.304702]  ret_from_fork_asm+0x1a/0x30
[   24.305060] 
[   24.305430] The buggy address belongs to the object at ffff8881039e9700
[   24.305430]  which belongs to the cache kmalloc-64 of size 64
[   24.306044] The buggy address is located 0 bytes to the right of
[   24.306044]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.306706] 
[   24.306796] The buggy address belongs to the physical page:
[   24.307111] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.307481] flags: 0x200000000000000(node=0|zone=2)
[   24.307699] page_type: f5(slab)
[   24.307818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.308225] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.308541] page dumped because: kasan: bad access detected
[   24.308706] 
[   24.308768] Memory state around the buggy address:
[   24.308917]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.309133]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.309339] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.309670]                                      ^
[   24.309890]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.310583]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.311242] ==================================================================
[   25.041625] ==================================================================
[   25.042134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   25.042653] Read of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.042995] 
[   25.043104] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.043160] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.043174] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.043196] Call Trace:
[   25.043215]  <TASK>
[   25.043233]  dump_stack_lvl+0x73/0xb0
[   25.043260]  print_report+0xd1/0x650
[   25.043281]  ? __virt_addr_valid+0x1db/0x2d0
[   25.043304]  ? kasan_atomics_helper+0x4eae/0x5450
[   25.043325]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.043353]  ? kasan_atomics_helper+0x4eae/0x5450
[   25.043375]  kasan_report+0x141/0x180
[   25.043399]  ? kasan_atomics_helper+0x4eae/0x5450
[   25.043424]  __asan_report_load8_noabort+0x18/0x20
[   25.043448]  kasan_atomics_helper+0x4eae/0x5450
[   25.043470]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.043491]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.043515]  ? kasan_atomics+0x152/0x310
[   25.043540]  kasan_atomics+0x1dc/0x310
[   25.043562]  ? __pfx_kasan_atomics+0x10/0x10
[   25.043583]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.043607]  ? __pfx_read_tsc+0x10/0x10
[   25.043629]  ? ktime_get_ts64+0x86/0x230
[   25.043654]  kunit_try_run_case+0x1a5/0x480
[   25.043680]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.043703]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.043724]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.043750]  ? __kthread_parkme+0x82/0x180
[   25.043770]  ? preempt_count_sub+0x50/0x80
[   25.043793]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.043817]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.043841]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.043864]  kthread+0x337/0x6f0
[   25.043884]  ? trace_preempt_on+0x20/0xc0
[   25.043918]  ? __pfx_kthread+0x10/0x10
[   25.043954]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.043977]  ? calculate_sigpending+0x7b/0xa0
[   25.044001]  ? __pfx_kthread+0x10/0x10
[   25.044022]  ret_from_fork+0x116/0x1d0
[   25.044043]  ? __pfx_kthread+0x10/0x10
[   25.044065]  ret_from_fork_asm+0x1a/0x30
[   25.044095]  </TASK>
[   25.044106] 
[   25.051516] Allocated by task 294:
[   25.051698]  kasan_save_stack+0x45/0x70
[   25.051894]  kasan_save_track+0x18/0x40
[   25.052083]  kasan_save_alloc_info+0x3b/0x50
[   25.052311]  __kasan_kmalloc+0xb7/0xc0
[   25.052520]  __kmalloc_cache_noprof+0x189/0x420
[   25.052707]  kasan_atomics+0x95/0x310
[   25.052890]  kunit_try_run_case+0x1a5/0x480
[   25.053090]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.053391]  kthread+0x337/0x6f0
[   25.053569]  ret_from_fork+0x116/0x1d0
[   25.053730]  ret_from_fork_asm+0x1a/0x30
[   25.053930] 
[   25.054017] The buggy address belongs to the object at ffff8881039e9700
[   25.054017]  which belongs to the cache kmalloc-64 of size 64
[   25.054543] The buggy address is located 0 bytes to the right of
[   25.054543]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.055002] 
[   25.055072] The buggy address belongs to the physical page:
[   25.055590] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.055848] flags: 0x200000000000000(node=0|zone=2)
[   25.056016] page_type: f5(slab)
[   25.056274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.056615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.056948] page dumped because: kasan: bad access detected
[   25.057205] 
[   25.057281] Memory state around the buggy address:
[   25.057470]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.057777]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.058207] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.058542]                                      ^
[   25.058689]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.058895]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.059108] ==================================================================
[   25.117576] ==================================================================
[   25.117922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   25.118281] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.118801] 
[   25.118913] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.118970] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.118984] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.119006] Call Trace:
[   25.119026]  <TASK>
[   25.119063]  dump_stack_lvl+0x73/0xb0
[   25.119090]  print_report+0xd1/0x650
[   25.119112]  ? __virt_addr_valid+0x1db/0x2d0
[   25.119135]  ? kasan_atomics_helper+0x15b6/0x5450
[   25.119156]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.119181]  ? kasan_atomics_helper+0x15b6/0x5450
[   25.119203]  kasan_report+0x141/0x180
[   25.119223]  ? kasan_atomics_helper+0x15b6/0x5450
[   25.119249]  kasan_check_range+0x10c/0x1c0
[   25.119272]  __kasan_check_write+0x18/0x20
[   25.119294]  kasan_atomics_helper+0x15b6/0x5450
[   25.119316]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.119337]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.119362]  ? kasan_atomics+0x152/0x310
[   25.119387]  kasan_atomics+0x1dc/0x310
[   25.119409]  ? __pfx_kasan_atomics+0x10/0x10
[   25.119431]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.119454]  ? __pfx_read_tsc+0x10/0x10
[   25.119478]  ? ktime_get_ts64+0x86/0x230
[   25.119502]  kunit_try_run_case+0x1a5/0x480
[   25.119529]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.119552]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.119572]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.119598]  ? __kthread_parkme+0x82/0x180
[   25.119618]  ? preempt_count_sub+0x50/0x80
[   25.119642]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.119666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.119690]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.119713]  kthread+0x337/0x6f0
[   25.119733]  ? trace_preempt_on+0x20/0xc0
[   25.119756]  ? __pfx_kthread+0x10/0x10
[   25.119776]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.119799]  ? calculate_sigpending+0x7b/0xa0
[   25.119822]  ? __pfx_kthread+0x10/0x10
[   25.119844]  ret_from_fork+0x116/0x1d0
[   25.119862]  ? __pfx_kthread+0x10/0x10
[   25.119883]  ret_from_fork_asm+0x1a/0x30
[   25.119913]  </TASK>
[   25.119924] 
[   25.127563] Allocated by task 294:
[   25.127733]  kasan_save_stack+0x45/0x70
[   25.127872]  kasan_save_track+0x18/0x40
[   25.128009]  kasan_save_alloc_info+0x3b/0x50
[   25.128247]  __kasan_kmalloc+0xb7/0xc0
[   25.128443]  __kmalloc_cache_noprof+0x189/0x420
[   25.128650]  kasan_atomics+0x95/0x310
[   25.128774]  kunit_try_run_case+0x1a5/0x480
[   25.128915]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.129226]  kthread+0x337/0x6f0
[   25.129388]  ret_from_fork+0x116/0x1d0
[   25.129569]  ret_from_fork_asm+0x1a/0x30
[   25.129732] 
[   25.129797] The buggy address belongs to the object at ffff8881039e9700
[   25.129797]  which belongs to the cache kmalloc-64 of size 64
[   25.130148] The buggy address is located 0 bytes to the right of
[   25.130148]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.130502] 
[   25.130567] The buggy address belongs to the physical page:
[   25.130862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.131213] flags: 0x200000000000000(node=0|zone=2)
[   25.131447] page_type: f5(slab)
[   25.131614] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.131970] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.132302] page dumped because: kasan: bad access detected
[   25.132559] 
[   25.132648] Memory state around the buggy address:
[   25.132868]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.133137]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.133344] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.133547]                                      ^
[   25.133806]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.134125]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.134429] ==================================================================
[   24.381534] ==================================================================
[   24.382519] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   24.383471] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.383783] 
[   24.383891] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.383958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.383975] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.384000] Call Trace:
[   24.384016]  <TASK>
[   24.384038]  dump_stack_lvl+0x73/0xb0
[   24.384069]  print_report+0xd1/0x650
[   24.384092]  ? __virt_addr_valid+0x1db/0x2d0
[   24.384117]  ? kasan_atomics_helper+0x565/0x5450
[   24.384138]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.384164]  ? kasan_atomics_helper+0x565/0x5450
[   24.384185]  kasan_report+0x141/0x180
[   24.384208]  ? kasan_atomics_helper+0x565/0x5450
[   24.384257]  kasan_check_range+0x10c/0x1c0
[   24.384282]  __kasan_check_write+0x18/0x20
[   24.384304]  kasan_atomics_helper+0x565/0x5450
[   24.384326]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.384357]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.384611]  ? kasan_atomics+0x152/0x310
[   24.384639]  kasan_atomics+0x1dc/0x310
[   24.384854]  ? __pfx_kasan_atomics+0x10/0x10
[   24.384879]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.384907]  ? __pfx_read_tsc+0x10/0x10
[   24.384930]  ? ktime_get_ts64+0x86/0x230
[   24.384968]  kunit_try_run_case+0x1a5/0x480
[   24.384997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.385020]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.385042]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.385067]  ? __kthread_parkme+0x82/0x180
[   24.385088]  ? preempt_count_sub+0x50/0x80
[   24.385111]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.385147]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.385171]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.385195]  kthread+0x337/0x6f0
[   24.385215]  ? trace_preempt_on+0x20/0xc0
[   24.385238]  ? __pfx_kthread+0x10/0x10
[   24.385259]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.385282]  ? calculate_sigpending+0x7b/0xa0
[   24.385305]  ? __pfx_kthread+0x10/0x10
[   24.385327]  ret_from_fork+0x116/0x1d0
[   24.385345]  ? __pfx_kthread+0x10/0x10
[   24.385366]  ret_from_fork_asm+0x1a/0x30
[   24.385397]  </TASK>
[   24.385409] 
[   24.398023] Allocated by task 294:
[   24.398599]  kasan_save_stack+0x45/0x70
[   24.398773]  kasan_save_track+0x18/0x40
[   24.399309]  kasan_save_alloc_info+0x3b/0x50
[   24.399550]  __kasan_kmalloc+0xb7/0xc0
[   24.399909]  __kmalloc_cache_noprof+0x189/0x420
[   24.400215]  kasan_atomics+0x95/0x310
[   24.400386]  kunit_try_run_case+0x1a5/0x480
[   24.400622]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.401146]  kthread+0x337/0x6f0
[   24.401375]  ret_from_fork+0x116/0x1d0
[   24.401551]  ret_from_fork_asm+0x1a/0x30
[   24.401734] 
[   24.402111] The buggy address belongs to the object at ffff8881039e9700
[   24.402111]  which belongs to the cache kmalloc-64 of size 64
[   24.402614] The buggy address is located 0 bytes to the right of
[   24.402614]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.403420] 
[   24.403563] The buggy address belongs to the physical page:
[   24.403789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.404322] flags: 0x200000000000000(node=0|zone=2)
[   24.404727] page_type: f5(slab)
[   24.404987] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.405319] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.405781] page dumped because: kasan: bad access detected
[   24.406180] 
[   24.406251] Memory state around the buggy address:
[   24.406416]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.406728]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.406959] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.407404]                                      ^
[   24.408027]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.408353]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.408787] ==================================================================
[   25.408567] ==================================================================
[   25.409212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   25.409483] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.409836] 
[   25.409932] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.409992] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.410006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.410028] Call Trace:
[   25.410048]  <TASK>
[   25.410068]  dump_stack_lvl+0x73/0xb0
[   25.410096]  print_report+0xd1/0x650
[   25.410117]  ? __virt_addr_valid+0x1db/0x2d0
[   25.410148]  ? kasan_atomics_helper+0x1e12/0x5450
[   25.410169]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.410204]  ? kasan_atomics_helper+0x1e12/0x5450
[   25.410225]  kasan_report+0x141/0x180
[   25.410247]  ? kasan_atomics_helper+0x1e12/0x5450
[   25.410283]  kasan_check_range+0x10c/0x1c0
[   25.410306]  __kasan_check_write+0x18/0x20
[   25.410328]  kasan_atomics_helper+0x1e12/0x5450
[   25.410349]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.410370]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.410395]  ? kasan_atomics+0x152/0x310
[   25.410420]  kasan_atomics+0x1dc/0x310
[   25.410441]  ? __pfx_kasan_atomics+0x10/0x10
[   25.410462]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.410485]  ? __pfx_read_tsc+0x10/0x10
[   25.410508]  ? ktime_get_ts64+0x86/0x230
[   25.410543]  kunit_try_run_case+0x1a5/0x480
[   25.410569]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.410592]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.410624]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.410650]  ? __kthread_parkme+0x82/0x180
[   25.410672]  ? preempt_count_sub+0x50/0x80
[   25.410695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.410719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.410743]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.410767]  kthread+0x337/0x6f0
[   25.410786]  ? trace_preempt_on+0x20/0xc0
[   25.410810]  ? __pfx_kthread+0x10/0x10
[   25.410830]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.410854]  ? calculate_sigpending+0x7b/0xa0
[   25.410877]  ? __pfx_kthread+0x10/0x10
[   25.410898]  ret_from_fork+0x116/0x1d0
[   25.410917]  ? __pfx_kthread+0x10/0x10
[   25.410945]  ret_from_fork_asm+0x1a/0x30
[   25.410976]  </TASK>
[   25.410988] 
[   25.418614] Allocated by task 294:
[   25.418772]  kasan_save_stack+0x45/0x70
[   25.419006]  kasan_save_track+0x18/0x40
[   25.419214]  kasan_save_alloc_info+0x3b/0x50
[   25.419405]  __kasan_kmalloc+0xb7/0xc0
[   25.419580]  __kmalloc_cache_noprof+0x189/0x420
[   25.419800]  kasan_atomics+0x95/0x310
[   25.419962]  kunit_try_run_case+0x1a5/0x480
[   25.420180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.420447]  kthread+0x337/0x6f0
[   25.420617]  ret_from_fork+0x116/0x1d0
[   25.420794]  ret_from_fork_asm+0x1a/0x30
[   25.420978] 
[   25.421068] The buggy address belongs to the object at ffff8881039e9700
[   25.421068]  which belongs to the cache kmalloc-64 of size 64
[   25.421593] The buggy address is located 0 bytes to the right of
[   25.421593]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.422081] 
[   25.422192] The buggy address belongs to the physical page:
[   25.422433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.422697] flags: 0x200000000000000(node=0|zone=2)
[   25.422855] page_type: f5(slab)
[   25.422990] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.423531] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.423890] page dumped because: kasan: bad access detected
[   25.424153] 
[   25.424222] Memory state around the buggy address:
[   25.424380]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.424586]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.424883] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.425360]                                      ^
[   25.425562]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.425811]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.426137] ==================================================================
[   24.748050] ==================================================================
[   24.748715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   24.749134] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.749418] 
[   24.749531] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.749582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.749595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.749618] Call Trace:
[   24.749639]  <TASK>
[   24.749660]  dump_stack_lvl+0x73/0xb0
[   24.749687]  print_report+0xd1/0x650
[   24.749710]  ? __virt_addr_valid+0x1db/0x2d0
[   24.749733]  ? kasan_atomics_helper+0xde0/0x5450
[   24.749754]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.749779]  ? kasan_atomics_helper+0xde0/0x5450
[   24.749800]  kasan_report+0x141/0x180
[   24.749822]  ? kasan_atomics_helper+0xde0/0x5450
[   24.749847]  kasan_check_range+0x10c/0x1c0
[   24.749870]  __kasan_check_write+0x18/0x20
[   24.749892]  kasan_atomics_helper+0xde0/0x5450
[   24.749914]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.749948]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.749973]  ? kasan_atomics+0x152/0x310
[   24.749998]  kasan_atomics+0x1dc/0x310
[   24.750020]  ? __pfx_kasan_atomics+0x10/0x10
[   24.750041]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.750065]  ? __pfx_read_tsc+0x10/0x10
[   24.750088]  ? ktime_get_ts64+0x86/0x230
[   24.750114]  kunit_try_run_case+0x1a5/0x480
[   24.750151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.750175]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.750195]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.750220]  ? __kthread_parkme+0x82/0x180
[   24.750241]  ? preempt_count_sub+0x50/0x80
[   24.750265]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.750289]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.750313]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.750337]  kthread+0x337/0x6f0
[   24.750356]  ? trace_preempt_on+0x20/0xc0
[   24.750380]  ? __pfx_kthread+0x10/0x10
[   24.750400]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.750424]  ? calculate_sigpending+0x7b/0xa0
[   24.750447]  ? __pfx_kthread+0x10/0x10
[   24.750469]  ret_from_fork+0x116/0x1d0
[   24.750488]  ? __pfx_kthread+0x10/0x10
[   24.750508]  ret_from_fork_asm+0x1a/0x30
[   24.750539]  </TASK>
[   24.750551] 
[   24.757879] Allocated by task 294:
[   24.758032]  kasan_save_stack+0x45/0x70
[   24.758273]  kasan_save_track+0x18/0x40
[   24.758431]  kasan_save_alloc_info+0x3b/0x50
[   24.758619]  __kasan_kmalloc+0xb7/0xc0
[   24.758770]  __kmalloc_cache_noprof+0x189/0x420
[   24.758978]  kasan_atomics+0x95/0x310
[   24.759135]  kunit_try_run_case+0x1a5/0x480
[   24.759314]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.759516]  kthread+0x337/0x6f0
[   24.759643]  ret_from_fork+0x116/0x1d0
[   24.759820]  ret_from_fork_asm+0x1a/0x30
[   24.759979] 
[   24.760046] The buggy address belongs to the object at ffff8881039e9700
[   24.760046]  which belongs to the cache kmalloc-64 of size 64
[   24.760625] The buggy address is located 0 bytes to the right of
[   24.760625]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.760996] 
[   24.761068] The buggy address belongs to the physical page:
[   24.761306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.761649] flags: 0x200000000000000(node=0|zone=2)
[   24.761876] page_type: f5(slab)
[   24.762048] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.762557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.762850] page dumped because: kasan: bad access detected
[   24.763033] 
[   24.763096] Memory state around the buggy address:
[   24.763246]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.763555]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.763867] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.764182]                                      ^
[   24.764380]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.764654]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.764928] ==================================================================
[   24.312953] ==================================================================
[   24.313497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   24.313980] Read of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.314651] 
[   24.314790] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.314953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.314971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.314995] Call Trace:
[   24.315017]  <TASK>
[   24.315039]  dump_stack_lvl+0x73/0xb0
[   24.315070]  print_report+0xd1/0x650
[   24.315093]  ? __virt_addr_valid+0x1db/0x2d0
[   24.315117]  ? kasan_atomics_helper+0x4b54/0x5450
[   24.315156]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.315182]  ? kasan_atomics_helper+0x4b54/0x5450
[   24.315203]  kasan_report+0x141/0x180
[   24.315235]  ? kasan_atomics_helper+0x4b54/0x5450
[   24.315260]  __asan_report_load4_noabort+0x18/0x20
[   24.315284]  kasan_atomics_helper+0x4b54/0x5450
[   24.315317]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.315338]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.315362]  ? kasan_atomics+0x152/0x310
[   24.315388]  kasan_atomics+0x1dc/0x310
[   24.315410]  ? __pfx_kasan_atomics+0x10/0x10
[   24.315431]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.315455]  ? __pfx_read_tsc+0x10/0x10
[   24.315478]  ? ktime_get_ts64+0x86/0x230
[   24.315503]  kunit_try_run_case+0x1a5/0x480
[   24.315530]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.315554]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.315574]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.315608]  ? __kthread_parkme+0x82/0x180
[   24.315629]  ? preempt_count_sub+0x50/0x80
[   24.315653]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.315686]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.315710]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.315734]  kthread+0x337/0x6f0
[   24.315762]  ? trace_preempt_on+0x20/0xc0
[   24.315785]  ? __pfx_kthread+0x10/0x10
[   24.315805]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.315839]  ? calculate_sigpending+0x7b/0xa0
[   24.315911]  ? __pfx_kthread+0x10/0x10
[   24.315932]  ret_from_fork+0x116/0x1d0
[   24.315961]  ? __pfx_kthread+0x10/0x10
[   24.315982]  ret_from_fork_asm+0x1a/0x30
[   24.316014]  </TASK>
[   24.316025] 
[   24.324744] Allocated by task 294:
[   24.325003]  kasan_save_stack+0x45/0x70
[   24.325332]  kasan_save_track+0x18/0x40
[   24.325522]  kasan_save_alloc_info+0x3b/0x50
[   24.325744]  __kasan_kmalloc+0xb7/0xc0
[   24.326220]  __kmalloc_cache_noprof+0x189/0x420
[   24.326455]  kasan_atomics+0x95/0x310
[   24.326606]  kunit_try_run_case+0x1a5/0x480
[   24.326747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.326913]  kthread+0x337/0x6f0
[   24.327058]  ret_from_fork+0x116/0x1d0
[   24.327277]  ret_from_fork_asm+0x1a/0x30
[   24.327468] 
[   24.327596] The buggy address belongs to the object at ffff8881039e9700
[   24.327596]  which belongs to the cache kmalloc-64 of size 64
[   24.328089] The buggy address is located 0 bytes to the right of
[   24.328089]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.328654] 
[   24.328728] The buggy address belongs to the physical page:
[   24.328958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.329353] flags: 0x200000000000000(node=0|zone=2)
[   24.329682] page_type: f5(slab)
[   24.329801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.330070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.330703] page dumped because: kasan: bad access detected
[   24.331215] 
[   24.331317] Memory state around the buggy address:
[   24.331485]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.331694]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.332276] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.332722]                                      ^
[   24.333032]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.333326]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.333656] ==================================================================
[   24.986316] ==================================================================
[   24.986960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   24.987611] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.988032] 
[   24.988127] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.988176] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.988189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.988212] Call Trace:
[   24.988244]  <TASK>
[   24.988264]  dump_stack_lvl+0x73/0xb0
[   24.988292]  print_report+0xd1/0x650
[   24.988325]  ? __virt_addr_valid+0x1db/0x2d0
[   24.988355]  ? kasan_atomics_helper+0x12e6/0x5450
[   24.988376]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.988412]  ? kasan_atomics_helper+0x12e6/0x5450
[   24.988433]  kasan_report+0x141/0x180
[   24.988454]  ? kasan_atomics_helper+0x12e6/0x5450
[   24.988478]  kasan_check_range+0x10c/0x1c0
[   24.988500]  __kasan_check_write+0x18/0x20
[   24.988523]  kasan_atomics_helper+0x12e6/0x5450
[   24.988545]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.988575]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.988599]  ? kasan_atomics+0x152/0x310
[   24.988624]  kasan_atomics+0x1dc/0x310
[   24.988656]  ? __pfx_kasan_atomics+0x10/0x10
[   24.988677]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.988701]  ? __pfx_read_tsc+0x10/0x10
[   24.988724]  ? ktime_get_ts64+0x86/0x230
[   24.988758]  kunit_try_run_case+0x1a5/0x480
[   24.988785]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.988808]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.988838]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.988863]  ? __kthread_parkme+0x82/0x180
[   24.988884]  ? preempt_count_sub+0x50/0x80
[   24.988908]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.988932]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.988963]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.988987]  kthread+0x337/0x6f0
[   24.989007]  ? trace_preempt_on+0x20/0xc0
[   24.989030]  ? __pfx_kthread+0x10/0x10
[   24.989050]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.989073]  ? calculate_sigpending+0x7b/0xa0
[   24.989097]  ? __pfx_kthread+0x10/0x10
[   24.989118]  ret_from_fork+0x116/0x1d0
[   24.989147]  ? __pfx_kthread+0x10/0x10
[   24.989169]  ret_from_fork_asm+0x1a/0x30
[   24.989200]  </TASK>
[   24.989211] 
[   24.997462] Allocated by task 294:
[   24.997642]  kasan_save_stack+0x45/0x70
[   24.997846]  kasan_save_track+0x18/0x40
[   24.998023]  kasan_save_alloc_info+0x3b/0x50
[   24.998274]  __kasan_kmalloc+0xb7/0xc0
[   24.998451]  __kmalloc_cache_noprof+0x189/0x420
[   24.998667]  kasan_atomics+0x95/0x310
[   24.998838]  kunit_try_run_case+0x1a5/0x480
[   24.999048]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.999217]  kthread+0x337/0x6f0
[   24.999329]  ret_from_fork+0x116/0x1d0
[   24.999455]  ret_from_fork_asm+0x1a/0x30
[   24.999587] 
[   24.999667] The buggy address belongs to the object at ffff8881039e9700
[   24.999667]  which belongs to the cache kmalloc-64 of size 64
[   25.000206] The buggy address is located 0 bytes to the right of
[   25.000206]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.000712] 
[   25.000779] The buggy address belongs to the physical page:
[   25.000953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.001185] flags: 0x200000000000000(node=0|zone=2)
[   25.001588] page_type: f5(slab)
[   25.001753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.002104] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.002646] page dumped because: kasan: bad access detected
[   25.002899] 
[   25.002998] Memory state around the buggy address:
[   25.003176]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.003496]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.003772] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.004082]                                      ^
[   25.004381]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.004673]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.004977] ==================================================================
[   25.266199] ==================================================================
[   25.266600] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   25.266975] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.267346] 
[   25.267446] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.267493] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.267507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.267529] Call Trace:
[   25.267548]  <TASK>
[   25.267565]  dump_stack_lvl+0x73/0xb0
[   25.267591]  print_report+0xd1/0x650
[   25.267612]  ? __virt_addr_valid+0x1db/0x2d0
[   25.267635]  ? kasan_atomics_helper+0x19e3/0x5450
[   25.267656]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.267682]  ? kasan_atomics_helper+0x19e3/0x5450
[   25.267703]  kasan_report+0x141/0x180
[   25.267724]  ? kasan_atomics_helper+0x19e3/0x5450
[   25.267749]  kasan_check_range+0x10c/0x1c0
[   25.267772]  __kasan_check_write+0x18/0x20
[   25.267795]  kasan_atomics_helper+0x19e3/0x5450
[   25.267816]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.267837]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.267861]  ? kasan_atomics+0x152/0x310
[   25.267886]  kasan_atomics+0x1dc/0x310
[   25.267908]  ? __pfx_kasan_atomics+0x10/0x10
[   25.267929]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.267975]  ? __pfx_read_tsc+0x10/0x10
[   25.267997]  ? ktime_get_ts64+0x86/0x230
[   25.268021]  kunit_try_run_case+0x1a5/0x480
[   25.268060]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.268083]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.268103]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.268139]  ? __kthread_parkme+0x82/0x180
[   25.268159]  ? preempt_count_sub+0x50/0x80
[   25.268182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.268217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.268240]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.268265]  kthread+0x337/0x6f0
[   25.268295]  ? trace_preempt_on+0x20/0xc0
[   25.268318]  ? __pfx_kthread+0x10/0x10
[   25.268344]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.268379]  ? calculate_sigpending+0x7b/0xa0
[   25.268402]  ? __pfx_kthread+0x10/0x10
[   25.268423]  ret_from_fork+0x116/0x1d0
[   25.268453]  ? __pfx_kthread+0x10/0x10
[   25.268473]  ret_from_fork_asm+0x1a/0x30
[   25.268503]  </TASK>
[   25.268525] 
[   25.275866] Allocated by task 294:
[   25.276036]  kasan_save_stack+0x45/0x70
[   25.276250]  kasan_save_track+0x18/0x40
[   25.276416]  kasan_save_alloc_info+0x3b/0x50
[   25.276617]  __kasan_kmalloc+0xb7/0xc0
[   25.276781]  __kmalloc_cache_noprof+0x189/0x420
[   25.277007]  kasan_atomics+0x95/0x310
[   25.277211]  kunit_try_run_case+0x1a5/0x480
[   25.277410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.277646]  kthread+0x337/0x6f0
[   25.277804]  ret_from_fork+0x116/0x1d0
[   25.277975]  ret_from_fork_asm+0x1a/0x30
[   25.278197] 
[   25.278268] The buggy address belongs to the object at ffff8881039e9700
[   25.278268]  which belongs to the cache kmalloc-64 of size 64
[   25.278694] The buggy address is located 0 bytes to the right of
[   25.278694]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.279177] 
[   25.279267] The buggy address belongs to the physical page:
[   25.279495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.279810] flags: 0x200000000000000(node=0|zone=2)
[   25.279970] page_type: f5(slab)
[   25.280080] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.280731] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.280973] page dumped because: kasan: bad access detected
[   25.281131] 
[   25.281193] Memory state around the buggy address:
[   25.281424]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.281736]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.282062] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.282406]                                      ^
[   25.282619]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.282831]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.283162] ==================================================================
[   25.301057] ==================================================================
[   25.301524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   25.301899] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.302248] 
[   25.302358] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.302406] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.302420] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.302442] Call Trace:
[   25.302462]  <TASK>
[   25.302490]  dump_stack_lvl+0x73/0xb0
[   25.302517]  print_report+0xd1/0x650
[   25.302538]  ? __virt_addr_valid+0x1db/0x2d0
[   25.302572]  ? kasan_atomics_helper+0x1b22/0x5450
[   25.302593]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.302618]  ? kasan_atomics_helper+0x1b22/0x5450
[   25.302639]  kasan_report+0x141/0x180
[   25.302661]  ? kasan_atomics_helper+0x1b22/0x5450
[   25.302686]  kasan_check_range+0x10c/0x1c0
[   25.302709]  __kasan_check_write+0x18/0x20
[   25.302732]  kasan_atomics_helper+0x1b22/0x5450
[   25.302754]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.302776]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.302800]  ? kasan_atomics+0x152/0x310
[   25.302825]  kasan_atomics+0x1dc/0x310
[   25.302847]  ? __pfx_kasan_atomics+0x10/0x10
[   25.302868]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.302892]  ? __pfx_read_tsc+0x10/0x10
[   25.302916]  ? ktime_get_ts64+0x86/0x230
[   25.302953]  kunit_try_run_case+0x1a5/0x480
[   25.302980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.303003]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.303025]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.303050]  ? __kthread_parkme+0x82/0x180
[   25.303071]  ? preempt_count_sub+0x50/0x80
[   25.303094]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.303129]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.303162]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.303185]  kthread+0x337/0x6f0
[   25.303206]  ? trace_preempt_on+0x20/0xc0
[   25.303240]  ? __pfx_kthread+0x10/0x10
[   25.303260]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.303284]  ? calculate_sigpending+0x7b/0xa0
[   25.303308]  ? __pfx_kthread+0x10/0x10
[   25.303328]  ret_from_fork+0x116/0x1d0
[   25.303347]  ? __pfx_kthread+0x10/0x10
[   25.303367]  ret_from_fork_asm+0x1a/0x30
[   25.303398]  </TASK>
[   25.303409] 
[   25.312635] Allocated by task 294:
[   25.312815]  kasan_save_stack+0x45/0x70
[   25.313006]  kasan_save_track+0x18/0x40
[   25.313753]  kasan_save_alloc_info+0x3b/0x50
[   25.314343]  __kasan_kmalloc+0xb7/0xc0
[   25.314492]  __kmalloc_cache_noprof+0x189/0x420
[   25.314643]  kasan_atomics+0x95/0x310
[   25.314774]  kunit_try_run_case+0x1a5/0x480
[   25.314917]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.315095]  kthread+0x337/0x6f0
[   25.315217]  ret_from_fork+0x116/0x1d0
[   25.315342]  ret_from_fork_asm+0x1a/0x30
[   25.315472] 
[   25.315540] The buggy address belongs to the object at ffff8881039e9700
[   25.315540]  which belongs to the cache kmalloc-64 of size 64
[   25.315883] The buggy address is located 0 bytes to the right of
[   25.315883]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.317116] 
[   25.317368] The buggy address belongs to the physical page:
[   25.317903] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.318641] flags: 0x200000000000000(node=0|zone=2)
[   25.319106] page_type: f5(slab)
[   25.319413] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.320059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.320717] page dumped because: kasan: bad access detected
[   25.321209] 
[   25.321360] Memory state around the buggy address:
[   25.321796]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.322479]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.323195] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.323800]                                      ^
[   25.324237]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.324483]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.324681] ==================================================================
[   24.356477] ==================================================================
[   24.356815] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   24.357249] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.357576] 
[   24.357690] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.357743] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.357757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.357790] Call Trace:
[   24.357814]  <TASK>
[   24.357837]  dump_stack_lvl+0x73/0xb0
[   24.358118]  print_report+0xd1/0x650
[   24.358159]  ? __virt_addr_valid+0x1db/0x2d0
[   24.358198]  ? kasan_atomics_helper+0x4b3a/0x5450
[   24.358221]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.358247]  ? kasan_atomics_helper+0x4b3a/0x5450
[   24.358268]  kasan_report+0x141/0x180
[   24.358290]  ? kasan_atomics_helper+0x4b3a/0x5450
[   24.358316]  __asan_report_store4_noabort+0x1b/0x30
[   24.358340]  kasan_atomics_helper+0x4b3a/0x5450
[   24.358364]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.358385]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.358410]  ? kasan_atomics+0x152/0x310
[   24.358436]  kasan_atomics+0x1dc/0x310
[   24.358458]  ? __pfx_kasan_atomics+0x10/0x10
[   24.358480]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.358504]  ? __pfx_read_tsc+0x10/0x10
[   24.358542]  ? ktime_get_ts64+0x86/0x230
[   24.358568]  kunit_try_run_case+0x1a5/0x480
[   24.358596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.358631]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.358653]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.358678]  ? __kthread_parkme+0x82/0x180
[   24.358699]  ? preempt_count_sub+0x50/0x80
[   24.358722]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.358746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.358770]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.358794]  kthread+0x337/0x6f0
[   24.358858]  ? trace_preempt_on+0x20/0xc0
[   24.358885]  ? __pfx_kthread+0x10/0x10
[   24.358906]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.359011]  ? calculate_sigpending+0x7b/0xa0
[   24.359038]  ? __pfx_kthread+0x10/0x10
[   24.359059]  ret_from_fork+0x116/0x1d0
[   24.359080]  ? __pfx_kthread+0x10/0x10
[   24.359100]  ret_from_fork_asm+0x1a/0x30
[   24.359131]  </TASK>
[   24.359143] 
[   24.368138] Allocated by task 294:
[   24.368721]  kasan_save_stack+0x45/0x70
[   24.369134]  kasan_save_track+0x18/0x40
[   24.369317]  kasan_save_alloc_info+0x3b/0x50
[   24.369514]  __kasan_kmalloc+0xb7/0xc0
[   24.369679]  __kmalloc_cache_noprof+0x189/0x420
[   24.370172]  kasan_atomics+0x95/0x310
[   24.370364]  kunit_try_run_case+0x1a5/0x480
[   24.370545]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.370715]  kthread+0x337/0x6f0
[   24.370844]  ret_from_fork+0x116/0x1d0
[   24.371134]  ret_from_fork_asm+0x1a/0x30
[   24.371333] 
[   24.371428] The buggy address belongs to the object at ffff8881039e9700
[   24.371428]  which belongs to the cache kmalloc-64 of size 64
[   24.372104] The buggy address is located 0 bytes to the right of
[   24.372104]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.372547] 
[   24.372644] The buggy address belongs to the physical page:
[   24.372925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.373486] flags: 0x200000000000000(node=0|zone=2)
[   24.373659] page_type: f5(slab)
[   24.373777] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.374117] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.374477] page dumped because: kasan: bad access detected
[   24.375029] 
[   24.375497] Memory state around the buggy address:
[   24.376167]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.376591]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.377077] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.377646]                                      ^
[   24.378369]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.379147]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.379784] ==================================================================
[   24.460737] ==================================================================
[   24.461340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   24.461623] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.461924] 
[   24.462086] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.462138] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.462152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.462175] Call Trace:
[   24.462189]  <TASK>
[   24.462209]  dump_stack_lvl+0x73/0xb0
[   24.462236]  print_report+0xd1/0x650
[   24.462258]  ? __virt_addr_valid+0x1db/0x2d0
[   24.462282]  ? kasan_atomics_helper+0x72f/0x5450
[   24.462302]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.462348]  ? kasan_atomics_helper+0x72f/0x5450
[   24.462391]  kasan_report+0x141/0x180
[   24.462414]  ? kasan_atomics_helper+0x72f/0x5450
[   24.462468]  kasan_check_range+0x10c/0x1c0
[   24.462503]  __kasan_check_write+0x18/0x20
[   24.462544]  kasan_atomics_helper+0x72f/0x5450
[   24.462571]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.462593]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.462618]  ? kasan_atomics+0x152/0x310
[   24.462644]  kasan_atomics+0x1dc/0x310
[   24.462666]  ? __pfx_kasan_atomics+0x10/0x10
[   24.462687]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.462711]  ? __pfx_read_tsc+0x10/0x10
[   24.462734]  ? ktime_get_ts64+0x86/0x230
[   24.462759]  kunit_try_run_case+0x1a5/0x480
[   24.462805]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.462842]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.462863]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.462888]  ? __kthread_parkme+0x82/0x180
[   24.462909]  ? preempt_count_sub+0x50/0x80
[   24.462932]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.462966]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.462990]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.463014]  kthread+0x337/0x6f0
[   24.463033]  ? trace_preempt_on+0x20/0xc0
[   24.463074]  ? __pfx_kthread+0x10/0x10
[   24.463096]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.463119]  ? calculate_sigpending+0x7b/0xa0
[   24.463143]  ? __pfx_kthread+0x10/0x10
[   24.463163]  ret_from_fork+0x116/0x1d0
[   24.463182]  ? __pfx_kthread+0x10/0x10
[   24.463203]  ret_from_fork_asm+0x1a/0x30
[   24.463233]  </TASK>
[   24.463244] 
[   24.475706] Allocated by task 294:
[   24.476169]  kasan_save_stack+0x45/0x70
[   24.476510]  kasan_save_track+0x18/0x40
[   24.476694]  kasan_save_alloc_info+0x3b/0x50
[   24.477338]  __kasan_kmalloc+0xb7/0xc0
[   24.477545]  __kmalloc_cache_noprof+0x189/0x420
[   24.477740]  kasan_atomics+0x95/0x310
[   24.478275]  kunit_try_run_case+0x1a5/0x480
[   24.478631]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.479255]  kthread+0x337/0x6f0
[   24.479453]  ret_from_fork+0x116/0x1d0
[   24.479623]  ret_from_fork_asm+0x1a/0x30
[   24.479793] 
[   24.480158] The buggy address belongs to the object at ffff8881039e9700
[   24.480158]  which belongs to the cache kmalloc-64 of size 64
[   24.480637] The buggy address is located 0 bytes to the right of
[   24.480637]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.481547] 
[   24.481643] The buggy address belongs to the physical page:
[   24.482186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.482516] flags: 0x200000000000000(node=0|zone=2)
[   24.482725] page_type: f5(slab)
[   24.483269] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.483582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.484036] page dumped because: kasan: bad access detected
[   24.484434] 
[   24.484539] Memory state around the buggy address:
[   24.484740]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.485378]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.485609] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.485955]                                      ^
[   24.486264]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.486539]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.486828] ==================================================================
[   25.207425] ==================================================================
[   25.207827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   25.208288] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.208606] 
[   25.208722] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.208805] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.208846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.208869] Call Trace:
[   25.208891]  <TASK>
[   25.208916]  dump_stack_lvl+0x73/0xb0
[   25.208959]  print_report+0xd1/0x650
[   25.208983]  ? __virt_addr_valid+0x1db/0x2d0
[   25.209007]  ? kasan_atomics_helper+0x1818/0x5450
[   25.209047]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.209081]  ? kasan_atomics_helper+0x1818/0x5450
[   25.209103]  kasan_report+0x141/0x180
[   25.209136]  ? kasan_atomics_helper+0x1818/0x5450
[   25.209162]  kasan_check_range+0x10c/0x1c0
[   25.209185]  __kasan_check_write+0x18/0x20
[   25.209207]  kasan_atomics_helper+0x1818/0x5450
[   25.209229]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.209251]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.209276]  ? kasan_atomics+0x152/0x310
[   25.209329]  kasan_atomics+0x1dc/0x310
[   25.209351]  ? __pfx_kasan_atomics+0x10/0x10
[   25.209372]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.209406]  ? __pfx_read_tsc+0x10/0x10
[   25.209430]  ? ktime_get_ts64+0x86/0x230
[   25.209481]  kunit_try_run_case+0x1a5/0x480
[   25.209509]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.209532]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.209563]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.209588]  ? __kthread_parkme+0x82/0x180
[   25.209609]  ? preempt_count_sub+0x50/0x80
[   25.209632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.209656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.209679]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.209703]  kthread+0x337/0x6f0
[   25.209723]  ? trace_preempt_on+0x20/0xc0
[   25.209746]  ? __pfx_kthread+0x10/0x10
[   25.209768]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.209790]  ? calculate_sigpending+0x7b/0xa0
[   25.209814]  ? __pfx_kthread+0x10/0x10
[   25.209835]  ret_from_fork+0x116/0x1d0
[   25.209854]  ? __pfx_kthread+0x10/0x10
[   25.209874]  ret_from_fork_asm+0x1a/0x30
[   25.209904]  </TASK>
[   25.209916] 
[   25.217797] Allocated by task 294:
[   25.217992]  kasan_save_stack+0x45/0x70
[   25.218233]  kasan_save_track+0x18/0x40
[   25.218533]  kasan_save_alloc_info+0x3b/0x50
[   25.218763]  __kasan_kmalloc+0xb7/0xc0
[   25.218934]  __kmalloc_cache_noprof+0x189/0x420
[   25.219155]  kasan_atomics+0x95/0x310
[   25.219406]  kunit_try_run_case+0x1a5/0x480
[   25.219606]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.219912]  kthread+0x337/0x6f0
[   25.220088]  ret_from_fork+0x116/0x1d0
[   25.220287]  ret_from_fork_asm+0x1a/0x30
[   25.220463] 
[   25.220585] The buggy address belongs to the object at ffff8881039e9700
[   25.220585]  which belongs to the cache kmalloc-64 of size 64
[   25.221053] The buggy address is located 0 bytes to the right of
[   25.221053]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.221401] 
[   25.221469] The buggy address belongs to the physical page:
[   25.221632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.221907] flags: 0x200000000000000(node=0|zone=2)
[   25.222224] page_type: f5(slab)
[   25.222409] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.222790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.223139] page dumped because: kasan: bad access detected
[   25.223382] 
[   25.223509] Memory state around the buggy address:
[   25.223726]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.223969]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.224292] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.224658]                                      ^
[   25.224950]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.225337]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.225538] ==================================================================
[   24.228012] ==================================================================
[   24.228399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   24.228735] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.229221] 
[   24.229309] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.229358] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.229370] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.229391] Call Trace:
[   24.229406]  <TASK>
[   24.229501]  dump_stack_lvl+0x73/0xb0
[   24.229529]  print_report+0xd1/0x650
[   24.229549]  ? __virt_addr_valid+0x1db/0x2d0
[   24.229571]  ? kasan_atomics_helper+0x4ba2/0x5450
[   24.229592]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.229617]  ? kasan_atomics_helper+0x4ba2/0x5450
[   24.229636]  kasan_report+0x141/0x180
[   24.229656]  ? kasan_atomics_helper+0x4ba2/0x5450
[   24.229679]  __asan_report_store4_noabort+0x1b/0x30
[   24.229711]  kasan_atomics_helper+0x4ba2/0x5450
[   24.229732]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.229752]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.229786]  ? kasan_atomics+0x152/0x310
[   24.229810]  kasan_atomics+0x1dc/0x310
[   24.229897]  ? __pfx_kasan_atomics+0x10/0x10
[   24.229917]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.229952]  ? __pfx_read_tsc+0x10/0x10
[   24.229973]  ? ktime_get_ts64+0x86/0x230
[   24.229998]  kunit_try_run_case+0x1a5/0x480
[   24.230023]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.230054]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.230073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.230097]  ? __kthread_parkme+0x82/0x180
[   24.230128]  ? preempt_count_sub+0x50/0x80
[   24.230151]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.230173]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.230195]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.230217]  kthread+0x337/0x6f0
[   24.230235]  ? trace_preempt_on+0x20/0xc0
[   24.230258]  ? __pfx_kthread+0x10/0x10
[   24.230277]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.230308]  ? calculate_sigpending+0x7b/0xa0
[   24.230331]  ? __pfx_kthread+0x10/0x10
[   24.230351]  ret_from_fork+0x116/0x1d0
[   24.230379]  ? __pfx_kthread+0x10/0x10
[   24.230398]  ret_from_fork_asm+0x1a/0x30
[   24.230427]  </TASK>
[   24.230438] 
[   24.238778] Allocated by task 294:
[   24.239203]  kasan_save_stack+0x45/0x70
[   24.239549]  kasan_save_track+0x18/0x40
[   24.239737]  kasan_save_alloc_info+0x3b/0x50
[   24.240116]  __kasan_kmalloc+0xb7/0xc0
[   24.240252]  __kmalloc_cache_noprof+0x189/0x420
[   24.240405]  kasan_atomics+0x95/0x310
[   24.240549]  kunit_try_run_case+0x1a5/0x480
[   24.240747]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.240997]  kthread+0x337/0x6f0
[   24.241143]  ret_from_fork+0x116/0x1d0
[   24.241269]  ret_from_fork_asm+0x1a/0x30
[   24.241403] 
[   24.241468] The buggy address belongs to the object at ffff8881039e9700
[   24.241468]  which belongs to the cache kmalloc-64 of size 64
[   24.242021] The buggy address is located 0 bytes to the right of
[   24.242021]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.243071] 
[   24.243302] The buggy address belongs to the physical page:
[   24.243539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.243847] flags: 0x200000000000000(node=0|zone=2)
[   24.244021] page_type: f5(slab)
[   24.244274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.244737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.245165] page dumped because: kasan: bad access detected
[   24.245401] 
[   24.245490] Memory state around the buggy address:
[   24.245654]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.245966]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.246362] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.246604]                                      ^
[   24.246838]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.247570]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.248003] ==================================================================
[   25.391052] ==================================================================
[   25.391579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   25.391809] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.392198] 
[   25.392310] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.392366] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.392379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.392401] Call Trace:
[   25.392422]  <TASK>
[   25.392442]  dump_stack_lvl+0x73/0xb0
[   25.392469]  print_report+0xd1/0x650
[   25.392492]  ? __virt_addr_valid+0x1db/0x2d0
[   25.392515]  ? kasan_atomics_helper+0x1d7a/0x5450
[   25.392535]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.392561]  ? kasan_atomics_helper+0x1d7a/0x5450
[   25.392581]  kasan_report+0x141/0x180
[   25.392602]  ? kasan_atomics_helper+0x1d7a/0x5450
[   25.392628]  kasan_check_range+0x10c/0x1c0
[   25.392651]  __kasan_check_write+0x18/0x20
[   25.392674]  kasan_atomics_helper+0x1d7a/0x5450
[   25.392696]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.392717]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.392741]  ? kasan_atomics+0x152/0x310
[   25.392766]  kasan_atomics+0x1dc/0x310
[   25.392788]  ? __pfx_kasan_atomics+0x10/0x10
[   25.392809]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.392832]  ? __pfx_read_tsc+0x10/0x10
[   25.392854]  ? ktime_get_ts64+0x86/0x230
[   25.392879]  kunit_try_run_case+0x1a5/0x480
[   25.392906]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.392928]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.392958]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.392984]  ? __kthread_parkme+0x82/0x180
[   25.393004]  ? preempt_count_sub+0x50/0x80
[   25.393028]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.393052]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.393076]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.393099]  kthread+0x337/0x6f0
[   25.393130]  ? trace_preempt_on+0x20/0xc0
[   25.393153]  ? __pfx_kthread+0x10/0x10
[   25.393173]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.393197]  ? calculate_sigpending+0x7b/0xa0
[   25.393220]  ? __pfx_kthread+0x10/0x10
[   25.393242]  ret_from_fork+0x116/0x1d0
[   25.393260]  ? __pfx_kthread+0x10/0x10
[   25.393280]  ret_from_fork_asm+0x1a/0x30
[   25.393310]  </TASK>
[   25.393322] 
[   25.400858] Allocated by task 294:
[   25.401031]  kasan_save_stack+0x45/0x70
[   25.401246]  kasan_save_track+0x18/0x40
[   25.401411]  kasan_save_alloc_info+0x3b/0x50
[   25.401607]  __kasan_kmalloc+0xb7/0xc0
[   25.401781]  __kmalloc_cache_noprof+0x189/0x420
[   25.401982]  kasan_atomics+0x95/0x310
[   25.402141]  kunit_try_run_case+0x1a5/0x480
[   25.402302]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.402539]  kthread+0x337/0x6f0
[   25.402693]  ret_from_fork+0x116/0x1d0
[   25.402870]  ret_from_fork_asm+0x1a/0x30
[   25.403038] 
[   25.403104] The buggy address belongs to the object at ffff8881039e9700
[   25.403104]  which belongs to the cache kmalloc-64 of size 64
[   25.403569] The buggy address is located 0 bytes to the right of
[   25.403569]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.404052] 
[   25.404147] The buggy address belongs to the physical page:
[   25.404322] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.404553] flags: 0x200000000000000(node=0|zone=2)
[   25.404710] page_type: f5(slab)
[   25.404824] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.405112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.405629] page dumped because: kasan: bad access detected
[   25.405868] 
[   25.405962] Memory state around the buggy address:
[   25.406171]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.406376]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.406580] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.406781]                                      ^
[   25.407081]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.407528]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.407863] ==================================================================
[   25.226071] ==================================================================
[   25.226590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   25.227172] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.227556] 
[   25.227728] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.227855] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.227870] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.228166] Call Trace:
[   25.228190]  <TASK>
[   25.228211]  dump_stack_lvl+0x73/0xb0
[   25.228239]  print_report+0xd1/0x650
[   25.228261]  ? __virt_addr_valid+0x1db/0x2d0
[   25.228305]  ? kasan_atomics_helper+0x18b1/0x5450
[   25.228346]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.228371]  ? kasan_atomics_helper+0x18b1/0x5450
[   25.228405]  kasan_report+0x141/0x180
[   25.228440]  ? kasan_atomics_helper+0x18b1/0x5450
[   25.228465]  kasan_check_range+0x10c/0x1c0
[   25.228502]  __kasan_check_write+0x18/0x20
[   25.228524]  kasan_atomics_helper+0x18b1/0x5450
[   25.228559]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.228591]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.228616]  ? kasan_atomics+0x152/0x310
[   25.228642]  kasan_atomics+0x1dc/0x310
[   25.228675]  ? __pfx_kasan_atomics+0x10/0x10
[   25.228698]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.228722]  ? __pfx_read_tsc+0x10/0x10
[   25.228745]  ? ktime_get_ts64+0x86/0x230
[   25.228770]  kunit_try_run_case+0x1a5/0x480
[   25.228797]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.228819]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.228840]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.228866]  ? __kthread_parkme+0x82/0x180
[   25.228885]  ? preempt_count_sub+0x50/0x80
[   25.228909]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.228933]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.228965]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.228989]  kthread+0x337/0x6f0
[   25.229008]  ? trace_preempt_on+0x20/0xc0
[   25.229031]  ? __pfx_kthread+0x10/0x10
[   25.229051]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.229074]  ? calculate_sigpending+0x7b/0xa0
[   25.229098]  ? __pfx_kthread+0x10/0x10
[   25.229129]  ret_from_fork+0x116/0x1d0
[   25.229148]  ? __pfx_kthread+0x10/0x10
[   25.229168]  ret_from_fork_asm+0x1a/0x30
[   25.229199]  </TASK>
[   25.229210] 
[   25.237288] Allocated by task 294:
[   25.237423]  kasan_save_stack+0x45/0x70
[   25.237558]  kasan_save_track+0x18/0x40
[   25.237742]  kasan_save_alloc_info+0x3b/0x50
[   25.238030]  __kasan_kmalloc+0xb7/0xc0
[   25.238425]  __kmalloc_cache_noprof+0x189/0x420
[   25.238573]  kasan_atomics+0x95/0x310
[   25.238750]  kunit_try_run_case+0x1a5/0x480
[   25.238984]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.239302]  kthread+0x337/0x6f0
[   25.239461]  ret_from_fork+0x116/0x1d0
[   25.239647]  ret_from_fork_asm+0x1a/0x30
[   25.239860] 
[   25.239977] The buggy address belongs to the object at ffff8881039e9700
[   25.239977]  which belongs to the cache kmalloc-64 of size 64
[   25.240565] The buggy address is located 0 bytes to the right of
[   25.240565]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.241168] 
[   25.241273] The buggy address belongs to the physical page:
[   25.241517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.241904] flags: 0x200000000000000(node=0|zone=2)
[   25.242154] page_type: f5(slab)
[   25.242373] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.242692] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.242905] page dumped because: kasan: bad access detected
[   25.243124] 
[   25.243209] Memory state around the buggy address:
[   25.243420]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.243730]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.244065] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.244269]                                      ^
[   25.244416]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.244792]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.245111] ==================================================================
[   25.246494] ==================================================================
[   25.247098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   25.247518] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.247848] 
[   25.247980] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.248042] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.248056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.248118] Call Trace:
[   25.248163]  <TASK>
[   25.248182]  dump_stack_lvl+0x73/0xb0
[   25.248209]  print_report+0xd1/0x650
[   25.248240]  ? __virt_addr_valid+0x1db/0x2d0
[   25.248263]  ? kasan_atomics_helper+0x194a/0x5450
[   25.248284]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.248310]  ? kasan_atomics_helper+0x194a/0x5450
[   25.248335]  kasan_report+0x141/0x180
[   25.248357]  ? kasan_atomics_helper+0x194a/0x5450
[   25.248382]  kasan_check_range+0x10c/0x1c0
[   25.248405]  __kasan_check_write+0x18/0x20
[   25.248438]  kasan_atomics_helper+0x194a/0x5450
[   25.248460]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.248481]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.248505]  ? kasan_atomics+0x152/0x310
[   25.248530]  kasan_atomics+0x1dc/0x310
[   25.248552]  ? __pfx_kasan_atomics+0x10/0x10
[   25.248573]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.248676]  ? __pfx_read_tsc+0x10/0x10
[   25.248700]  ? ktime_get_ts64+0x86/0x230
[   25.248726]  kunit_try_run_case+0x1a5/0x480
[   25.248764]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.248787]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.248818]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.248858]  ? __kthread_parkme+0x82/0x180
[   25.248899]  ? preempt_count_sub+0x50/0x80
[   25.248924]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.248964]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.249003]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.249053]  kthread+0x337/0x6f0
[   25.249072]  ? trace_preempt_on+0x20/0xc0
[   25.249095]  ? __pfx_kthread+0x10/0x10
[   25.249133]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.249156]  ? calculate_sigpending+0x7b/0xa0
[   25.249180]  ? __pfx_kthread+0x10/0x10
[   25.249201]  ret_from_fork+0x116/0x1d0
[   25.249220]  ? __pfx_kthread+0x10/0x10
[   25.249240]  ret_from_fork_asm+0x1a/0x30
[   25.249270]  </TASK>
[   25.249282] 
[   25.257338] Allocated by task 294:
[   25.257484]  kasan_save_stack+0x45/0x70
[   25.257723]  kasan_save_track+0x18/0x40
[   25.257881]  kasan_save_alloc_info+0x3b/0x50
[   25.258107]  __kasan_kmalloc+0xb7/0xc0
[   25.258318]  __kmalloc_cache_noprof+0x189/0x420
[   25.258539]  kasan_atomics+0x95/0x310
[   25.258725]  kunit_try_run_case+0x1a5/0x480
[   25.258920]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.259277]  kthread+0x337/0x6f0
[   25.259459]  ret_from_fork+0x116/0x1d0
[   25.259660]  ret_from_fork_asm+0x1a/0x30
[   25.259841] 
[   25.259905] The buggy address belongs to the object at ffff8881039e9700
[   25.259905]  which belongs to the cache kmalloc-64 of size 64
[   25.260536] The buggy address is located 0 bytes to the right of
[   25.260536]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.260907] 
[   25.261028] The buggy address belongs to the physical page:
[   25.261278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.261737] flags: 0x200000000000000(node=0|zone=2)
[   25.262008] page_type: f5(slab)
[   25.262207] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.262551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.262869] page dumped because: kasan: bad access detected
[   25.263040] 
[   25.263100] Memory state around the buggy address:
[   25.263242]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.263459]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.263820] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.264271]                                      ^
[   25.264726]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.265136]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.265428] ==================================================================
[   25.346720] ==================================================================
[   25.347721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   25.348209] Read of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.348643] 
[   25.348735] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.348787] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.348801] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.349071] Call Trace:
[   25.349102]  <TASK>
[   25.349127]  dump_stack_lvl+0x73/0xb0
[   25.349160]  print_report+0xd1/0x650
[   25.349185]  ? __virt_addr_valid+0x1db/0x2d0
[   25.349209]  ? kasan_atomics_helper+0x4f30/0x5450
[   25.349230]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.349257]  ? kasan_atomics_helper+0x4f30/0x5450
[   25.349278]  kasan_report+0x141/0x180
[   25.349299]  ? kasan_atomics_helper+0x4f30/0x5450
[   25.349325]  __asan_report_load8_noabort+0x18/0x20
[   25.349348]  kasan_atomics_helper+0x4f30/0x5450
[   25.349370]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.349392]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.349417]  ? kasan_atomics+0x152/0x310
[   25.349442]  kasan_atomics+0x1dc/0x310
[   25.349463]  ? __pfx_kasan_atomics+0x10/0x10
[   25.349485]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.349508]  ? __pfx_read_tsc+0x10/0x10
[   25.349530]  ? ktime_get_ts64+0x86/0x230
[   25.349556]  kunit_try_run_case+0x1a5/0x480
[   25.349583]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.349605]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.349625]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.349650]  ? __kthread_parkme+0x82/0x180
[   25.349671]  ? preempt_count_sub+0x50/0x80
[   25.349695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.349719]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.349742]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.349765]  kthread+0x337/0x6f0
[   25.349785]  ? trace_preempt_on+0x20/0xc0
[   25.349809]  ? __pfx_kthread+0x10/0x10
[   25.349830]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.349853]  ? calculate_sigpending+0x7b/0xa0
[   25.349877]  ? __pfx_kthread+0x10/0x10
[   25.349897]  ret_from_fork+0x116/0x1d0
[   25.349916]  ? __pfx_kthread+0x10/0x10
[   25.349947]  ret_from_fork_asm+0x1a/0x30
[   25.349978]  </TASK>
[   25.349989] 
[   25.362673] Allocated by task 294:
[   25.363157]  kasan_save_stack+0x45/0x70
[   25.363646]  kasan_save_track+0x18/0x40
[   25.364175]  kasan_save_alloc_info+0x3b/0x50
[   25.364691]  __kasan_kmalloc+0xb7/0xc0
[   25.365204]  __kmalloc_cache_noprof+0x189/0x420
[   25.365731]  kasan_atomics+0x95/0x310
[   25.366289]  kunit_try_run_case+0x1a5/0x480
[   25.366620]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.366793]  kthread+0x337/0x6f0
[   25.366910]  ret_from_fork+0x116/0x1d0
[   25.367047]  ret_from_fork_asm+0x1a/0x30
[   25.367309] 
[   25.367469] The buggy address belongs to the object at ffff8881039e9700
[   25.367469]  which belongs to the cache kmalloc-64 of size 64
[   25.368601] The buggy address is located 0 bytes to the right of
[   25.368601]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.369783] 
[   25.369960] The buggy address belongs to the physical page:
[   25.370239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.370475] flags: 0x200000000000000(node=0|zone=2)
[   25.370635] page_type: f5(slab)
[   25.370751] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.370990] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.371293] page dumped because: kasan: bad access detected
[   25.371531] 
[   25.371618] Memory state around the buggy address:
[   25.371813]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.372045]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.372608] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.372891]                                      ^
[   25.373110]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.373378]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.373657] ==================================================================
[   24.704217] ==================================================================
[   24.704769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   24.705256] Read of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.705578] 
[   24.705696] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.705747] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.705761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.705784] Call Trace:
[   24.705807]  <TASK>
[   24.706031]  dump_stack_lvl+0x73/0xb0
[   24.706065]  print_report+0xd1/0x650
[   24.706088]  ? __virt_addr_valid+0x1db/0x2d0
[   24.706239]  ? kasan_atomics_helper+0x4a84/0x5450
[   24.706263]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.706289]  ? kasan_atomics_helper+0x4a84/0x5450
[   24.706310]  kasan_report+0x141/0x180
[   24.706332]  ? kasan_atomics_helper+0x4a84/0x5450
[   24.706357]  __asan_report_load4_noabort+0x18/0x20
[   24.706381]  kasan_atomics_helper+0x4a84/0x5450
[   24.706403]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.706425]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.706449]  ? kasan_atomics+0x152/0x310
[   24.706474]  kasan_atomics+0x1dc/0x310
[   24.706497]  ? __pfx_kasan_atomics+0x10/0x10
[   24.706518]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.706542]  ? __pfx_read_tsc+0x10/0x10
[   24.706564]  ? ktime_get_ts64+0x86/0x230
[   24.706589]  kunit_try_run_case+0x1a5/0x480
[   24.706616]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.706639]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.706659]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.706684]  ? __kthread_parkme+0x82/0x180
[   24.706705]  ? preempt_count_sub+0x50/0x80
[   24.706728]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.706752]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.706775]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.706798]  kthread+0x337/0x6f0
[   24.706825]  ? trace_preempt_on+0x20/0xc0
[   24.706849]  ? __pfx_kthread+0x10/0x10
[   24.706869]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.706892]  ? calculate_sigpending+0x7b/0xa0
[   24.706915]  ? __pfx_kthread+0x10/0x10
[   24.706950]  ret_from_fork+0x116/0x1d0
[   24.706969]  ? __pfx_kthread+0x10/0x10
[   24.706989]  ret_from_fork_asm+0x1a/0x30
[   24.707019]  </TASK>
[   24.707030] 
[   24.718495] Allocated by task 294:
[   24.718805]  kasan_save_stack+0x45/0x70
[   24.719008]  kasan_save_track+0x18/0x40
[   24.719415]  kasan_save_alloc_info+0x3b/0x50
[   24.719842]  __kasan_kmalloc+0xb7/0xc0
[   24.720104]  __kmalloc_cache_noprof+0x189/0x420
[   24.720425]  kasan_atomics+0x95/0x310
[   24.720792]  kunit_try_run_case+0x1a5/0x480
[   24.721216]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.721543]  kthread+0x337/0x6f0
[   24.721815]  ret_from_fork+0x116/0x1d0
[   24.722264]  ret_from_fork_asm+0x1a/0x30
[   24.722466] 
[   24.722565] The buggy address belongs to the object at ffff8881039e9700
[   24.722565]  which belongs to the cache kmalloc-64 of size 64
[   24.723264] The buggy address is located 0 bytes to the right of
[   24.723264]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.723904] 
[   24.724015] The buggy address belongs to the physical page:
[   24.724694] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.725211] flags: 0x200000000000000(node=0|zone=2)
[   24.725534] page_type: f5(slab)
[   24.725710] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.726294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.726695] page dumped because: kasan: bad access detected
[   24.727316] 
[   24.727405] Memory state around the buggy address:
[   24.727618]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.727902]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.728594] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.728837]                                      ^
[   24.729501]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.729741]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.730387] ==================================================================
[   25.283820] ==================================================================
[   25.284147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   25.284380] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.284606] 
[   25.284766] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.284811] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.284825] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.284846] Call Trace:
[   25.284862]  <TASK>
[   25.284877]  dump_stack_lvl+0x73/0xb0
[   25.284903]  print_report+0xd1/0x650
[   25.284924]  ? __virt_addr_valid+0x1db/0x2d0
[   25.284957]  ? kasan_atomics_helper+0x1a7f/0x5450
[   25.284978]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.285003]  ? kasan_atomics_helper+0x1a7f/0x5450
[   25.285024]  kasan_report+0x141/0x180
[   25.285046]  ? kasan_atomics_helper+0x1a7f/0x5450
[   25.285072]  kasan_check_range+0x10c/0x1c0
[   25.285094]  __kasan_check_write+0x18/0x20
[   25.285117]  kasan_atomics_helper+0x1a7f/0x5450
[   25.285138]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.285159]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.285183]  ? kasan_atomics+0x152/0x310
[   25.285209]  kasan_atomics+0x1dc/0x310
[   25.285230]  ? __pfx_kasan_atomics+0x10/0x10
[   25.285251]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.285275]  ? __pfx_read_tsc+0x10/0x10
[   25.285296]  ? ktime_get_ts64+0x86/0x230
[   25.285320]  kunit_try_run_case+0x1a5/0x480
[   25.285346]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.285368]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.285388]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.285414]  ? __kthread_parkme+0x82/0x180
[   25.285434]  ? preempt_count_sub+0x50/0x80
[   25.285458]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.285482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.285506]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.285530]  kthread+0x337/0x6f0
[   25.285549]  ? trace_preempt_on+0x20/0xc0
[   25.285572]  ? __pfx_kthread+0x10/0x10
[   25.285593]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.285616]  ? calculate_sigpending+0x7b/0xa0
[   25.285639]  ? __pfx_kthread+0x10/0x10
[   25.285660]  ret_from_fork+0x116/0x1d0
[   25.285678]  ? __pfx_kthread+0x10/0x10
[   25.285698]  ret_from_fork_asm+0x1a/0x30
[   25.285729]  </TASK>
[   25.285739] 
[   25.293377] Allocated by task 294:
[   25.293559]  kasan_save_stack+0x45/0x70
[   25.293778]  kasan_save_track+0x18/0x40
[   25.293933]  kasan_save_alloc_info+0x3b/0x50
[   25.294081]  __kasan_kmalloc+0xb7/0xc0
[   25.294204]  __kmalloc_cache_noprof+0x189/0x420
[   25.294349]  kasan_atomics+0x95/0x310
[   25.294473]  kunit_try_run_case+0x1a5/0x480
[   25.294613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.294778]  kthread+0x337/0x6f0
[   25.294891]  ret_from_fork+0x116/0x1d0
[   25.295024]  ret_from_fork_asm+0x1a/0x30
[   25.295193] 
[   25.295283] The buggy address belongs to the object at ffff8881039e9700
[   25.295283]  which belongs to the cache kmalloc-64 of size 64
[   25.295830] The buggy address is located 0 bytes to the right of
[   25.295830]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.296382] 
[   25.296471] The buggy address belongs to the physical page:
[   25.296714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.297060] flags: 0x200000000000000(node=0|zone=2)
[   25.297283] page_type: f5(slab)
[   25.297454] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.297767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.297994] page dumped because: kasan: bad access detected
[   25.298257] 
[   25.298353] Memory state around the buggy address:
[   25.298566]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.298879]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.299233] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.299517]                                      ^
[   25.299668]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.299966]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.300302] ==================================================================
[   24.937560] ==================================================================
[   24.937983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   24.938332] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.938613] 
[   24.938725] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.938773] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.938787] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.938811] Call Trace:
[   24.938833]  <TASK>
[   24.938854]  dump_stack_lvl+0x73/0xb0
[   24.938881]  print_report+0xd1/0x650
[   24.938902]  ? __virt_addr_valid+0x1db/0x2d0
[   24.938926]  ? kasan_atomics_helper+0x1217/0x5450
[   24.938959]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.938984]  ? kasan_atomics_helper+0x1217/0x5450
[   24.939005]  kasan_report+0x141/0x180
[   24.939027]  ? kasan_atomics_helper+0x1217/0x5450
[   24.939052]  kasan_check_range+0x10c/0x1c0
[   24.939076]  __kasan_check_write+0x18/0x20
[   24.939100]  kasan_atomics_helper+0x1217/0x5450
[   24.939123]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.939146]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.939171]  ? kasan_atomics+0x152/0x310
[   24.939196]  kasan_atomics+0x1dc/0x310
[   24.939218]  ? __pfx_kasan_atomics+0x10/0x10
[   24.939240]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.939265]  ? __pfx_read_tsc+0x10/0x10
[   24.939287]  ? ktime_get_ts64+0x86/0x230
[   24.939312]  kunit_try_run_case+0x1a5/0x480
[   24.939339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.939361]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.939381]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.939407]  ? __kthread_parkme+0x82/0x180
[   24.939426]  ? preempt_count_sub+0x50/0x80
[   24.939451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.939474]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.939497]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.939520]  kthread+0x337/0x6f0
[   24.939539]  ? trace_preempt_on+0x20/0xc0
[   24.939562]  ? __pfx_kthread+0x10/0x10
[   24.939583]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.939607]  ? calculate_sigpending+0x7b/0xa0
[   24.939631]  ? __pfx_kthread+0x10/0x10
[   24.939652]  ret_from_fork+0x116/0x1d0
[   24.939670]  ? __pfx_kthread+0x10/0x10
[   24.939691]  ret_from_fork_asm+0x1a/0x30
[   24.939721]  </TASK>
[   24.939732] 
[   24.951244] Allocated by task 294:
[   24.951562]  kasan_save_stack+0x45/0x70
[   24.951908]  kasan_save_track+0x18/0x40
[   24.952230]  kasan_save_alloc_info+0x3b/0x50
[   24.952458]  __kasan_kmalloc+0xb7/0xc0
[   24.952626]  __kmalloc_cache_noprof+0x189/0x420
[   24.952813]  kasan_atomics+0x95/0x310
[   24.952992]  kunit_try_run_case+0x1a5/0x480
[   24.953449]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.953854]  kthread+0x337/0x6f0
[   24.954129]  ret_from_fork+0x116/0x1d0
[   24.954428]  ret_from_fork_asm+0x1a/0x30
[   24.954787] 
[   24.954882] The buggy address belongs to the object at ffff8881039e9700
[   24.954882]  which belongs to the cache kmalloc-64 of size 64
[   24.955583] The buggy address is located 0 bytes to the right of
[   24.955583]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.956086] 
[   24.956229] The buggy address belongs to the physical page:
[   24.956465] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.956782] flags: 0x200000000000000(node=0|zone=2)
[   24.957358] page_type: f5(slab)
[   24.957649] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.958276] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.958765] page dumped because: kasan: bad access detected
[   24.959220] 
[   24.959478] Memory state around the buggy address:
[   24.959756]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.960237]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.960721] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.961279]                                      ^
[   24.961501]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.961782]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.962070] ==================================================================
[   24.512505] ==================================================================
[   24.512757] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   24.513119] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.513570] 
[   24.514156] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.514404] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.514419] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.514443] Call Trace:
[   24.514465]  <TASK>
[   24.514486]  dump_stack_lvl+0x73/0xb0
[   24.514513]  print_report+0xd1/0x650
[   24.514536]  ? __virt_addr_valid+0x1db/0x2d0
[   24.514559]  ? kasan_atomics_helper+0x860/0x5450
[   24.514580]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.514606]  ? kasan_atomics_helper+0x860/0x5450
[   24.514627]  kasan_report+0x141/0x180
[   24.514649]  ? kasan_atomics_helper+0x860/0x5450
[   24.514674]  kasan_check_range+0x10c/0x1c0
[   24.514697]  __kasan_check_write+0x18/0x20
[   24.514719]  kasan_atomics_helper+0x860/0x5450
[   24.514741]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.514762]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.514787]  ? kasan_atomics+0x152/0x310
[   24.514813]  kasan_atomics+0x1dc/0x310
[   24.514931]  ? __pfx_kasan_atomics+0x10/0x10
[   24.514969]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.514993]  ? __pfx_read_tsc+0x10/0x10
[   24.515016]  ? ktime_get_ts64+0x86/0x230
[   24.515042]  kunit_try_run_case+0x1a5/0x480
[   24.515069]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.515092]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.515113]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.515146]  ? __kthread_parkme+0x82/0x180
[   24.515168]  ? preempt_count_sub+0x50/0x80
[   24.515192]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.515217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.515241]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.515265]  kthread+0x337/0x6f0
[   24.515285]  ? trace_preempt_on+0x20/0xc0
[   24.515308]  ? __pfx_kthread+0x10/0x10
[   24.515329]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.515353]  ? calculate_sigpending+0x7b/0xa0
[   24.515377]  ? __pfx_kthread+0x10/0x10
[   24.515399]  ret_from_fork+0x116/0x1d0
[   24.515418]  ? __pfx_kthread+0x10/0x10
[   24.515439]  ret_from_fork_asm+0x1a/0x30
[   24.515469]  </TASK>
[   24.515480] 
[   24.526720] Allocated by task 294:
[   24.527150]  kasan_save_stack+0x45/0x70
[   24.527437]  kasan_save_track+0x18/0x40
[   24.527614]  kasan_save_alloc_info+0x3b/0x50
[   24.528112]  __kasan_kmalloc+0xb7/0xc0
[   24.528363]  __kmalloc_cache_noprof+0x189/0x420
[   24.528608]  kasan_atomics+0x95/0x310
[   24.528773]  kunit_try_run_case+0x1a5/0x480
[   24.529225]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.529419]  kthread+0x337/0x6f0
[   24.529717]  ret_from_fork+0x116/0x1d0
[   24.529892]  ret_from_fork_asm+0x1a/0x30
[   24.530312] 
[   24.530413] The buggy address belongs to the object at ffff8881039e9700
[   24.530413]  which belongs to the cache kmalloc-64 of size 64
[   24.530932] The buggy address is located 0 bytes to the right of
[   24.530932]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.531822] 
[   24.531934] The buggy address belongs to the physical page:
[   24.532348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.532813] flags: 0x200000000000000(node=0|zone=2)
[   24.533133] page_type: f5(slab)
[   24.533323] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.533787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.534217] page dumped because: kasan: bad access detected
[   24.534490] 
[   24.534589] Memory state around the buggy address:
[   24.534771]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.535410]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.535709] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.536216]                                      ^
[   24.536661]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.537047]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.537347] ==================================================================
[   24.269744] ==================================================================
[   24.270196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   24.270528] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.270846] 
[   24.271235] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.271288] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.271303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.271326] Call Trace:
[   24.271348]  <TASK>
[   24.271369]  dump_stack_lvl+0x73/0xb0
[   24.271398]  print_report+0xd1/0x650
[   24.271420]  ? __virt_addr_valid+0x1db/0x2d0
[   24.271443]  ? kasan_atomics_helper+0x4b6e/0x5450
[   24.271464]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.271490]  ? kasan_atomics_helper+0x4b6e/0x5450
[   24.271511]  kasan_report+0x141/0x180
[   24.271533]  ? kasan_atomics_helper+0x4b6e/0x5450
[   24.271558]  __asan_report_store4_noabort+0x1b/0x30
[   24.271582]  kasan_atomics_helper+0x4b6e/0x5450
[   24.271603]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.271624]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.271649]  ? kasan_atomics+0x152/0x310
[   24.271675]  kasan_atomics+0x1dc/0x310
[   24.271697]  ? __pfx_kasan_atomics+0x10/0x10
[   24.271718]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.271741]  ? __pfx_read_tsc+0x10/0x10
[   24.271763]  ? ktime_get_ts64+0x86/0x230
[   24.271788]  kunit_try_run_case+0x1a5/0x480
[   24.271815]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.271837]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.271857]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.271883]  ? __kthread_parkme+0x82/0x180
[   24.272005]  ? preempt_count_sub+0x50/0x80
[   24.272037]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.272062]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.272098]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.272133]  kthread+0x337/0x6f0
[   24.272153]  ? trace_preempt_on+0x20/0xc0
[   24.272188]  ? __pfx_kthread+0x10/0x10
[   24.272208]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.272241]  ? calculate_sigpending+0x7b/0xa0
[   24.272265]  ? __pfx_kthread+0x10/0x10
[   24.272286]  ret_from_fork+0x116/0x1d0
[   24.272316]  ? __pfx_kthread+0x10/0x10
[   24.272342]  ret_from_fork_asm+0x1a/0x30
[   24.272373]  </TASK>
[   24.272385] 
[   24.280827] Allocated by task 294:
[   24.281035]  kasan_save_stack+0x45/0x70
[   24.281189]  kasan_save_track+0x18/0x40
[   24.281403]  kasan_save_alloc_info+0x3b/0x50
[   24.281752]  __kasan_kmalloc+0xb7/0xc0
[   24.281953]  __kmalloc_cache_noprof+0x189/0x420
[   24.282423]  kasan_atomics+0x95/0x310
[   24.282598]  kunit_try_run_case+0x1a5/0x480
[   24.282787]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.283290]  kthread+0x337/0x6f0
[   24.283461]  ret_from_fork+0x116/0x1d0
[   24.283647]  ret_from_fork_asm+0x1a/0x30
[   24.283935] 
[   24.284048] The buggy address belongs to the object at ffff8881039e9700
[   24.284048]  which belongs to the cache kmalloc-64 of size 64
[   24.284584] The buggy address is located 0 bytes to the right of
[   24.284584]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.285198] 
[   24.285297] The buggy address belongs to the physical page:
[   24.285540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.285914] flags: 0x200000000000000(node=0|zone=2)
[   24.286150] page_type: f5(slab)
[   24.286413] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.286686] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.286909] page dumped because: kasan: bad access detected
[   24.287084] 
[   24.287150] Memory state around the buggy address:
[   24.287413]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.287733]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.288048] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.289143]                                      ^
[   24.289416]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.289681]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.289890] ==================================================================
[   24.963478] ==================================================================
[   24.963883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   24.964523] Read of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.964827] 
[   24.964934] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.964995] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.965009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.965032] Call Trace:
[   24.965055]  <TASK>
[   24.965076]  dump_stack_lvl+0x73/0xb0
[   24.965103]  print_report+0xd1/0x650
[   24.965125]  ? __virt_addr_valid+0x1db/0x2d0
[   24.965148]  ? kasan_atomics_helper+0x49e8/0x5450
[   24.965169]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.965195]  ? kasan_atomics_helper+0x49e8/0x5450
[   24.965217]  kasan_report+0x141/0x180
[   24.965238]  ? kasan_atomics_helper+0x49e8/0x5450
[   24.965263]  __asan_report_load4_noabort+0x18/0x20
[   24.965286]  kasan_atomics_helper+0x49e8/0x5450
[   24.965307]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.965329]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.965353]  ? kasan_atomics+0x152/0x310
[   24.965378]  kasan_atomics+0x1dc/0x310
[   24.965399]  ? __pfx_kasan_atomics+0x10/0x10
[   24.965421]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.965445]  ? __pfx_read_tsc+0x10/0x10
[   24.965467]  ? ktime_get_ts64+0x86/0x230
[   24.965492]  kunit_try_run_case+0x1a5/0x480
[   24.965518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.965540]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.965562]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.965588]  ? __kthread_parkme+0x82/0x180
[   24.965609]  ? preempt_count_sub+0x50/0x80
[   24.965632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.965656]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.965680]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.965703]  kthread+0x337/0x6f0
[   24.965723]  ? trace_preempt_on+0x20/0xc0
[   24.965748]  ? __pfx_kthread+0x10/0x10
[   24.965769]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.965792]  ? calculate_sigpending+0x7b/0xa0
[   24.965816]  ? __pfx_kthread+0x10/0x10
[   24.965837]  ret_from_fork+0x116/0x1d0
[   24.965856]  ? __pfx_kthread+0x10/0x10
[   24.965876]  ret_from_fork_asm+0x1a/0x30
[   24.965906]  </TASK>
[   24.965917] 
[   24.973179] Allocated by task 294:
[   24.973309]  kasan_save_stack+0x45/0x70
[   24.973499]  kasan_save_track+0x18/0x40
[   24.974699]  kasan_save_alloc_info+0x3b/0x50
[   24.975155]  __kasan_kmalloc+0xb7/0xc0
[   24.975294]  __kmalloc_cache_noprof+0x189/0x420
[   24.975440]  kasan_atomics+0x95/0x310
[   24.975562]  kunit_try_run_case+0x1a5/0x480
[   24.975699]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.975862]  kthread+0x337/0x6f0
[   24.975983]  ret_from_fork+0x116/0x1d0
[   24.976107]  ret_from_fork_asm+0x1a/0x30
[   24.976235] 
[   24.976300] The buggy address belongs to the object at ffff8881039e9700
[   24.976300]  which belongs to the cache kmalloc-64 of size 64
[   24.976643] The buggy address is located 0 bytes to the right of
[   24.976643]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.977109] 
[   24.977264] The buggy address belongs to the physical page:
[   24.977776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.978640] flags: 0x200000000000000(node=0|zone=2)
[   24.979259] page_type: f5(slab)
[   24.979618] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.980314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.980987] page dumped because: kasan: bad access detected
[   24.981504] 
[   24.981668] Memory state around the buggy address:
[   24.982132]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.982758]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.983436] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.984056]                                      ^
[   24.984543]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.985180]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.985777] ==================================================================
[   25.082807] ==================================================================
[   25.083209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   25.083467] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.083717] 
[   25.083823] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.083871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.083884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.083906] Call Trace:
[   25.083925]  <TASK>
[   25.083955]  dump_stack_lvl+0x73/0xb0
[   25.083981]  print_report+0xd1/0x650
[   25.084003]  ? __virt_addr_valid+0x1db/0x2d0
[   25.084026]  ? kasan_atomics_helper+0x50d4/0x5450
[   25.084047]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.084073]  ? kasan_atomics_helper+0x50d4/0x5450
[   25.084094]  kasan_report+0x141/0x180
[   25.084115]  ? kasan_atomics_helper+0x50d4/0x5450
[   25.084155]  __asan_report_store8_noabort+0x1b/0x30
[   25.084179]  kasan_atomics_helper+0x50d4/0x5450
[   25.084201]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.084223]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.084247]  ? kasan_atomics+0x152/0x310
[   25.084272]  kasan_atomics+0x1dc/0x310
[   25.084295]  ? __pfx_kasan_atomics+0x10/0x10
[   25.084317]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.084349]  ? __pfx_read_tsc+0x10/0x10
[   25.084371]  ? ktime_get_ts64+0x86/0x230
[   25.084396]  kunit_try_run_case+0x1a5/0x480
[   25.084422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.084445]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.084465]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.084490]  ? __kthread_parkme+0x82/0x180
[   25.084510]  ? preempt_count_sub+0x50/0x80
[   25.084534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.084557]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.084582]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.084606]  kthread+0x337/0x6f0
[   25.084625]  ? trace_preempt_on+0x20/0xc0
[   25.084648]  ? __pfx_kthread+0x10/0x10
[   25.084668]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.084691]  ? calculate_sigpending+0x7b/0xa0
[   25.084714]  ? __pfx_kthread+0x10/0x10
[   25.084735]  ret_from_fork+0x116/0x1d0
[   25.084754]  ? __pfx_kthread+0x10/0x10
[   25.084774]  ret_from_fork_asm+0x1a/0x30
[   25.084804]  </TASK>
[   25.084815] 
[   25.092028] Allocated by task 294:
[   25.092154]  kasan_save_stack+0x45/0x70
[   25.092287]  kasan_save_track+0x18/0x40
[   25.092421]  kasan_save_alloc_info+0x3b/0x50
[   25.092562]  __kasan_kmalloc+0xb7/0xc0
[   25.092713]  __kmalloc_cache_noprof+0x189/0x420
[   25.093062]  kasan_atomics+0x95/0x310
[   25.093422]  kunit_try_run_case+0x1a5/0x480
[   25.093621]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.093861]  kthread+0x337/0x6f0
[   25.094028]  ret_from_fork+0x116/0x1d0
[   25.094260]  ret_from_fork_asm+0x1a/0x30
[   25.094447] 
[   25.094535] The buggy address belongs to the object at ffff8881039e9700
[   25.094535]  which belongs to the cache kmalloc-64 of size 64
[   25.095006] The buggy address is located 0 bytes to the right of
[   25.095006]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.095639] 
[   25.095705] The buggy address belongs to the physical page:
[   25.095870] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.096319] flags: 0x200000000000000(node=0|zone=2)
[   25.096560] page_type: f5(slab)
[   25.096728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.097032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.097372] page dumped because: kasan: bad access detected
[   25.097595] 
[   25.097658] Memory state around the buggy address:
[   25.097849]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.098148]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.098417] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.098679]                                      ^
[   25.098859]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.099162]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.099433] ==================================================================
[   25.426869] ==================================================================
[   25.427302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   25.427561] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.427853] 
[   25.427973] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.428025] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.428038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.428060] Call Trace:
[   25.428081]  <TASK>
[   25.428101]  dump_stack_lvl+0x73/0xb0
[   25.428127]  print_report+0xd1/0x650
[   25.428149]  ? __virt_addr_valid+0x1db/0x2d0
[   25.428173]  ? kasan_atomics_helper+0x1eaa/0x5450
[   25.428193]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.428217]  ? kasan_atomics_helper+0x1eaa/0x5450
[   25.428239]  kasan_report+0x141/0x180
[   25.428272]  ? kasan_atomics_helper+0x1eaa/0x5450
[   25.428297]  kasan_check_range+0x10c/0x1c0
[   25.428320]  __kasan_check_write+0x18/0x20
[   25.428349]  kasan_atomics_helper+0x1eaa/0x5450
[   25.428371]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.428392]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.428417]  ? kasan_atomics+0x152/0x310
[   25.428452]  kasan_atomics+0x1dc/0x310
[   25.428474]  ? __pfx_kasan_atomics+0x10/0x10
[   25.428495]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.428529]  ? __pfx_read_tsc+0x10/0x10
[   25.428552]  ? ktime_get_ts64+0x86/0x230
[   25.428577]  kunit_try_run_case+0x1a5/0x480
[   25.428604]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.428627]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.428647]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.428672]  ? __kthread_parkme+0x82/0x180
[   25.428693]  ? preempt_count_sub+0x50/0x80
[   25.428716]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.428740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.428763]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.428787]  kthread+0x337/0x6f0
[   25.428807]  ? trace_preempt_on+0x20/0xc0
[   25.428831]  ? __pfx_kthread+0x10/0x10
[   25.428852]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.428874]  ? calculate_sigpending+0x7b/0xa0
[   25.428898]  ? __pfx_kthread+0x10/0x10
[   25.428919]  ret_from_fork+0x116/0x1d0
[   25.428949]  ? __pfx_kthread+0x10/0x10
[   25.428970]  ret_from_fork_asm+0x1a/0x30
[   25.429003]  </TASK>
[   25.429014] 
[   25.436744] Allocated by task 294:
[   25.436877]  kasan_save_stack+0x45/0x70
[   25.437027]  kasan_save_track+0x18/0x40
[   25.437153]  kasan_save_alloc_info+0x3b/0x50
[   25.437294]  __kasan_kmalloc+0xb7/0xc0
[   25.437417]  __kmalloc_cache_noprof+0x189/0x420
[   25.437566]  kasan_atomics+0x95/0x310
[   25.437768]  kunit_try_run_case+0x1a5/0x480
[   25.438014]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.438277]  kthread+0x337/0x6f0
[   25.438435]  ret_from_fork+0x116/0x1d0
[   25.438609]  ret_from_fork_asm+0x1a/0x30
[   25.438792] 
[   25.438880] The buggy address belongs to the object at ffff8881039e9700
[   25.438880]  which belongs to the cache kmalloc-64 of size 64
[   25.439413] The buggy address is located 0 bytes to the right of
[   25.439413]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.439914] 
[   25.439990] The buggy address belongs to the physical page:
[   25.440176] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.440405] flags: 0x200000000000000(node=0|zone=2)
[   25.440581] page_type: f5(slab)
[   25.440745] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.441090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.441468] page dumped because: kasan: bad access detected
[   25.441716] 
[   25.441782] Memory state around the buggy address:
[   25.441931]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.442177]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.442391] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.442599]                                      ^
[   25.442745]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.442961]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.443290] ==================================================================
[   24.920509] ==================================================================
[   24.920962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   24.921293] Read of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.921568] 
[   24.921672] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.921722] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.921735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.921757] Call Trace:
[   24.921777]  <TASK>
[   24.921797]  dump_stack_lvl+0x73/0xb0
[   24.921823]  print_report+0xd1/0x650
[   24.921844]  ? __virt_addr_valid+0x1db/0x2d0
[   24.921867]  ? kasan_atomics_helper+0x4a02/0x5450
[   24.921888]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.921914]  ? kasan_atomics_helper+0x4a02/0x5450
[   24.921934]  kasan_report+0x141/0x180
[   24.921966]  ? kasan_atomics_helper+0x4a02/0x5450
[   24.921991]  __asan_report_load4_noabort+0x18/0x20
[   24.922014]  kasan_atomics_helper+0x4a02/0x5450
[   24.922035]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.922057]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.922082]  ? kasan_atomics+0x152/0x310
[   24.922107]  kasan_atomics+0x1dc/0x310
[   24.922129]  ? __pfx_kasan_atomics+0x10/0x10
[   24.922151]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.922174]  ? __pfx_read_tsc+0x10/0x10
[   24.922196]  ? ktime_get_ts64+0x86/0x230
[   24.922221]  kunit_try_run_case+0x1a5/0x480
[   24.922247]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.922270]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.922290]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.922315]  ? __kthread_parkme+0x82/0x180
[   24.922335]  ? preempt_count_sub+0x50/0x80
[   24.922359]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.922382]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.922405]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.922429]  kthread+0x337/0x6f0
[   24.922448]  ? trace_preempt_on+0x20/0xc0
[   24.922472]  ? __pfx_kthread+0x10/0x10
[   24.922492]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.922515]  ? calculate_sigpending+0x7b/0xa0
[   24.922539]  ? __pfx_kthread+0x10/0x10
[   24.922560]  ret_from_fork+0x116/0x1d0
[   24.922579]  ? __pfx_kthread+0x10/0x10
[   24.922599]  ret_from_fork_asm+0x1a/0x30
[   24.922628]  </TASK>
[   24.922640] 
[   24.929789] Allocated by task 294:
[   24.929981]  kasan_save_stack+0x45/0x70
[   24.930222]  kasan_save_track+0x18/0x40
[   24.930403]  kasan_save_alloc_info+0x3b/0x50
[   24.930609]  __kasan_kmalloc+0xb7/0xc0
[   24.930765]  __kmalloc_cache_noprof+0x189/0x420
[   24.930947]  kasan_atomics+0x95/0x310
[   24.931071]  kunit_try_run_case+0x1a5/0x480
[   24.931401]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.931617]  kthread+0x337/0x6f0
[   24.931731]  ret_from_fork+0x116/0x1d0
[   24.931855]  ret_from_fork_asm+0x1a/0x30
[   24.932005] 
[   24.932071] The buggy address belongs to the object at ffff8881039e9700
[   24.932071]  which belongs to the cache kmalloc-64 of size 64
[   24.932821] The buggy address is located 0 bytes to the right of
[   24.932821]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.933327] 
[   24.933396] The buggy address belongs to the physical page:
[   24.933561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.933883] flags: 0x200000000000000(node=0|zone=2)
[   24.934123] page_type: f5(slab)
[   24.934287] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.934627] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.934950] page dumped because: kasan: bad access detected
[   24.935182] 
[   24.935246] Memory state around the buggy address:
[   24.935394]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.935601]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.935808] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.936060]                                      ^
[   24.936268]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.936585]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.936887] ==================================================================
[   24.903339] ==================================================================
[   24.903577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   24.904032] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.904397] 
[   24.904546] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.904597] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.904611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.904633] Call Trace:
[   24.904656]  <TASK>
[   24.904676]  dump_stack_lvl+0x73/0xb0
[   24.904702]  print_report+0xd1/0x650
[   24.904723]  ? __virt_addr_valid+0x1db/0x2d0
[   24.904748]  ? kasan_atomics_helper+0x1148/0x5450
[   24.904769]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.904794]  ? kasan_atomics_helper+0x1148/0x5450
[   24.904816]  kasan_report+0x141/0x180
[   24.904838]  ? kasan_atomics_helper+0x1148/0x5450
[   24.904863]  kasan_check_range+0x10c/0x1c0
[   24.904886]  __kasan_check_write+0x18/0x20
[   24.904909]  kasan_atomics_helper+0x1148/0x5450
[   24.904930]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.904963]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.904987]  ? kasan_atomics+0x152/0x310
[   24.905012]  kasan_atomics+0x1dc/0x310
[   24.905034]  ? __pfx_kasan_atomics+0x10/0x10
[   24.905055]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.905079]  ? __pfx_read_tsc+0x10/0x10
[   24.905101]  ? ktime_get_ts64+0x86/0x230
[   24.905126]  kunit_try_run_case+0x1a5/0x480
[   24.905152]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.905175]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.905195]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.905219]  ? __kthread_parkme+0x82/0x180
[   24.905240]  ? preempt_count_sub+0x50/0x80
[   24.905263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.905287]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.905311]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.905334]  kthread+0x337/0x6f0
[   24.905366]  ? trace_preempt_on+0x20/0xc0
[   24.905389]  ? __pfx_kthread+0x10/0x10
[   24.905409]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.905433]  ? calculate_sigpending+0x7b/0xa0
[   24.905457]  ? __pfx_kthread+0x10/0x10
[   24.905478]  ret_from_fork+0x116/0x1d0
[   24.905497]  ? __pfx_kthread+0x10/0x10
[   24.905517]  ret_from_fork_asm+0x1a/0x30
[   24.905546]  </TASK>
[   24.905558] 
[   24.912950] Allocated by task 294:
[   24.913092]  kasan_save_stack+0x45/0x70
[   24.913293]  kasan_save_track+0x18/0x40
[   24.913469]  kasan_save_alloc_info+0x3b/0x50
[   24.913621]  __kasan_kmalloc+0xb7/0xc0
[   24.913788]  __kmalloc_cache_noprof+0x189/0x420
[   24.913934]  kasan_atomics+0x95/0x310
[   24.914068]  kunit_try_run_case+0x1a5/0x480
[   24.914454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.914703]  kthread+0x337/0x6f0
[   24.914860]  ret_from_fork+0x116/0x1d0
[   24.915016]  ret_from_fork_asm+0x1a/0x30
[   24.915184] 
[   24.915342] The buggy address belongs to the object at ffff8881039e9700
[   24.915342]  which belongs to the cache kmalloc-64 of size 64
[   24.915713] The buggy address is located 0 bytes to the right of
[   24.915713]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.916299] 
[   24.916387] The buggy address belongs to the physical page:
[   24.916597] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.916893] flags: 0x200000000000000(node=0|zone=2)
[   24.917117] page_type: f5(slab)
[   24.917275] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.917515] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.917735] page dumped because: kasan: bad access detected
[   24.917900] 
[   24.917973] Memory state around the buggy address:
[   24.918123]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.918433]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.918752] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.919063]                                      ^
[   24.919460]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.919743]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.919954] ==================================================================
[   25.325282] ==================================================================
[   25.326130] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   25.326475] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.326685] 
[   25.326770] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.326821] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.326834] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.326857] Call Trace:
[   25.326878]  <TASK>
[   25.326899]  dump_stack_lvl+0x73/0xb0
[   25.326928]  print_report+0xd1/0x650
[   25.326962]  ? __virt_addr_valid+0x1db/0x2d0
[   25.326985]  ? kasan_atomics_helper+0x1c18/0x5450
[   25.327006]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.327031]  ? kasan_atomics_helper+0x1c18/0x5450
[   25.327051]  kasan_report+0x141/0x180
[   25.327073]  ? kasan_atomics_helper+0x1c18/0x5450
[   25.327098]  kasan_check_range+0x10c/0x1c0
[   25.327121]  __kasan_check_write+0x18/0x20
[   25.327144]  kasan_atomics_helper+0x1c18/0x5450
[   25.327166]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.327207]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.327232]  ? kasan_atomics+0x152/0x310
[   25.327257]  kasan_atomics+0x1dc/0x310
[   25.327278]  ? __pfx_kasan_atomics+0x10/0x10
[   25.327299]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.327323]  ? __pfx_read_tsc+0x10/0x10
[   25.327346]  ? ktime_get_ts64+0x86/0x230
[   25.327371]  kunit_try_run_case+0x1a5/0x480
[   25.327398]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.327420]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.327440]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.327466]  ? __kthread_parkme+0x82/0x180
[   25.327486]  ? preempt_count_sub+0x50/0x80
[   25.327510]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.327534]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.327558]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.327582]  kthread+0x337/0x6f0
[   25.327602]  ? trace_preempt_on+0x20/0xc0
[   25.327626]  ? __pfx_kthread+0x10/0x10
[   25.327649]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.327672]  ? calculate_sigpending+0x7b/0xa0
[   25.327696]  ? __pfx_kthread+0x10/0x10
[   25.327718]  ret_from_fork+0x116/0x1d0
[   25.327737]  ? __pfx_kthread+0x10/0x10
[   25.327757]  ret_from_fork_asm+0x1a/0x30
[   25.327788]  </TASK>
[   25.327800] 
[   25.334863] Allocated by task 294:
[   25.335045]  kasan_save_stack+0x45/0x70
[   25.335980]  kasan_save_track+0x18/0x40
[   25.336516]  kasan_save_alloc_info+0x3b/0x50
[   25.336966]  __kasan_kmalloc+0xb7/0xc0
[   25.337147]  __kmalloc_cache_noprof+0x189/0x420
[   25.337614]  kasan_atomics+0x95/0x310
[   25.337859]  kunit_try_run_case+0x1a5/0x480
[   25.338202]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.338527]  kthread+0x337/0x6f0
[   25.338662]  ret_from_fork+0x116/0x1d0
[   25.338975]  ret_from_fork_asm+0x1a/0x30
[   25.339167] 
[   25.339413] The buggy address belongs to the object at ffff8881039e9700
[   25.339413]  which belongs to the cache kmalloc-64 of size 64
[   25.339922] The buggy address is located 0 bytes to the right of
[   25.339922]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.340597] 
[   25.340845] The buggy address belongs to the physical page:
[   25.341062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.341640] flags: 0x200000000000000(node=0|zone=2)
[   25.341877] page_type: f5(slab)
[   25.342163] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.342513] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.342795] page dumped because: kasan: bad access detected
[   25.343108] 
[   25.343309] Memory state around the buggy address:
[   25.343626]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.344000]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.344448] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.344727]                                      ^
[   25.344924]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.345388]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.345766] ==================================================================
[   24.248497] ==================================================================
[   24.248921] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   24.249276] Read of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.249572] 
[   24.249684] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.249733] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.249745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.249768] Call Trace:
[   24.249799]  <TASK>
[   24.249821]  dump_stack_lvl+0x73/0xb0
[   24.249848]  print_report+0xd1/0x650
[   24.249880]  ? __virt_addr_valid+0x1db/0x2d0
[   24.249902]  ? kasan_atomics_helper+0x4b88/0x5450
[   24.249932]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.249973]  ? kasan_atomics_helper+0x4b88/0x5450
[   24.249993]  kasan_report+0x141/0x180
[   24.250013]  ? kasan_atomics_helper+0x4b88/0x5450
[   24.250037]  __asan_report_load4_noabort+0x18/0x20
[   24.250059]  kasan_atomics_helper+0x4b88/0x5450
[   24.250079]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.250099]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.250123]  ? kasan_atomics+0x152/0x310
[   24.250262]  kasan_atomics+0x1dc/0x310
[   24.250285]  ? __pfx_kasan_atomics+0x10/0x10
[   24.250305]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.250328]  ? __pfx_read_tsc+0x10/0x10
[   24.250350]  ? ktime_get_ts64+0x86/0x230
[   24.250374]  kunit_try_run_case+0x1a5/0x480
[   24.250400]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.250422]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.250450]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.250474]  ? __kthread_parkme+0x82/0x180
[   24.250493]  ? preempt_count_sub+0x50/0x80
[   24.250527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.250549]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.250572]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.250594]  kthread+0x337/0x6f0
[   24.250612]  ? trace_preempt_on+0x20/0xc0
[   24.250634]  ? __pfx_kthread+0x10/0x10
[   24.250653]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.250675]  ? calculate_sigpending+0x7b/0xa0
[   24.250697]  ? __pfx_kthread+0x10/0x10
[   24.250718]  ret_from_fork+0x116/0x1d0
[   24.250736]  ? __pfx_kthread+0x10/0x10
[   24.250756]  ret_from_fork_asm+0x1a/0x30
[   24.250785]  </TASK>
[   24.250796] 
[   24.259994] Allocated by task 294:
[   24.260417]  kasan_save_stack+0x45/0x70
[   24.260652]  kasan_save_track+0x18/0x40
[   24.260882]  kasan_save_alloc_info+0x3b/0x50
[   24.261095]  __kasan_kmalloc+0xb7/0xc0
[   24.261335]  __kmalloc_cache_noprof+0x189/0x420
[   24.261526]  kasan_atomics+0x95/0x310
[   24.261716]  kunit_try_run_case+0x1a5/0x480
[   24.261972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.262279]  kthread+0x337/0x6f0
[   24.262429]  ret_from_fork+0x116/0x1d0
[   24.262617]  ret_from_fork_asm+0x1a/0x30
[   24.262789] 
[   24.262891] The buggy address belongs to the object at ffff8881039e9700
[   24.262891]  which belongs to the cache kmalloc-64 of size 64
[   24.263548] The buggy address is located 0 bytes to the right of
[   24.263548]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.264090] 
[   24.264181] The buggy address belongs to the physical page:
[   24.264607] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.264963] flags: 0x200000000000000(node=0|zone=2)
[   24.265187] page_type: f5(slab)
[   24.265397] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.265622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.266120] page dumped because: kasan: bad access detected
[   24.266424] 
[   24.266524] Memory state around the buggy address:
[   24.266756]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.267342]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.267604] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.268035]                                      ^
[   24.268349]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.268670]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.268900] ==================================================================
[   24.858877] ==================================================================
[   24.859264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   24.859862] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.860369] 
[   24.860707] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.860775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.860790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.860812] Call Trace:
[   24.860833]  <TASK>
[   24.860852]  dump_stack_lvl+0x73/0xb0
[   24.860881]  print_report+0xd1/0x650
[   24.860902]  ? __virt_addr_valid+0x1db/0x2d0
[   24.860926]  ? kasan_atomics_helper+0x1079/0x5450
[   24.860955]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.860981]  ? kasan_atomics_helper+0x1079/0x5450
[   24.861002]  kasan_report+0x141/0x180
[   24.861023]  ? kasan_atomics_helper+0x1079/0x5450
[   24.861048]  kasan_check_range+0x10c/0x1c0
[   24.861071]  __kasan_check_write+0x18/0x20
[   24.861093]  kasan_atomics_helper+0x1079/0x5450
[   24.861114]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.861145]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.861169]  ? kasan_atomics+0x152/0x310
[   24.861193]  kasan_atomics+0x1dc/0x310
[   24.861215]  ? __pfx_kasan_atomics+0x10/0x10
[   24.861236]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.861259]  ? __pfx_read_tsc+0x10/0x10
[   24.861282]  ? ktime_get_ts64+0x86/0x230
[   24.861307]  kunit_try_run_case+0x1a5/0x480
[   24.861333]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.861356]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.861376]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.861402]  ? __kthread_parkme+0x82/0x180
[   24.861422]  ? preempt_count_sub+0x50/0x80
[   24.861446]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.861470]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.861494]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.861518]  kthread+0x337/0x6f0
[   24.861538]  ? trace_preempt_on+0x20/0xc0
[   24.861561]  ? __pfx_kthread+0x10/0x10
[   24.861582]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.861605]  ? calculate_sigpending+0x7b/0xa0
[   24.861629]  ? __pfx_kthread+0x10/0x10
[   24.861650]  ret_from_fork+0x116/0x1d0
[   24.861670]  ? __pfx_kthread+0x10/0x10
[   24.861690]  ret_from_fork_asm+0x1a/0x30
[   24.861721]  </TASK>
[   24.861732] 
[   24.871618] Allocated by task 294:
[   24.871967]  kasan_save_stack+0x45/0x70
[   24.872144]  kasan_save_track+0x18/0x40
[   24.872466]  kasan_save_alloc_info+0x3b/0x50
[   24.872665]  __kasan_kmalloc+0xb7/0xc0
[   24.872857]  __kmalloc_cache_noprof+0x189/0x420
[   24.873052]  kasan_atomics+0x95/0x310
[   24.873221]  kunit_try_run_case+0x1a5/0x480
[   24.873414]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.873626]  kthread+0x337/0x6f0
[   24.873787]  ret_from_fork+0x116/0x1d0
[   24.873934]  ret_from_fork_asm+0x1a/0x30
[   24.874490] 
[   24.874580] The buggy address belongs to the object at ffff8881039e9700
[   24.874580]  which belongs to the cache kmalloc-64 of size 64
[   24.875162] The buggy address is located 0 bytes to the right of
[   24.875162]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.875764] 
[   24.876003] The buggy address belongs to the physical page:
[   24.876277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.876715] flags: 0x200000000000000(node=0|zone=2)
[   24.877013] page_type: f5(slab)
[   24.877207] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.877609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.878001] page dumped because: kasan: bad access detected
[   24.878207] 
[   24.878365] Memory state around the buggy address:
[   24.878697]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.879012]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.879328] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.879750]                                      ^
[   24.880041]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.880307]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.880731] ==================================================================
[   25.099955] ==================================================================
[   25.100416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   25.100746] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.101036] 
[   25.101122] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.101170] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.101183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.101206] Call Trace:
[   25.101226]  <TASK>
[   25.101244]  dump_stack_lvl+0x73/0xb0
[   25.101270]  print_report+0xd1/0x650
[   25.101291]  ? __virt_addr_valid+0x1db/0x2d0
[   25.101314]  ? kasan_atomics_helper+0x151d/0x5450
[   25.101335]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.101361]  ? kasan_atomics_helper+0x151d/0x5450
[   25.101382]  kasan_report+0x141/0x180
[   25.101404]  ? kasan_atomics_helper+0x151d/0x5450
[   25.101429]  kasan_check_range+0x10c/0x1c0
[   25.101452]  __kasan_check_write+0x18/0x20
[   25.101474]  kasan_atomics_helper+0x151d/0x5450
[   25.101496]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.101518]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.101543]  ? kasan_atomics+0x152/0x310
[   25.101568]  kasan_atomics+0x1dc/0x310
[   25.101590]  ? __pfx_kasan_atomics+0x10/0x10
[   25.101611]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.101635]  ? __pfx_read_tsc+0x10/0x10
[   25.101656]  ? ktime_get_ts64+0x86/0x230
[   25.101680]  kunit_try_run_case+0x1a5/0x480
[   25.101706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.101728]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.101749]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.101776]  ? __kthread_parkme+0x82/0x180
[   25.101795]  ? preempt_count_sub+0x50/0x80
[   25.101818]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.101842]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.101865]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.101889]  kthread+0x337/0x6f0
[   25.101908]  ? trace_preempt_on+0x20/0xc0
[   25.101931]  ? __pfx_kthread+0x10/0x10
[   25.101961]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.101985]  ? calculate_sigpending+0x7b/0xa0
[   25.102022]  ? __pfx_kthread+0x10/0x10
[   25.102042]  ret_from_fork+0x116/0x1d0
[   25.102062]  ? __pfx_kthread+0x10/0x10
[   25.102082]  ret_from_fork_asm+0x1a/0x30
[   25.102112]  </TASK>
[   25.102123] 
[   25.109741] Allocated by task 294:
[   25.109884]  kasan_save_stack+0x45/0x70
[   25.110063]  kasan_save_track+0x18/0x40
[   25.110336]  kasan_save_alloc_info+0x3b/0x50
[   25.110507]  __kasan_kmalloc+0xb7/0xc0
[   25.110656]  __kmalloc_cache_noprof+0x189/0x420
[   25.110839]  kasan_atomics+0x95/0x310
[   25.110972]  kunit_try_run_case+0x1a5/0x480
[   25.111184]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.111442]  kthread+0x337/0x6f0
[   25.111603]  ret_from_fork+0x116/0x1d0
[   25.111782]  ret_from_fork_asm+0x1a/0x30
[   25.111930] 
[   25.112004] The buggy address belongs to the object at ffff8881039e9700
[   25.112004]  which belongs to the cache kmalloc-64 of size 64
[   25.112584] The buggy address is located 0 bytes to the right of
[   25.112584]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.112933] 
[   25.113034] The buggy address belongs to the physical page:
[   25.113480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.113829] flags: 0x200000000000000(node=0|zone=2)
[   25.114029] page_type: f5(slab)
[   25.114200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.114484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.114749] page dumped because: kasan: bad access detected
[   25.114911] 
[   25.115004] Memory state around the buggy address:
[   25.115224]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.115802]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.116054] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.116403]                                      ^
[   25.116556]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.116765]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.116979] ==================================================================
[   25.560052] ==================================================================
[   25.560425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   25.560760] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.561152] 
[   25.561244] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.561296] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.561309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.561332] Call Trace:
[   25.561354]  <TASK>
[   25.561376]  dump_stack_lvl+0x73/0xb0
[   25.561405]  print_report+0xd1/0x650
[   25.561428]  ? __virt_addr_valid+0x1db/0x2d0
[   25.561451]  ? kasan_atomics_helper+0x218a/0x5450
[   25.561484]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.561510]  ? kasan_atomics_helper+0x218a/0x5450
[   25.561531]  kasan_report+0x141/0x180
[   25.561564]  ? kasan_atomics_helper+0x218a/0x5450
[   25.561591]  kasan_check_range+0x10c/0x1c0
[   25.561614]  __kasan_check_write+0x18/0x20
[   25.561637]  kasan_atomics_helper+0x218a/0x5450
[   25.561668]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.561690]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.561714]  ? kasan_atomics+0x152/0x310
[   25.561750]  kasan_atomics+0x1dc/0x310
[   25.561772]  ? __pfx_kasan_atomics+0x10/0x10
[   25.561793]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.561817]  ? __pfx_read_tsc+0x10/0x10
[   25.561840]  ? ktime_get_ts64+0x86/0x230
[   25.561865]  kunit_try_run_case+0x1a5/0x480
[   25.561893]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.561916]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.561947]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.561973]  ? __kthread_parkme+0x82/0x180
[   25.561994]  ? preempt_count_sub+0x50/0x80
[   25.562018]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.562050]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.562074]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.562126]  kthread+0x337/0x6f0
[   25.562146]  ? trace_preempt_on+0x20/0xc0
[   25.562170]  ? __pfx_kthread+0x10/0x10
[   25.562191]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.562214]  ? calculate_sigpending+0x7b/0xa0
[   25.562238]  ? __pfx_kthread+0x10/0x10
[   25.562259]  ret_from_fork+0x116/0x1d0
[   25.562278]  ? __pfx_kthread+0x10/0x10
[   25.562298]  ret_from_fork_asm+0x1a/0x30
[   25.562329]  </TASK>
[   25.562341] 
[   25.569737] Allocated by task 294:
[   25.569942]  kasan_save_stack+0x45/0x70
[   25.570181]  kasan_save_track+0x18/0x40
[   25.570362]  kasan_save_alloc_info+0x3b/0x50
[   25.570552]  __kasan_kmalloc+0xb7/0xc0
[   25.570719]  __kmalloc_cache_noprof+0x189/0x420
[   25.570943]  kasan_atomics+0x95/0x310
[   25.571161]  kunit_try_run_case+0x1a5/0x480
[   25.571304]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.571571]  kthread+0x337/0x6f0
[   25.571716]  ret_from_fork+0x116/0x1d0
[   25.571870]  ret_from_fork_asm+0x1a/0x30
[   25.572069] 
[   25.572156] The buggy address belongs to the object at ffff8881039e9700
[   25.572156]  which belongs to the cache kmalloc-64 of size 64
[   25.572663] The buggy address is located 0 bytes to the right of
[   25.572663]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.573200] 
[   25.573293] The buggy address belongs to the physical page:
[   25.573528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.573766] flags: 0x200000000000000(node=0|zone=2)
[   25.573925] page_type: f5(slab)
[   25.574097] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.574430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.574751] page dumped because: kasan: bad access detected
[   25.574919] 
[   25.575015] Memory state around the buggy address:
[   25.575286]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.575603]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.575893] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.576215]                                      ^
[   25.576432]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.576741]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.577041] ==================================================================
[   25.513980] ==================================================================
[   25.514389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   25.514619] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.514859] 
[   25.514972] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.515021] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.515034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.515057] Call Trace:
[   25.515077]  <TASK>
[   25.515096]  dump_stack_lvl+0x73/0xb0
[   25.515159]  print_report+0xd1/0x650
[   25.515181]  ? __virt_addr_valid+0x1db/0x2d0
[   25.515204]  ? kasan_atomics_helper+0x20c8/0x5450
[   25.515237]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.515263]  ? kasan_atomics_helper+0x20c8/0x5450
[   25.515284]  kasan_report+0x141/0x180
[   25.515306]  ? kasan_atomics_helper+0x20c8/0x5450
[   25.515331]  kasan_check_range+0x10c/0x1c0
[   25.515353]  __kasan_check_write+0x18/0x20
[   25.515376]  kasan_atomics_helper+0x20c8/0x5450
[   25.515398]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.515421]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.515447]  ? kasan_atomics+0x152/0x310
[   25.515472]  kasan_atomics+0x1dc/0x310
[   25.515494]  ? __pfx_kasan_atomics+0x10/0x10
[   25.515516]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.515539]  ? __pfx_read_tsc+0x10/0x10
[   25.515561]  ? ktime_get_ts64+0x86/0x230
[   25.515587]  kunit_try_run_case+0x1a5/0x480
[   25.515613]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.515636]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.515657]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.515683]  ? __kthread_parkme+0x82/0x180
[   25.515704]  ? preempt_count_sub+0x50/0x80
[   25.515727]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.515751]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.515775]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.515799]  kthread+0x337/0x6f0
[   25.515819]  ? trace_preempt_on+0x20/0xc0
[   25.515842]  ? __pfx_kthread+0x10/0x10
[   25.515863]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.515886]  ? calculate_sigpending+0x7b/0xa0
[   25.515910]  ? __pfx_kthread+0x10/0x10
[   25.515932]  ret_from_fork+0x116/0x1d0
[   25.515959]  ? __pfx_kthread+0x10/0x10
[   25.515980]  ret_from_fork_asm+0x1a/0x30
[   25.516011]  </TASK>
[   25.516023] 
[   25.523675] Allocated by task 294:
[   25.523835]  kasan_save_stack+0x45/0x70
[   25.524037]  kasan_save_track+0x18/0x40
[   25.524237]  kasan_save_alloc_info+0x3b/0x50
[   25.524438]  __kasan_kmalloc+0xb7/0xc0
[   25.524613]  __kmalloc_cache_noprof+0x189/0x420
[   25.524814]  kasan_atomics+0x95/0x310
[   25.524995]  kunit_try_run_case+0x1a5/0x480
[   25.525219]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.525456]  kthread+0x337/0x6f0
[   25.525623]  ret_from_fork+0x116/0x1d0
[   25.525798]  ret_from_fork_asm+0x1a/0x30
[   25.525986] 
[   25.526080] The buggy address belongs to the object at ffff8881039e9700
[   25.526080]  which belongs to the cache kmalloc-64 of size 64
[   25.526518] The buggy address is located 0 bytes to the right of
[   25.526518]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.526874] 
[   25.526948] The buggy address belongs to the physical page:
[   25.527214] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.527577] flags: 0x200000000000000(node=0|zone=2)
[   25.527801] page_type: f5(slab)
[   25.527970] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.528321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.528636] page dumped because: kasan: bad access detected
[   25.528813] 
[   25.528876] Memory state around the buggy address:
[   25.529033]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.529309]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.529649] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.529960]                                      ^
[   25.530197]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.530514]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.530807] ==================================================================
[   25.135160] ==================================================================
[   25.135489] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   25.135809] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.136149] 
[   25.136265] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.136313] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.137671] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.137716] Call Trace:
[   25.137741]  <TASK>
[   25.137763]  dump_stack_lvl+0x73/0xb0
[   25.137795]  print_report+0xd1/0x650
[   25.137828]  ? __virt_addr_valid+0x1db/0x2d0
[   25.137852]  ? kasan_atomics_helper+0x164f/0x5450
[   25.137874]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.137900]  ? kasan_atomics_helper+0x164f/0x5450
[   25.137921]  kasan_report+0x141/0x180
[   25.137951]  ? kasan_atomics_helper+0x164f/0x5450
[   25.137976]  kasan_check_range+0x10c/0x1c0
[   25.138000]  __kasan_check_write+0x18/0x20
[   25.138022]  kasan_atomics_helper+0x164f/0x5450
[   25.138044]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.138065]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.138089]  ? kasan_atomics+0x152/0x310
[   25.138115]  kasan_atomics+0x1dc/0x310
[   25.138149]  ? __pfx_kasan_atomics+0x10/0x10
[   25.138170]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.138194]  ? __pfx_read_tsc+0x10/0x10
[   25.138217]  ? ktime_get_ts64+0x86/0x230
[   25.138243]  kunit_try_run_case+0x1a5/0x480
[   25.138272]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.138295]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.138316]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.138341]  ? __kthread_parkme+0x82/0x180
[   25.138362]  ? preempt_count_sub+0x50/0x80
[   25.138386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.138410]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.138434]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.138457]  kthread+0x337/0x6f0
[   25.138477]  ? trace_preempt_on+0x20/0xc0
[   25.138500]  ? __pfx_kthread+0x10/0x10
[   25.138522]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.138545]  ? calculate_sigpending+0x7b/0xa0
[   25.138568]  ? __pfx_kthread+0x10/0x10
[   25.138590]  ret_from_fork+0x116/0x1d0
[   25.138608]  ? __pfx_kthread+0x10/0x10
[   25.138629]  ret_from_fork_asm+0x1a/0x30
[   25.138659]  </TASK>
[   25.138671] 
[   25.147455] Allocated by task 294:
[   25.147654]  kasan_save_stack+0x45/0x70
[   25.147845]  kasan_save_track+0x18/0x40
[   25.148026]  kasan_save_alloc_info+0x3b/0x50
[   25.148527]  __kasan_kmalloc+0xb7/0xc0
[   25.148827]  __kmalloc_cache_noprof+0x189/0x420
[   25.149114]  kasan_atomics+0x95/0x310
[   25.149394]  kunit_try_run_case+0x1a5/0x480
[   25.149769]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.150121]  kthread+0x337/0x6f0
[   25.150289]  ret_from_fork+0x116/0x1d0
[   25.150463]  ret_from_fork_asm+0x1a/0x30
[   25.150647] 
[   25.150740] The buggy address belongs to the object at ffff8881039e9700
[   25.150740]  which belongs to the cache kmalloc-64 of size 64
[   25.151688] The buggy address is located 0 bytes to the right of
[   25.151688]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.152570] 
[   25.152676] The buggy address belongs to the physical page:
[   25.153063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.153597] flags: 0x200000000000000(node=0|zone=2)
[   25.153935] page_type: f5(slab)
[   25.154115] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.154568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.154867] page dumped because: kasan: bad access detected
[   25.155096] 
[   25.155377] Memory state around the buggy address:
[   25.155710]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.156266]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.156747] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.157058]                                      ^
[   25.157528]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.158030]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.158551] ==================================================================
[   24.487829] ==================================================================
[   24.488161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   24.488510] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.489725] 
[   24.489961] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.490077] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.490093] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.490134] Call Trace:
[   24.490155]  <TASK>
[   24.490174]  dump_stack_lvl+0x73/0xb0
[   24.490202]  print_report+0xd1/0x650
[   24.490224]  ? __virt_addr_valid+0x1db/0x2d0
[   24.490247]  ? kasan_atomics_helper+0x7c7/0x5450
[   24.490268]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.490294]  ? kasan_atomics_helper+0x7c7/0x5450
[   24.490315]  kasan_report+0x141/0x180
[   24.490336]  ? kasan_atomics_helper+0x7c7/0x5450
[   24.490361]  kasan_check_range+0x10c/0x1c0
[   24.490384]  __kasan_check_write+0x18/0x20
[   24.490407]  kasan_atomics_helper+0x7c7/0x5450
[   24.490429]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.490451]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.490476]  ? kasan_atomics+0x152/0x310
[   24.490501]  kasan_atomics+0x1dc/0x310
[   24.490523]  ? __pfx_kasan_atomics+0x10/0x10
[   24.490545]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.490568]  ? __pfx_read_tsc+0x10/0x10
[   24.490590]  ? ktime_get_ts64+0x86/0x230
[   24.490616]  kunit_try_run_case+0x1a5/0x480
[   24.490644]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.490666]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.490688]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.490714]  ? __kthread_parkme+0x82/0x180
[   24.490735]  ? preempt_count_sub+0x50/0x80
[   24.490758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.490783]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.490889]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.490921]  kthread+0x337/0x6f0
[   24.490954]  ? trace_preempt_on+0x20/0xc0
[   24.490979]  ? __pfx_kthread+0x10/0x10
[   24.491000]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.491024]  ? calculate_sigpending+0x7b/0xa0
[   24.491047]  ? __pfx_kthread+0x10/0x10
[   24.491068]  ret_from_fork+0x116/0x1d0
[   24.491087]  ? __pfx_kthread+0x10/0x10
[   24.491108]  ret_from_fork_asm+0x1a/0x30
[   24.491138]  </TASK>
[   24.491149] 
[   24.501807] Allocated by task 294:
[   24.501961]  kasan_save_stack+0x45/0x70
[   24.502471]  kasan_save_track+0x18/0x40
[   24.502645]  kasan_save_alloc_info+0x3b/0x50
[   24.503003]  __kasan_kmalloc+0xb7/0xc0
[   24.503209]  __kmalloc_cache_noprof+0x189/0x420
[   24.503521]  kasan_atomics+0x95/0x310
[   24.503664]  kunit_try_run_case+0x1a5/0x480
[   24.504025]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.504391]  kthread+0x337/0x6f0
[   24.504636]  ret_from_fork+0x116/0x1d0
[   24.504809]  ret_from_fork_asm+0x1a/0x30
[   24.505110] 
[   24.505186] The buggy address belongs to the object at ffff8881039e9700
[   24.505186]  which belongs to the cache kmalloc-64 of size 64
[   24.505873] The buggy address is located 0 bytes to the right of
[   24.505873]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.506786] 
[   24.506973] The buggy address belongs to the physical page:
[   24.507242] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.507630] flags: 0x200000000000000(node=0|zone=2)
[   24.508024] page_type: f5(slab)
[   24.508351] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.508736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.509095] page dumped because: kasan: bad access detected
[   24.509301] 
[   24.509379] Memory state around the buggy address:
[   24.509691]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.510012]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.510569] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.510904]                                      ^
[   24.511132]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.511529]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.511947] ==================================================================
[   25.023000] ==================================================================
[   25.023696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   25.024032] Read of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.024379] 
[   25.024486] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.024534] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.024547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.024569] Call Trace:
[   25.024589]  <TASK>
[   25.024608]  dump_stack_lvl+0x73/0xb0
[   25.024635]  print_report+0xd1/0x650
[   25.024656]  ? __virt_addr_valid+0x1db/0x2d0
[   25.024679]  ? kasan_atomics_helper+0x13b5/0x5450
[   25.024699]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.024724]  ? kasan_atomics_helper+0x13b5/0x5450
[   25.024745]  kasan_report+0x141/0x180
[   25.024767]  ? kasan_atomics_helper+0x13b5/0x5450
[   25.024792]  kasan_check_range+0x10c/0x1c0
[   25.024815]  __kasan_check_read+0x15/0x20
[   25.024837]  kasan_atomics_helper+0x13b5/0x5450
[   25.024860]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.024882]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.024906]  ? kasan_atomics+0x152/0x310
[   25.024931]  kasan_atomics+0x1dc/0x310
[   25.024963]  ? __pfx_kasan_atomics+0x10/0x10
[   25.024985]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.025008]  ? __pfx_read_tsc+0x10/0x10
[   25.025031]  ? ktime_get_ts64+0x86/0x230
[   25.025055]  kunit_try_run_case+0x1a5/0x480
[   25.025081]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.025104]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.025124]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.025149]  ? __kthread_parkme+0x82/0x180
[   25.025170]  ? preempt_count_sub+0x50/0x80
[   25.025193]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.025217]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.025241]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.025264]  kthread+0x337/0x6f0
[   25.025298]  ? trace_preempt_on+0x20/0xc0
[   25.025321]  ? __pfx_kthread+0x10/0x10
[   25.025342]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.025364]  ? calculate_sigpending+0x7b/0xa0
[   25.025388]  ? __pfx_kthread+0x10/0x10
[   25.025409]  ret_from_fork+0x116/0x1d0
[   25.025428]  ? __pfx_kthread+0x10/0x10
[   25.025448]  ret_from_fork_asm+0x1a/0x30
[   25.025478]  </TASK>
[   25.025489] 
[   25.033623] Allocated by task 294:
[   25.033746]  kasan_save_stack+0x45/0x70
[   25.033882]  kasan_save_track+0x18/0x40
[   25.034018]  kasan_save_alloc_info+0x3b/0x50
[   25.034159]  __kasan_kmalloc+0xb7/0xc0
[   25.034345]  __kmalloc_cache_noprof+0x189/0x420
[   25.034787]  kasan_atomics+0x95/0x310
[   25.034974]  kunit_try_run_case+0x1a5/0x480
[   25.035171]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.035478]  kthread+0x337/0x6f0
[   25.035637]  ret_from_fork+0x116/0x1d0
[   25.035812]  ret_from_fork_asm+0x1a/0x30
[   25.036008] 
[   25.036097] The buggy address belongs to the object at ffff8881039e9700
[   25.036097]  which belongs to the cache kmalloc-64 of size 64
[   25.036601] The buggy address is located 0 bytes to the right of
[   25.036601]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.036965] 
[   25.037032] The buggy address belongs to the physical page:
[   25.037392] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.037739] flags: 0x200000000000000(node=0|zone=2)
[   25.038003] page_type: f5(slab)
[   25.038195] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.038540] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.038841] page dumped because: kasan: bad access detected
[   25.039016] 
[   25.039080] Memory state around the buggy address:
[   25.039518]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.039827]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.040072] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.040579]                                      ^
[   25.040751]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.040968]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.041173] ==================================================================
[   25.184088] ==================================================================
[   25.184442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   25.184789] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.185638] 
[   25.185740] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.185795] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.185811] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.185835] Call Trace:
[   25.185858]  <TASK>
[   25.185881]  dump_stack_lvl+0x73/0xb0
[   25.185911]  print_report+0xd1/0x650
[   25.185934]  ? __virt_addr_valid+0x1db/0x2d0
[   25.185972]  ? kasan_atomics_helper+0x177f/0x5450
[   25.185994]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.186022]  ? kasan_atomics_helper+0x177f/0x5450
[   25.186043]  kasan_report+0x141/0x180
[   25.186064]  ? kasan_atomics_helper+0x177f/0x5450
[   25.186090]  kasan_check_range+0x10c/0x1c0
[   25.186119]  __kasan_check_write+0x18/0x20
[   25.186142]  kasan_atomics_helper+0x177f/0x5450
[   25.186163]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.186185]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.186210]  ? kasan_atomics+0x152/0x310
[   25.186235]  kasan_atomics+0x1dc/0x310
[   25.186257]  ? __pfx_kasan_atomics+0x10/0x10
[   25.186278]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.186302]  ? __pfx_read_tsc+0x10/0x10
[   25.186324]  ? ktime_get_ts64+0x86/0x230
[   25.186349]  kunit_try_run_case+0x1a5/0x480
[   25.186388]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.186411]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.186432]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.186467]  ? __kthread_parkme+0x82/0x180
[   25.186488]  ? preempt_count_sub+0x50/0x80
[   25.186512]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.186536]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.186559]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.186583]  kthread+0x337/0x6f0
[   25.186602]  ? trace_preempt_on+0x20/0xc0
[   25.186626]  ? __pfx_kthread+0x10/0x10
[   25.186646]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.186670]  ? calculate_sigpending+0x7b/0xa0
[   25.186694]  ? __pfx_kthread+0x10/0x10
[   25.186715]  ret_from_fork+0x116/0x1d0
[   25.186734]  ? __pfx_kthread+0x10/0x10
[   25.186754]  ret_from_fork_asm+0x1a/0x30
[   25.186785]  </TASK>
[   25.186797] 
[   25.194800] Allocated by task 294:
[   25.194986]  kasan_save_stack+0x45/0x70
[   25.195213]  kasan_save_track+0x18/0x40
[   25.195420]  kasan_save_alloc_info+0x3b/0x50
[   25.195625]  __kasan_kmalloc+0xb7/0xc0
[   25.195788]  __kmalloc_cache_noprof+0x189/0x420
[   25.196031]  kasan_atomics+0x95/0x310
[   25.196252]  kunit_try_run_case+0x1a5/0x480
[   25.196509]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.196773]  kthread+0x337/0x6f0
[   25.196931]  ret_from_fork+0x116/0x1d0
[   25.197143]  ret_from_fork_asm+0x1a/0x30
[   25.197329] 
[   25.197418] The buggy address belongs to the object at ffff8881039e9700
[   25.197418]  which belongs to the cache kmalloc-64 of size 64
[   25.197848] The buggy address is located 0 bytes to the right of
[   25.197848]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.198801] 
[   25.198916] The buggy address belongs to the physical page:
[   25.199673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.200493] flags: 0x200000000000000(node=0|zone=2)
[   25.200873] page_type: f5(slab)
[   25.201052] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.201914] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.202590] page dumped because: kasan: bad access detected
[   25.203064] 
[   25.203341] Memory state around the buggy address:
[   25.203694]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.204427]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.204823] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.205112]                                      ^
[   25.205621]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.206230]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.206534] ==================================================================
[   25.478957] ==================================================================
[   25.479351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   25.479630] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.479943] 
[   25.480062] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.480155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.480169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.480191] Call Trace:
[   25.480212]  <TASK>
[   25.480232]  dump_stack_lvl+0x73/0xb0
[   25.480260]  print_report+0xd1/0x650
[   25.480282]  ? __virt_addr_valid+0x1db/0x2d0
[   25.480307]  ? kasan_atomics_helper+0x2006/0x5450
[   25.480334]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.480361]  ? kasan_atomics_helper+0x2006/0x5450
[   25.480382]  kasan_report+0x141/0x180
[   25.480404]  ? kasan_atomics_helper+0x2006/0x5450
[   25.480428]  kasan_check_range+0x10c/0x1c0
[   25.480462]  __kasan_check_write+0x18/0x20
[   25.480484]  kasan_atomics_helper+0x2006/0x5450
[   25.480506]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.480527]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.480563]  ? kasan_atomics+0x152/0x310
[   25.480588]  kasan_atomics+0x1dc/0x310
[   25.480610]  ? __pfx_kasan_atomics+0x10/0x10
[   25.480640]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.480664]  ? __pfx_read_tsc+0x10/0x10
[   25.480686]  ? ktime_get_ts64+0x86/0x230
[   25.480722]  kunit_try_run_case+0x1a5/0x480
[   25.480749]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.480772]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.480801]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.480826]  ? __kthread_parkme+0x82/0x180
[   25.480849]  ? preempt_count_sub+0x50/0x80
[   25.480882]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.480907]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.480930]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.480963]  kthread+0x337/0x6f0
[   25.480992]  ? trace_preempt_on+0x20/0xc0
[   25.481015]  ? __pfx_kthread+0x10/0x10
[   25.481035]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.481069]  ? calculate_sigpending+0x7b/0xa0
[   25.481093]  ? __pfx_kthread+0x10/0x10
[   25.481131]  ret_from_fork+0x116/0x1d0
[   25.481160]  ? __pfx_kthread+0x10/0x10
[   25.481180]  ret_from_fork_asm+0x1a/0x30
[   25.481210]  </TASK>
[   25.481233] 
[   25.488734] Allocated by task 294:
[   25.488928]  kasan_save_stack+0x45/0x70
[   25.489153]  kasan_save_track+0x18/0x40
[   25.489315]  kasan_save_alloc_info+0x3b/0x50
[   25.489455]  __kasan_kmalloc+0xb7/0xc0
[   25.489578]  __kmalloc_cache_noprof+0x189/0x420
[   25.489724]  kasan_atomics+0x95/0x310
[   25.489848]  kunit_try_run_case+0x1a5/0x480
[   25.490048]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.490325]  kthread+0x337/0x6f0
[   25.490485]  ret_from_fork+0x116/0x1d0
[   25.490660]  ret_from_fork_asm+0x1a/0x30
[   25.490847] 
[   25.490944] The buggy address belongs to the object at ffff8881039e9700
[   25.490944]  which belongs to the cache kmalloc-64 of size 64
[   25.491395] The buggy address is located 0 bytes to the right of
[   25.491395]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.491748] 
[   25.491831] The buggy address belongs to the physical page:
[   25.492088] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.492485] flags: 0x200000000000000(node=0|zone=2)
[   25.492738] page_type: f5(slab)
[   25.492932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.493295] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.493575] page dumped because: kasan: bad access detected
[   25.493819] 
[   25.493895] Memory state around the buggy address:
[   25.494104]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.494435]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.494725] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.495007]                                      ^
[   25.495222]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.495505]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.495820] ==================================================================
[   24.587514] ==================================================================
[   24.587739] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   24.588535] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.589250] 
[   24.589433] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.589485] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.589499] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.589522] Call Trace:
[   24.589547]  <TASK>
[   24.589570]  dump_stack_lvl+0x73/0xb0
[   24.589601]  print_report+0xd1/0x650
[   24.589623]  ? __virt_addr_valid+0x1db/0x2d0
[   24.589665]  ? kasan_atomics_helper+0xa2b/0x5450
[   24.589686]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.589711]  ? kasan_atomics_helper+0xa2b/0x5450
[   24.589732]  kasan_report+0x141/0x180
[   24.589753]  ? kasan_atomics_helper+0xa2b/0x5450
[   24.589815]  kasan_check_range+0x10c/0x1c0
[   24.589850]  __kasan_check_write+0x18/0x20
[   24.589884]  kasan_atomics_helper+0xa2b/0x5450
[   24.589906]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.589927]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.589962]  ? kasan_atomics+0x152/0x310
[   24.589987]  kasan_atomics+0x1dc/0x310
[   24.590009]  ? __pfx_kasan_atomics+0x10/0x10
[   24.590030]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.590053]  ? __pfx_read_tsc+0x10/0x10
[   24.590076]  ? ktime_get_ts64+0x86/0x230
[   24.590120]  kunit_try_run_case+0x1a5/0x480
[   24.590155]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.590194]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.590214]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.590239]  ? __kthread_parkme+0x82/0x180
[   24.590260]  ? preempt_count_sub+0x50/0x80
[   24.590284]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.590308]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.590332]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.590355]  kthread+0x337/0x6f0
[   24.590375]  ? trace_preempt_on+0x20/0xc0
[   24.590401]  ? __pfx_kthread+0x10/0x10
[   24.590422]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.590445]  ? calculate_sigpending+0x7b/0xa0
[   24.590469]  ? __pfx_kthread+0x10/0x10
[   24.590490]  ret_from_fork+0x116/0x1d0
[   24.590509]  ? __pfx_kthread+0x10/0x10
[   24.590530]  ret_from_fork_asm+0x1a/0x30
[   24.590560]  </TASK>
[   24.590572] 
[   24.604845] Allocated by task 294:
[   24.605824]  kasan_save_stack+0x45/0x70
[   24.606057]  kasan_save_track+0x18/0x40
[   24.606208]  kasan_save_alloc_info+0x3b/0x50
[   24.606352]  __kasan_kmalloc+0xb7/0xc0
[   24.606478]  __kmalloc_cache_noprof+0x189/0x420
[   24.606625]  kasan_atomics+0x95/0x310
[   24.606751]  kunit_try_run_case+0x1a5/0x480
[   24.606891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.607456]  kthread+0x337/0x6f0
[   24.607768]  ret_from_fork+0x116/0x1d0
[   24.608237]  ret_from_fork_asm+0x1a/0x30
[   24.608583] 
[   24.608655] The buggy address belongs to the object at ffff8881039e9700
[   24.608655]  which belongs to the cache kmalloc-64 of size 64
[   24.610163] The buggy address is located 0 bytes to the right of
[   24.610163]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.611624] 
[   24.611734] The buggy address belongs to the physical page:
[   24.612237] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.612770] flags: 0x200000000000000(node=0|zone=2)
[   24.613337] page_type: f5(slab)
[   24.613661] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.614251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.614777] page dumped because: kasan: bad access detected
[   24.614975] 
[   24.615044] Memory state around the buggy address:
[   24.615455]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.615717]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.616508] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.617044]                                      ^
[   24.617471]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.617969]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.618627] ==================================================================
[   25.531610] ==================================================================
[   25.532136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   25.532755] Read of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.533036] 
[   25.533276] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.533327] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.533340] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.533363] Call Trace:
[   25.533384]  <TASK>
[   25.533403]  dump_stack_lvl+0x73/0xb0
[   25.533430]  print_report+0xd1/0x650
[   25.533452]  ? __virt_addr_valid+0x1db/0x2d0
[   25.533475]  ? kasan_atomics_helper+0x4fb2/0x5450
[   25.533496]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.533522]  ? kasan_atomics_helper+0x4fb2/0x5450
[   25.533543]  kasan_report+0x141/0x180
[   25.533564]  ? kasan_atomics_helper+0x4fb2/0x5450
[   25.533589]  __asan_report_load8_noabort+0x18/0x20
[   25.533613]  kasan_atomics_helper+0x4fb2/0x5450
[   25.533635]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.533657]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.533682]  ? kasan_atomics+0x152/0x310
[   25.533708]  kasan_atomics+0x1dc/0x310
[   25.533730]  ? __pfx_kasan_atomics+0x10/0x10
[   25.533751]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.533774]  ? __pfx_read_tsc+0x10/0x10
[   25.533796]  ? ktime_get_ts64+0x86/0x230
[   25.533820]  kunit_try_run_case+0x1a5/0x480
[   25.533848]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.533870]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.533891]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.533916]  ? __kthread_parkme+0x82/0x180
[   25.533948]  ? preempt_count_sub+0x50/0x80
[   25.533972]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.533996]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.534019]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.534044]  kthread+0x337/0x6f0
[   25.534062]  ? trace_preempt_on+0x20/0xc0
[   25.534085]  ? __pfx_kthread+0x10/0x10
[   25.534112]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.534135]  ? calculate_sigpending+0x7b/0xa0
[   25.534159]  ? __pfx_kthread+0x10/0x10
[   25.534180]  ret_from_fork+0x116/0x1d0
[   25.534199]  ? __pfx_kthread+0x10/0x10
[   25.534219]  ret_from_fork_asm+0x1a/0x30
[   25.534250]  </TASK>
[   25.534262] 
[   25.547455] Allocated by task 294:
[   25.547832]  kasan_save_stack+0x45/0x70
[   25.548236]  kasan_save_track+0x18/0x40
[   25.548599]  kasan_save_alloc_info+0x3b/0x50
[   25.548991]  __kasan_kmalloc+0xb7/0xc0
[   25.549353]  __kmalloc_cache_noprof+0x189/0x420
[   25.549763]  kasan_atomics+0x95/0x310
[   25.550138]  kunit_try_run_case+0x1a5/0x480
[   25.550520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.550947]  kthread+0x337/0x6f0
[   25.551063]  ret_from_fork+0x116/0x1d0
[   25.551414]  ret_from_fork_asm+0x1a/0x30
[   25.551783] 
[   25.551952] The buggy address belongs to the object at ffff8881039e9700
[   25.551952]  which belongs to the cache kmalloc-64 of size 64
[   25.552700] The buggy address is located 0 bytes to the right of
[   25.552700]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.553822] 
[   25.553987] The buggy address belongs to the physical page:
[   25.554445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.555025] flags: 0x200000000000000(node=0|zone=2)
[   25.555430] page_type: f5(slab)
[   25.555554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.556057] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.556724] page dumped because: kasan: bad access detected
[   25.557070] 
[   25.557209] Memory state around the buggy address:
[   25.557662]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.558176]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.558390] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.558604]                                      ^
[   25.558754]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.558982]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.559245] ==================================================================
[   25.614920] ==================================================================
[   25.615287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   25.615639] Read of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.615969] 
[   25.616056] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.616126] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.616140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.616162] Call Trace:
[   25.616183]  <TASK>
[   25.616204]  dump_stack_lvl+0x73/0xb0
[   25.616230]  print_report+0xd1/0x650
[   25.616253]  ? __virt_addr_valid+0x1db/0x2d0
[   25.616277]  ? kasan_atomics_helper+0x5115/0x5450
[   25.616298]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.616324]  ? kasan_atomics_helper+0x5115/0x5450
[   25.616349]  kasan_report+0x141/0x180
[   25.616371]  ? kasan_atomics_helper+0x5115/0x5450
[   25.616396]  __asan_report_load8_noabort+0x18/0x20
[   25.616430]  kasan_atomics_helper+0x5115/0x5450
[   25.616452]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.616474]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.616518]  ? kasan_atomics+0x152/0x310
[   25.616543]  kasan_atomics+0x1dc/0x310
[   25.616566]  ? __pfx_kasan_atomics+0x10/0x10
[   25.616597]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.616621]  ? __pfx_read_tsc+0x10/0x10
[   25.616643]  ? ktime_get_ts64+0x86/0x230
[   25.616668]  kunit_try_run_case+0x1a5/0x480
[   25.616695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.616727]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.616747]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.616773]  ? __kthread_parkme+0x82/0x180
[   25.616804]  ? preempt_count_sub+0x50/0x80
[   25.616827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.616851]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.616875]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.616899]  kthread+0x337/0x6f0
[   25.616918]  ? trace_preempt_on+0x20/0xc0
[   25.616951]  ? __pfx_kthread+0x10/0x10
[   25.616971]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.616995]  ? calculate_sigpending+0x7b/0xa0
[   25.617019]  ? __pfx_kthread+0x10/0x10
[   25.617040]  ret_from_fork+0x116/0x1d0
[   25.617059]  ? __pfx_kthread+0x10/0x10
[   25.617079]  ret_from_fork_asm+0x1a/0x30
[   25.617135]  </TASK>
[   25.617147] 
[   25.624640] Allocated by task 294:
[   25.624777]  kasan_save_stack+0x45/0x70
[   25.624934]  kasan_save_track+0x18/0x40
[   25.625547]  kasan_save_alloc_info+0x3b/0x50
[   25.625740]  __kasan_kmalloc+0xb7/0xc0
[   25.625901]  __kmalloc_cache_noprof+0x189/0x420
[   25.626084]  kasan_atomics+0x95/0x310
[   25.626262]  kunit_try_run_case+0x1a5/0x480
[   25.626446]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.626663]  kthread+0x337/0x6f0
[   25.626815]  ret_from_fork+0x116/0x1d0
[   25.627634]  ret_from_fork_asm+0x1a/0x30
[   25.627826] 
[   25.627899] The buggy address belongs to the object at ffff8881039e9700
[   25.627899]  which belongs to the cache kmalloc-64 of size 64
[   25.628839] The buggy address is located 0 bytes to the right of
[   25.628839]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.629585] 
[   25.629682] The buggy address belongs to the physical page:
[   25.629910] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.630187] flags: 0x200000000000000(node=0|zone=2)
[   25.630439] page_type: f5(slab)
[   25.630588] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.630918] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.631204] page dumped because: kasan: bad access detected
[   25.631471] 
[   25.631577] Memory state around the buggy address:
[   25.631810]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.632089]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.632441] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.632716]                                      ^
[   25.632888]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.633225]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.633479] ==================================================================
[   24.619584] ==================================================================
[   24.620436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   24.621182] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.621661] 
[   24.621790] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.621951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.621967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.621991] Call Trace:
[   24.622012]  <TASK>
[   24.622063]  dump_stack_lvl+0x73/0xb0
[   24.622095]  print_report+0xd1/0x650
[   24.622135]  ? __virt_addr_valid+0x1db/0x2d0
[   24.622158]  ? kasan_atomics_helper+0xac7/0x5450
[   24.622180]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.622205]  ? kasan_atomics_helper+0xac7/0x5450
[   24.622226]  kasan_report+0x141/0x180
[   24.622248]  ? kasan_atomics_helper+0xac7/0x5450
[   24.622273]  kasan_check_range+0x10c/0x1c0
[   24.622297]  __kasan_check_write+0x18/0x20
[   24.622319]  kasan_atomics_helper+0xac7/0x5450
[   24.622341]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.622362]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.622387]  ? kasan_atomics+0x152/0x310
[   24.622412]  kasan_atomics+0x1dc/0x310
[   24.622435]  ? __pfx_kasan_atomics+0x10/0x10
[   24.622457]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.622481]  ? __pfx_read_tsc+0x10/0x10
[   24.622502]  ? ktime_get_ts64+0x86/0x230
[   24.622528]  kunit_try_run_case+0x1a5/0x480
[   24.622556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.622579]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.622599]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.622624]  ? __kthread_parkme+0x82/0x180
[   24.622645]  ? preempt_count_sub+0x50/0x80
[   24.622669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.622692]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.622717]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.622741]  kthread+0x337/0x6f0
[   24.622760]  ? trace_preempt_on+0x20/0xc0
[   24.622783]  ? __pfx_kthread+0x10/0x10
[   24.622803]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.622826]  ? calculate_sigpending+0x7b/0xa0
[   24.622850]  ? __pfx_kthread+0x10/0x10
[   24.622871]  ret_from_fork+0x116/0x1d0
[   24.622890]  ? __pfx_kthread+0x10/0x10
[   24.622910]  ret_from_fork_asm+0x1a/0x30
[   24.622949]  </TASK>
[   24.622961] 
[   24.635819] Allocated by task 294:
[   24.636088]  kasan_save_stack+0x45/0x70
[   24.636284]  kasan_save_track+0x18/0x40
[   24.636463]  kasan_save_alloc_info+0x3b/0x50
[   24.636654]  __kasan_kmalloc+0xb7/0xc0
[   24.637194]  __kmalloc_cache_noprof+0x189/0x420
[   24.637588]  kasan_atomics+0x95/0x310
[   24.637781]  kunit_try_run_case+0x1a5/0x480
[   24.638187]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.638424]  kthread+0x337/0x6f0
[   24.638582]  ret_from_fork+0x116/0x1d0
[   24.638751]  ret_from_fork_asm+0x1a/0x30
[   24.639353] 
[   24.639446] The buggy address belongs to the object at ffff8881039e9700
[   24.639446]  which belongs to the cache kmalloc-64 of size 64
[   24.640378] The buggy address is located 0 bytes to the right of
[   24.640378]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.640998] 
[   24.641097] The buggy address belongs to the physical page:
[   24.641328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.641648] flags: 0x200000000000000(node=0|zone=2)
[   24.642231] page_type: f5(slab)
[   24.642381] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.642689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.643800] page dumped because: kasan: bad access detected
[   24.644267] 
[   24.644502] Memory state around the buggy address:
[   24.644845]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.645373]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.645669] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.646221]                                      ^
[   24.646628]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.647347]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.647629] ==================================================================
[   24.564979] ==================================================================
[   24.565275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   24.565553] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.565900] 
[   24.566018] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.566069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.566084] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.566108] Call Trace:
[   24.566131]  <TASK>
[   24.566153]  dump_stack_lvl+0x73/0xb0
[   24.566180]  print_report+0xd1/0x650
[   24.566202]  ? __virt_addr_valid+0x1db/0x2d0
[   24.566226]  ? kasan_atomics_helper+0x992/0x5450
[   24.566246]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.566272]  ? kasan_atomics_helper+0x992/0x5450
[   24.566293]  kasan_report+0x141/0x180
[   24.566314]  ? kasan_atomics_helper+0x992/0x5450
[   24.566339]  kasan_check_range+0x10c/0x1c0
[   24.566362]  __kasan_check_write+0x18/0x20
[   24.566384]  kasan_atomics_helper+0x992/0x5450
[   24.566407]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.566428]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.566452]  ? kasan_atomics+0x152/0x310
[   24.566485]  kasan_atomics+0x1dc/0x310
[   24.566507]  ? __pfx_kasan_atomics+0x10/0x10
[   24.566527]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.566550]  ? __pfx_read_tsc+0x10/0x10
[   24.566572]  ? ktime_get_ts64+0x86/0x230
[   24.566597]  kunit_try_run_case+0x1a5/0x480
[   24.566624]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.566646]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.566666]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.566691]  ? __kthread_parkme+0x82/0x180
[   24.566712]  ? preempt_count_sub+0x50/0x80
[   24.566735]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.566759]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.566782]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.566806]  kthread+0x337/0x6f0
[   24.566835]  ? trace_preempt_on+0x20/0xc0
[   24.566858]  ? __pfx_kthread+0x10/0x10
[   24.566879]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.566902]  ? calculate_sigpending+0x7b/0xa0
[   24.566927]  ? __pfx_kthread+0x10/0x10
[   24.566959]  ret_from_fork+0x116/0x1d0
[   24.566978]  ? __pfx_kthread+0x10/0x10
[   24.566998]  ret_from_fork_asm+0x1a/0x30
[   24.567028]  </TASK>
[   24.567040] 
[   24.575723] Allocated by task 294:
[   24.576082]  kasan_save_stack+0x45/0x70
[   24.576302]  kasan_save_track+0x18/0x40
[   24.576492]  kasan_save_alloc_info+0x3b/0x50
[   24.576676]  __kasan_kmalloc+0xb7/0xc0
[   24.576800]  __kmalloc_cache_noprof+0x189/0x420
[   24.576958]  kasan_atomics+0x95/0x310
[   24.577207]  kunit_try_run_case+0x1a5/0x480
[   24.577424]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.577674]  kthread+0x337/0x6f0
[   24.578541]  ret_from_fork+0x116/0x1d0
[   24.579020]  ret_from_fork_asm+0x1a/0x30
[   24.579181] 
[   24.579252] The buggy address belongs to the object at ffff8881039e9700
[   24.579252]  which belongs to the cache kmalloc-64 of size 64
[   24.579595] The buggy address is located 0 bytes to the right of
[   24.579595]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.579962] 
[   24.580076] The buggy address belongs to the physical page:
[   24.580649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.580883] flags: 0x200000000000000(node=0|zone=2)
[   24.581372] page_type: f5(slab)
[   24.581774] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.582369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.583170] page dumped because: kasan: bad access detected
[   24.583637] 
[   24.583709] Memory state around the buggy address:
[   24.583909]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.584418]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.585175] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.585886]                                      ^
[   24.586323]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.586877]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.587089] ==================================================================
[   24.765571] ==================================================================
[   24.765981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   24.766314] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.766527] 
[   24.766610] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.766658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.766671] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.766694] Call Trace:
[   24.766716]  <TASK>
[   24.766736]  dump_stack_lvl+0x73/0xb0
[   24.766762]  print_report+0xd1/0x650
[   24.766782]  ? __virt_addr_valid+0x1db/0x2d0
[   24.766808]  ? kasan_atomics_helper+0xe78/0x5450
[   24.766829]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.766854]  ? kasan_atomics_helper+0xe78/0x5450
[   24.766875]  kasan_report+0x141/0x180
[   24.766896]  ? kasan_atomics_helper+0xe78/0x5450
[   24.766921]  kasan_check_range+0x10c/0x1c0
[   24.766956]  __kasan_check_write+0x18/0x20
[   24.766978]  kasan_atomics_helper+0xe78/0x5450
[   24.767000]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.767021]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.767046]  ? kasan_atomics+0x152/0x310
[   24.767071]  kasan_atomics+0x1dc/0x310
[   24.767094]  ? __pfx_kasan_atomics+0x10/0x10
[   24.767115]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.767139]  ? __pfx_read_tsc+0x10/0x10
[   24.767160]  ? ktime_get_ts64+0x86/0x230
[   24.767185]  kunit_try_run_case+0x1a5/0x480
[   24.767212]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.767235]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.767255]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.767280]  ? __kthread_parkme+0x82/0x180
[   24.767301]  ? preempt_count_sub+0x50/0x80
[   24.767324]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.767348]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.767371]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.767395]  kthread+0x337/0x6f0
[   24.767414]  ? trace_preempt_on+0x20/0xc0
[   24.767437]  ? __pfx_kthread+0x10/0x10
[   24.767458]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.767481]  ? calculate_sigpending+0x7b/0xa0
[   24.767506]  ? __pfx_kthread+0x10/0x10
[   24.767527]  ret_from_fork+0x116/0x1d0
[   24.767546]  ? __pfx_kthread+0x10/0x10
[   24.767567]  ret_from_fork_asm+0x1a/0x30
[   24.767597]  </TASK>
[   24.767608] 
[   24.775213] Allocated by task 294:
[   24.775364]  kasan_save_stack+0x45/0x70
[   24.775539]  kasan_save_track+0x18/0x40
[   24.775693]  kasan_save_alloc_info+0x3b/0x50
[   24.775866]  __kasan_kmalloc+0xb7/0xc0
[   24.776000]  __kmalloc_cache_noprof+0x189/0x420
[   24.776211]  kasan_atomics+0x95/0x310
[   24.776393]  kunit_try_run_case+0x1a5/0x480
[   24.776613]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.776784]  kthread+0x337/0x6f0
[   24.776898]  ret_from_fork+0x116/0x1d0
[   24.777070]  ret_from_fork_asm+0x1a/0x30
[   24.777353] 
[   24.777451] The buggy address belongs to the object at ffff8881039e9700
[   24.777451]  which belongs to the cache kmalloc-64 of size 64
[   24.777899] The buggy address is located 0 bytes to the right of
[   24.777899]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.778413] 
[   24.778496] The buggy address belongs to the physical page:
[   24.778716] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.779007] flags: 0x200000000000000(node=0|zone=2)
[   24.779261] page_type: f5(slab)
[   24.779397] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.779684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.779982] page dumped because: kasan: bad access detected
[   24.780218] 
[   24.780296] Memory state around the buggy address:
[   24.780486]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.780694]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.780901] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.781202]                                      ^
[   24.781515]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.781818]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.782033] ==================================================================
[   24.676518] ==================================================================
[   24.676877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   24.677129] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.677437] 
[   24.677846] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.677903] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.677918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.677955] Call Trace:
[   24.677978]  <TASK>
[   24.677999]  dump_stack_lvl+0x73/0xb0
[   24.678029]  print_report+0xd1/0x650
[   24.678052]  ? __virt_addr_valid+0x1db/0x2d0
[   24.678076]  ? kasan_atomics_helper+0xc70/0x5450
[   24.678097]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.678151]  ? kasan_atomics_helper+0xc70/0x5450
[   24.678173]  kasan_report+0x141/0x180
[   24.678195]  ? kasan_atomics_helper+0xc70/0x5450
[   24.678220]  kasan_check_range+0x10c/0x1c0
[   24.678243]  __kasan_check_write+0x18/0x20
[   24.678541]  kasan_atomics_helper+0xc70/0x5450
[   24.678568]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.678590]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.678615]  ? kasan_atomics+0x152/0x310
[   24.678641]  kasan_atomics+0x1dc/0x310
[   24.678662]  ? __pfx_kasan_atomics+0x10/0x10
[   24.678684]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.678708]  ? __pfx_read_tsc+0x10/0x10
[   24.678731]  ? ktime_get_ts64+0x86/0x230
[   24.678759]  kunit_try_run_case+0x1a5/0x480
[   24.678785]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.678808]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.678843]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.678869]  ? __kthread_parkme+0x82/0x180
[   24.678889]  ? preempt_count_sub+0x50/0x80
[   24.678913]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.678950]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.678974]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.678997]  kthread+0x337/0x6f0
[   24.679016]  ? trace_preempt_on+0x20/0xc0
[   24.679040]  ? __pfx_kthread+0x10/0x10
[   24.679060]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.679083]  ? calculate_sigpending+0x7b/0xa0
[   24.679107]  ? __pfx_kthread+0x10/0x10
[   24.679128]  ret_from_fork+0x116/0x1d0
[   24.679147]  ? __pfx_kthread+0x10/0x10
[   24.679167]  ret_from_fork_asm+0x1a/0x30
[   24.679197]  </TASK>
[   24.679209] 
[   24.691612] Allocated by task 294:
[   24.691958]  kasan_save_stack+0x45/0x70
[   24.692493]  kasan_save_track+0x18/0x40
[   24.692766]  kasan_save_alloc_info+0x3b/0x50
[   24.693103]  __kasan_kmalloc+0xb7/0xc0
[   24.693412]  __kmalloc_cache_noprof+0x189/0x420
[   24.693835]  kasan_atomics+0x95/0x310
[   24.694031]  kunit_try_run_case+0x1a5/0x480
[   24.694519]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.694847]  kthread+0x337/0x6f0
[   24.695022]  ret_from_fork+0x116/0x1d0
[   24.695281]  ret_from_fork_asm+0x1a/0x30
[   24.695715] 
[   24.695808] The buggy address belongs to the object at ffff8881039e9700
[   24.695808]  which belongs to the cache kmalloc-64 of size 64
[   24.696640] The buggy address is located 0 bytes to the right of
[   24.696640]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.697386] 
[   24.697643] The buggy address belongs to the physical page:
[   24.697954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.698581] flags: 0x200000000000000(node=0|zone=2)
[   24.698983] page_type: f5(slab)
[   24.699260] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.699695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.700044] page dumped because: kasan: bad access detected
[   24.700503] 
[   24.700783] Memory state around the buggy address:
[   24.701039]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.701517]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.701907] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.702518]                                      ^
[   24.702992]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.703294]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.703564] ==================================================================
[   24.409508] ==================================================================
[   24.409796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   24.410333] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.410611] 
[   24.410796] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.410849] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.410864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.410886] Call Trace:
[   24.410908]  <TASK>
[   24.410930]  dump_stack_lvl+0x73/0xb0
[   24.410972]  print_report+0xd1/0x650
[   24.410995]  ? __virt_addr_valid+0x1db/0x2d0
[   24.411019]  ? kasan_atomics_helper+0x5fe/0x5450
[   24.411040]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.411065]  ? kasan_atomics_helper+0x5fe/0x5450
[   24.411088]  kasan_report+0x141/0x180
[   24.411110]  ? kasan_atomics_helper+0x5fe/0x5450
[   24.411136]  kasan_check_range+0x10c/0x1c0
[   24.411158]  __kasan_check_write+0x18/0x20
[   24.411281]  kasan_atomics_helper+0x5fe/0x5450
[   24.411304]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.411326]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.411351]  ? kasan_atomics+0x152/0x310
[   24.411376]  kasan_atomics+0x1dc/0x310
[   24.411399]  ? __pfx_kasan_atomics+0x10/0x10
[   24.411420]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.411443]  ? __pfx_read_tsc+0x10/0x10
[   24.411468]  ? ktime_get_ts64+0x86/0x230
[   24.411493]  kunit_try_run_case+0x1a5/0x480
[   24.411521]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.411544]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.411565]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.411590]  ? __kthread_parkme+0x82/0x180
[   24.411611]  ? preempt_count_sub+0x50/0x80
[   24.411635]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.411659]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.411683]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.411706]  kthread+0x337/0x6f0
[   24.411726]  ? trace_preempt_on+0x20/0xc0
[   24.411749]  ? __pfx_kthread+0x10/0x10
[   24.411769]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.411792]  ? calculate_sigpending+0x7b/0xa0
[   24.412023]  ? __pfx_kthread+0x10/0x10
[   24.412053]  ret_from_fork+0x116/0x1d0
[   24.412074]  ? __pfx_kthread+0x10/0x10
[   24.412095]  ret_from_fork_asm+0x1a/0x30
[   24.412125]  </TASK>
[   24.412137] 
[   24.422875] Allocated by task 294:
[   24.423177]  kasan_save_stack+0x45/0x70
[   24.423754]  kasan_save_track+0x18/0x40
[   24.424083]  kasan_save_alloc_info+0x3b/0x50
[   24.424257]  __kasan_kmalloc+0xb7/0xc0
[   24.424534]  __kmalloc_cache_noprof+0x189/0x420
[   24.424853]  kasan_atomics+0x95/0x310
[   24.425162]  kunit_try_run_case+0x1a5/0x480
[   24.425327]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.425692]  kthread+0x337/0x6f0
[   24.425920]  ret_from_fork+0x116/0x1d0
[   24.426363]  ret_from_fork_asm+0x1a/0x30
[   24.426551] 
[   24.426637] The buggy address belongs to the object at ffff8881039e9700
[   24.426637]  which belongs to the cache kmalloc-64 of size 64
[   24.427186] The buggy address is located 0 bytes to the right of
[   24.427186]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.428108] 
[   24.428218] The buggy address belongs to the physical page:
[   24.428617] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.429157] flags: 0x200000000000000(node=0|zone=2)
[   24.429391] page_type: f5(slab)
[   24.429698] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.430188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.430470] page dumped because: kasan: bad access detected
[   24.430695] 
[   24.430780] Memory state around the buggy address:
[   24.430975]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.431272]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.432137] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.432370]                                      ^
[   24.432526]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.432737]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.432952] ==================================================================
[   24.783036] ==================================================================
[   24.783342] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   24.783641] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.783994] 
[   24.784099] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.784148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.784161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.784185] Call Trace:
[   24.784207]  <TASK>
[   24.784226]  dump_stack_lvl+0x73/0xb0
[   24.784252]  print_report+0xd1/0x650
[   24.784274]  ? __virt_addr_valid+0x1db/0x2d0
[   24.784298]  ? kasan_atomics_helper+0xf10/0x5450
[   24.784318]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.784351]  ? kasan_atomics_helper+0xf10/0x5450
[   24.784372]  kasan_report+0x141/0x180
[   24.784393]  ? kasan_atomics_helper+0xf10/0x5450
[   24.784418]  kasan_check_range+0x10c/0x1c0
[   24.784440]  __kasan_check_write+0x18/0x20
[   24.784463]  kasan_atomics_helper+0xf10/0x5450
[   24.785076]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.785100]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.785125]  ? kasan_atomics+0x152/0x310
[   24.785151]  kasan_atomics+0x1dc/0x310
[   24.785173]  ? __pfx_kasan_atomics+0x10/0x10
[   24.785194]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.785874]  ? __pfx_read_tsc+0x10/0x10
[   24.785902]  ? ktime_get_ts64+0x86/0x230
[   24.785931]  kunit_try_run_case+0x1a5/0x480
[   24.785974]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.785997]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.786018]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.786043]  ? __kthread_parkme+0x82/0x180
[   24.786065]  ? preempt_count_sub+0x50/0x80
[   24.786088]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.786112]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.786151]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.786174]  kthread+0x337/0x6f0
[   24.786194]  ? trace_preempt_on+0x20/0xc0
[   24.786218]  ? __pfx_kthread+0x10/0x10
[   24.786238]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.786262]  ? calculate_sigpending+0x7b/0xa0
[   24.786325]  ? __pfx_kthread+0x10/0x10
[   24.786366]  ret_from_fork+0x116/0x1d0
[   24.786386]  ? __pfx_kthread+0x10/0x10
[   24.786407]  ret_from_fork_asm+0x1a/0x30
[   24.786437]  </TASK>
[   24.786449] 
[   24.799110] Allocated by task 294:
[   24.799475]  kasan_save_stack+0x45/0x70
[   24.799869]  kasan_save_track+0x18/0x40
[   24.800046]  kasan_save_alloc_info+0x3b/0x50
[   24.800549]  __kasan_kmalloc+0xb7/0xc0
[   24.800913]  __kmalloc_cache_noprof+0x189/0x420
[   24.801340]  kasan_atomics+0x95/0x310
[   24.801516]  kunit_try_run_case+0x1a5/0x480
[   24.801701]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.801928]  kthread+0x337/0x6f0
[   24.802087]  ret_from_fork+0x116/0x1d0
[   24.802581]  ret_from_fork_asm+0x1a/0x30
[   24.802966] 
[   24.803385] The buggy address belongs to the object at ffff8881039e9700
[   24.803385]  which belongs to the cache kmalloc-64 of size 64
[   24.804307] The buggy address is located 0 bytes to the right of
[   24.804307]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.805245] 
[   24.805346] The buggy address belongs to the physical page:
[   24.805579] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.805893] flags: 0x200000000000000(node=0|zone=2)
[   24.806449] page_type: f5(slab)
[   24.806861] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.807382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.807686] page dumped because: kasan: bad access detected
[   24.807896] 
[   24.807986] Memory state around the buggy address:
[   24.808478]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.808995]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.809442] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.809725]                                      ^
[   24.809924]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.810143]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.810526] ==================================================================
[   24.648820] ==================================================================
[   24.649436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   24.649843] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.650400] 
[   24.650718] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.650775] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.650790] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.650814] Call Trace:
[   24.650932]  <TASK>
[   24.650969]  dump_stack_lvl+0x73/0xb0
[   24.651000]  print_report+0xd1/0x650
[   24.651022]  ? __virt_addr_valid+0x1db/0x2d0
[   24.651046]  ? kasan_atomics_helper+0xb6a/0x5450
[   24.651099]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.651125]  ? kasan_atomics_helper+0xb6a/0x5450
[   24.651146]  kasan_report+0x141/0x180
[   24.651167]  ? kasan_atomics_helper+0xb6a/0x5450
[   24.651192]  kasan_check_range+0x10c/0x1c0
[   24.651215]  __kasan_check_write+0x18/0x20
[   24.651249]  kasan_atomics_helper+0xb6a/0x5450
[   24.651271]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.651292]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.651316]  ? kasan_atomics+0x152/0x310
[   24.651341]  kasan_atomics+0x1dc/0x310
[   24.651363]  ? __pfx_kasan_atomics+0x10/0x10
[   24.651384]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.651408]  ? __pfx_read_tsc+0x10/0x10
[   24.651430]  ? ktime_get_ts64+0x86/0x230
[   24.651455]  kunit_try_run_case+0x1a5/0x480
[   24.651481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.651504]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.651524]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.651551]  ? __kthread_parkme+0x82/0x180
[   24.651571]  ? preempt_count_sub+0x50/0x80
[   24.651596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.651620]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.651643]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.651667]  kthread+0x337/0x6f0
[   24.651686]  ? trace_preempt_on+0x20/0xc0
[   24.651709]  ? __pfx_kthread+0x10/0x10
[   24.651729]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.651752]  ? calculate_sigpending+0x7b/0xa0
[   24.651776]  ? __pfx_kthread+0x10/0x10
[   24.651796]  ret_from_fork+0x116/0x1d0
[   24.651815]  ? __pfx_kthread+0x10/0x10
[   24.651845]  ret_from_fork_asm+0x1a/0x30
[   24.651875]  </TASK>
[   24.651886] 
[   24.664448] Allocated by task 294:
[   24.664639]  kasan_save_stack+0x45/0x70
[   24.665005]  kasan_save_track+0x18/0x40
[   24.665330]  kasan_save_alloc_info+0x3b/0x50
[   24.665648]  __kasan_kmalloc+0xb7/0xc0
[   24.665992]  __kmalloc_cache_noprof+0x189/0x420
[   24.666381]  kasan_atomics+0x95/0x310
[   24.666557]  kunit_try_run_case+0x1a5/0x480
[   24.666750]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.667320]  kthread+0x337/0x6f0
[   24.667796]  ret_from_fork+0x116/0x1d0
[   24.668100]  ret_from_fork_asm+0x1a/0x30
[   24.668488] 
[   24.668584] The buggy address belongs to the object at ffff8881039e9700
[   24.668584]  which belongs to the cache kmalloc-64 of size 64
[   24.669395] The buggy address is located 0 bytes to the right of
[   24.669395]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.670470] 
[   24.670698] The buggy address belongs to the physical page:
[   24.671066] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.671413] flags: 0x200000000000000(node=0|zone=2)
[   24.671638] page_type: f5(slab)
[   24.671755] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.672573] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.672922] page dumped because: kasan: bad access detected
[   24.673203] 
[   24.673274] Memory state around the buggy address:
[   24.673468]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.673765]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.674378] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.674672]                                      ^
[   24.675065]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.675307]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.675669] ==================================================================
[   25.577744] ==================================================================
[   25.578089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   25.578472] Read of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.578786] 
[   25.578899] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.578975] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.578989] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.579011] Call Trace:
[   25.579032]  <TASK>
[   25.579054]  dump_stack_lvl+0x73/0xb0
[   25.579091]  print_report+0xd1/0x650
[   25.579147]  ? __virt_addr_valid+0x1db/0x2d0
[   25.579183]  ? kasan_atomics_helper+0x4fa5/0x5450
[   25.579207]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.579234]  ? kasan_atomics_helper+0x4fa5/0x5450
[   25.579256]  kasan_report+0x141/0x180
[   25.579279]  ? kasan_atomics_helper+0x4fa5/0x5450
[   25.579308]  __asan_report_load8_noabort+0x18/0x20
[   25.579332]  kasan_atomics_helper+0x4fa5/0x5450
[   25.579354]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.579375]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.579400]  ? kasan_atomics+0x152/0x310
[   25.579437]  kasan_atomics+0x1dc/0x310
[   25.579459]  ? __pfx_kasan_atomics+0x10/0x10
[   25.579491]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.579515]  ? __pfx_read_tsc+0x10/0x10
[   25.579538]  ? ktime_get_ts64+0x86/0x230
[   25.579563]  kunit_try_run_case+0x1a5/0x480
[   25.579600]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.579623]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.579655]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.579681]  ? __kthread_parkme+0x82/0x180
[   25.579703]  ? preempt_count_sub+0x50/0x80
[   25.579734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.579758]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.579782]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.579824]  kthread+0x337/0x6f0
[   25.579844]  ? trace_preempt_on+0x20/0xc0
[   25.579867]  ? __pfx_kthread+0x10/0x10
[   25.579888]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.579910]  ? calculate_sigpending+0x7b/0xa0
[   25.579934]  ? __pfx_kthread+0x10/0x10
[   25.579964]  ret_from_fork+0x116/0x1d0
[   25.579983]  ? __pfx_kthread+0x10/0x10
[   25.580004]  ret_from_fork_asm+0x1a/0x30
[   25.580036]  </TASK>
[   25.580049] 
[   25.587143] Allocated by task 294:
[   25.587338]  kasan_save_stack+0x45/0x70
[   25.587512]  kasan_save_track+0x18/0x40
[   25.587702]  kasan_save_alloc_info+0x3b/0x50
[   25.587892]  __kasan_kmalloc+0xb7/0xc0
[   25.588080]  __kmalloc_cache_noprof+0x189/0x420
[   25.588301]  kasan_atomics+0x95/0x310
[   25.588487]  kunit_try_run_case+0x1a5/0x480
[   25.588697]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.588906]  kthread+0x337/0x6f0
[   25.589069]  ret_from_fork+0x116/0x1d0
[   25.589269]  ret_from_fork_asm+0x1a/0x30
[   25.589454] 
[   25.589542] The buggy address belongs to the object at ffff8881039e9700
[   25.589542]  which belongs to the cache kmalloc-64 of size 64
[   25.590016] The buggy address is located 0 bytes to the right of
[   25.590016]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.590549] 
[   25.590651] The buggy address belongs to the physical page:
[   25.590846] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.591086] flags: 0x200000000000000(node=0|zone=2)
[   25.591264] page_type: f5(slab)
[   25.591379] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.591602] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.591820] page dumped because: kasan: bad access detected
[   25.592035] 
[   25.592141] Memory state around the buggy address:
[   25.592384]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.592689]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.593012] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.593324]                                      ^
[   25.593537]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.593840]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.594984] ==================================================================
[   25.443958] ==================================================================
[   25.444322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   25.444651] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.444996] 
[   25.445126] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.445175] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.445188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.445211] Call Trace:
[   25.445231]  <TASK>
[   25.445251]  dump_stack_lvl+0x73/0xb0
[   25.445278]  print_report+0xd1/0x650
[   25.445301]  ? __virt_addr_valid+0x1db/0x2d0
[   25.445325]  ? kasan_atomics_helper+0x1f43/0x5450
[   25.445345]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.445371]  ? kasan_atomics_helper+0x1f43/0x5450
[   25.445392]  kasan_report+0x141/0x180
[   25.445414]  ? kasan_atomics_helper+0x1f43/0x5450
[   25.445439]  kasan_check_range+0x10c/0x1c0
[   25.445462]  __kasan_check_write+0x18/0x20
[   25.445485]  kasan_atomics_helper+0x1f43/0x5450
[   25.445507]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.445527]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.445552]  ? kasan_atomics+0x152/0x310
[   25.445577]  kasan_atomics+0x1dc/0x310
[   25.445599]  ? __pfx_kasan_atomics+0x10/0x10
[   25.445620]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.445644]  ? __pfx_read_tsc+0x10/0x10
[   25.445666]  ? ktime_get_ts64+0x86/0x230
[   25.445691]  kunit_try_run_case+0x1a5/0x480
[   25.445717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.445740]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.445761]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.445786]  ? __kthread_parkme+0x82/0x180
[   25.445806]  ? preempt_count_sub+0x50/0x80
[   25.445829]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.445853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.445876]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.445918]  kthread+0x337/0x6f0
[   25.445947]  ? trace_preempt_on+0x20/0xc0
[   25.445971]  ? __pfx_kthread+0x10/0x10
[   25.445991]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.446015]  ? calculate_sigpending+0x7b/0xa0
[   25.446039]  ? __pfx_kthread+0x10/0x10
[   25.446061]  ret_from_fork+0x116/0x1d0
[   25.446079]  ? __pfx_kthread+0x10/0x10
[   25.446100]  ret_from_fork_asm+0x1a/0x30
[   25.446148]  </TASK>
[   25.446160] 
[   25.453916] Allocated by task 294:
[   25.454074]  kasan_save_stack+0x45/0x70
[   25.454299]  kasan_save_track+0x18/0x40
[   25.454495]  kasan_save_alloc_info+0x3b/0x50
[   25.454697]  __kasan_kmalloc+0xb7/0xc0
[   25.454872]  __kmalloc_cache_noprof+0x189/0x420
[   25.455089]  kasan_atomics+0x95/0x310
[   25.455283]  kunit_try_run_case+0x1a5/0x480
[   25.455436]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.455619]  kthread+0x337/0x6f0
[   25.455778]  ret_from_fork+0x116/0x1d0
[   25.455965]  ret_from_fork_asm+0x1a/0x30
[   25.456204] 
[   25.456286] The buggy address belongs to the object at ffff8881039e9700
[   25.456286]  which belongs to the cache kmalloc-64 of size 64
[   25.456706] The buggy address is located 0 bytes to the right of
[   25.456706]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.457070] 
[   25.457163] The buggy address belongs to the physical page:
[   25.457330] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.457560] flags: 0x200000000000000(node=0|zone=2)
[   25.457715] page_type: f5(slab)
[   25.457829] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.458223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.458547] page dumped because: kasan: bad access detected
[   25.458785] 
[   25.458868] Memory state around the buggy address:
[   25.459087]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.459407]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.459714] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.460041]                                      ^
[   25.460286]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.460595]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.460858] ==================================================================
[   24.835048] ==================================================================
[   24.835740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   24.836354] Read of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.836815] 
[   24.836971] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.837024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.837037] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.837059] Call Trace:
[   24.837082]  <TASK>
[   24.837102]  dump_stack_lvl+0x73/0xb0
[   24.837129]  print_report+0xd1/0x650
[   24.837151]  ? __virt_addr_valid+0x1db/0x2d0
[   24.837175]  ? kasan_atomics_helper+0x4a36/0x5450
[   24.837196]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.837222]  ? kasan_atomics_helper+0x4a36/0x5450
[   24.837244]  kasan_report+0x141/0x180
[   24.837267]  ? kasan_atomics_helper+0x4a36/0x5450
[   24.837331]  __asan_report_load4_noabort+0x18/0x20
[   24.837356]  kasan_atomics_helper+0x4a36/0x5450
[   24.837389]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.837411]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.837435]  ? kasan_atomics+0x152/0x310
[   24.837460]  kasan_atomics+0x1dc/0x310
[   24.837482]  ? __pfx_kasan_atomics+0x10/0x10
[   24.837504]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.837527]  ? __pfx_read_tsc+0x10/0x10
[   24.837549]  ? ktime_get_ts64+0x86/0x230
[   24.837575]  kunit_try_run_case+0x1a5/0x480
[   24.837602]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.837625]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.837645]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.837671]  ? __kthread_parkme+0x82/0x180
[   24.837691]  ? preempt_count_sub+0x50/0x80
[   24.837716]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.837740]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.837763]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.837787]  kthread+0x337/0x6f0
[   24.837807]  ? trace_preempt_on+0x20/0xc0
[   24.837830]  ? __pfx_kthread+0x10/0x10
[   24.837850]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.837873]  ? calculate_sigpending+0x7b/0xa0
[   24.837896]  ? __pfx_kthread+0x10/0x10
[   24.837917]  ret_from_fork+0x116/0x1d0
[   24.837944]  ? __pfx_kthread+0x10/0x10
[   24.837965]  ret_from_fork_asm+0x1a/0x30
[   24.837995]  </TASK>
[   24.838007] 
[   24.848008] Allocated by task 294:
[   24.848209]  kasan_save_stack+0x45/0x70
[   24.848451]  kasan_save_track+0x18/0x40
[   24.848722]  kasan_save_alloc_info+0x3b/0x50
[   24.848954]  __kasan_kmalloc+0xb7/0xc0
[   24.849456]  __kmalloc_cache_noprof+0x189/0x420
[   24.849666]  kasan_atomics+0x95/0x310
[   24.849800]  kunit_try_run_case+0x1a5/0x480
[   24.850013]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.850494]  kthread+0x337/0x6f0
[   24.850758]  ret_from_fork+0x116/0x1d0
[   24.850946]  ret_from_fork_asm+0x1a/0x30
[   24.851291] 
[   24.851396] The buggy address belongs to the object at ffff8881039e9700
[   24.851396]  which belongs to the cache kmalloc-64 of size 64
[   24.852195] The buggy address is located 0 bytes to the right of
[   24.852195]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.852947] 
[   24.853057] The buggy address belongs to the physical page:
[   24.853288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.853785] flags: 0x200000000000000(node=0|zone=2)
[   24.854094] page_type: f5(slab)
[   24.854234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.854671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.855103] page dumped because: kasan: bad access detected
[   24.855522] 
[   24.855673] Memory state around the buggy address:
[   24.855886]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.856371]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.856733] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.857142]                                      ^
[   24.857302]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.857724]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.858046] ==================================================================
[   24.203424] ==================================================================
[   24.204086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   24.204602] Read of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.204879] 
[   24.205003] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.205057] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.205070] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.205091] Call Trace:
[   24.205106]  <TASK>
[   24.205491]  dump_stack_lvl+0x73/0xb0
[   24.205538]  print_report+0xd1/0x650
[   24.205560]  ? __virt_addr_valid+0x1db/0x2d0
[   24.205585]  ? kasan_atomics_helper+0x4bbc/0x5450
[   24.205605]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.205629]  ? kasan_atomics_helper+0x4bbc/0x5450
[   24.205649]  kasan_report+0x141/0x180
[   24.205671]  ? kasan_atomics_helper+0x4bbc/0x5450
[   24.205695]  __asan_report_load4_noabort+0x18/0x20
[   24.205718]  kasan_atomics_helper+0x4bbc/0x5450
[   24.205738]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.205758]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.205782]  ? kasan_atomics+0x152/0x310
[   24.205807]  kasan_atomics+0x1dc/0x310
[   24.205874]  ? __pfx_kasan_atomics+0x10/0x10
[   24.205898]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.205921]  ? __pfx_read_tsc+0x10/0x10
[   24.205956]  ? ktime_get_ts64+0x86/0x230
[   24.205980]  kunit_try_run_case+0x1a5/0x480
[   24.206007]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.206029]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.206048]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.206073]  ? __kthread_parkme+0x82/0x180
[   24.206093]  ? preempt_count_sub+0x50/0x80
[   24.206116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.206138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.206160]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.206183]  kthread+0x337/0x6f0
[   24.206201]  ? trace_preempt_on+0x20/0xc0
[   24.206224]  ? __pfx_kthread+0x10/0x10
[   24.206243]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.206266]  ? calculate_sigpending+0x7b/0xa0
[   24.206289]  ? __pfx_kthread+0x10/0x10
[   24.206309]  ret_from_fork+0x116/0x1d0
[   24.206327]  ? __pfx_kthread+0x10/0x10
[   24.206345]  ret_from_fork_asm+0x1a/0x30
[   24.206375]  </TASK>
[   24.206386] 
[   24.218219] Allocated by task 294:
[   24.218372]  kasan_save_stack+0x45/0x70
[   24.218579]  kasan_save_track+0x18/0x40
[   24.218767]  kasan_save_alloc_info+0x3b/0x50
[   24.219154]  __kasan_kmalloc+0xb7/0xc0
[   24.219295]  __kmalloc_cache_noprof+0x189/0x420
[   24.219523]  kasan_atomics+0x95/0x310
[   24.219703]  kunit_try_run_case+0x1a5/0x480
[   24.219928]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.220399]  kthread+0x337/0x6f0
[   24.220537]  ret_from_fork+0x116/0x1d0
[   24.220702]  ret_from_fork_asm+0x1a/0x30
[   24.220956] 
[   24.221031] The buggy address belongs to the object at ffff8881039e9700
[   24.221031]  which belongs to the cache kmalloc-64 of size 64
[   24.221667] The buggy address is located 0 bytes to the right of
[   24.221667]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.222383] 
[   24.222494] The buggy address belongs to the physical page:
[   24.222746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.223305] flags: 0x200000000000000(node=0|zone=2)
[   24.223548] page_type: f5(slab)
[   24.223692] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.224045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.224362] page dumped because: kasan: bad access detected
[   24.224589] 
[   24.224659] Memory state around the buggy address:
[   24.224867]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.225180]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.225666] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.226072]                                      ^
[   24.226362]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.226573]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.227166] ==================================================================
[   25.461439] ==================================================================
[   25.461777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   25.462169] Read of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.462492] 
[   25.462587] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.462636] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.462649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.462671] Call Trace:
[   25.462691]  <TASK>
[   25.462709]  dump_stack_lvl+0x73/0xb0
[   25.462737]  print_report+0xd1/0x650
[   25.462758]  ? __virt_addr_valid+0x1db/0x2d0
[   25.462783]  ? kasan_atomics_helper+0x4f71/0x5450
[   25.462805]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.462833]  ? kasan_atomics_helper+0x4f71/0x5450
[   25.462854]  kasan_report+0x141/0x180
[   25.462875]  ? kasan_atomics_helper+0x4f71/0x5450
[   25.462900]  __asan_report_load8_noabort+0x18/0x20
[   25.462924]  kasan_atomics_helper+0x4f71/0x5450
[   25.462957]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.462977]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.463002]  ? kasan_atomics+0x152/0x310
[   25.463040]  kasan_atomics+0x1dc/0x310
[   25.463062]  ? __pfx_kasan_atomics+0x10/0x10
[   25.463083]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.463129]  ? __pfx_read_tsc+0x10/0x10
[   25.463151]  ? ktime_get_ts64+0x86/0x230
[   25.463176]  kunit_try_run_case+0x1a5/0x480
[   25.463203]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.463226]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.463266]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.463291]  ? __kthread_parkme+0x82/0x180
[   25.463312]  ? preempt_count_sub+0x50/0x80
[   25.463336]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.463374]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.463397]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.463423]  kthread+0x337/0x6f0
[   25.463442]  ? trace_preempt_on+0x20/0xc0
[   25.463465]  ? __pfx_kthread+0x10/0x10
[   25.463485]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.463508]  ? calculate_sigpending+0x7b/0xa0
[   25.463532]  ? __pfx_kthread+0x10/0x10
[   25.463555]  ret_from_fork+0x116/0x1d0
[   25.463577]  ? __pfx_kthread+0x10/0x10
[   25.463599]  ret_from_fork_asm+0x1a/0x30
[   25.463633]  </TASK>
[   25.463644] 
[   25.471130] Allocated by task 294:
[   25.471323]  kasan_save_stack+0x45/0x70
[   25.471548]  kasan_save_track+0x18/0x40
[   25.471751]  kasan_save_alloc_info+0x3b/0x50
[   25.471893]  __kasan_kmalloc+0xb7/0xc0
[   25.472026]  __kmalloc_cache_noprof+0x189/0x420
[   25.472198]  kasan_atomics+0x95/0x310
[   25.472324]  kunit_try_run_case+0x1a5/0x480
[   25.472470]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.472635]  kthread+0x337/0x6f0
[   25.472747]  ret_from_fork+0x116/0x1d0
[   25.472871]  ret_from_fork_asm+0x1a/0x30
[   25.473046] 
[   25.473168] The buggy address belongs to the object at ffff8881039e9700
[   25.473168]  which belongs to the cache kmalloc-64 of size 64
[   25.473690] The buggy address is located 0 bytes to the right of
[   25.473690]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.474250] 
[   25.474342] The buggy address belongs to the physical page:
[   25.474592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.474949] flags: 0x200000000000000(node=0|zone=2)
[   25.475200] page_type: f5(slab)
[   25.475363] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.475693] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.476033] page dumped because: kasan: bad access detected
[   25.476273] 
[   25.476355] Memory state around the buggy address:
[   25.476505]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.476714]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.476923] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.477265]                                      ^
[   25.477512]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.477861]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.478232] ==================================================================
[   25.496517] ==================================================================
[   25.496848] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   25.497189] Read of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.497654] 
[   25.497774] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.497823] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.497836] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.497858] Call Trace:
[   25.497879]  <TASK>
[   25.497899]  dump_stack_lvl+0x73/0xb0
[   25.497926]  print_report+0xd1/0x650
[   25.497957]  ? __virt_addr_valid+0x1db/0x2d0
[   25.497980]  ? kasan_atomics_helper+0x4f98/0x5450
[   25.498001]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.498027]  ? kasan_atomics_helper+0x4f98/0x5450
[   25.498048]  kasan_report+0x141/0x180
[   25.498069]  ? kasan_atomics_helper+0x4f98/0x5450
[   25.498094]  __asan_report_load8_noabort+0x18/0x20
[   25.498124]  kasan_atomics_helper+0x4f98/0x5450
[   25.498146]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.498167]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.498191]  ? kasan_atomics+0x152/0x310
[   25.498217]  kasan_atomics+0x1dc/0x310
[   25.498239]  ? __pfx_kasan_atomics+0x10/0x10
[   25.498261]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.498283]  ? __pfx_read_tsc+0x10/0x10
[   25.498305]  ? ktime_get_ts64+0x86/0x230
[   25.498330]  kunit_try_run_case+0x1a5/0x480
[   25.498356]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.498381]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.498401]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.498427]  ? __kthread_parkme+0x82/0x180
[   25.498448]  ? preempt_count_sub+0x50/0x80
[   25.498471]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.498495]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.498519]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.498542]  kthread+0x337/0x6f0
[   25.498562]  ? trace_preempt_on+0x20/0xc0
[   25.498584]  ? __pfx_kthread+0x10/0x10
[   25.498605]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.498628]  ? calculate_sigpending+0x7b/0xa0
[   25.498652]  ? __pfx_kthread+0x10/0x10
[   25.498673]  ret_from_fork+0x116/0x1d0
[   25.498692]  ? __pfx_kthread+0x10/0x10
[   25.498712]  ret_from_fork_asm+0x1a/0x30
[   25.498742]  </TASK>
[   25.498754] 
[   25.505771] Allocated by task 294:
[   25.505903]  kasan_save_stack+0x45/0x70
[   25.506055]  kasan_save_track+0x18/0x40
[   25.506207]  kasan_save_alloc_info+0x3b/0x50
[   25.506351]  __kasan_kmalloc+0xb7/0xc0
[   25.506488]  __kmalloc_cache_noprof+0x189/0x420
[   25.506700]  kasan_atomics+0x95/0x310
[   25.506878]  kunit_try_run_case+0x1a5/0x480
[   25.507135]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.507389]  kthread+0x337/0x6f0
[   25.507553]  ret_from_fork+0x116/0x1d0
[   25.507748]  ret_from_fork_asm+0x1a/0x30
[   25.507983] 
[   25.508079] The buggy address belongs to the object at ffff8881039e9700
[   25.508079]  which belongs to the cache kmalloc-64 of size 64
[   25.508677] The buggy address is located 0 bytes to the right of
[   25.508677]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.509195] 
[   25.509265] The buggy address belongs to the physical page:
[   25.509433] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.509807] flags: 0x200000000000000(node=0|zone=2)
[   25.510047] page_type: f5(slab)
[   25.510241] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.510560] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.510861] page dumped because: kasan: bad access detected
[   25.511097] 
[   25.511229] Memory state around the buggy address:
[   25.511408]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.511698]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.512004] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.512347]                                      ^
[   25.512568]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.512853]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.513177] ==================================================================
[   24.434004] ==================================================================
[   24.434768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   24.435273] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.435858] 
[   24.436192] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.436260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.436275] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.436299] Call Trace:
[   24.436317]  <TASK>
[   24.436357]  dump_stack_lvl+0x73/0xb0
[   24.436387]  print_report+0xd1/0x650
[   24.436410]  ? __virt_addr_valid+0x1db/0x2d0
[   24.436434]  ? kasan_atomics_helper+0x697/0x5450
[   24.436455]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.436482]  ? kasan_atomics_helper+0x697/0x5450
[   24.436503]  kasan_report+0x141/0x180
[   24.436524]  ? kasan_atomics_helper+0x697/0x5450
[   24.436549]  kasan_check_range+0x10c/0x1c0
[   24.436572]  __kasan_check_write+0x18/0x20
[   24.436595]  kasan_atomics_helper+0x697/0x5450
[   24.436617]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.436639]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.436664]  ? kasan_atomics+0x152/0x310
[   24.436689]  kasan_atomics+0x1dc/0x310
[   24.436711]  ? __pfx_kasan_atomics+0x10/0x10
[   24.436733]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.436757]  ? __pfx_read_tsc+0x10/0x10
[   24.436780]  ? ktime_get_ts64+0x86/0x230
[   24.436847]  kunit_try_run_case+0x1a5/0x480
[   24.436877]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.436900]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.436932]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.436965]  ? __kthread_parkme+0x82/0x180
[   24.436986]  ? preempt_count_sub+0x50/0x80
[   24.437010]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.437034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.437058]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.437082]  kthread+0x337/0x6f0
[   24.437101]  ? trace_preempt_on+0x20/0xc0
[   24.437141]  ? __pfx_kthread+0x10/0x10
[   24.437161]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.437184]  ? calculate_sigpending+0x7b/0xa0
[   24.437208]  ? __pfx_kthread+0x10/0x10
[   24.437230]  ret_from_fork+0x116/0x1d0
[   24.437248]  ? __pfx_kthread+0x10/0x10
[   24.437269]  ret_from_fork_asm+0x1a/0x30
[   24.437299]  </TASK>
[   24.437311] 
[   24.450128] Allocated by task 294:
[   24.450596]  kasan_save_stack+0x45/0x70
[   24.451150]  kasan_save_track+0x18/0x40
[   24.451542]  kasan_save_alloc_info+0x3b/0x50
[   24.452016]  __kasan_kmalloc+0xb7/0xc0
[   24.452391]  __kmalloc_cache_noprof+0x189/0x420
[   24.452908]  kasan_atomics+0x95/0x310
[   24.453183]  kunit_try_run_case+0x1a5/0x480
[   24.453333]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.453497]  kthread+0x337/0x6f0
[   24.453609]  ret_from_fork+0x116/0x1d0
[   24.453729]  ret_from_fork_asm+0x1a/0x30
[   24.453889] 
[   24.453962] The buggy address belongs to the object at ffff8881039e9700
[   24.453962]  which belongs to the cache kmalloc-64 of size 64
[   24.454785] The buggy address is located 0 bytes to the right of
[   24.454785]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.455194] 
[   24.455303] The buggy address belongs to the physical page:
[   24.455672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.455993] flags: 0x200000000000000(node=0|zone=2)
[   24.456393] page_type: f5(slab)
[   24.456576] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.457035] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.457374] page dumped because: kasan: bad access detected
[   24.457649] 
[   24.457713] Memory state around the buggy address:
[   24.457972]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.458473]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.458739] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.458962]                                      ^
[   24.459218]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.459654]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.459988] ==================================================================
[   25.159193] ==================================================================
[   25.160187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   25.160714] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.161038] 
[   25.161149] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.161203] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.161217] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.161241] Call Trace:
[   25.161264]  <TASK>
[   25.161286]  dump_stack_lvl+0x73/0xb0
[   25.161315]  print_report+0xd1/0x650
[   25.161337]  ? __virt_addr_valid+0x1db/0x2d0
[   25.161360]  ? kasan_atomics_helper+0x16e7/0x5450
[   25.161382]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.161408]  ? kasan_atomics_helper+0x16e7/0x5450
[   25.161429]  kasan_report+0x141/0x180
[   25.161450]  ? kasan_atomics_helper+0x16e7/0x5450
[   25.161475]  kasan_check_range+0x10c/0x1c0
[   25.161499]  __kasan_check_write+0x18/0x20
[   25.161522]  kasan_atomics_helper+0x16e7/0x5450
[   25.161543]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.161565]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.161590]  ? kasan_atomics+0x152/0x310
[   25.161615]  kasan_atomics+0x1dc/0x310
[   25.161637]  ? __pfx_kasan_atomics+0x10/0x10
[   25.161658]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.161682]  ? __pfx_read_tsc+0x10/0x10
[   25.161704]  ? ktime_get_ts64+0x86/0x230
[   25.161730]  kunit_try_run_case+0x1a5/0x480
[   25.161758]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.161781]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.161802]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.161827]  ? __kthread_parkme+0x82/0x180
[   25.161848]  ? preempt_count_sub+0x50/0x80
[   25.161872]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.161896]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.161920]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.161957]  kthread+0x337/0x6f0
[   25.161977]  ? trace_preempt_on+0x20/0xc0
[   25.162000]  ? __pfx_kthread+0x10/0x10
[   25.162020]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.162044]  ? calculate_sigpending+0x7b/0xa0
[   25.162068]  ? __pfx_kthread+0x10/0x10
[   25.162089]  ret_from_fork+0x116/0x1d0
[   25.162108]  ? __pfx_kthread+0x10/0x10
[   25.162129]  ret_from_fork_asm+0x1a/0x30
[   25.162160]  </TASK>
[   25.162171] 
[   25.173345] Allocated by task 294:
[   25.173780]  kasan_save_stack+0x45/0x70
[   25.173985]  kasan_save_track+0x18/0x40
[   25.174511]  kasan_save_alloc_info+0x3b/0x50
[   25.174730]  __kasan_kmalloc+0xb7/0xc0
[   25.174901]  __kmalloc_cache_noprof+0x189/0x420
[   25.175141]  kasan_atomics+0x95/0x310
[   25.175545]  kunit_try_run_case+0x1a5/0x480
[   25.175845]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.176150]  kthread+0x337/0x6f0
[   25.176285]  ret_from_fork+0x116/0x1d0
[   25.176609]  ret_from_fork_asm+0x1a/0x30
[   25.176763] 
[   25.176955] The buggy address belongs to the object at ffff8881039e9700
[   25.176955]  which belongs to the cache kmalloc-64 of size 64
[   25.177654] The buggy address is located 0 bytes to the right of
[   25.177654]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.178333] 
[   25.178572] The buggy address belongs to the physical page:
[   25.178761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.179264] flags: 0x200000000000000(node=0|zone=2)
[   25.179571] page_type: f5(slab)
[   25.179748] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.180283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.181025] page dumped because: kasan: bad access detected
[   25.181399] 
[   25.181483] Memory state around the buggy address:
[   25.181830]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.182244]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.182450] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.182648]                                      ^
[   25.182794]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.183012]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.183350] ==================================================================
[   25.374254] ==================================================================
[   25.374573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   25.374948] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.375309] 
[   25.375417] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.375467] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.375481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.375503] Call Trace:
[   25.375525]  <TASK>
[   25.375545]  dump_stack_lvl+0x73/0xb0
[   25.375572]  print_report+0xd1/0x650
[   25.375593]  ? __virt_addr_valid+0x1db/0x2d0
[   25.375618]  ? kasan_atomics_helper+0x1ce1/0x5450
[   25.375638]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.375663]  ? kasan_atomics_helper+0x1ce1/0x5450
[   25.375684]  kasan_report+0x141/0x180
[   25.375705]  ? kasan_atomics_helper+0x1ce1/0x5450
[   25.375730]  kasan_check_range+0x10c/0x1c0
[   25.375754]  __kasan_check_write+0x18/0x20
[   25.375776]  kasan_atomics_helper+0x1ce1/0x5450
[   25.375798]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.375820]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.375845]  ? kasan_atomics+0x152/0x310
[   25.375871]  kasan_atomics+0x1dc/0x310
[   25.375896]  ? __pfx_kasan_atomics+0x10/0x10
[   25.375918]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.375957]  ? __pfx_read_tsc+0x10/0x10
[   25.375980]  ? ktime_get_ts64+0x86/0x230
[   25.376006]  kunit_try_run_case+0x1a5/0x480
[   25.376035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.376058]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.376079]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.376104]  ? __kthread_parkme+0x82/0x180
[   25.376137]  ? preempt_count_sub+0x50/0x80
[   25.376161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.376185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.376209]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.376232]  kthread+0x337/0x6f0
[   25.376254]  ? trace_preempt_on+0x20/0xc0
[   25.376278]  ? __pfx_kthread+0x10/0x10
[   25.376298]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.376321]  ? calculate_sigpending+0x7b/0xa0
[   25.376351]  ? __pfx_kthread+0x10/0x10
[   25.376373]  ret_from_fork+0x116/0x1d0
[   25.376391]  ? __pfx_kthread+0x10/0x10
[   25.376411]  ret_from_fork_asm+0x1a/0x30
[   25.376442]  </TASK>
[   25.376454] 
[   25.383580] Allocated by task 294:
[   25.383718]  kasan_save_stack+0x45/0x70
[   25.383899]  kasan_save_track+0x18/0x40
[   25.384092]  kasan_save_alloc_info+0x3b/0x50
[   25.384290]  __kasan_kmalloc+0xb7/0xc0
[   25.384475]  __kmalloc_cache_noprof+0x189/0x420
[   25.384659]  kasan_atomics+0x95/0x310
[   25.384783]  kunit_try_run_case+0x1a5/0x480
[   25.384922]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.385098]  kthread+0x337/0x6f0
[   25.385218]  ret_from_fork+0x116/0x1d0
[   25.385407]  ret_from_fork_asm+0x1a/0x30
[   25.385595] 
[   25.385685] The buggy address belongs to the object at ffff8881039e9700
[   25.385685]  which belongs to the cache kmalloc-64 of size 64
[   25.386324] The buggy address is located 0 bytes to the right of
[   25.386324]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.386872] 
[   25.386972] The buggy address belongs to the physical page:
[   25.387209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.387491] flags: 0x200000000000000(node=0|zone=2)
[   25.387650] page_type: f5(slab)
[   25.387814] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.388185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.388491] page dumped because: kasan: bad access detected
[   25.388692] 
[   25.388779] Memory state around the buggy address:
[   25.388978]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.389187]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.389393] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.389596]                                      ^
[   25.389742]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.390045]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.390346] ==================================================================
[   24.335240] ==================================================================
[   24.335552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   24.335889] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.336380] 
[   24.336494] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.336559] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.336578] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.336602] Call Trace:
[   24.336624]  <TASK>
[   24.336655]  dump_stack_lvl+0x73/0xb0
[   24.336687]  print_report+0xd1/0x650
[   24.336710]  ? __virt_addr_valid+0x1db/0x2d0
[   24.336745]  ? kasan_atomics_helper+0x4a0/0x5450
[   24.336766]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.336793]  ? kasan_atomics_helper+0x4a0/0x5450
[   24.336826]  kasan_report+0x141/0x180
[   24.336849]  ? kasan_atomics_helper+0x4a0/0x5450
[   24.336874]  kasan_check_range+0x10c/0x1c0
[   24.336897]  __kasan_check_write+0x18/0x20
[   24.336920]  kasan_atomics_helper+0x4a0/0x5450
[   24.336951]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.336973]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.336998]  ? kasan_atomics+0x152/0x310
[   24.337023]  kasan_atomics+0x1dc/0x310
[   24.337102]  ? __pfx_kasan_atomics+0x10/0x10
[   24.337137]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.337162]  ? __pfx_read_tsc+0x10/0x10
[   24.337185]  ? ktime_get_ts64+0x86/0x230
[   24.337211]  kunit_try_run_case+0x1a5/0x480
[   24.337237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.337260]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.337281]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.337315]  ? __kthread_parkme+0x82/0x180
[   24.337337]  ? preempt_count_sub+0x50/0x80
[   24.337362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.337386]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.337410]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.337442]  kthread+0x337/0x6f0
[   24.337462]  ? trace_preempt_on+0x20/0xc0
[   24.337485]  ? __pfx_kthread+0x10/0x10
[   24.337515]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.337539]  ? calculate_sigpending+0x7b/0xa0
[   24.337571]  ? __pfx_kthread+0x10/0x10
[   24.337592]  ret_from_fork+0x116/0x1d0
[   24.337611]  ? __pfx_kthread+0x10/0x10
[   24.337632]  ret_from_fork_asm+0x1a/0x30
[   24.337671]  </TASK>
[   24.337683] 
[   24.346831] Allocated by task 294:
[   24.347021]  kasan_save_stack+0x45/0x70
[   24.347369]  kasan_save_track+0x18/0x40
[   24.347620]  kasan_save_alloc_info+0x3b/0x50
[   24.347830]  __kasan_kmalloc+0xb7/0xc0
[   24.348116]  __kmalloc_cache_noprof+0x189/0x420
[   24.348412]  kasan_atomics+0x95/0x310
[   24.348548]  kunit_try_run_case+0x1a5/0x480
[   24.348770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.349021]  kthread+0x337/0x6f0
[   24.349173]  ret_from_fork+0x116/0x1d0
[   24.349436]  ret_from_fork_asm+0x1a/0x30
[   24.349655] 
[   24.349747] The buggy address belongs to the object at ffff8881039e9700
[   24.349747]  which belongs to the cache kmalloc-64 of size 64
[   24.350152] The buggy address is located 0 bytes to the right of
[   24.350152]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.351009] 
[   24.351128] The buggy address belongs to the physical page:
[   24.351377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.351710] flags: 0x200000000000000(node=0|zone=2)
[   24.352090] page_type: f5(slab)
[   24.352281] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.352588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.352810] page dumped because: kasan: bad access detected
[   24.353127] 
[   24.353253] Memory state around the buggy address:
[   24.353480]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.353920]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.354506] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.354889]                                      ^
[   24.355137]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.355385]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.355707] ==================================================================
[   25.005574] ==================================================================
[   25.006170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   25.006408] Read of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.006714] 
[   25.006846] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.006894] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.006908] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.006930] Call Trace:
[   25.006961]  <TASK>
[   25.006981]  dump_stack_lvl+0x73/0xb0
[   25.007008]  print_report+0xd1/0x650
[   25.007030]  ? __virt_addr_valid+0x1db/0x2d0
[   25.007053]  ? kasan_atomics_helper+0x49ce/0x5450
[   25.007074]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.007099]  ? kasan_atomics_helper+0x49ce/0x5450
[   25.007130]  kasan_report+0x141/0x180
[   25.007152]  ? kasan_atomics_helper+0x49ce/0x5450
[   25.007177]  __asan_report_load4_noabort+0x18/0x20
[   25.007201]  kasan_atomics_helper+0x49ce/0x5450
[   25.007222]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.007243]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.007267]  ? kasan_atomics+0x152/0x310
[   25.007292]  kasan_atomics+0x1dc/0x310
[   25.007314]  ? __pfx_kasan_atomics+0x10/0x10
[   25.007335]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.007369]  ? __pfx_read_tsc+0x10/0x10
[   25.007390]  ? ktime_get_ts64+0x86/0x230
[   25.007426]  kunit_try_run_case+0x1a5/0x480
[   25.007453]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.007476]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.007496]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.007521]  ? __kthread_parkme+0x82/0x180
[   25.007542]  ? preempt_count_sub+0x50/0x80
[   25.007566]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.007598]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.007622]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.007647]  kthread+0x337/0x6f0
[   25.007681]  ? trace_preempt_on+0x20/0xc0
[   25.007705]  ? __pfx_kthread+0x10/0x10
[   25.007726]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.007749]  ? calculate_sigpending+0x7b/0xa0
[   25.007774]  ? __pfx_kthread+0x10/0x10
[   25.007796]  ret_from_fork+0x116/0x1d0
[   25.007815]  ? __pfx_kthread+0x10/0x10
[   25.007835]  ret_from_fork_asm+0x1a/0x30
[   25.007865]  </TASK>
[   25.007876] 
[   25.015458] Allocated by task 294:
[   25.015627]  kasan_save_stack+0x45/0x70
[   25.015803]  kasan_save_track+0x18/0x40
[   25.015992]  kasan_save_alloc_info+0x3b/0x50
[   25.016227]  __kasan_kmalloc+0xb7/0xc0
[   25.016394]  __kmalloc_cache_noprof+0x189/0x420
[   25.016611]  kasan_atomics+0x95/0x310
[   25.016767]  kunit_try_run_case+0x1a5/0x480
[   25.016908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.017081]  kthread+0x337/0x6f0
[   25.017238]  ret_from_fork+0x116/0x1d0
[   25.017415]  ret_from_fork_asm+0x1a/0x30
[   25.017626] 
[   25.017714] The buggy address belongs to the object at ffff8881039e9700
[   25.017714]  which belongs to the cache kmalloc-64 of size 64
[   25.018138] The buggy address is located 0 bytes to the right of
[   25.018138]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.018656] 
[   25.018758] The buggy address belongs to the physical page:
[   25.018981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.019212] flags: 0x200000000000000(node=0|zone=2)
[   25.019367] page_type: f5(slab)
[   25.019481] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.019701] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.019918] page dumped because: kasan: bad access detected
[   25.020168] 
[   25.020253] Memory state around the buggy address:
[   25.020475]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.020791]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.021111] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.021447]                                      ^
[   25.021660]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.021975]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.022307] ==================================================================
[   25.596036] ==================================================================
[   25.596981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   25.597509] Write of size 8 at addr ffff8881039e9730 by task kunit_try_catch/294
[   25.598047] 
[   25.598286] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   25.598457] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.598478] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.598502] Call Trace:
[   25.598535]  <TASK>
[   25.598556]  dump_stack_lvl+0x73/0xb0
[   25.598586]  print_report+0xd1/0x650
[   25.598651]  ? __virt_addr_valid+0x1db/0x2d0
[   25.598675]  ? kasan_atomics_helper+0x224c/0x5450
[   25.598696]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.598722]  ? kasan_atomics_helper+0x224c/0x5450
[   25.598744]  kasan_report+0x141/0x180
[   25.598767]  ? kasan_atomics_helper+0x224c/0x5450
[   25.598792]  kasan_check_range+0x10c/0x1c0
[   25.598815]  __kasan_check_write+0x18/0x20
[   25.598838]  kasan_atomics_helper+0x224c/0x5450
[   25.598860]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.598881]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.598905]  ? kasan_atomics+0x152/0x310
[   25.598931]  kasan_atomics+0x1dc/0x310
[   25.598964]  ? __pfx_kasan_atomics+0x10/0x10
[   25.598986]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.599010]  ? __pfx_read_tsc+0x10/0x10
[   25.599032]  ? ktime_get_ts64+0x86/0x230
[   25.599058]  kunit_try_run_case+0x1a5/0x480
[   25.599085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.599129]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.599151]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.599176]  ? __kthread_parkme+0x82/0x180
[   25.599197]  ? preempt_count_sub+0x50/0x80
[   25.599220]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.599246]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.599269]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.599295]  kthread+0x337/0x6f0
[   25.599317]  ? trace_preempt_on+0x20/0xc0
[   25.599341]  ? __pfx_kthread+0x10/0x10
[   25.599361]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.599385]  ? calculate_sigpending+0x7b/0xa0
[   25.599409]  ? __pfx_kthread+0x10/0x10
[   25.599430]  ret_from_fork+0x116/0x1d0
[   25.599450]  ? __pfx_kthread+0x10/0x10
[   25.599471]  ret_from_fork_asm+0x1a/0x30
[   25.599502]  </TASK>
[   25.599514] 
[   25.607073] Allocated by task 294:
[   25.607295]  kasan_save_stack+0x45/0x70
[   25.607485]  kasan_save_track+0x18/0x40
[   25.607681]  kasan_save_alloc_info+0x3b/0x50
[   25.607835]  __kasan_kmalloc+0xb7/0xc0
[   25.607976]  __kmalloc_cache_noprof+0x189/0x420
[   25.608233]  kasan_atomics+0x95/0x310
[   25.608418]  kunit_try_run_case+0x1a5/0x480
[   25.608616]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.608803]  kthread+0x337/0x6f0
[   25.608949]  ret_from_fork+0x116/0x1d0
[   25.609156]  ret_from_fork_asm+0x1a/0x30
[   25.609360] 
[   25.609449] The buggy address belongs to the object at ffff8881039e9700
[   25.609449]  which belongs to the cache kmalloc-64 of size 64
[   25.609887] The buggy address is located 0 bytes to the right of
[   25.609887]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   25.610283] 
[   25.610358] The buggy address belongs to the physical page:
[   25.610601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   25.610970] flags: 0x200000000000000(node=0|zone=2)
[   25.611220] page_type: f5(slab)
[   25.611383] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.611633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.611852] page dumped because: kasan: bad access detected
[   25.612051] 
[   25.612163] Memory state around the buggy address:
[   25.612411]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.612746]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.613067] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.613401]                                      ^
[   25.613608]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.613891]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.614227] ==================================================================
[   24.730996] ==================================================================
[   24.731586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   24.731963] Write of size 4 at addr ffff8881039e9730 by task kunit_try_catch/294
[   24.732420] 
[   24.732552] CPU: 1 UID: 0 PID: 294 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc3-next-20250625 #1 PREEMPT(voluntary) 
[   24.732604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.732619] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.732642] Call Trace:
[   24.732665]  <TASK>
[   24.732686]  dump_stack_lvl+0x73/0xb0
[   24.732713]  print_report+0xd1/0x650
[   24.732736]  ? __virt_addr_valid+0x1db/0x2d0
[   24.732760]  ? kasan_atomics_helper+0xd47/0x5450
[   24.732781]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.732807]  ? kasan_atomics_helper+0xd47/0x5450
[   24.732827]  kasan_report+0x141/0x180
[   24.732849]  ? kasan_atomics_helper+0xd47/0x5450
[   24.732874]  kasan_check_range+0x10c/0x1c0
[   24.732897]  __kasan_check_write+0x18/0x20
[   24.732919]  kasan_atomics_helper+0xd47/0x5450
[   24.732953]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   24.732974]  ? __kmalloc_cache_noprof+0x189/0x420
[   24.732999]  ? kasan_atomics+0x152/0x310
[   24.733024]  kasan_atomics+0x1dc/0x310
[   24.733046]  ? __pfx_kasan_atomics+0x10/0x10
[   24.733067]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   24.733091]  ? __pfx_read_tsc+0x10/0x10
[   24.733113]  ? ktime_get_ts64+0x86/0x230
[   24.733139]  kunit_try_run_case+0x1a5/0x480
[   24.733166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.733189]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   24.733210]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.733235]  ? __kthread_parkme+0x82/0x180
[   24.733255]  ? preempt_count_sub+0x50/0x80
[   24.733279]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.733303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.733326]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.733350]  kthread+0x337/0x6f0
[   24.733378]  ? trace_preempt_on+0x20/0xc0
[   24.733402]  ? __pfx_kthread+0x10/0x10
[   24.733422]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.733444]  ? calculate_sigpending+0x7b/0xa0
[   24.733468]  ? __pfx_kthread+0x10/0x10
[   24.733489]  ret_from_fork+0x116/0x1d0
[   24.733508]  ? __pfx_kthread+0x10/0x10
[   24.733529]  ret_from_fork_asm+0x1a/0x30
[   24.733559]  </TASK>
[   24.733570] 
[   24.740566] Allocated by task 294:
[   24.740762]  kasan_save_stack+0x45/0x70
[   24.740930]  kasan_save_track+0x18/0x40
[   24.741074]  kasan_save_alloc_info+0x3b/0x50
[   24.741468]  __kasan_kmalloc+0xb7/0xc0
[   24.741644]  __kmalloc_cache_noprof+0x189/0x420
[   24.741853]  kasan_atomics+0x95/0x310
[   24.741991]  kunit_try_run_case+0x1a5/0x480
[   24.742153]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.742356]  kthread+0x337/0x6f0
[   24.742523]  ret_from_fork+0x116/0x1d0
[   24.742683]  ret_from_fork_asm+0x1a/0x30
[   24.742851] 
[   24.742920] The buggy address belongs to the object at ffff8881039e9700
[   24.742920]  which belongs to the cache kmalloc-64 of size 64
[   24.743517] The buggy address is located 0 bytes to the right of
[   24.743517]  allocated 48-byte region [ffff8881039e9700, ffff8881039e9730)
[   24.743982] 
[   24.744078] The buggy address belongs to the physical page:
[   24.744304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1039e9
[   24.744617] flags: 0x200000000000000(node=0|zone=2)
[   24.744823] page_type: f5(slab)
[   24.744972] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   24.745279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   24.745552] page dumped because: kasan: bad access detected
[   24.745758] 
[   24.745840] Memory state around the buggy address:
[   24.746044]  ffff8881039e9600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.746351]  ffff8881039e9680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   24.746560] >ffff8881039e9700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   24.746763]                                      ^
[   24.746912]  ffff8881039e9780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.747127]  ffff8881039e9800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.747387] ==================================================================