Hay
Date
July 2, 2025, 11:10 a.m.

Environment
qemu-arm64
qemu-x86_64

[   33.677306] ==================================================================
[   33.677358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   33.677853] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.677921] 
[   33.677981] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.678072] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.678220] Hardware name: linux,dummy-virt (DT)
[   33.678257] Call trace:
[   33.678282]  show_stack+0x20/0x38 (C)
[   33.678333]  dump_stack_lvl+0x8c/0xd0
[   33.678718]  print_report+0x118/0x608
[   33.678970]  kasan_report+0xdc/0x128
[   33.679036]  kasan_check_range+0x100/0x1a8
[   33.679189]  __kasan_check_write+0x20/0x30
[   33.679252]  kasan_atomics_helper+0xf20/0x4858
[   33.679554]  kasan_atomics+0x198/0x2e0
[   33.680025]  kunit_try_run_case+0x170/0x3f0
[   33.680112]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.680171]  kthread+0x328/0x630
[   33.680215]  ret_from_fork+0x10/0x20
[   33.680543] 
[   33.680754] Allocated by task 298:
[   33.680910]  kasan_save_stack+0x3c/0x68
[   33.681017]  kasan_save_track+0x20/0x40
[   33.681165]  kasan_save_alloc_info+0x40/0x58
[   33.681458]  __kasan_kmalloc+0xd4/0xd8
[   33.681632]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.681856]  kasan_atomics+0xb8/0x2e0
[   33.681941]  kunit_try_run_case+0x170/0x3f0
[   33.681999]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.682283]  kthread+0x328/0x630
[   33.682354]  ret_from_fork+0x10/0x20
[   33.682407] 
[   33.682442] The buggy address belongs to the object at fff00000c8dc1a80
[   33.682442]  which belongs to the cache kmalloc-64 of size 64
[   33.682506] The buggy address is located 0 bytes to the right of
[   33.682506]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.682582] 
[   33.682613] The buggy address belongs to the physical page:
[   33.682655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.682713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.682781] page_type: f5(slab)
[   33.682834] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.682897] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.682951] page dumped because: kasan: bad access detected
[   33.682996] 
[   33.683026] Memory state around the buggy address:
[   33.683060]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.683105]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.683161] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.683217]                                      ^
[   33.683251]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.683305]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.683345] ==================================================================
[   33.860466] ==================================================================
[   33.860541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   33.860594] Read of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.860800] 
[   33.860869] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.861094] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.861220] Hardware name: linux,dummy-virt (DT)
[   33.861258] Call trace:
[   33.861284]  show_stack+0x20/0x38 (C)
[   33.861340]  dump_stack_lvl+0x8c/0xd0
[   33.861399]  print_report+0x118/0x608
[   33.861606]  kasan_report+0xdc/0x128
[   33.861785]  __asan_report_load8_noabort+0x20/0x30
[   33.861981]  kasan_atomics_helper+0x3e20/0x4858
[   33.862184]  kasan_atomics+0x198/0x2e0
[   33.862247]  kunit_try_run_case+0x170/0x3f0
[   33.862368]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.862458]  kthread+0x328/0x630
[   33.862523]  ret_from_fork+0x10/0x20
[   33.862577] 
[   33.862767] Allocated by task 298:
[   33.862812]  kasan_save_stack+0x3c/0x68
[   33.863070]  kasan_save_track+0x20/0x40
[   33.863309]  kasan_save_alloc_info+0x40/0x58
[   33.863484]  __kasan_kmalloc+0xd4/0xd8
[   33.863538]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.863653]  kasan_atomics+0xb8/0x2e0
[   33.864035]  kunit_try_run_case+0x170/0x3f0
[   33.864116]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.864303]  kthread+0x328/0x630
[   33.864414]  ret_from_fork+0x10/0x20
[   33.864555] 
[   33.864579] The buggy address belongs to the object at fff00000c8dc1a80
[   33.864579]  which belongs to the cache kmalloc-64 of size 64
[   33.864642] The buggy address is located 0 bytes to the right of
[   33.864642]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.864711] 
[   33.864956] The buggy address belongs to the physical page:
[   33.865278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.865406] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.865613] page_type: f5(slab)
[   33.865672] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.865727] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.866275] page dumped because: kasan: bad access detected
[   33.866362] 
[   33.866535] Memory state around the buggy address:
[   33.866609]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.866714]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.866779] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.866836]                                      ^
[   33.867088]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.867168]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.867430] ==================================================================
[   33.795000] ==================================================================
[   33.795064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   33.795255] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.795321] 
[   33.795483] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.795614] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.795733] Hardware name: linux,dummy-virt (DT)
[   33.795778] Call trace:
[   33.795820]  show_stack+0x20/0x38 (C)
[   33.795895]  dump_stack_lvl+0x8c/0xd0
[   33.796136]  print_report+0x118/0x608
[   33.796356]  kasan_report+0xdc/0x128
[   33.796446]  kasan_check_range+0x100/0x1a8
[   33.796725]  __kasan_check_write+0x20/0x30
[   33.796851]  kasan_atomics_helper+0x154c/0x4858
[   33.797263]  kasan_atomics+0x198/0x2e0
[   33.797449]  kunit_try_run_case+0x170/0x3f0
[   33.797549]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.797789]  kthread+0x328/0x630
[   33.798204]  ret_from_fork+0x10/0x20
[   33.798419] 
[   33.798449] Allocated by task 298:
[   33.798490]  kasan_save_stack+0x3c/0x68
[   33.798694]  kasan_save_track+0x20/0x40
[   33.798818]  kasan_save_alloc_info+0x40/0x58
[   33.798979]  __kasan_kmalloc+0xd4/0xd8
[   33.799209]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.799312]  kasan_atomics+0xb8/0x2e0
[   33.799400]  kunit_try_run_case+0x170/0x3f0
[   33.799802]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.800018]  kthread+0x328/0x630
[   33.800212]  ret_from_fork+0x10/0x20
[   33.800261] 
[   33.800285] The buggy address belongs to the object at fff00000c8dc1a80
[   33.800285]  which belongs to the cache kmalloc-64 of size 64
[   33.800346] The buggy address is located 0 bytes to the right of
[   33.800346]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.800414] 
[   33.800867] The buggy address belongs to the physical page:
[   33.801124] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.801228] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.801351] page_type: f5(slab)
[   33.801404] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.801472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.801525] page dumped because: kasan: bad access detected
[   33.801561] 
[   33.801591] Memory state around the buggy address:
[   33.801626]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.801674]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.801720] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.801767]                                      ^
[   33.801806]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.801862]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.801909] ==================================================================
[   33.635019] ==================================================================
[   33.635088] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   33.635261] Read of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.635380] 
[   33.635419] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.635658] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.635862] Hardware name: linux,dummy-virt (DT)
[   33.635953] Call trace:
[   33.636098]  show_stack+0x20/0x38 (C)
[   33.636158]  dump_stack_lvl+0x8c/0xd0
[   33.636319]  print_report+0x118/0x608
[   33.636428]  kasan_report+0xdc/0x128
[   33.636672]  kasan_check_range+0x100/0x1a8
[   33.636969]  __kasan_check_read+0x20/0x30
[   33.637321]  kasan_atomics_helper+0xdd4/0x4858
[   33.637644]  kasan_atomics+0x198/0x2e0
[   33.637821]  kunit_try_run_case+0x170/0x3f0
[   33.637920]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.638139]  kthread+0x328/0x630
[   33.638520]  ret_from_fork+0x10/0x20
[   33.638688] 
[   33.638856] Allocated by task 298:
[   33.638889]  kasan_save_stack+0x3c/0x68
[   33.639127]  kasan_save_track+0x20/0x40
[   33.639195]  kasan_save_alloc_info+0x40/0x58
[   33.639301]  __kasan_kmalloc+0xd4/0xd8
[   33.639345]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.639475]  kasan_atomics+0xb8/0x2e0
[   33.639534]  kunit_try_run_case+0x170/0x3f0
[   33.639719]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.639892]  kthread+0x328/0x630
[   33.640097]  ret_from_fork+0x10/0x20
[   33.640359] 
[   33.640491] The buggy address belongs to the object at fff00000c8dc1a80
[   33.640491]  which belongs to the cache kmalloc-64 of size 64
[   33.640556] The buggy address is located 0 bytes to the right of
[   33.640556]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.640624] 
[   33.640647] The buggy address belongs to the physical page:
[   33.640885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.640972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.641377] page_type: f5(slab)
[   33.641466] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.641554] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.641688] page dumped because: kasan: bad access detected
[   33.641782] 
[   33.641827] Memory state around the buggy address:
[   33.641863]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.642230]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.642322] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.642531]                                      ^
[   33.642665]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.642917]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.643030] ==================================================================
[   33.709084] ==================================================================
[   33.709140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   33.709195] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.709709] 
[   33.709811] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.709969] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.710042] Hardware name: linux,dummy-virt (DT)
[   33.710089] Call trace:
[   33.710114]  show_stack+0x20/0x38 (C)
[   33.710309]  dump_stack_lvl+0x8c/0xd0
[   33.710486]  print_report+0x118/0x608
[   33.710681]  kasan_report+0xdc/0x128
[   33.710776]  kasan_check_range+0x100/0x1a8
[   33.710952]  __kasan_check_write+0x20/0x30
[   33.711015]  kasan_atomics_helper+0x10c0/0x4858
[   33.711071]  kasan_atomics+0x198/0x2e0
[   33.711176]  kunit_try_run_case+0x170/0x3f0
[   33.711234]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.711311]  kthread+0x328/0x630
[   33.711502]  ret_from_fork+0x10/0x20
[   33.711709] 
[   33.711942] Allocated by task 298:
[   33.711993]  kasan_save_stack+0x3c/0x68
[   33.712160]  kasan_save_track+0x20/0x40
[   33.712345]  kasan_save_alloc_info+0x40/0x58
[   33.712451]  __kasan_kmalloc+0xd4/0xd8
[   33.712646]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.712718]  kasan_atomics+0xb8/0x2e0
[   33.712912]  kunit_try_run_case+0x170/0x3f0
[   33.713018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.713169]  kthread+0x328/0x630
[   33.713234]  ret_from_fork+0x10/0x20
[   33.713587] 
[   33.713682] The buggy address belongs to the object at fff00000c8dc1a80
[   33.713682]  which belongs to the cache kmalloc-64 of size 64
[   33.713750] The buggy address is located 0 bytes to the right of
[   33.713750]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.713837] 
[   33.713878] The buggy address belongs to the physical page:
[   33.713914] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.713985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.714035] page_type: f5(slab)
[   33.714084] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.714137] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.714182] page dumped because: kasan: bad access detected
[   33.714215] 
[   33.714238] Memory state around the buggy address:
[   33.714278]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.714324]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.714376] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.714417]                                      ^
[   33.714461]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.714507]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.714556] ==================================================================
[   33.509146] ==================================================================
[   33.509204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   33.509642] Read of size 4 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.509726] 
[   33.509763] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.509897] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.509950] Hardware name: linux,dummy-virt (DT)
[   33.509987] Call trace:
[   33.510117]  show_stack+0x20/0x38 (C)
[   33.510329]  dump_stack_lvl+0x8c/0xd0
[   33.510511]  print_report+0x118/0x608
[   33.510575]  kasan_report+0xdc/0x128
[   33.510761]  __asan_report_load4_noabort+0x20/0x30
[   33.511052]  kasan_atomics_helper+0x42d8/0x4858
[   33.511326]  kasan_atomics+0x198/0x2e0
[   33.511491]  kunit_try_run_case+0x170/0x3f0
[   33.511801]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.511989]  kthread+0x328/0x630
[   33.512136]  ret_from_fork+0x10/0x20
[   33.512259] 
[   33.512283] Allocated by task 298:
[   33.512457]  kasan_save_stack+0x3c/0x68
[   33.512638]  kasan_save_track+0x20/0x40
[   33.512717]  kasan_save_alloc_info+0x40/0x58
[   33.512848]  __kasan_kmalloc+0xd4/0xd8
[   33.512893]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.513087]  kasan_atomics+0xb8/0x2e0
[   33.513232]  kunit_try_run_case+0x170/0x3f0
[   33.513430]  kthread+0x328/0x630
[   33.514402] The buggy address belongs to the physical page:
[   33.514586] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.516321] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.518250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858
[   33.519794]  __kasan_check_write+0x20/0x30
[   33.521090]  kasan_save_track+0x20/0x40
[   33.521170]  __kasan_kmalloc+0xd4/0xd8
[   33.521210]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.521264]  kasan_atomics+0xb8/0x2e0
[   33.521313]  kunit_try_run_case+0x170/0x3f0
[   33.521356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.521404]  kthread+0x328/0x630
[   33.521458]  ret_from_fork+0x10/0x20
[   33.521501] 
[   33.521538] The buggy address belongs to the object at fff00000c8dc1a80
[   33.521538]  which belongs to the cache kmalloc-64 of size 64
[   33.521600] The buggy address is located 0 bytes to the right of
[   33.521600]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.521689] 
[   33.521713] The buggy address belongs to the physical page:
[   33.521755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.521813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.521875] page_type: f5(slab)
[   33.521942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.522006] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.522050] page dumped because: kasan: bad access detected
[   33.522086] 
[   33.522113] Memory state around the buggy address:
[   33.522158]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.522204]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.522249] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.522291]                                      ^
[   33.522336]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.522390]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.522441] ==================================================================
[   33.826200] ==================================================================
[   33.826250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   33.826569] Read of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.826885] 
[   33.826953] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.827052] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.827271] Hardware name: linux,dummy-virt (DT)
[   33.827340] Call trace:
[   33.827368]  show_stack+0x20/0x38 (C)
[   33.827425]  dump_stack_lvl+0x8c/0xd0
[   33.827477]  print_report+0x118/0x608
[   33.827526]  kasan_report+0xdc/0x128
[   33.827896]  __asan_report_load8_noabort+0x20/0x30
[   33.828179]  kasan_atomics_helper+0x3df4/0x4858
[   33.828411]  kasan_atomics+0x198/0x2e0
[   33.828523]  kunit_try_run_case+0x170/0x3f0
[   33.828600]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.828916]  kthread+0x328/0x630
[   33.829129]  ret_from_fork+0x10/0x20
[   33.829392] 
[   33.829533] Allocated by task 298:
[   33.829746]  kasan_save_stack+0x3c/0x68
[   33.830202]  kasan_save_track+0x20/0x40
[   33.830649]  kasan_save_alloc_info+0x40/0x58
[   33.830946]  __kasan_kmalloc+0xd4/0xd8
[   33.831147]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.831367]  kasan_atomics+0xb8/0x2e0
[   33.831625]  kunit_try_run_case+0x170/0x3f0
[   33.831806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.832012]  kthread+0x328/0x630
[   33.832155]  ret_from_fork+0x10/0x20
[   33.832305] 
[   33.832438] The buggy address belongs to the object at fff00000c8dc1a80
[   33.832438]  which belongs to the cache kmalloc-64 of size 64
[   33.832551] The buggy address is located 0 bytes to the right of
[   33.832551]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.832908] 
[   33.832949] The buggy address belongs to the physical page:
[   33.832984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.833443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.833663] page_type: f5(slab)
[   33.833710] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.833822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.833898] page dumped because: kasan: bad access detected
[   33.833954] 
[   33.833985] Memory state around the buggy address:
[   33.834019]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.834066]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.834121] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.834178]                                      ^
[   33.834229]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.834280]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.834343] ==================================================================
[   33.650481] ==================================================================
[   33.650536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   33.650708] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.650789] 
[   33.650865] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.651396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.651658] Hardware name: linux,dummy-virt (DT)
[   33.651696] Call trace:
[   33.651722]  show_stack+0x20/0x38 (C)
[   33.651777]  dump_stack_lvl+0x8c/0xd0
[   33.652057]  print_report+0x118/0x608
[   33.652403]  kasan_report+0xdc/0x128
[   33.652493]  kasan_check_range+0x100/0x1a8
[   33.652825]  __kasan_check_write+0x20/0x30
[   33.652943]  kasan_atomics_helper+0xe44/0x4858
[   33.652996]  kasan_atomics+0x198/0x2e0
[   33.653290]  kunit_try_run_case+0x170/0x3f0
[   33.653721]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.654031]  kthread+0x328/0x630
[   33.654268]  ret_from_fork+0x10/0x20
[   33.654354] 
[   33.654697] Allocated by task 298:
[   33.654786]  kasan_save_stack+0x3c/0x68
[   33.655046]  kasan_save_track+0x20/0x40
[   33.655698]  kasan_save_alloc_info+0x40/0x58
[   33.656025]  __kasan_kmalloc+0xd4/0xd8
[   33.656163]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.656283]  kasan_atomics+0xb8/0x2e0
[   33.656327]  kunit_try_run_case+0x170/0x3f0
[   33.656379]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.656434]  kthread+0x328/0x630
[   33.656657]  ret_from_fork+0x10/0x20
[   33.656860] 
[   33.656997] The buggy address belongs to the object at fff00000c8dc1a80
[   33.656997]  which belongs to the cache kmalloc-64 of size 64
[   33.657184] The buggy address is located 0 bytes to the right of
[   33.657184]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.657261] 
[   33.657503] The buggy address belongs to the physical page:
[   33.657725] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.658333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.658593] page_type: f5(slab)
[   33.658650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.658832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.659030] page dumped because: kasan: bad access detected
[   33.659077] 
[   33.659125] Memory state around the buggy address:
[   33.659512]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.659620]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.659852] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.660053]                                      ^
[   33.660401]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.660485]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.660744] ==================================================================
[   33.732071] ==================================================================
[   33.732230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   33.732287] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.732340] 
[   33.732574] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.732783] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.732828] Hardware name: linux,dummy-virt (DT)
[   33.732870] Call trace:
[   33.732897]  show_stack+0x20/0x38 (C)
[   33.733139]  dump_stack_lvl+0x8c/0xd0
[   33.733330]  print_report+0x118/0x608
[   33.733515]  kasan_report+0xdc/0x128
[   33.733610]  kasan_check_range+0x100/0x1a8
[   33.733662]  __kasan_check_write+0x20/0x30
[   33.733710]  kasan_atomics_helper+0x11f8/0x4858
[   33.733941]  kasan_atomics+0x198/0x2e0
[   33.733996]  kunit_try_run_case+0x170/0x3f0
[   33.734326]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.734569]  kthread+0x328/0x630
[   33.734625]  ret_from_fork+0x10/0x20
[   33.734686] 
[   33.734877] Allocated by task 298:
[   33.734955]  kasan_save_stack+0x3c/0x68
[   33.735116]  kasan_save_track+0x20/0x40
[   33.735344]  kasan_save_alloc_info+0x40/0x58
[   33.735460]  __kasan_kmalloc+0xd4/0xd8
[   33.735519]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.735563]  kasan_atomics+0xb8/0x2e0
[   33.735889]  kunit_try_run_case+0x170/0x3f0
[   33.735987]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.736323]  kthread+0x328/0x630
[   33.736470]  ret_from_fork+0x10/0x20
[   33.736515] 
[   33.736540] The buggy address belongs to the object at fff00000c8dc1a80
[   33.736540]  which belongs to the cache kmalloc-64 of size 64
[   33.736602] The buggy address is located 0 bytes to the right of
[   33.736602]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.737054] 
[   33.737212] The buggy address belongs to the physical page:
[   33.737384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.737570] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.737841] page_type: f5(slab)
[   33.738020] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.738381] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.738558] page dumped because: kasan: bad access detected
[   33.738630] 
[   33.738680] Memory state around the buggy address:
[   33.739000]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.739209]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.739302] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.739383]                                      ^
[   33.739443]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.739697]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.739955] ==================================================================
[   33.834617] ==================================================================
[   33.835076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   33.835483] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.835575] 
[   33.835626] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.835875] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.835915] Hardware name: linux,dummy-virt (DT)
[   33.836020] Call trace:
[   33.836105]  show_stack+0x20/0x38 (C)
[   33.836332]  dump_stack_lvl+0x8c/0xd0
[   33.836526]  print_report+0x118/0x608
[   33.836717]  kasan_report+0xdc/0x128
[   33.836792]  kasan_check_range+0x100/0x1a8
[   33.836980]  __kasan_check_write+0x20/0x30
[   33.837154]  kasan_atomics_helper+0x16d0/0x4858
[   33.837233]  kasan_atomics+0x198/0x2e0
[   33.837481]  kunit_try_run_case+0x170/0x3f0
[   33.837560]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.837674]  kthread+0x328/0x630
[   33.838013]  ret_from_fork+0x10/0x20
[   33.838442] 
[   33.838689] Allocated by task 298:
[   33.838795]  kasan_save_stack+0x3c/0x68
[   33.839029]  kasan_save_track+0x20/0x40
[   33.839223]  kasan_save_alloc_info+0x40/0x58
[   33.839312]  __kasan_kmalloc+0xd4/0xd8
[   33.839651]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.839810]  kasan_atomics+0xb8/0x2e0
[   33.840032]  kunit_try_run_case+0x170/0x3f0
[   33.840090]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.840138]  kthread+0x328/0x630
[   33.840307]  ret_from_fork+0x10/0x20
[   33.840473] 
[   33.840543] The buggy address belongs to the object at fff00000c8dc1a80
[   33.840543]  which belongs to the cache kmalloc-64 of size 64
[   33.840623] The buggy address is located 0 bytes to the right of
[   33.840623]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.840887] 
[   33.841035] The buggy address belongs to the physical page:
[   33.841083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.841312] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.841528] page_type: f5(slab)
[   33.841778] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.841856] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.841999] page dumped because: kasan: bad access detected
[   33.842115] 
[   33.842138] Memory state around the buggy address:
[   33.842332]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.842591]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.842794] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.843010]                                      ^
[   33.843150]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.843255]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.843436] ==================================================================
[   33.616113] ==================================================================
[   33.616941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   33.617006] Write of size 4 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.617087] 
[   33.617125] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.617216] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.617621] Hardware name: linux,dummy-virt (DT)
[   33.617706] Call trace:
[   33.617733]  show_stack+0x20/0x38 (C)
[   33.617787]  dump_stack_lvl+0x8c/0xd0
[   33.618099]  print_report+0x118/0x608
[   33.618162]  kasan_report+0xdc/0x128
[   33.618217]  kasan_check_range+0x100/0x1a8
[   33.618579]  __kasan_check_write+0x20/0x30
[   33.618652]  kasan_atomics_helper+0xd3c/0x4858
[   33.618991]  kasan_atomics+0x198/0x2e0
[   33.619092]  kunit_try_run_case+0x170/0x3f0
[   33.619306]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.619659]  kthread+0x328/0x630
[   33.619878]  ret_from_fork+0x10/0x20
[   33.620158] 
[   33.620228] Allocated by task 298:
[   33.620500]  kasan_save_stack+0x3c/0x68
[   33.620650]  kasan_save_track+0x20/0x40
[   33.620736]  kasan_save_alloc_info+0x40/0x58
[   33.620779]  __kasan_kmalloc+0xd4/0xd8
[   33.620994]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.621173]  kasan_atomics+0xb8/0x2e0
[   33.621243]  kunit_try_run_case+0x170/0x3f0
[   33.621417]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.621512]  kthread+0x328/0x630
[   33.621685]  ret_from_fork+0x10/0x20
[   33.621762] 
[   33.621980] The buggy address belongs to the object at fff00000c8dc1a80
[   33.621980]  which belongs to the cache kmalloc-64 of size 64
[   33.622211] The buggy address is located 0 bytes to the right of
[   33.622211]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.622490] 
[   33.622605] The buggy address belongs to the physical page:
[   33.622771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.622866] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.623166] page_type: f5(slab)
[   33.623269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.623576] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.623743] page dumped because: kasan: bad access detected
[   33.623889] 
[   33.624036] Memory state around the buggy address:
[   33.624260]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.624398]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.624447] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.624726]                                      ^
[   33.624938]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.625023]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.625095] ==================================================================
[   33.715358] ==================================================================
[   33.715923] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   33.716116] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.716203] 
[   33.716257] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.716402] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.716433] Hardware name: linux,dummy-virt (DT)
[   33.716465] Call trace:
[   33.716706]  show_stack+0x20/0x38 (C)
[   33.716866]  dump_stack_lvl+0x8c/0xd0
[   33.717333]  print_report+0x118/0x608
[   33.717415]  kasan_report+0xdc/0x128
[   33.717565]  kasan_check_range+0x100/0x1a8
[   33.717633]  __kasan_check_write+0x20/0x30
[   33.717777]  kasan_atomics_helper+0x1128/0x4858
[   33.717867]  kasan_atomics+0x198/0x2e0
[   33.718103]  kunit_try_run_case+0x170/0x3f0
[   33.718318]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.718576]  kthread+0x328/0x630
[   33.718759]  ret_from_fork+0x10/0x20
[   33.718817] 
[   33.719131] Allocated by task 298:
[   33.719185]  kasan_save_stack+0x3c/0x68
[   33.719484]  kasan_save_track+0x20/0x40
[   33.719762]  kasan_save_alloc_info+0x40/0x58
[   33.719819]  __kasan_kmalloc+0xd4/0xd8
[   33.719861]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.719914]  kasan_atomics+0xb8/0x2e0
[   33.720153]  kunit_try_run_case+0x170/0x3f0
[   33.720243]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.720313]  kthread+0x328/0x630
[   33.720574]  ret_from_fork+0x10/0x20
[   33.720715] 
[   33.720770] The buggy address belongs to the object at fff00000c8dc1a80
[   33.720770]  which belongs to the cache kmalloc-64 of size 64
[   33.720836] The buggy address is located 0 bytes to the right of
[   33.720836]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.721306] 
[   33.721541] The buggy address belongs to the physical page:
[   33.721831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.722190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.722277] page_type: f5(slab)
[   33.722329] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.722559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.722728] page dumped because: kasan: bad access detected
[   33.723044] 
[   33.723102] Memory state around the buggy address:
[   33.723431]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.723491]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.723609] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.724011]                                      ^
[   33.724192]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.724332]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.724404] ==================================================================
[   33.661143] ==================================================================
[   33.661201] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   33.661254] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.661618] 
[   33.661899] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.662155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.662209] Hardware name: linux,dummy-virt (DT)
[   33.662246] Call trace:
[   33.662272]  show_stack+0x20/0x38 (C)
[   33.662328]  dump_stack_lvl+0x8c/0xd0
[   33.662497]  print_report+0x118/0x608
[   33.662555]  kasan_report+0xdc/0x128
[   33.662624]  __asan_report_store8_noabort+0x20/0x30
[   33.662992]  kasan_atomics_helper+0x3e5c/0x4858
[   33.663076]  kasan_atomics+0x198/0x2e0
[   33.663322]  kunit_try_run_case+0x170/0x3f0
[   33.663567]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.663696]  kthread+0x328/0x630
[   33.663890]  ret_from_fork+0x10/0x20
[   33.664118] 
[   33.664161] Allocated by task 298:
[   33.664214]  kasan_save_stack+0x3c/0x68
[   33.664427]  kasan_save_track+0x20/0x40
[   33.664482]  kasan_save_alloc_info+0x40/0x58
[   33.664766]  __kasan_kmalloc+0xd4/0xd8
[   33.664864]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.665089]  kasan_atomics+0xb8/0x2e0
[   33.665280]  kunit_try_run_case+0x170/0x3f0
[   33.665516]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.665579]  kthread+0x328/0x630
[   33.665615]  ret_from_fork+0x10/0x20
[   33.665790] 
[   33.665904] The buggy address belongs to the object at fff00000c8dc1a80
[   33.665904]  which belongs to the cache kmalloc-64 of size 64
[   33.665992] The buggy address is located 0 bytes to the right of
[   33.665992]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.666059] 
[   33.666092] The buggy address belongs to the physical page:
[   33.666132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.666201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.666253] page_type: f5(slab)
[   33.666294] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.666354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.666413] page dumped because: kasan: bad access detected
[   33.666448] 
[   33.666469] Memory state around the buggy address:
[   33.666512]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.666558]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.666613] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.666654]                                      ^
[   33.666692]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.666751]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.666794] ==================================================================
[   33.684630] ==================================================================
[   33.684685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   33.684735] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.684788] 
[   33.684820] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.684909] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.684951] Hardware name: linux,dummy-virt (DT)
[   33.685228] Call trace:
[   33.685290]  show_stack+0x20/0x38 (C)
[   33.685354]  dump_stack_lvl+0x8c/0xd0
[   33.685764]  print_report+0x118/0x608
[   33.685839]  kasan_report+0xdc/0x128
[   33.685952]  kasan_check_range+0x100/0x1a8
[   33.686024]  __kasan_check_write+0x20/0x30
[   33.686077]  kasan_atomics_helper+0xf88/0x4858
[   33.686320]  kasan_atomics+0x198/0x2e0
[   33.686373]  kunit_try_run_case+0x170/0x3f0
[   33.686520]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.686770]  kthread+0x328/0x630
[   33.687218]  ret_from_fork+0x10/0x20
[   33.687285] 
[   33.687336] Allocated by task 298:
[   33.687535]  kasan_save_stack+0x3c/0x68
[   33.687874]  kasan_save_track+0x20/0x40
[   33.688068]  kasan_save_alloc_info+0x40/0x58
[   33.688143]  __kasan_kmalloc+0xd4/0xd8
[   33.688185]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.688239]  kasan_atomics+0xb8/0x2e0
[   33.688280]  kunit_try_run_case+0x170/0x3f0
[   33.688473]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.688672]  kthread+0x328/0x630
[   33.689004]  ret_from_fork+0x10/0x20
[   33.689105] 
[   33.689149] The buggy address belongs to the object at fff00000c8dc1a80
[   33.689149]  which belongs to the cache kmalloc-64 of size 64
[   33.689256] The buggy address is located 0 bytes to the right of
[   33.689256]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.689537] 
[   33.689851] The buggy address belongs to the physical page:
[   33.690023] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.690234] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.690367] page_type: f5(slab)
[   33.690475] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.690749] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.690911] page dumped because: kasan: bad access detected
[   33.691038] 
[   33.691205] Memory state around the buggy address:
[   33.691330]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.691422]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.691627] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.691725]                                      ^
[   33.691861]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.691966]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.692016] ==================================================================
[   33.764053] ==================================================================
[   33.764311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   33.764396] Read of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.764467] 
[   33.764502] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.764592] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.764621] Hardware name: linux,dummy-virt (DT)
[   33.764655] Call trace:
[   33.764680]  show_stack+0x20/0x38 (C)
[   33.764734]  dump_stack_lvl+0x8c/0xd0
[   33.764784]  print_report+0x118/0x608
[   33.765148]  kasan_report+0xdc/0x128
[   33.765520]  __asan_report_load8_noabort+0x20/0x30
[   33.765573]  kasan_atomics_helper+0x3f04/0x4858
[   33.765627]  kasan_atomics+0x198/0x2e0
[   33.765675]  kunit_try_run_case+0x170/0x3f0
[   33.765727]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.765785]  kthread+0x328/0x630
[   33.765832]  ret_from_fork+0x10/0x20
[   33.765885] 
[   33.766017] Allocated by task 298:
[   33.766053]  kasan_save_stack+0x3c/0x68
[   33.766097]  kasan_save_track+0x20/0x40
[   33.766138]  kasan_save_alloc_info+0x40/0x58
[   33.766179]  __kasan_kmalloc+0xd4/0xd8
[   33.766220]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.766263]  kasan_atomics+0xb8/0x2e0
[   33.766302]  kunit_try_run_case+0x170/0x3f0
[   33.766344]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.766390]  kthread+0x328/0x630
[   33.766427]  ret_from_fork+0x10/0x20
[   33.766465] 
[   33.766486] The buggy address belongs to the object at fff00000c8dc1a80
[   33.766486]  which belongs to the cache kmalloc-64 of size 64
[   33.766546] The buggy address is located 0 bytes to the right of
[   33.766546]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.766613] 
[   33.766635] The buggy address belongs to the physical page:
[   33.766669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.766728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.766778] page_type: f5(slab)
[   33.766818] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.766883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.767276] page dumped because: kasan: bad access detected
[   33.767658] 
[   33.767717] Memory state around the buggy address:
[   33.767979]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.768062]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.768314] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.768440]                                      ^
[   33.768542]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.768591]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.768632] ==================================================================
[   33.625898] ==================================================================
[   33.625962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   33.626015] Read of size 4 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.626673] 
[   33.626727] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.627178] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.627227] Hardware name: linux,dummy-virt (DT)
[   33.627281] Call trace:
[   33.627307]  show_stack+0x20/0x38 (C)
[   33.627363]  dump_stack_lvl+0x8c/0xd0
[   33.627416]  print_report+0x118/0x608
[   33.627794]  kasan_report+0xdc/0x128
[   33.628026]  __asan_report_load4_noabort+0x20/0x30
[   33.628090]  kasan_atomics_helper+0x3e04/0x4858
[   33.628143]  kasan_atomics+0x198/0x2e0
[   33.628199]  kunit_try_run_case+0x170/0x3f0
[   33.628468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.628874]  kthread+0x328/0x630
[   33.629229]  ret_from_fork+0x10/0x20
[   33.629466] 
[   33.629537] Allocated by task 298:
[   33.629739]  kasan_save_stack+0x3c/0x68
[   33.629912]  kasan_save_track+0x20/0x40
[   33.629977]  kasan_save_alloc_info+0x40/0x58
[   33.630179]  __kasan_kmalloc+0xd4/0xd8
[   33.630491]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.630581]  kasan_atomics+0xb8/0x2e0
[   33.630772]  kunit_try_run_case+0x170/0x3f0
[   33.630842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.630892]  kthread+0x328/0x630
[   33.631223]  ret_from_fork+0x10/0x20
[   33.631475] 
[   33.631716] The buggy address belongs to the object at fff00000c8dc1a80
[   33.631716]  which belongs to the cache kmalloc-64 of size 64
[   33.631847] The buggy address is located 0 bytes to the right of
[   33.631847]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.631960] 
[   33.632008] The buggy address belongs to the physical page:
[   33.632156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.632251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.632624] page_type: f5(slab)
[   33.632717] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.632771] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.632914] page dumped because: kasan: bad access detected
[   33.633220] 
[   33.633284] Memory state around the buggy address:
[   33.633493]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.633604]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.633676] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.633899]                                      ^
[   33.633976]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.634087]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.634168] ==================================================================
[   33.643806] ==================================================================
[   33.644167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   33.644238] Read of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.644354] 
[   33.644388] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.644477] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.644507] Hardware name: linux,dummy-virt (DT)
[   33.644638] Call trace:
[   33.644709]  show_stack+0x20/0x38 (C)
[   33.644912]  dump_stack_lvl+0x8c/0xd0
[   33.645154]  print_report+0x118/0x608
[   33.645209]  kasan_report+0xdc/0x128
[   33.645422]  __asan_report_load8_noabort+0x20/0x30
[   33.645583]  kasan_atomics_helper+0x3f58/0x4858
[   33.645776]  kasan_atomics+0x198/0x2e0
[   33.645838]  kunit_try_run_case+0x170/0x3f0
[   33.645893]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.646193]  kthread+0x328/0x630
[   33.646475]  ret_from_fork+0x10/0x20
[   33.646548] 
[   33.646730] Allocated by task 298:
[   33.646774]  kasan_save_stack+0x3c/0x68
[   33.646961]  kasan_save_track+0x20/0x40
[   33.647145]  kasan_save_alloc_info+0x40/0x58
[   33.647199]  __kasan_kmalloc+0xd4/0xd8
[   33.647374]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.647430]  kasan_atomics+0xb8/0x2e0
[   33.647604]  kunit_try_run_case+0x170/0x3f0
[   33.647934]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.648112]  kthread+0x328/0x630
[   33.648150]  ret_from_fork+0x10/0x20
[   33.648190] 
[   33.648369] The buggy address belongs to the object at fff00000c8dc1a80
[   33.648369]  which belongs to the cache kmalloc-64 of size 64
[   33.648464] The buggy address is located 0 bytes to the right of
[   33.648464]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.648691] 
[   33.648739] The buggy address belongs to the physical page:
[   33.648773] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.648841] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.648901] page_type: f5(slab)
[   33.648955] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.649008] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.649051] page dumped because: kasan: bad access detected
[   33.649085] 
[   33.649107] Memory state around the buggy address:
[   33.649141]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.649187]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.649248] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.649291]                                      ^
[   33.649328]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.649391]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.649441] ==================================================================
[   33.812156] ==================================================================
[   33.812206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   33.812258] Read of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.812310] 
[   33.812621] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.812886] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.812945] Hardware name: linux,dummy-virt (DT)
[   33.813125] Call trace:
[   33.813161]  show_stack+0x20/0x38 (C)
[   33.813217]  dump_stack_lvl+0x8c/0xd0
[   33.813383]  print_report+0x118/0x608
[   33.813450]  kasan_report+0xdc/0x128
[   33.813686]  __asan_report_load8_noabort+0x20/0x30
[   33.813763]  kasan_atomics_helper+0x3db0/0x4858
[   33.814022]  kasan_atomics+0x198/0x2e0
[   33.814077]  kunit_try_run_case+0x170/0x3f0
[   33.814246]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.814318]  kthread+0x328/0x630
[   33.814365]  ret_from_fork+0x10/0x20
[   33.814725] 
[   33.814768] Allocated by task 298:
[   33.814949]  kasan_save_stack+0x3c/0x68
[   33.815108]  kasan_save_track+0x20/0x40
[   33.815155]  kasan_save_alloc_info+0x40/0x58
[   33.815349]  __kasan_kmalloc+0xd4/0xd8
[   33.815405]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.815525]  kasan_atomics+0xb8/0x2e0
[   33.815713]  kunit_try_run_case+0x170/0x3f0
[   33.815972]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.816191]  kthread+0x328/0x630
[   33.816239]  ret_from_fork+0x10/0x20
[   33.816291] 
[   33.816314] The buggy address belongs to the object at fff00000c8dc1a80
[   33.816314]  which belongs to the cache kmalloc-64 of size 64
[   33.816419] The buggy address is located 0 bytes to the right of
[   33.816419]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.816488] 
[   33.816510] The buggy address belongs to the physical page:
[   33.816564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.816643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.816693] page_type: f5(slab)
[   33.816757] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.816810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.816854] page dumped because: kasan: bad access detected
[   33.816898] 
[   33.816940] Memory state around the buggy address:
[   33.816972]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.817019]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.817063] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.817127]                                      ^
[   33.817171]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.817232]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.817274] ==================================================================
[   33.802959] ==================================================================
[   33.803129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   33.803370] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.803464] 
[   33.803500] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.803815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.804025] Hardware name: linux,dummy-virt (DT)
[   33.804182] Call trace:
[   33.804278]  show_stack+0x20/0x38 (C)
[   33.804363]  dump_stack_lvl+0x8c/0xd0
[   33.804585]  print_report+0x118/0x608
[   33.804790]  kasan_report+0xdc/0x128
[   33.804870]  kasan_check_range+0x100/0x1a8
[   33.805205]  __kasan_check_write+0x20/0x30
[   33.805433]  kasan_atomics_helper+0x15b4/0x4858
[   33.805663]  kasan_atomics+0x198/0x2e0
[   33.806027]  kunit_try_run_case+0x170/0x3f0
[   33.806783]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.806891]  kthread+0x328/0x630
[   33.806998]  ret_from_fork+0x10/0x20
[   33.807066] 
[   33.807090] Allocated by task 298:
[   33.807140]  kasan_save_stack+0x3c/0x68
[   33.807436]  kasan_save_track+0x20/0x40
[   33.807502]  kasan_save_alloc_info+0x40/0x58
[   33.807610]  __kasan_kmalloc+0xd4/0xd8
[   33.807980]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.808046]  kasan_atomics+0xb8/0x2e0
[   33.808087]  kunit_try_run_case+0x170/0x3f0
[   33.808131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.808181]  kthread+0x328/0x630
[   33.808550]  ret_from_fork+0x10/0x20
[   33.808763] 
[   33.808848] The buggy address belongs to the object at fff00000c8dc1a80
[   33.808848]  which belongs to the cache kmalloc-64 of size 64
[   33.809032] The buggy address is located 0 bytes to the right of
[   33.809032]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.809333] 
[   33.809407] The buggy address belongs to the physical page:
[   33.809573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.810052] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.810129] page_type: f5(slab)
[   33.810302] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.810518] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.810747] page dumped because: kasan: bad access detected
[   33.810803] 
[   33.810906] Memory state around the buggy address:
[   33.810976]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.811066]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.811157] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.811216]                                      ^
[   33.811421]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.811638]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.811757] ==================================================================
[   33.851302] ==================================================================
[   33.851351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   33.851400] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.851452] 
[   33.851484] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.852324] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.852379] Hardware name: linux,dummy-virt (DT)
[   33.852445] Call trace:
[   33.852564]  show_stack+0x20/0x38 (C)
[   33.852766]  dump_stack_lvl+0x8c/0xd0
[   33.852830]  print_report+0x118/0x608
[   33.852954]  kasan_report+0xdc/0x128
[   33.853026]  kasan_check_range+0x100/0x1a8
[   33.853098]  __kasan_check_write+0x20/0x30
[   33.853207]  kasan_atomics_helper+0x175c/0x4858
[   33.853603]  kasan_atomics+0x198/0x2e0
[   33.853738]  kunit_try_run_case+0x170/0x3f0
[   33.853851]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.854006]  kthread+0x328/0x630
[   33.854077]  ret_from_fork+0x10/0x20
[   33.854483] 
[   33.854784] Allocated by task 298:
[   33.854884]  kasan_save_stack+0x3c/0x68
[   33.855019]  kasan_save_track+0x20/0x40
[   33.855065]  kasan_save_alloc_info+0x40/0x58
[   33.855107]  __kasan_kmalloc+0xd4/0xd8
[   33.855508]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.855681]  kasan_atomics+0xb8/0x2e0
[   33.855855]  kunit_try_run_case+0x170/0x3f0
[   33.856035]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.856114]  kthread+0x328/0x630
[   33.856157]  ret_from_fork+0x10/0x20
[   33.856376] 
[   33.856422] The buggy address belongs to the object at fff00000c8dc1a80
[   33.856422]  which belongs to the cache kmalloc-64 of size 64
[   33.856767] The buggy address is located 0 bytes to the right of
[   33.856767]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.857223] 
[   33.857459] The buggy address belongs to the physical page:
[   33.857538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.857788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.857988] page_type: f5(slab)
[   33.858364] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.858445] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.858765] page dumped because: kasan: bad access detected
[   33.858886] 
[   33.859014] Memory state around the buggy address:
[   33.859120]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.859196]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.859274] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.859589]                                      ^
[   33.859802]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.859866]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.860052] ==================================================================
[   33.780006] ==================================================================
[   33.780062] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   33.780132] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.780312] 
[   33.780349] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.780586] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.780721] Hardware name: linux,dummy-virt (DT)
[   33.780770] Call trace:
[   33.780796]  show_stack+0x20/0x38 (C)
[   33.780984]  dump_stack_lvl+0x8c/0xd0
[   33.781050]  print_report+0x118/0x608
[   33.781126]  kasan_report+0xdc/0x128
[   33.781306]  kasan_check_range+0x100/0x1a8
[   33.781436]  __kasan_check_write+0x20/0x30
[   33.781505]  kasan_atomics_helper+0x147c/0x4858
[   33.781559]  kasan_atomics+0x198/0x2e0
[   33.781753]  kunit_try_run_case+0x170/0x3f0
[   33.781842]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.782009]  kthread+0x328/0x630
[   33.782065]  ret_from_fork+0x10/0x20
[   33.782404] 
[   33.782598] Allocated by task 298:
[   33.782642]  kasan_save_stack+0x3c/0x68
[   33.782692]  kasan_save_track+0x20/0x40
[   33.782883]  kasan_save_alloc_info+0x40/0x58
[   33.783154]  __kasan_kmalloc+0xd4/0xd8
[   33.783463]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.783522]  kasan_atomics+0xb8/0x2e0
[   33.783760]  kunit_try_run_case+0x170/0x3f0
[   33.783978]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.784050]  kthread+0x328/0x630
[   33.784088]  ret_from_fork+0x10/0x20
[   33.784128] 
[   33.784398] The buggy address belongs to the object at fff00000c8dc1a80
[   33.784398]  which belongs to the cache kmalloc-64 of size 64
[   33.784742] The buggy address is located 0 bytes to the right of
[   33.784742]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.784945] 
[   33.785058] The buggy address belongs to the physical page:
[   33.785113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.785173] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.785407] page_type: f5(slab)
[   33.785462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.785900] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.786025] page dumped because: kasan: bad access detected
[   33.786093] 
[   33.786143] Memory state around the buggy address:
[   33.786269]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.786318]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.786370] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.786409]                                      ^
[   33.786446]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.786616]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.786670] ==================================================================
[   33.540612] ==================================================================
[   33.540672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   33.540726] Write of size 4 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.540780] 
[   33.540816] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.540907] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.541763] Hardware name: linux,dummy-virt (DT)
[   33.541820] Call trace:
[   33.541848]  show_stack+0x20/0x38 (C)
[   33.542284]  dump_stack_lvl+0x8c/0xd0
[   33.542544]  print_report+0x118/0x608
[   33.542641]  kasan_report+0xdc/0x128
[   33.542732]  kasan_check_range+0x100/0x1a8
[   33.542831]  __kasan_check_write+0x20/0x30
[   33.542900]  kasan_atomics_helper+0xa6c/0x4858
[   33.542992]  kasan_atomics+0x198/0x2e0
[   33.543046]  kunit_try_run_case+0x170/0x3f0
[   33.543145]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.543208]  kthread+0x328/0x630
[   33.543255]  ret_from_fork+0x10/0x20
[   33.543354] 
[   33.543379] Allocated by task 298:
[   33.543413]  kasan_save_stack+0x3c/0x68
[   33.543460]  kasan_save_track+0x20/0x40
[   33.543756]  kasan_save_alloc_info+0x40/0x58
[   33.543876]  __kasan_kmalloc+0xd4/0xd8
[   33.544033]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.544097]  kasan_atomics+0xb8/0x2e0
[   33.544136]  kunit_try_run_case+0x170/0x3f0
[   33.544180]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.544464]  kthread+0x328/0x630
[   33.544583]  ret_from_fork+0x10/0x20
[   33.544723] 
[   33.544765] The buggy address belongs to the object at fff00000c8dc1a80
[   33.544765]  which belongs to the cache kmalloc-64 of size 64
[   33.544826] The buggy address is located 0 bytes to the right of
[   33.544826]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.545176] 
[   33.545205] The buggy address belongs to the physical page:
[   33.545275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.545522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.545730] page_type: f5(slab)
[   33.546015] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.546189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.546407] page dumped because: kasan: bad access detected
[   33.546584] 
[   33.546709] Memory state around the buggy address:
[   33.547009]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.547182]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.547281] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.547331]                                      ^
[   33.547370]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.547416]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.547457] ==================================================================
[   33.818649] ==================================================================
[   33.818719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   33.819023] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.819101] 
[   33.819298] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.819553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.819862] Hardware name: linux,dummy-virt (DT)
[   33.820034] Call trace:
[   33.820142]  show_stack+0x20/0x38 (C)
[   33.820266]  dump_stack_lvl+0x8c/0xd0
[   33.820395]  print_report+0x118/0x608
[   33.820466]  kasan_report+0xdc/0x128
[   33.820527]  kasan_check_range+0x100/0x1a8
[   33.820764]  __kasan_check_write+0x20/0x30
[   33.820920]  kasan_atomics_helper+0x1644/0x4858
[   33.821176]  kasan_atomics+0x198/0x2e0
[   33.821422]  kunit_try_run_case+0x170/0x3f0
[   33.821501]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.821649]  kthread+0x328/0x630
[   33.821728]  ret_from_fork+0x10/0x20
[   33.821866] 
[   33.821916] Allocated by task 298:
[   33.822031]  kasan_save_stack+0x3c/0x68
[   33.822105]  kasan_save_track+0x20/0x40
[   33.822191]  kasan_save_alloc_info+0x40/0x58
[   33.822289]  __kasan_kmalloc+0xd4/0xd8
[   33.822344]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.822387]  kasan_atomics+0xb8/0x2e0
[   33.822575]  kunit_try_run_case+0x170/0x3f0
[   33.822818]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.823059]  kthread+0x328/0x630
[   33.823135]  ret_from_fork+0x10/0x20
[   33.823304] 
[   33.823413] The buggy address belongs to the object at fff00000c8dc1a80
[   33.823413]  which belongs to the cache kmalloc-64 of size 64
[   33.823478] The buggy address is located 0 bytes to the right of
[   33.823478]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.823742] 
[   33.823971] The buggy address belongs to the physical page:
[   33.824156] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.824402] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.824490] page_type: f5(slab)
[   33.824613] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.824668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.824712] page dumped because: kasan: bad access detected
[   33.824771] 
[   33.824816] Memory state around the buggy address:
[   33.825020]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.825111]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.825516] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.825590]                                      ^
[   33.825685]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.825766]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.825845] ==================================================================
[   33.522719] ==================================================================
[   33.522778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   33.522838] Write of size 4 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.522891] 
[   33.523434] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.523550] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.524094] Hardware name: linux,dummy-virt (DT)
[   33.524152] Call trace:
[   33.524196]  show_stack+0x20/0x38 (C)
[   33.524504]  dump_stack_lvl+0x8c/0xd0
[   33.524652]  print_report+0x118/0x608
[   33.524766]  kasan_report+0xdc/0x128
[   33.524821]  kasan_check_range+0x100/0x1a8
[   33.524875]  __kasan_check_write+0x20/0x30
[   33.525263]  kasan_atomics_helper+0x99c/0x4858
[   33.525360]  kasan_atomics+0x198/0x2e0
[   33.525589]  kunit_try_run_case+0x170/0x3f0
[   33.525772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.525851]  kthread+0x328/0x630
[   33.526159]  ret_from_fork+0x10/0x20
[   33.526402] 
[   33.526464] Allocated by task 298:
[   33.526604]  kasan_save_stack+0x3c/0x68
[   33.526693]  kasan_save_track+0x20/0x40
[   33.526810]  kasan_save_alloc_info+0x40/0x58
[   33.526881]  __kasan_kmalloc+0xd4/0xd8
[   33.527074]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.527294]  kasan_atomics+0xb8/0x2e0
[   33.527381]  kunit_try_run_case+0x170/0x3f0
[   33.527487]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.527607]  kthread+0x328/0x630
[   33.527764]  ret_from_fork+0x10/0x20
[   33.527808] 
[   33.527831] The buggy address belongs to the object at fff00000c8dc1a80
[   33.527831]  which belongs to the cache kmalloc-64 of size 64
[   33.527898] The buggy address is located 0 bytes to the right of
[   33.527898]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.528146] 
[   33.528252] The buggy address belongs to the physical page:
[   33.528353] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.528665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.528914] page_type: f5(slab)
[   33.529035] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.529106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.529233] page dumped because: kasan: bad access detected
[   33.529315] 
[   33.529357] Memory state around the buggy address:
[   33.529392]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.529622]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.529851] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.529975]                                      ^
[   33.530024]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.530095]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.530234] ==================================================================
[   33.668146] ==================================================================
[   33.668203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   33.668318] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.668374] 
[   33.668492] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.668582] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.668613] Hardware name: linux,dummy-virt (DT)
[   33.668645] Call trace:
[   33.668669]  show_stack+0x20/0x38 (C)
[   33.668720]  dump_stack_lvl+0x8c/0xd0
[   33.668770]  print_report+0x118/0x608
[   33.669385]  kasan_report+0xdc/0x128
[   33.669468]  kasan_check_range+0x100/0x1a8
[   33.669521]  __kasan_check_write+0x20/0x30
[   33.669854]  kasan_atomics_helper+0xeb8/0x4858
[   33.670265]  kasan_atomics+0x198/0x2e0
[   33.670719]  kunit_try_run_case+0x170/0x3f0
[   33.670942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.671023]  kthread+0x328/0x630
[   33.671068]  ret_from_fork+0x10/0x20
[   33.671417] 
[   33.671655] Allocated by task 298:
[   33.671705]  kasan_save_stack+0x3c/0x68
[   33.671778]  kasan_save_track+0x20/0x40
[   33.671936]  kasan_save_alloc_info+0x40/0x58
[   33.672016]  __kasan_kmalloc+0xd4/0xd8
[   33.672103]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.672404]  kasan_atomics+0xb8/0x2e0
[   33.672525]  kunit_try_run_case+0x170/0x3f0
[   33.672582]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.673001]  kthread+0x328/0x630
[   33.673114]  ret_from_fork+0x10/0x20
[   33.673217] 
[   33.673440] The buggy address belongs to the object at fff00000c8dc1a80
[   33.673440]  which belongs to the cache kmalloc-64 of size 64
[   33.673519] The buggy address is located 0 bytes to the right of
[   33.673519]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.673717] 
[   33.673774] The buggy address belongs to the physical page:
[   33.674282] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.675008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.675218] page_type: f5(slab)
[   33.675294] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.675449] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.675496] page dumped because: kasan: bad access detected
[   33.675530] 
[   33.675689] Memory state around the buggy address:
[   33.675752]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.676176]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.676296] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.676543]                                      ^
[   33.676675]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.676753]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.676978] ==================================================================
[   33.740665] ==================================================================
[   33.740741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   33.740795] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.741045] 
[   33.741260] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.741361] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.741571] Hardware name: linux,dummy-virt (DT)
[   33.741750] Call trace:
[   33.741792]  show_stack+0x20/0x38 (C)
[   33.741856]  dump_stack_lvl+0x8c/0xd0
[   33.741998]  print_report+0x118/0x608
[   33.742069]  kasan_report+0xdc/0x128
[   33.742127]  kasan_check_range+0x100/0x1a8
[   33.742259]  __kasan_check_write+0x20/0x30
[   33.742307]  kasan_atomics_helper+0x126c/0x4858
[   33.742373]  kasan_atomics+0x198/0x2e0
[   33.742434]  kunit_try_run_case+0x170/0x3f0
[   33.742488]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.742546]  kthread+0x328/0x630
[   33.742591]  ret_from_fork+0x10/0x20
[   33.742951] 
[   33.742999] Allocated by task 298:
[   33.743211]  kasan_save_stack+0x3c/0x68
[   33.743267]  kasan_save_track+0x20/0x40
[   33.743309]  kasan_save_alloc_info+0x40/0x58
[   33.743349]  __kasan_kmalloc+0xd4/0xd8
[   33.743390]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.743462]  kasan_atomics+0xb8/0x2e0
[   33.743510]  kunit_try_run_case+0x170/0x3f0
[   33.743762]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.743866]  kthread+0x328/0x630
[   33.744123]  ret_from_fork+0x10/0x20
[   33.744195] 
[   33.744239] The buggy address belongs to the object at fff00000c8dc1a80
[   33.744239]  which belongs to the cache kmalloc-64 of size 64
[   33.744463] The buggy address is located 0 bytes to the right of
[   33.744463]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.744586] 
[   33.744617] The buggy address belongs to the physical page:
[   33.744652] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.744832] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.745342] page_type: f5(slab)
[   33.745397] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.745483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.745529] page dumped because: kasan: bad access detected
[   33.745564] 
[   33.745780] Memory state around the buggy address:
[   33.746160]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.746265]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.746337] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.746502]                                      ^
[   33.746659]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.746720]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.746761] ==================================================================
[   33.610807] ==================================================================
[   33.611264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   33.611350] Read of size 4 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.611406] 
[   33.611441] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.611622] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.611709] Hardware name: linux,dummy-virt (DT)
[   33.611761] Call trace:
[   33.611914]  show_stack+0x20/0x38 (C)
[   33.612098]  dump_stack_lvl+0x8c/0xd0
[   33.612194]  print_report+0x118/0x608
[   33.612247]  kasan_report+0xdc/0x128
[   33.612313]  __asan_report_load4_noabort+0x20/0x30
[   33.612365]  kasan_atomics_helper+0x3dd8/0x4858
[   33.612595]  kasan_atomics+0x198/0x2e0
[   33.612820]  kunit_try_run_case+0x170/0x3f0
[   33.613092]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.613224]  kthread+0x328/0x630
[   33.613273]  ret_from_fork+0x10/0x20
[   33.613738] 
[   33.613791] Allocated by task 298:
[   33.614073]  kasan_save_stack+0x3c/0x68
[   33.614289]  kasan_save_track+0x20/0x40
[   33.614450]  kasan_save_alloc_info+0x40/0x58
[   33.614507]  __kasan_kmalloc+0xd4/0xd8
[   33.614548]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.614591]  kasan_atomics+0xb8/0x2e0
[   33.614633]  kunit_try_run_case+0x170/0x3f0
[   33.614672]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.614718]  kthread+0x328/0x630
[   33.614754]  ret_from_fork+0x10/0x20
[   33.614791] 
[   33.614842] The buggy address belongs to the object at fff00000c8dc1a80
[   33.614842]  which belongs to the cache kmalloc-64 of size 64
[   33.614905] The buggy address is located 0 bytes to the right of
[   33.614905]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.614992] 
[   33.615026] The buggy address belongs to the physical page:
[   33.615076] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.615146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.615207] page_type: f5(slab)
[   33.615263] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.615326] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.615370] page dumped because: kasan: bad access detected
[   33.615421] 
[   33.615442] Memory state around the buggy address:
[   33.615476]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.615521]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.615566] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.615628]                                      ^
[   33.615664]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.615708]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.615749] ==================================================================
[   33.747406] ==================================================================
[   33.747461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   33.747719] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.747811] 
[   33.747893] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.748188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.748224] Hardware name: linux,dummy-virt (DT)
[   33.748631] Call trace:
[   33.748686]  show_stack+0x20/0x38 (C)
[   33.748950]  dump_stack_lvl+0x8c/0xd0
[   33.749176]  print_report+0x118/0x608
[   33.749320]  kasan_report+0xdc/0x128
[   33.749420]  kasan_check_range+0x100/0x1a8
[   33.749500]  __kasan_check_write+0x20/0x30
[   33.749872]  kasan_atomics_helper+0x12d8/0x4858
[   33.750153]  kasan_atomics+0x198/0x2e0
[   33.750318]  kunit_try_run_case+0x170/0x3f0
[   33.750376]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.750441]  kthread+0x328/0x630
[   33.750486]  ret_from_fork+0x10/0x20
[   33.750678] 
[   33.750733] Allocated by task 298:
[   33.750778]  kasan_save_stack+0x3c/0x68
[   33.750846]  kasan_save_track+0x20/0x40
[   33.750888]  kasan_save_alloc_info+0x40/0x58
[   33.750940]  __kasan_kmalloc+0xd4/0xd8
[   33.750983]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.751026]  kasan_atomics+0xb8/0x2e0
[   33.751081]  kunit_try_run_case+0x170/0x3f0
[   33.751125]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.751173]  kthread+0x328/0x630
[   33.751212]  ret_from_fork+0x10/0x20
[   33.751252] 
[   33.751283] The buggy address belongs to the object at fff00000c8dc1a80
[   33.751283]  which belongs to the cache kmalloc-64 of size 64
[   33.751344] The buggy address is located 0 bytes to the right of
[   33.751344]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.751419] 
[   33.751451] The buggy address belongs to the physical page:
[   33.751496] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.751899] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.752333] page_type: f5(slab)
[   33.752392] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.752467] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.752512] page dumped because: kasan: bad access detected
[   33.752749] 
[   33.752847] Memory state around the buggy address:
[   33.753190]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.753326]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.753451] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.753607]                                      ^
[   33.753678]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.753734]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.753799] ==================================================================
[   33.692664] ==================================================================
[   33.692836] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   33.692939] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.693010] 
[   33.693045] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.693251] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.693392] Hardware name: linux,dummy-virt (DT)
[   33.693439] Call trace:
[   33.693464]  show_stack+0x20/0x38 (C)
[   33.693536]  dump_stack_lvl+0x8c/0xd0
[   33.693993]  print_report+0x118/0x608
[   33.694151]  kasan_report+0xdc/0x128
[   33.694413]  kasan_check_range+0x100/0x1a8
[   33.694679]  __kasan_check_write+0x20/0x30
[   33.694955]  kasan_atomics_helper+0xff0/0x4858
[   33.695028]  kasan_atomics+0x198/0x2e0
[   33.695184]  kunit_try_run_case+0x170/0x3f0
[   33.695252]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.695517]  kthread+0x328/0x630
[   33.695812]  ret_from_fork+0x10/0x20
[   33.695870] 
[   33.695894] Allocated by task 298:
[   33.695934]  kasan_save_stack+0x3c/0x68
[   33.695980]  kasan_save_track+0x20/0x40
[   33.696022]  kasan_save_alloc_info+0x40/0x58
[   33.696362]  __kasan_kmalloc+0xd4/0xd8
[   33.696468]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.696933]  kasan_atomics+0xb8/0x2e0
[   33.697008]  kunit_try_run_case+0x170/0x3f0
[   33.697052]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.697101]  kthread+0x328/0x630
[   33.697180]  ret_from_fork+0x10/0x20
[   33.697223] 
[   33.697253] The buggy address belongs to the object at fff00000c8dc1a80
[   33.697253]  which belongs to the cache kmalloc-64 of size 64
[   33.697323] The buggy address is located 0 bytes to the right of
[   33.697323]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.697389] 
[   33.697415] The buggy address belongs to the physical page:
[   33.697461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.697516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.697576] page_type: f5(slab)
[   33.697625] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.697685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.697736] page dumped because: kasan: bad access detected
[   33.697780] 
[   33.697810] Memory state around the buggy address:
[   33.697846]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.697900]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.697955] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.697997]                                      ^
[   33.698043]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.698087]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.698137] ==================================================================
[   33.755005] ==================================================================
[   33.755062] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   33.755132] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.755213] 
[   33.755247] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.755337] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.755540] Hardware name: linux,dummy-virt (DT)
[   33.756116] Call trace:
[   33.756183]  show_stack+0x20/0x38 (C)
[   33.756360]  dump_stack_lvl+0x8c/0xd0
[   33.756439]  print_report+0x118/0x608
[   33.756676]  kasan_report+0xdc/0x128
[   33.756910]  kasan_check_range+0x100/0x1a8
[   33.757012]  __kasan_check_write+0x20/0x30
[   33.757233]  kasan_atomics_helper+0x1384/0x4858
[   33.757332]  kasan_atomics+0x198/0x2e0
[   33.757494]  kunit_try_run_case+0x170/0x3f0
[   33.757945]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.758037]  kthread+0x328/0x630
[   33.758265]  ret_from_fork+0x10/0x20
[   33.758327] 
[   33.758350] Allocated by task 298:
[   33.758449]  kasan_save_stack+0x3c/0x68
[   33.758607]  kasan_save_track+0x20/0x40
[   33.758904]  kasan_save_alloc_info+0x40/0x58
[   33.759205]  __kasan_kmalloc+0xd4/0xd8
[   33.759280]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.759325]  kasan_atomics+0xb8/0x2e0
[   33.759365]  kunit_try_run_case+0x170/0x3f0
[   33.759655]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.759916]  kthread+0x328/0x630
[   33.760117]  ret_from_fork+0x10/0x20
[   33.760270] 
[   33.760314] The buggy address belongs to the object at fff00000c8dc1a80
[   33.760314]  which belongs to the cache kmalloc-64 of size 64
[   33.760378] The buggy address is located 0 bytes to the right of
[   33.760378]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.760674] 
[   33.761031] The buggy address belongs to the physical page:
[   33.761152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.761216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.761267] page_type: f5(slab)
[   33.761528] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.761961] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.762126] page dumped because: kasan: bad access detected
[   33.762282] 
[   33.762349] Memory state around the buggy address:
[   33.762546]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.762832]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.762909] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.762980]                                      ^
[   33.763028]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.763167]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.763210] ==================================================================
[   33.724836] ==================================================================
[   33.725029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   33.725226] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.725325] 
[   33.725395] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.725500] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.725684] Hardware name: linux,dummy-virt (DT)
[   33.725730] Call trace:
[   33.725771]  show_stack+0x20/0x38 (C)
[   33.725826]  dump_stack_lvl+0x8c/0xd0
[   33.726050]  print_report+0x118/0x608
[   33.726265]  kasan_report+0xdc/0x128
[   33.726344]  kasan_check_range+0x100/0x1a8
[   33.726396]  __kasan_check_write+0x20/0x30
[   33.726446]  kasan_atomics_helper+0x1190/0x4858
[   33.726498]  kasan_atomics+0x198/0x2e0
[   33.726551]  kunit_try_run_case+0x170/0x3f0
[   33.726606]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.726664]  kthread+0x328/0x630
[   33.726709]  ret_from_fork+0x10/0x20
[   33.726817] 
[   33.726842] Allocated by task 298:
[   33.726874]  kasan_save_stack+0x3c/0x68
[   33.726919]  kasan_save_track+0x20/0x40
[   33.726971]  kasan_save_alloc_info+0x40/0x58
[   33.727020]  __kasan_kmalloc+0xd4/0xd8
[   33.727067]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.727110]  kasan_atomics+0xb8/0x2e0
[   33.727149]  kunit_try_run_case+0x170/0x3f0
[   33.727200]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.727248]  kthread+0x328/0x630
[   33.727285]  ret_from_fork+0x10/0x20
[   33.727324] 
[   33.727353] The buggy address belongs to the object at fff00000c8dc1a80
[   33.727353]  which belongs to the cache kmalloc-64 of size 64
[   33.727415] The buggy address is located 0 bytes to the right of
[   33.727415]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.727481] 
[   33.727503] The buggy address belongs to the physical page:
[   33.727539] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.728490] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.728598] page_type: f5(slab)
[   33.728719] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.728820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.728957] page dumped because: kasan: bad access detected
[   33.729300] 
[   33.729347] Memory state around the buggy address:
[   33.729489]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.729768]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.730088] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.730226]                                      ^
[   33.730267]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.730503]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.730663] ==================================================================
[   33.867831] ==================================================================
[   33.867883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   33.868126] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.868343] 
[   33.868399] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.868492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.868521] Hardware name: linux,dummy-virt (DT)
[   33.868555] Call trace:
[   33.868580]  show_stack+0x20/0x38 (C)
[   33.868640]  dump_stack_lvl+0x8c/0xd0
[   33.868690]  print_report+0x118/0x608
[   33.868742]  kasan_report+0xdc/0x128
[   33.868791]  kasan_check_range+0x100/0x1a8
[   33.868839]  __kasan_check_write+0x20/0x30
[   33.868886]  kasan_atomics_helper+0x17ec/0x4858
[   33.868951]  kasan_atomics+0x198/0x2e0
[   33.869007]  kunit_try_run_case+0x170/0x3f0
[   33.869057]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.869113]  kthread+0x328/0x630
[   33.869159]  ret_from_fork+0x10/0x20
[   33.869219] 
[   33.869242] Allocated by task 298:
[   33.869273]  kasan_save_stack+0x3c/0x68
[   33.869318]  kasan_save_track+0x20/0x40
[   33.869360]  kasan_save_alloc_info+0x40/0x58
[   33.869400]  __kasan_kmalloc+0xd4/0xd8
[   33.869449]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.869493]  kasan_atomics+0xb8/0x2e0
[   33.869536]  kunit_try_run_case+0x170/0x3f0
[   33.869580]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.869636]  kthread+0x328/0x630
[   33.869671]  ret_from_fork+0x10/0x20
[   33.869710] 
[   33.869733] The buggy address belongs to the object at fff00000c8dc1a80
[   33.869733]  which belongs to the cache kmalloc-64 of size 64
[   33.869794] The buggy address is located 0 bytes to the right of
[   33.869794]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.869861] 
[   33.869886] The buggy address belongs to the physical page:
[   33.869919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.869986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.870386] page_type: f5(slab)
[   33.870443] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.870496] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.870668] page dumped because: kasan: bad access detected
[   33.870731] 
[   33.870753] Memory state around the buggy address:
[   33.870791]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.871160]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.871477] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.871536]                                      ^
[   33.871603]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.871887]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.872232] ==================================================================
[   33.769610] ==================================================================
[   33.769693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   33.769747] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.769908] 
[   33.769954] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.770045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.770076] Hardware name: linux,dummy-virt (DT)
[   33.770254] Call trace:
[   33.770293]  show_stack+0x20/0x38 (C)
[   33.770448]  dump_stack_lvl+0x8c/0xd0
[   33.770635]  print_report+0x118/0x608
[   33.770700]  kasan_report+0xdc/0x128
[   33.770885]  kasan_check_range+0x100/0x1a8
[   33.771367]  __kasan_check_write+0x20/0x30
[   33.771640]  kasan_atomics_helper+0x1414/0x4858
[   33.771993]  kasan_atomics+0x198/0x2e0
[   33.772523]  kunit_try_run_case+0x170/0x3f0
[   33.772691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.772774]  kthread+0x328/0x630
[   33.772998]  ret_from_fork+0x10/0x20
[   33.773422] 
[   33.773565] Allocated by task 298:
[   33.773838]  kasan_save_stack+0x3c/0x68
[   33.773903]  kasan_save_track+0x20/0x40
[   33.774113]  kasan_save_alloc_info+0x40/0x58
[   33.774249]  __kasan_kmalloc+0xd4/0xd8
[   33.774586]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.774673]  kasan_atomics+0xb8/0x2e0
[   33.774849]  kunit_try_run_case+0x170/0x3f0
[   33.774906]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.775222]  kthread+0x328/0x630
[   33.775368]  ret_from_fork+0x10/0x20
[   33.775725] 
[   33.775960] The buggy address belongs to the object at fff00000c8dc1a80
[   33.775960]  which belongs to the cache kmalloc-64 of size 64
[   33.776075] The buggy address is located 0 bytes to the right of
[   33.776075]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.776324] 
[   33.776489] The buggy address belongs to the physical page:
[   33.776529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.776738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.776984] page_type: f5(slab)
[   33.777323] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.777605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.777683] page dumped because: kasan: bad access detected
[   33.777802] 
[   33.777871] Memory state around the buggy address:
[   33.778048]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.778247]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.778460] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.778568]                                      ^
[   33.778616]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.778809]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.778949] ==================================================================
[   33.843647] ==================================================================
[   33.843695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   33.843946] Read of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.844201] 
[   33.844407] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.844527] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.844556] Hardware name: linux,dummy-virt (DT)
[   33.844591] Call trace:
[   33.844808]  show_stack+0x20/0x38 (C)
[   33.845090]  dump_stack_lvl+0x8c/0xd0
[   33.845174]  print_report+0x118/0x608
[   33.845377]  kasan_report+0xdc/0x128
[   33.845568]  __asan_report_load8_noabort+0x20/0x30
[   33.845869]  kasan_atomics_helper+0x3e10/0x4858
[   33.846120]  kasan_atomics+0x198/0x2e0
[   33.846184]  kunit_try_run_case+0x170/0x3f0
[   33.846240]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.846297]  kthread+0x328/0x630
[   33.846343]  ret_from_fork+0x10/0x20
[   33.846395] 
[   33.846677] Allocated by task 298:
[   33.847250]  kasan_save_stack+0x3c/0x68
[   33.847341]  kasan_save_track+0x20/0x40
[   33.847535]  kasan_save_alloc_info+0x40/0x58
[   33.847655]  __kasan_kmalloc+0xd4/0xd8
[   33.848022]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.848100]  kasan_atomics+0xb8/0x2e0
[   33.848477]  kunit_try_run_case+0x170/0x3f0
[   33.848678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.848941]  kthread+0x328/0x630
[   33.849152]  ret_from_fork+0x10/0x20
[   33.849373] 
[   33.849586] The buggy address belongs to the object at fff00000c8dc1a80
[   33.849586]  which belongs to the cache kmalloc-64 of size 64
[   33.849889] The buggy address is located 0 bytes to the right of
[   33.849889]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.850045] 
[   33.850135] The buggy address belongs to the physical page:
[   33.850233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.850376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.850437] page_type: f5(slab)
[   33.850481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.850534] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.850577] page dumped because: kasan: bad access detected
[   33.850631] 
[   33.850663] Memory state around the buggy address:
[   33.850697]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.850752]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.850799] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.850849]                                      ^
[   33.850894]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.850950]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.851003] ==================================================================
[   33.699198] ==================================================================
[   33.699259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   33.699361] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.699429] 
[   33.699599] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.699971] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.700006] Hardware name: linux,dummy-virt (DT)
[   33.700045] Call trace:
[   33.700072]  show_stack+0x20/0x38 (C)
[   33.700363]  dump_stack_lvl+0x8c/0xd0
[   33.700718]  print_report+0x118/0x608
[   33.700783]  kasan_report+0xdc/0x128
[   33.701297]  kasan_check_range+0x100/0x1a8
[   33.701497]  __kasan_check_write+0x20/0x30
[   33.701592]  kasan_atomics_helper+0x1058/0x4858
[   33.701765]  kasan_atomics+0x198/0x2e0
[   33.702031]  kunit_try_run_case+0x170/0x3f0
[   33.702403]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.702599]  kthread+0x328/0x630
[   33.702823]  ret_from_fork+0x10/0x20
[   33.703216] 
[   33.703280] Allocated by task 298:
[   33.703316]  kasan_save_stack+0x3c/0x68
[   33.703610]  kasan_save_track+0x20/0x40
[   33.703836]  kasan_save_alloc_info+0x40/0x58
[   33.703918]  __kasan_kmalloc+0xd4/0xd8
[   33.704159]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.704267]  kasan_atomics+0xb8/0x2e0
[   33.704311]  kunit_try_run_case+0x170/0x3f0
[   33.704356]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.704680]  kthread+0x328/0x630
[   33.704802]  ret_from_fork+0x10/0x20
[   33.704872] 
[   33.705050] The buggy address belongs to the object at fff00000c8dc1a80
[   33.705050]  which belongs to the cache kmalloc-64 of size 64
[   33.705206] The buggy address is located 0 bytes to the right of
[   33.705206]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.705497] 
[   33.705660] The buggy address belongs to the physical page:
[   33.705897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.706089] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.706370] page_type: f5(slab)
[   33.706505] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.706718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.706773] page dumped because: kasan: bad access detected
[   33.706809] 
[   33.706983] Memory state around the buggy address:
[   33.707164]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.707357]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.707417] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.707649]                                      ^
[   33.707727]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.707775]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.707977] ==================================================================
[   33.531754] ==================================================================
[   33.531966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858
[   33.532061] Write of size 4 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.532282] 
[   33.532436] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.533351]  print_report+0x118/0x608
[   33.534073]  kunit_try_run_case+0x170/0x3f0
[   33.535680]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.536558] 
[   33.536629] The buggy address belongs to the physical page:
[   33.536679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.536996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.537193] page_type: f5(slab)
[   33.537277] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.537426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.537497] page dumped because: kasan: bad access detected
[   33.537546] 
[   33.537640] Memory state around the buggy address:
[   33.537678]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.537750]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.537824] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.538042]                                      ^
[   33.538157]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.538293]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.538430] ==================================================================
[   33.786903] ==================================================================
[   33.786966] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   33.787018] Write of size 8 at addr fff00000c8dc1ab0 by task kunit_try_catch/298
[   33.787087] 
[   33.787120] CPU: 1 UID: 0 PID: 298 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   33.787210] Tainted: [B]=BAD_PAGE, [N]=TEST
[   33.787239] Hardware name: linux,dummy-virt (DT)
[   33.787273] Call trace:
[   33.787297]  show_stack+0x20/0x38 (C)
[   33.787365]  dump_stack_lvl+0x8c/0xd0
[   33.787418]  print_report+0x118/0x608
[   33.787476]  kasan_report+0xdc/0x128
[   33.787526]  kasan_check_range+0x100/0x1a8
[   33.787740]  __kasan_check_write+0x20/0x30
[   33.788015]  kasan_atomics_helper+0x14e4/0x4858
[   33.788070]  kasan_atomics+0x198/0x2e0
[   33.788695]  kunit_try_run_case+0x170/0x3f0
[   33.788793]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.789031]  kthread+0x328/0x630
[   33.789087]  ret_from_fork+0x10/0x20
[   33.789512] 
[   33.789578] Allocated by task 298:
[   33.789632]  kasan_save_stack+0x3c/0x68
[   33.789802]  kasan_save_track+0x20/0x40
[   33.790022]  kasan_save_alloc_info+0x40/0x58
[   33.790228]  __kasan_kmalloc+0xd4/0xd8
[   33.790334]  __kmalloc_cache_noprof+0x16c/0x3c0
[   33.790496]  kasan_atomics+0xb8/0x2e0
[   33.790710]  kunit_try_run_case+0x170/0x3f0
[   33.790891]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   33.791191]  kthread+0x328/0x630
[   33.791542]  ret_from_fork+0x10/0x20
[   33.791795] 
[   33.791840] The buggy address belongs to the object at fff00000c8dc1a80
[   33.791840]  which belongs to the cache kmalloc-64 of size 64
[   33.791936] The buggy address is located 0 bytes to the right of
[   33.791936]  allocated 48-byte region [fff00000c8dc1a80, fff00000c8dc1ab0)
[   33.792167] 
[   33.792325] The buggy address belongs to the physical page:
[   33.792487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x108dc1
[   33.792728] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   33.792822] page_type: f5(slab)
[   33.792968] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   33.793047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   33.793290] page dumped because: kasan: bad access detected
[   33.793479] 
[   33.793543] Memory state around the buggy address:
[   33.793591]  fff00000c8dc1980: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.793816]  fff00000c8dc1a00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   33.793960] >fff00000c8dc1a80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   33.794031]                                      ^
[   33.794250]  fff00000c8dc1b00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.794318]  fff00000c8dc1b80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   33.794434] ==================================================================

[   35.261209] ==================================================================
[   35.261497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858
[   35.261682] Read of size 4 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.261860] 
[   35.261897] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.261989] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.262493] Hardware name: linux,dummy-virt (DT)
[   35.262577] Call trace:
[   35.262603]  show_stack+0x20/0x38 (C)
[   35.262659]  dump_stack_lvl+0x8c/0xd0
[   35.262710]  print_report+0x118/0x608
[   35.262760]  kasan_report+0xdc/0x128
[   35.263291]  __asan_report_load4_noabort+0x20/0x30
[   35.263370]  kasan_atomics_helper+0x3e04/0x4858
[   35.263426]  kasan_atomics+0x198/0x2e0
[   35.263539]  kunit_try_run_case+0x170/0x3f0
[   35.263646]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.263950]  kthread+0x328/0x630
[   35.264276]  ret_from_fork+0x10/0x20
[   35.264497] 
[   35.264549] Allocated by task 296:
[   35.264619]  kasan_save_stack+0x3c/0x68
[   35.264668]  kasan_save_track+0x20/0x40
[   35.264884]  kasan_save_alloc_info+0x40/0x58
[   35.265215]  __kasan_kmalloc+0xd4/0xd8
[   35.265279]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.265461]  kasan_atomics+0xb8/0x2e0
[   35.265704]  kunit_try_run_case+0x170/0x3f0
[   35.265973]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.266127]  kthread+0x328/0x630
[   35.266189]  ret_from_fork+0x10/0x20
[   35.266228] 
[   35.266259] The buggy address belongs to the object at fff00000c997d800
[   35.266259]  which belongs to the cache kmalloc-64 of size 64
[   35.266322] The buggy address is located 0 bytes to the right of
[   35.266322]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.266404] 
[   35.266443] The buggy address belongs to the physical page:
[   35.266486] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.266541] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.266620] page_type: f5(slab)
[   35.266685] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.266769] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.266814] page dumped because: kasan: bad access detected
[   35.266846] 
[   35.266868] Memory state around the buggy address:
[   35.266900]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.266956]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.267007] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.267065]                                      ^
[   35.267121]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.267187]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.267234] ==================================================================
[   35.428657] ==================================================================
[   35.428772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858
[   35.428923] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.428999] 
[   35.429120] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.429242] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.429270] Hardware name: linux,dummy-virt (DT)
[   35.429305] Call trace:
[   35.429329]  show_stack+0x20/0x38 (C)
[   35.429398]  dump_stack_lvl+0x8c/0xd0
[   35.429454]  print_report+0x118/0x608
[   35.429723]  kasan_report+0xdc/0x128
[   35.429831]  kasan_check_range+0x100/0x1a8
[   35.429885]  __kasan_check_write+0x20/0x30
[   35.429952]  kasan_atomics_helper+0x175c/0x4858
[   35.430024]  kasan_atomics+0x198/0x2e0
[   35.430090]  kunit_try_run_case+0x170/0x3f0
[   35.430144]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.430224]  kthread+0x328/0x630
[   35.430268]  ret_from_fork+0x10/0x20
[   35.430319] 
[   35.430359] Allocated by task 296:
[   35.430392]  kasan_save_stack+0x3c/0x68
[   35.430590]  kasan_save_track+0x20/0x40
[   35.430738]  kasan_save_alloc_info+0x40/0x58
[   35.430802]  __kasan_kmalloc+0xd4/0xd8
[   35.430859]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.431093]  kasan_atomics+0xb8/0x2e0
[   35.431144]  kunit_try_run_case+0x170/0x3f0
[   35.431222]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.431289]  kthread+0x328/0x630
[   35.431350]  ret_from_fork+0x10/0x20
[   35.431397] 
[   35.431420] The buggy address belongs to the object at fff00000c997d800
[   35.431420]  which belongs to the cache kmalloc-64 of size 64
[   35.431489] The buggy address is located 0 bytes to the right of
[   35.431489]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.431557] 
[   35.431581] The buggy address belongs to the physical page:
[   35.431614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.431946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.432083] page_type: f5(slab)
[   35.432134] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.432375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.432600] page dumped because: kasan: bad access detected
[   35.432722] 
[   35.432778] Memory state around the buggy address:
[   35.432815]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.432861]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.433048] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.433212]                                      ^
[   35.433260]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.433314]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.433571] ==================================================================
[   35.183897] ==================================================================
[   35.183964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858
[   35.184032] Read of size 4 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.184086] 
[   35.184136] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.184238] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.184266] Hardware name: linux,dummy-virt (DT)
[   35.185052]  kthread+0x328/0x630
[   35.185983] The buggy address is located 0 bytes to the right of
[   35.185983]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.187408] 
[   35.188708]  kunit_try_run_case+0x170/0x3f0
[   35.189640]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.189697]  kasan_atomics+0xb8/0x2e0
[   35.189746]  kunit_try_run_case+0x170/0x3f0
[   35.189803]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.189858]  kthread+0x328/0x630
[   35.189909]  ret_from_fork+0x10/0x20
[   35.189949] 
[   35.189970] The buggy address belongs to the object at fff00000c997d800
[   35.189970]  which belongs to the cache kmalloc-64 of size 64
[   35.190048] The buggy address is located 0 bytes to the right of
[   35.190048]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.190116] 
[   35.190144] The buggy address belongs to the physical page:
[   35.190218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.190273] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.190332] page_type: f5(slab)
[   35.190372] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.190426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.190470] page dumped because: kasan: bad access detected
[   35.190515] 
[   35.190545] Memory state around the buggy address:
[   35.190580]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.190647]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.190700] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.190751]                                      ^
[   35.190785]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.190829]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.190891] ==================================================================
[   35.433966] ==================================================================
[   35.434259] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858
[   35.434334] Read of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.434388] 
[   35.434454] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.434543] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.434582] Hardware name: linux,dummy-virt (DT)
[   35.434626] Call trace:
[   35.434667]  show_stack+0x20/0x38 (C)
[   35.434795]  dump_stack_lvl+0x8c/0xd0
[   35.434871]  print_report+0x118/0x608
[   35.434934]  kasan_report+0xdc/0x128
[   35.435181]  __asan_report_load8_noabort+0x20/0x30
[   35.435247]  kasan_atomics_helper+0x3e20/0x4858
[   35.435299]  kasan_atomics+0x198/0x2e0
[   35.435355]  kunit_try_run_case+0x170/0x3f0
[   35.435427]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.435532]  kthread+0x328/0x630
[   35.435619]  ret_from_fork+0x10/0x20
[   35.435670] 
[   35.435693] Allocated by task 296:
[   35.435868]  kasan_save_stack+0x3c/0x68
[   35.435916]  kasan_save_track+0x20/0x40
[   35.436084]  kasan_save_alloc_info+0x40/0x58
[   35.436194]  __kasan_kmalloc+0xd4/0xd8
[   35.436262]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.436328]  kasan_atomics+0xb8/0x2e0
[   35.436635]  kunit_try_run_case+0x170/0x3f0
[   35.436752]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.436883]  kthread+0x328/0x630
[   35.436953]  ret_from_fork+0x10/0x20
[   35.437021] 
[   35.437076] The buggy address belongs to the object at fff00000c997d800
[   35.437076]  which belongs to the cache kmalloc-64 of size 64
[   35.437138] The buggy address is located 0 bytes to the right of
[   35.437138]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.437409] 
[   35.437570] The buggy address belongs to the physical page:
[   35.437631] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.437704] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.437777] page_type: f5(slab)
[   35.437970] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.438120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.438265] page dumped because: kasan: bad access detected
[   35.438325] 
[   35.438364] Memory state around the buggy address:
[   35.438398]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.438453]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.438664] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.438820]                                      ^
[   35.438906]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.439086]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.439251] ==================================================================
[   35.269195] ==================================================================
[   35.269280] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858
[   35.269336] Read of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.269480] 
[   35.269521] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.269619] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.270018] Hardware name: linux,dummy-virt (DT)
[   35.270076] Call trace:
[   35.270103]  show_stack+0x20/0x38 (C)
[   35.270479]  dump_stack_lvl+0x8c/0xd0
[   35.270594]  print_report+0x118/0x608
[   35.270657]  kasan_report+0xdc/0x128
[   35.270707]  kasan_check_range+0x100/0x1a8
[   35.271009]  __kasan_check_read+0x20/0x30
[   35.271268]  kasan_atomics_helper+0xdd4/0x4858
[   35.271341]  kasan_atomics+0x198/0x2e0
[   35.271619]  kunit_try_run_case+0x170/0x3f0
[   35.271761]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.271846]  kthread+0x328/0x630
[   35.272181]  ret_from_fork+0x10/0x20
[   35.272476] 
[   35.272613] Allocated by task 296:
[   35.272670]  kasan_save_stack+0x3c/0x68
[   35.272825]  kasan_save_track+0x20/0x40
[   35.273476]  kasan_save_alloc_info+0x40/0x58
[   35.273564]  __kasan_kmalloc+0xd4/0xd8
[   35.273608]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.273820]  kasan_atomics+0xb8/0x2e0
[   35.274054]  kunit_try_run_case+0x170/0x3f0
[   35.274114]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.274379]  kthread+0x328/0x630
[   35.274435]  ret_from_fork+0x10/0x20
[   35.274807] 
[   35.275295] The buggy address belongs to the object at fff00000c997d800
[   35.275295]  which belongs to the cache kmalloc-64 of size 64
[   35.275398] The buggy address is located 0 bytes to the right of
[   35.275398]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.275565] 
[   35.275616] The buggy address belongs to the physical page:
[   35.275797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.275974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.276177] page_type: f5(slab)
[   35.276509] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.276722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.276804] page dumped because: kasan: bad access detected
[   35.276954] 
[   35.276996] Memory state around the buggy address:
[   35.277052]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.277104]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.277149] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.277398]                                      ^
[   35.277506]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.277881]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.278148] ==================================================================
[   35.361785] ==================================================================
[   35.361963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858
[   35.362185] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.362279] 
[   35.362350] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.362441] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.362469] Hardware name: linux,dummy-virt (DT)
[   35.362503] Call trace:
[   35.362552]  show_stack+0x20/0x38 (C)
[   35.362605]  dump_stack_lvl+0x8c/0xd0
[   35.362654]  print_report+0x118/0x608
[   35.362711]  kasan_report+0xdc/0x128
[   35.362918]  kasan_check_range+0x100/0x1a8
[   35.363012]  __kasan_check_write+0x20/0x30
[   35.363065]  kasan_atomics_helper+0x126c/0x4858
[   35.363124]  kasan_atomics+0x198/0x2e0
[   35.363189]  kunit_try_run_case+0x170/0x3f0
[   35.363251]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.363435]  kthread+0x328/0x630
[   35.363536]  ret_from_fork+0x10/0x20
[   35.363885] 
[   35.364034] Allocated by task 296:
[   35.364238]  kasan_save_stack+0x3c/0x68
[   35.364311]  kasan_save_track+0x20/0x40
[   35.364388]  kasan_save_alloc_info+0x40/0x58
[   35.364502]  __kasan_kmalloc+0xd4/0xd8
[   35.364544]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.364603]  kasan_atomics+0xb8/0x2e0
[   35.364648]  kunit_try_run_case+0x170/0x3f0
[   35.364690]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.364934]  kthread+0x328/0x630
[   35.365065]  ret_from_fork+0x10/0x20
[   35.365136] 
[   35.365421] The buggy address belongs to the object at fff00000c997d800
[   35.365421]  which belongs to the cache kmalloc-64 of size 64
[   35.365499] The buggy address is located 0 bytes to the right of
[   35.365499]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.365749] 
[   35.365890] The buggy address belongs to the physical page:
[   35.365946] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.366028] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.366302] page_type: f5(slab)
[   35.366369] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.366466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.366545] page dumped because: kasan: bad access detected
[   35.366581] 
[   35.366602] Memory state around the buggy address:
[   35.366723]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.366958]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.367014] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.367080]                                      ^
[   35.367115]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.367182]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.367223] ==================================================================
[   35.337119] ==================================================================
[   35.337186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858
[   35.337237] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.337390] 
[   35.337561] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.337684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.337722] Hardware name: linux,dummy-virt (DT)
[   35.337765] Call trace:
[   35.337791]  show_stack+0x20/0x38 (C)
[   35.337993]  dump_stack_lvl+0x8c/0xd0
[   35.338095]  print_report+0x118/0x608
[   35.338148]  kasan_report+0xdc/0x128
[   35.338225]  kasan_check_range+0x100/0x1a8
[   35.338282]  __kasan_check_write+0x20/0x30
[   35.338338]  kasan_atomics_helper+0x1058/0x4858
[   35.338391]  kasan_atomics+0x198/0x2e0
[   35.338481]  kunit_try_run_case+0x170/0x3f0
[   35.338536]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.338601]  kthread+0x328/0x630
[   35.338654]  ret_from_fork+0x10/0x20
[   35.338706] 
[   35.338735] Allocated by task 296:
[   35.338773]  kasan_save_stack+0x3c/0x68
[   35.338827]  kasan_save_track+0x20/0x40
[   35.338869]  kasan_save_alloc_info+0x40/0x58
[   35.338907]  __kasan_kmalloc+0xd4/0xd8
[   35.339110]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.339175]  kasan_atomics+0xb8/0x2e0
[   35.339291]  kunit_try_run_case+0x170/0x3f0
[   35.339358]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.339419]  kthread+0x328/0x630
[   35.339460]  ret_from_fork+0x10/0x20
[   35.339724] 
[   35.339786] The buggy address belongs to the object at fff00000c997d800
[   35.339786]  which belongs to the cache kmalloc-64 of size 64
[   35.339920] The buggy address is located 0 bytes to the right of
[   35.339920]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.340014] 
[   35.340040] The buggy address belongs to the physical page:
[   35.340073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.340297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.340459] page_type: f5(slab)
[   35.340610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.340709] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.340791] page dumped because: kasan: bad access detected
[   35.341057] 
[   35.341122] Memory state around the buggy address:
[   35.341170]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.341329]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.341529] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.341647]                                      ^
[   35.341751]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.341813]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.342050] ==================================================================
[   35.424349] ==================================================================
[   35.424391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858
[   35.424448] Read of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.424500] 
[   35.424540] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.424626] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.424656] Hardware name: linux,dummy-virt (DT)
[   35.424689] Call trace:
[   35.424714]  show_stack+0x20/0x38 (C)
[   35.424763]  dump_stack_lvl+0x8c/0xd0
[   35.424814]  print_report+0x118/0x608
[   35.424863]  kasan_report+0xdc/0x128
[   35.424912]  __asan_report_load8_noabort+0x20/0x30
[   35.424973]  kasan_atomics_helper+0x3e10/0x4858
[   35.425032]  kasan_atomics+0x198/0x2e0
[   35.425082]  kunit_try_run_case+0x170/0x3f0
[   35.425141]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.425221]  kthread+0x328/0x630
[   35.425265]  ret_from_fork+0x10/0x20
[   35.425355] 
[   35.425497] Allocated by task 296:
[   35.425844]  kasan_save_stack+0x3c/0x68
[   35.425909]  kasan_save_track+0x20/0x40
[   35.425976]  kasan_save_alloc_info+0x40/0x58
[   35.426018]  __kasan_kmalloc+0xd4/0xd8
[   35.426056]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.426099]  kasan_atomics+0xb8/0x2e0
[   35.426185]  kunit_try_run_case+0x170/0x3f0
[   35.426230]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.426287]  kthread+0x328/0x630
[   35.426333]  ret_from_fork+0x10/0x20
[   35.426373] 
[   35.426395] The buggy address belongs to the object at fff00000c997d800
[   35.426395]  which belongs to the cache kmalloc-64 of size 64
[   35.426553] The buggy address is located 0 bytes to the right of
[   35.426553]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.426626] 
[   35.426675] The buggy address belongs to the physical page:
[   35.426743] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.426808] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.426887] page_type: f5(slab)
[   35.426944] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.427347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.427492] page dumped because: kasan: bad access detected
[   35.427574] 
[   35.427620] Memory state around the buggy address:
[   35.427654]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.427699]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.427745] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.427787]                                      ^
[   35.427874]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.428026]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.428094] ==================================================================
[   35.401851] ==================================================================
[   35.401922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858
[   35.401990] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.402172] 
[   35.402292] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.402389] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.402436] Hardware name: linux,dummy-virt (DT)
[   35.402470] Call trace:
[   35.402512]  show_stack+0x20/0x38 (C)
[   35.402565]  dump_stack_lvl+0x8c/0xd0
[   35.402616]  print_report+0x118/0x608
[   35.402666]  kasan_report+0xdc/0x128
[   35.402713]  kasan_check_range+0x100/0x1a8
[   35.402770]  __kasan_check_write+0x20/0x30
[   35.402819]  kasan_atomics_helper+0x15b4/0x4858
[   35.402880]  kasan_atomics+0x198/0x2e0
[   35.402931]  kunit_try_run_case+0x170/0x3f0
[   35.402982]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.403047]  kthread+0x328/0x630
[   35.403091]  ret_from_fork+0x10/0x20
[   35.403142] 
[   35.403184] Allocated by task 296:
[   35.403214]  kasan_save_stack+0x3c/0x68
[   35.403259]  kasan_save_track+0x20/0x40
[   35.403300]  kasan_save_alloc_info+0x40/0x58
[   35.403340]  __kasan_kmalloc+0xd4/0xd8
[   35.403389]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.403432]  kasan_atomics+0xb8/0x2e0
[   35.403471]  kunit_try_run_case+0x170/0x3f0
[   35.403513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.403560]  kthread+0x328/0x630
[   35.403729]  ret_from_fork+0x10/0x20
[   35.403773] 
[   35.403795] The buggy address belongs to the object at fff00000c997d800
[   35.403795]  which belongs to the cache kmalloc-64 of size 64
[   35.404087] The buggy address is located 0 bytes to the right of
[   35.404087]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.404212] 
[   35.404263] The buggy address belongs to the physical page:
[   35.404333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.404424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.404520] page_type: f5(slab)
[   35.404561] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.404743] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.404840] page dumped because: kasan: bad access detected
[   35.404909] 
[   35.404992] Memory state around the buggy address:
[   35.405057]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.405126]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.405181] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.405259]                                      ^
[   35.405298]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.405472]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.405560] ==================================================================
[   35.202844] ==================================================================
[   35.202898] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858
[   35.203044] Write of size 4 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.203111] 
[   35.203150] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.203321] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.203355] Hardware name: linux,dummy-virt (DT)
[   35.203912]  kasan_report+0xdc/0x128
[   35.206247]  ret_from_fork+0x10/0x20
[   35.206690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.206750] page_type: f5(slab)
[   35.206799] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.206853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.207214]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.211269] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.211975] 
[   35.212524] The buggy address is located 0 bytes to the right of
[   35.212524]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.212698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.212747] page_type: f5(slab)
[   35.212786] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.212839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.213100]                                      ^
[   35.213802] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.216189] 
[   35.216433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.218815] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858
[   35.219564]  __kasan_check_write+0x20/0x30
[   35.220622]  ret_from_fork+0x10/0x20
[   35.220953] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.222461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858
[   35.223677]  kasan_save_track+0x20/0x40
[   35.225533] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.227549] 
[   35.228388]  dump_stack_lvl+0x8c/0xd0
[   35.229150]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.230343] page_type: f5(slab)
[   35.231232]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.232887] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.233599]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.234651] 
[   35.234906] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.235719] Hardware name: linux,dummy-virt (DT)
[   35.237422]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.237984] page dumped because: kasan: bad access detected
[   35.238018] 
[   35.238038] Memory state around the buggy address:
[   35.238071]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.238116]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.238169] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.238209]                                      ^
[   35.238242]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.238286]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.238327] ==================================================================
[   35.357337] ==================================================================
[   35.357497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858
[   35.357585] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.357657] 
[   35.357695] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.357785] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.357812] Hardware name: linux,dummy-virt (DT)
[   35.357863] Call trace:
[   35.357888]  show_stack+0x20/0x38 (C)
[   35.357938]  dump_stack_lvl+0x8c/0xd0
[   35.357988]  print_report+0x118/0x608
[   35.358075]  kasan_report+0xdc/0x128
[   35.358127]  kasan_check_range+0x100/0x1a8
[   35.358281]  __kasan_check_write+0x20/0x30
[   35.358406]  kasan_atomics_helper+0x11f8/0x4858
[   35.358466]  kasan_atomics+0x198/0x2e0
[   35.358516]  kunit_try_run_case+0x170/0x3f0
[   35.358569]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.358785]  kthread+0x328/0x630
[   35.358842]  ret_from_fork+0x10/0x20
[   35.358909] 
[   35.358943] Allocated by task 296:
[   35.358992]  kasan_save_stack+0x3c/0x68
[   35.359037]  kasan_save_track+0x20/0x40
[   35.359105]  kasan_save_alloc_info+0x40/0x58
[   35.359152]  __kasan_kmalloc+0xd4/0xd8
[   35.359204]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.359254]  kasan_atomics+0xb8/0x2e0
[   35.359294]  kunit_try_run_case+0x170/0x3f0
[   35.359341]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.359397]  kthread+0x328/0x630
[   35.359462]  ret_from_fork+0x10/0x20
[   35.359538] 
[   35.359596] The buggy address belongs to the object at fff00000c997d800
[   35.359596]  which belongs to the cache kmalloc-64 of size 64
[   35.359686] The buggy address is located 0 bytes to the right of
[   35.359686]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.359805] 
[   35.359855] The buggy address belongs to the physical page:
[   35.359924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.360015] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.360081] page_type: f5(slab)
[   35.360136] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.360197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.360241] page dumped because: kasan: bad access detected
[   35.360275] 
[   35.360295] Memory state around the buggy address:
[   35.360329]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.360627]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.360745] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.360838]                                      ^
[   35.360900]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.361246]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.361331] ==================================================================
[   35.331343] ==================================================================
[   35.331391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858
[   35.331469] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.331551] 
[   35.331611] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.331725] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.331786] Hardware name: linux,dummy-virt (DT)
[   35.331841] Call trace:
[   35.331883]  show_stack+0x20/0x38 (C)
[   35.331944]  dump_stack_lvl+0x8c/0xd0
[   35.332021]  print_report+0x118/0x608
[   35.332072]  kasan_report+0xdc/0x128
[   35.332121]  kasan_check_range+0x100/0x1a8
[   35.332184]  __kasan_check_write+0x20/0x30
[   35.332233]  kasan_atomics_helper+0xff0/0x4858
[   35.332284]  kasan_atomics+0x198/0x2e0
[   35.332333]  kunit_try_run_case+0x170/0x3f0
[   35.332573]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.332715]  kthread+0x328/0x630
[   35.332815]  ret_from_fork+0x10/0x20
[   35.332902] 
[   35.333176] Allocated by task 296:
[   35.333237]  kasan_save_stack+0x3c/0x68
[   35.333338]  kasan_save_track+0x20/0x40
[   35.333414]  kasan_save_alloc_info+0x40/0x58
[   35.333455]  __kasan_kmalloc+0xd4/0xd8
[   35.333499]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.333777]  kasan_atomics+0xb8/0x2e0
[   35.333856]  kunit_try_run_case+0x170/0x3f0
[   35.333942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.334016]  kthread+0x328/0x630
[   35.334082]  ret_from_fork+0x10/0x20
[   35.334336] 
[   35.334416] The buggy address belongs to the object at fff00000c997d800
[   35.334416]  which belongs to the cache kmalloc-64 of size 64
[   35.334543] The buggy address is located 0 bytes to the right of
[   35.334543]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.334613] 
[   35.334636] The buggy address belongs to the physical page:
[   35.334690] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.334978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.335065] page_type: f5(slab)
[   35.335369] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.335475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.335556] page dumped because: kasan: bad access detected
[   35.335638] 
[   35.335692] Memory state around the buggy address:
[   35.335772]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.335853]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.335926] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.336198]                                      ^
[   35.336256]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.336371]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.336475] ==================================================================
[   35.439847] ==================================================================
[   35.439971] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858
[   35.440023] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.440075] 
[   35.440118] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.440422] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.440543] Hardware name: linux,dummy-virt (DT)
[   35.440603] Call trace:
[   35.440684]  show_stack+0x20/0x38 (C)
[   35.440752]  dump_stack_lvl+0x8c/0xd0
[   35.440805]  print_report+0x118/0x608
[   35.440869]  kasan_report+0xdc/0x128
[   35.441074]  kasan_check_range+0x100/0x1a8
[   35.441268]  __kasan_check_write+0x20/0x30
[   35.441385]  kasan_atomics_helper+0x17ec/0x4858
[   35.441453]  kasan_atomics+0x198/0x2e0
[   35.441526]  kunit_try_run_case+0x170/0x3f0
[   35.441587]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.441684]  kthread+0x328/0x630
[   35.441739]  ret_from_fork+0x10/0x20
[   35.441807] 
[   35.441840] Allocated by task 296:
[   35.441873]  kasan_save_stack+0x3c/0x68
[   35.441918]  kasan_save_track+0x20/0x40
[   35.441959]  kasan_save_alloc_info+0x40/0x58
[   35.441998]  __kasan_kmalloc+0xd4/0xd8
[   35.442038]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.442081]  kasan_atomics+0xb8/0x2e0
[   35.442121]  kunit_try_run_case+0x170/0x3f0
[   35.442468]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.442576]  kthread+0x328/0x630
[   35.442635]  ret_from_fork+0x10/0x20
[   35.442681] 
[   35.442706] The buggy address belongs to the object at fff00000c997d800
[   35.442706]  which belongs to the cache kmalloc-64 of size 64
[   35.442776] The buggy address is located 0 bytes to the right of
[   35.442776]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.442851] 
[   35.442891] The buggy address belongs to the physical page:
[   35.442926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.442981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.443252] page_type: f5(slab)
[   35.443308] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.443401] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.443460] page dumped because: kasan: bad access detected
[   35.443524] 
[   35.443588] Memory state around the buggy address:
[   35.443777]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.443976]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.444056] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.444192]                                      ^
[   35.444230]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.444275]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.444317] ==================================================================
[   35.353327] ==================================================================
[   35.353381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858
[   35.353449] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.353507] 
[   35.353557] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.353710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.353742] Hardware name: linux,dummy-virt (DT)
[   35.353774] Call trace:
[   35.353800]  show_stack+0x20/0x38 (C)
[   35.353859]  dump_stack_lvl+0x8c/0xd0
[   35.353919]  print_report+0x118/0x608
[   35.353967]  kasan_report+0xdc/0x128
[   35.354016]  kasan_check_range+0x100/0x1a8
[   35.354083]  __kasan_check_write+0x20/0x30
[   35.354131]  kasan_atomics_helper+0x1190/0x4858
[   35.354193]  kasan_atomics+0x198/0x2e0
[   35.354250]  kunit_try_run_case+0x170/0x3f0
[   35.354303]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.354369]  kthread+0x328/0x630
[   35.354413]  ret_from_fork+0x10/0x20
[   35.354463] 
[   35.354486] Allocated by task 296:
[   35.354522]  kasan_save_stack+0x3c/0x68
[   35.354565]  kasan_save_track+0x20/0x40
[   35.354607]  kasan_save_alloc_info+0x40/0x58
[   35.354647]  __kasan_kmalloc+0xd4/0xd8
[   35.354687]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.354734]  kasan_atomics+0xb8/0x2e0
[   35.354783]  kunit_try_run_case+0x170/0x3f0
[   35.354847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.354908]  kthread+0x328/0x630
[   35.354944]  ret_from_fork+0x10/0x20
[   35.354994] 
[   35.355015] The buggy address belongs to the object at fff00000c997d800
[   35.355015]  which belongs to the cache kmalloc-64 of size 64
[   35.355087] The buggy address is located 0 bytes to the right of
[   35.355087]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.355586] 
[   35.355623] The buggy address belongs to the physical page:
[   35.355659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.355714] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.356025] page_type: f5(slab)
[   35.356179] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.356256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.356338] page dumped because: kasan: bad access detected
[   35.356418] 
[   35.356459] Memory state around the buggy address:
[   35.356499]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.356546]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.356605] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.356645]                                      ^
[   35.356679]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.356725]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.356766] ==================================================================
[   35.319841] ==================================================================
[   35.320039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858
[   35.320124] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.320241] 
[   35.320299] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.320465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.320497] Hardware name: linux,dummy-virt (DT)
[   35.320847] Call trace:
[   35.321247]  show_stack+0x20/0x38 (C)
[   35.321306]  dump_stack_lvl+0x8c/0xd0
[   35.321463]  print_report+0x118/0x608
[   35.321561]  kasan_report+0xdc/0x128
[   35.321824]  kasan_check_range+0x100/0x1a8
[   35.321908]  __kasan_check_write+0x20/0x30
[   35.321969]  kasan_atomics_helper+0xf20/0x4858
[   35.322029]  kasan_atomics+0x198/0x2e0
[   35.322078]  kunit_try_run_case+0x170/0x3f0
[   35.322131]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.322208]  kthread+0x328/0x630
[   35.322253]  ret_from_fork+0x10/0x20
[   35.322304] 
[   35.322351] Allocated by task 296:
[   35.322397]  kasan_save_stack+0x3c/0x68
[   35.322452]  kasan_save_track+0x20/0x40
[   35.322518]  kasan_save_alloc_info+0x40/0x58
[   35.322564]  __kasan_kmalloc+0xd4/0xd8
[   35.322619]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.322665]  kasan_atomics+0xb8/0x2e0
[   35.322712]  kunit_try_run_case+0x170/0x3f0
[   35.322764]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.322819]  kthread+0x328/0x630
[   35.322864]  ret_from_fork+0x10/0x20
[   35.322903] 
[   35.322936] The buggy address belongs to the object at fff00000c997d800
[   35.322936]  which belongs to the cache kmalloc-64 of size 64
[   35.323002] The buggy address is located 0 bytes to the right of
[   35.323002]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.323076] 
[   35.323100] The buggy address belongs to the physical page:
[   35.323132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.323416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.323755] page_type: f5(slab)
[   35.323803] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.324734] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.324852] page dumped because: kasan: bad access detected
[   35.325287] 
[   35.325400] Memory state around the buggy address:
[   35.325793]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.325916]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.326014] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.326056]                                      ^
[   35.326288]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.326459]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.326688] ==================================================================
[   35.421001] ==================================================================
[   35.421074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858
[   35.421153] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.421282] 
[   35.421330] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.421429] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.421490] Hardware name: linux,dummy-virt (DT)
[   35.421523] Call trace:
[   35.421549]  show_stack+0x20/0x38 (C)
[   35.421612]  dump_stack_lvl+0x8c/0xd0
[   35.421664]  print_report+0x118/0x608
[   35.421713]  kasan_report+0xdc/0x128
[   35.421762]  kasan_check_range+0x100/0x1a8
[   35.422023]  __kasan_check_write+0x20/0x30
[   35.422084]  kasan_atomics_helper+0x16d0/0x4858
[   35.422231]  kasan_atomics+0x198/0x2e0
[   35.422321]  kunit_try_run_case+0x170/0x3f0
[   35.422543]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.422630]  kthread+0x328/0x630
[   35.422702]  ret_from_fork+0x10/0x20
[   35.422786] 
[   35.422816] Allocated by task 296:
[   35.422865]  kasan_save_stack+0x3c/0x68
[   35.422922]  kasan_save_track+0x20/0x40
[   35.422963]  kasan_save_alloc_info+0x40/0x58
[   35.423045]  __kasan_kmalloc+0xd4/0xd8
[   35.423091]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.423134]  kasan_atomics+0xb8/0x2e0
[   35.423203]  kunit_try_run_case+0x170/0x3f0
[   35.423274]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.423331]  kthread+0x328/0x630
[   35.423373]  ret_from_fork+0x10/0x20
[   35.423418] 
[   35.423449] The buggy address belongs to the object at fff00000c997d800
[   35.423449]  which belongs to the cache kmalloc-64 of size 64
[   35.423519] The buggy address is located 0 bytes to the right of
[   35.423519]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.423588] 
[   35.423612] The buggy address belongs to the physical page:
[   35.423645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.423698] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.423747] page_type: f5(slab)
[   35.423787] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.423839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.423882] page dumped because: kasan: bad access detected
[   35.423927] 
[   35.423953] Memory state around the buggy address:
[   35.423997]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.424043]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.424096] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.424137]                                      ^
[   35.424181]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.424227]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.424267] ==================================================================
[   35.280099] ==================================================================
[   35.280261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858
[   35.280318] Read of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.280371] 
[   35.280734] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.280835] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.281110] Hardware name: linux,dummy-virt (DT)
[   35.281191] Call trace:
[   35.281220]  show_stack+0x20/0x38 (C)
[   35.281405]  dump_stack_lvl+0x8c/0xd0
[   35.281459]  print_report+0x118/0x608
[   35.281516]  kasan_report+0xdc/0x128
[   35.281565]  __asan_report_load8_noabort+0x20/0x30
[   35.281618]  kasan_atomics_helper+0x3f58/0x4858
[   35.281670]  kasan_atomics+0x198/0x2e0
[   35.281720]  kunit_try_run_case+0x170/0x3f0
[   35.281772]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.281830]  kthread+0x328/0x630
[   35.281876]  ret_from_fork+0x10/0x20
[   35.281927] 
[   35.282632] Allocated by task 296:
[   35.283078]  kasan_save_stack+0x3c/0x68
[   35.283307]  kasan_save_track+0x20/0x40
[   35.283678]  kasan_save_alloc_info+0x40/0x58
[   35.283849]  __kasan_kmalloc+0xd4/0xd8
[   35.283920]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.284319]  kasan_atomics+0xb8/0x2e0
[   35.284460]  kunit_try_run_case+0x170/0x3f0
[   35.284535]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.284797]  kthread+0x328/0x630
[   35.284942]  ret_from_fork+0x10/0x20
[   35.285109] 
[   35.285279] The buggy address belongs to the object at fff00000c997d800
[   35.285279]  which belongs to the cache kmalloc-64 of size 64
[   35.285712] The buggy address is located 0 bytes to the right of
[   35.285712]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.285888] 
[   35.285962] The buggy address belongs to the physical page:
[   35.286030] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.286372] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.286564] page_type: f5(slab)
[   35.286716] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.286775] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.286924] page dumped because: kasan: bad access detected
[   35.287333] 
[   35.287444] Memory state around the buggy address:
[   35.287597]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.287669]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.288110] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.288250]                                      ^
[   35.288394]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.288473]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.288530] ==================================================================
[   35.342765] ==================================================================
[   35.342819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858
[   35.342870] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.343051] 
[   35.343108] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.343315] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.343364] Hardware name: linux,dummy-virt (DT)
[   35.343408] Call trace:
[   35.343444]  show_stack+0x20/0x38 (C)
[   35.343742]  dump_stack_lvl+0x8c/0xd0
[   35.343840]  print_report+0x118/0x608
[   35.343954]  kasan_report+0xdc/0x128
[   35.344049]  kasan_check_range+0x100/0x1a8
[   35.344208]  __kasan_check_write+0x20/0x30
[   35.344305]  kasan_atomics_helper+0x10c0/0x4858
[   35.344417]  kasan_atomics+0x198/0x2e0
[   35.344502]  kunit_try_run_case+0x170/0x3f0
[   35.344558]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.344755]  kthread+0x328/0x630
[   35.344810]  ret_from_fork+0x10/0x20
[   35.345094] 
[   35.345154] Allocated by task 296:
[   35.345222]  kasan_save_stack+0x3c/0x68
[   35.345345]  kasan_save_track+0x20/0x40
[   35.345415]  kasan_save_alloc_info+0x40/0x58
[   35.345675]  __kasan_kmalloc+0xd4/0xd8
[   35.345772]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.345858]  kasan_atomics+0xb8/0x2e0
[   35.345949]  kunit_try_run_case+0x170/0x3f0
[   35.346025]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.346109]  kthread+0x328/0x630
[   35.346195]  ret_from_fork+0x10/0x20
[   35.346255] 
[   35.346278] The buggy address belongs to the object at fff00000c997d800
[   35.346278]  which belongs to the cache kmalloc-64 of size 64
[   35.346374] The buggy address is located 0 bytes to the right of
[   35.346374]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.346751] 
[   35.346924] The buggy address belongs to the physical page:
[   35.347090] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.347250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.347309] page_type: f5(slab)
[   35.347364] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.347418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.347461] page dumped because: kasan: bad access detected
[   35.347517] 
[   35.347539] Memory state around the buggy address:
[   35.347583]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.347633]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.347679] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.347731]                                      ^
[   35.347775]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.347820]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.347871] ==================================================================
[   35.385587] ==================================================================
[   35.385639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858
[   35.385707] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.385971] 
[   35.386047] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.386148] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.386206] Hardware name: linux,dummy-virt (DT)
[   35.386242] Call trace:
[   35.386273]  show_stack+0x20/0x38 (C)
[   35.386332]  dump_stack_lvl+0x8c/0xd0
[   35.386383]  print_report+0x118/0x608
[   35.386433]  kasan_report+0xdc/0x128
[   35.386481]  kasan_check_range+0x100/0x1a8
[   35.386528]  __kasan_check_write+0x20/0x30
[   35.386709]  kasan_atomics_helper+0x147c/0x4858
[   35.386794]  kasan_atomics+0x198/0x2e0
[   35.386845]  kunit_try_run_case+0x170/0x3f0
[   35.386904]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.386980]  kthread+0x328/0x630
[   35.387193]  ret_from_fork+0x10/0x20
[   35.387313] 
[   35.387340] Allocated by task 296:
[   35.387389]  kasan_save_stack+0x3c/0x68
[   35.387488]  kasan_save_track+0x20/0x40
[   35.387575]  kasan_save_alloc_info+0x40/0x58
[   35.387689]  __kasan_kmalloc+0xd4/0xd8
[   35.387755]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.387798]  kasan_atomics+0xb8/0x2e0
[   35.387838]  kunit_try_run_case+0x170/0x3f0
[   35.387880]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.387928]  kthread+0x328/0x630
[   35.388096]  ret_from_fork+0x10/0x20
[   35.388143] 
[   35.388176] The buggy address belongs to the object at fff00000c997d800
[   35.388176]  which belongs to the cache kmalloc-64 of size 64
[   35.388290] The buggy address is located 0 bytes to the right of
[   35.388290]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.388434] 
[   35.388493] The buggy address belongs to the physical page:
[   35.388596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.388691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.388751] page_type: f5(slab)
[   35.388791] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.388844] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.389054] page dumped because: kasan: bad access detected
[   35.389193] 
[   35.389241] Memory state around the buggy address:
[   35.389297]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.389343]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.389388] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.389701]                                      ^
[   35.389821]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.389900]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.389992] ==================================================================
[   35.367565] ==================================================================
[   35.367679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858
[   35.367810] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.367863] 
[   35.367895] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.368132] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.368270] Hardware name: linux,dummy-virt (DT)
[   35.368324] Call trace:
[   35.368366]  show_stack+0x20/0x38 (C)
[   35.368472]  dump_stack_lvl+0x8c/0xd0
[   35.368558]  print_report+0x118/0x608
[   35.368817]  kasan_report+0xdc/0x128
[   35.368976]  kasan_check_range+0x100/0x1a8
[   35.369072]  __kasan_check_write+0x20/0x30
[   35.369180]  kasan_atomics_helper+0x12d8/0x4858
[   35.369283]  kasan_atomics+0x198/0x2e0
[   35.369360]  kunit_try_run_case+0x170/0x3f0
[   35.369449]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.369541]  kthread+0x328/0x630
[   35.369585]  ret_from_fork+0x10/0x20
[   35.369636] 
[   35.369668] Allocated by task 296:
[   35.369712]  kasan_save_stack+0x3c/0x68
[   35.369772]  kasan_save_track+0x20/0x40
[   35.369823]  kasan_save_alloc_info+0x40/0x58
[   35.369864]  __kasan_kmalloc+0xd4/0xd8
[   35.369904]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.369947]  kasan_atomics+0xb8/0x2e0
[   35.369986]  kunit_try_run_case+0x170/0x3f0
[   35.370028]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.370077]  kthread+0x328/0x630
[   35.370113]  ret_from_fork+0x10/0x20
[   35.370153] 
[   35.370184] The buggy address belongs to the object at fff00000c997d800
[   35.370184]  which belongs to the cache kmalloc-64 of size 64
[   35.370245] The buggy address is located 0 bytes to the right of
[   35.370245]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.370335] 
[   35.370558] The buggy address belongs to the physical page:
[   35.370672] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.370755] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.370840] page_type: f5(slab)
[   35.370993] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.371142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.371228] page dumped because: kasan: bad access detected
[   35.371315] 
[   35.371352] Memory state around the buggy address:
[   35.371386]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.371433]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.371478] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.371519]                                      ^
[   35.371755]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.371828]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.371879] ==================================================================
[   35.192406] ==================================================================
[   35.192481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858
[   35.192617] Write of size 4 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.192704] 
[   35.192738] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.192964] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.193000] Hardware name: linux,dummy-virt (DT)
[   35.193034] Call trace:
[   35.193066]  show_stack+0x20/0x38 (C)
[   35.193189]  dump_stack_lvl+0x8c/0xd0
[   35.193246]  print_report+0x118/0x608
[   35.193363]  kasan_check_range+0x100/0x1a8
[   35.194356]  __kasan_kmalloc+0xd4/0xd8
[   35.195228] 
[   35.195720] page dumped because: kasan: bad access detected
[   35.196304]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.197657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.198677]  kthread+0x328/0x630
[   35.200443] 
[   35.200503] The buggy address belongs to the physical page:
[   35.200562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.200618] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.200668] page_type: f5(slab)
[   35.200884] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.201046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.201101] page dumped because: kasan: bad access detected
[   35.201152] 
[   35.201361] Memory state around the buggy address:
[   35.201547]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.201639]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.201770] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.201829]                                      ^
[   35.201901]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.202134]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.202255] ==================================================================
[   35.396807] ==================================================================
[   35.396871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858
[   35.396940] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.397010] 
[   35.397054] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.397142] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.397186] Hardware name: linux,dummy-virt (DT)
[   35.397226] Call trace:
[   35.397310]  show_stack+0x20/0x38 (C)
[   35.397361]  dump_stack_lvl+0x8c/0xd0
[   35.397423]  print_report+0x118/0x608
[   35.397474]  kasan_report+0xdc/0x128
[   35.397701]  kasan_check_range+0x100/0x1a8
[   35.397763]  __kasan_check_write+0x20/0x30
[   35.397945]  kasan_atomics_helper+0x154c/0x4858
[   35.398096]  kasan_atomics+0x198/0x2e0
[   35.398182]  kunit_try_run_case+0x170/0x3f0
[   35.398311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.398459]  kthread+0x328/0x630
[   35.398557]  ret_from_fork+0x10/0x20
[   35.398610] 
[   35.398649] Allocated by task 296:
[   35.398688]  kasan_save_stack+0x3c/0x68
[   35.398874]  kasan_save_track+0x20/0x40
[   35.398930]  kasan_save_alloc_info+0x40/0x58
[   35.399006]  __kasan_kmalloc+0xd4/0xd8
[   35.399069]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.399113]  kasan_atomics+0xb8/0x2e0
[   35.399544]  kunit_try_run_case+0x170/0x3f0
[   35.399625]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.399674]  kthread+0x328/0x630
[   35.399710]  ret_from_fork+0x10/0x20
[   35.399750] 
[   35.399773] The buggy address belongs to the object at fff00000c997d800
[   35.399773]  which belongs to the cache kmalloc-64 of size 64
[   35.399834] The buggy address is located 0 bytes to the right of
[   35.399834]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.399901] 
[   35.399924] The buggy address belongs to the physical page:
[   35.399959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.400010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.400060] page_type: f5(slab)
[   35.400101] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.400165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.400253] page dumped because: kasan: bad access detected
[   35.400332] 
[   35.400472] Memory state around the buggy address:
[   35.400610]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.400660]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.400763] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.400806]                                      ^
[   35.400996]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.401199]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.401250] ==================================================================
[   35.308924] ==================================================================
[   35.309008] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858
[   35.309063] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.309229] 
[   35.309583] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.309696] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.309726] Hardware name: linux,dummy-virt (DT)
[   35.309763] Call trace:
[   35.309790]  show_stack+0x20/0x38 (C)
[   35.310067]  dump_stack_lvl+0x8c/0xd0
[   35.310606]  print_report+0x118/0x608
[   35.310848]  kasan_report+0xdc/0x128
[   35.311263]  kasan_check_range+0x100/0x1a8
[   35.311343]  __kasan_check_write+0x20/0x30
[   35.311393]  kasan_atomics_helper+0xeb8/0x4858
[   35.311454]  kasan_atomics+0x198/0x2e0
[   35.311502]  kunit_try_run_case+0x170/0x3f0
[   35.312099]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.312313]  kthread+0x328/0x630
[   35.312362]  ret_from_fork+0x10/0x20
[   35.312724] 
[   35.312918] Allocated by task 296:
[   35.313150]  kasan_save_stack+0x3c/0x68
[   35.313220]  kasan_save_track+0x20/0x40
[   35.313478]  kasan_save_alloc_info+0x40/0x58
[   35.313779]  __kasan_kmalloc+0xd4/0xd8
[   35.313945]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.314303]  kasan_atomics+0xb8/0x2e0
[   35.314558]  kunit_try_run_case+0x170/0x3f0
[   35.314788]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.314957]  kthread+0x328/0x630
[   35.314998]  ret_from_fork+0x10/0x20
[   35.315181] 
[   35.315265] The buggy address belongs to the object at fff00000c997d800
[   35.315265]  which belongs to the cache kmalloc-64 of size 64
[   35.315488] The buggy address is located 0 bytes to the right of
[   35.315488]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.315673] 
[   35.315848] The buggy address belongs to the physical page:
[   35.316229] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.316321] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.316590] page_type: f5(slab)
[   35.316897] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.317081] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.317211] page dumped because: kasan: bad access detected
[   35.317256] 
[   35.317597] Memory state around the buggy address:
[   35.317660]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.318129]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.318201] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.318558]                                      ^
[   35.318672]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.318753]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.318847] ==================================================================
[   35.328877] ==================================================================
[   35.328944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858
[   35.328997] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.329059] 
[   35.329093] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.329196] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.329228] Hardware name: linux,dummy-virt (DT)
[   35.329262] Call trace:
[   35.329286]  show_stack+0x20/0x38 (C)
[   35.329337]  dump_stack_lvl+0x8c/0xd0
[   35.329388]  print_report+0x118/0x608
[   35.329437]  kasan_report+0xdc/0x128
[   35.329490]  kasan_check_range+0x100/0x1a8
[   35.329538]  __kasan_check_write+0x20/0x30
[   35.329588]  kasan_atomics_helper+0xf88/0x4858
[   35.329638]  kasan_atomics+0x198/0x2e0
[   35.329686]  kunit_try_run_case+0x170/0x3f0
[   35.329737]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.329791]  kthread+0x328/0x630
[   35.329835]  ret_from_fork+0x10/0x20
[   35.329885] 
[   35.329906] Allocated by task 296:
[   35.329937]  kasan_save_stack+0x3c/0x68
[   35.329981]  kasan_save_track+0x20/0x40
[   35.330022]  kasan_save_alloc_info+0x40/0x58
[   35.330063]  __kasan_kmalloc+0xd4/0xd8
[   35.330104]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.330147]  kasan_atomics+0xb8/0x2e0
[   35.330197]  kunit_try_run_case+0x170/0x3f0
[   35.330238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.330285]  kthread+0x328/0x630
[   35.330320]  ret_from_fork+0x10/0x20
[   35.330360] 
[   35.330381] The buggy address belongs to the object at fff00000c997d800
[   35.330381]  which belongs to the cache kmalloc-64 of size 64
[   35.330442] The buggy address is located 0 bytes to the right of
[   35.330442]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.330508] 
[   35.330530] The buggy address belongs to the physical page:
[   35.330563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.330615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.330665] page_type: f5(slab)
[   35.330707] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.330760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.330803] page dumped because: kasan: bad access detected
[   35.330835] 
[   35.330857] Memory state around the buggy address:
[   35.330888]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.330932]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.330977] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.331018]                                      ^
[   35.331054]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.331098]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.331139] ==================================================================
[   35.289989] ==================================================================
[   35.290050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858
[   35.290116] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.290514] 
[   35.290553] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.290657] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.290689] Hardware name: linux,dummy-virt (DT)
[   35.290726] Call trace:
[   35.290751]  show_stack+0x20/0x38 (C)
[   35.290805]  dump_stack_lvl+0x8c/0xd0
[   35.290866]  print_report+0x118/0x608
[   35.290919]  kasan_report+0xdc/0x128
[   35.290969]  kasan_check_range+0x100/0x1a8
[   35.291016]  __kasan_check_write+0x20/0x30
[   35.291065]  kasan_atomics_helper+0xe44/0x4858
[   35.291117]  kasan_atomics+0x198/0x2e0
[   35.291184]  kunit_try_run_case+0x170/0x3f0
[   35.291238]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.291294]  kthread+0x328/0x630
[   35.291339]  ret_from_fork+0x10/0x20
[   35.291758] 
[   35.292060] Allocated by task 296:
[   35.292148]  kasan_save_stack+0x3c/0x68
[   35.292472]  kasan_save_track+0x20/0x40
[   35.292661]  kasan_save_alloc_info+0x40/0x58
[   35.292878]  __kasan_kmalloc+0xd4/0xd8
[   35.292945]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.293017]  kasan_atomics+0xb8/0x2e0
[   35.293263]  kunit_try_run_case+0x170/0x3f0
[   35.293678]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.293973]  kthread+0x328/0x630
[   35.294424]  ret_from_fork+0x10/0x20
[   35.294576] 
[   35.294604] The buggy address belongs to the object at fff00000c997d800
[   35.294604]  which belongs to the cache kmalloc-64 of size 64
[   35.294822] The buggy address is located 0 bytes to the right of
[   35.294822]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.295045] 
[   35.295428] The buggy address belongs to the physical page:
[   35.295591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.295685] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.295769] page_type: f5(slab)
[   35.296049] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.296189] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.296430] page dumped because: kasan: bad access detected
[   35.296789] 
[   35.296830] Memory state around the buggy address:
[   35.296983]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.297175]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.297395] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.297492]                                      ^
[   35.297560]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.297718]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.297811] ==================================================================
[   35.250986] ==================================================================
[   35.251062] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858
[   35.251457] Write of size 4 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.251922] 
[   35.251985] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.252368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.252419] Hardware name: linux,dummy-virt (DT)
[   35.252974] Call trace:
[   35.253103]  show_stack+0x20/0x38 (C)
[   35.253200]  dump_stack_lvl+0x8c/0xd0
[   35.253432]  print_report+0x118/0x608
[   35.253510]  kasan_report+0xdc/0x128
[   35.253570]  kasan_check_range+0x100/0x1a8
[   35.253618]  __kasan_check_write+0x20/0x30
[   35.253674]  kasan_atomics_helper+0xd3c/0x4858
[   35.253726]  kasan_atomics+0x198/0x2e0
[   35.253775]  kunit_try_run_case+0x170/0x3f0
[   35.253830]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.253888]  kthread+0x328/0x630
[   35.253935]  ret_from_fork+0x10/0x20
[   35.253993] 
[   35.254031] Allocated by task 296:
[   35.254073]  kasan_save_stack+0x3c/0x68
[   35.254117]  kasan_save_track+0x20/0x40
[   35.254201]  kasan_save_alloc_info+0x40/0x58
[   35.254798]  __kasan_kmalloc+0xd4/0xd8
[   35.255009]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.255300]  kasan_atomics+0xb8/0x2e0
[   35.255844]  kunit_try_run_case+0x170/0x3f0
[   35.255942]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.256153]  kthread+0x328/0x630
[   35.256242]  ret_from_fork+0x10/0x20
[   35.256366] 
[   35.256390] The buggy address belongs to the object at fff00000c997d800
[   35.256390]  which belongs to the cache kmalloc-64 of size 64
[   35.256641] The buggy address is located 0 bytes to the right of
[   35.256641]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.257037] 
[   35.257126] The buggy address belongs to the physical page:
[   35.257297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.257505] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.257591] page_type: f5(slab)
[   35.257839] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.258048] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.258153] page dumped because: kasan: bad access detected
[   35.258561] 
[   35.258696] Memory state around the buggy address:
[   35.258765]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.258945]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.258993] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.259058]                                      ^
[   35.259105]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.259395]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.260003] ==================================================================
[   35.416280] ==================================================================
[   35.416333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858
[   35.416384] Read of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.416653] 
[   35.416694] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.416784] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.416839] Hardware name: linux,dummy-virt (DT)
[   35.416875] Call trace:
[   35.416904]  show_stack+0x20/0x38 (C)
[   35.416959]  dump_stack_lvl+0x8c/0xd0
[   35.417008]  print_report+0x118/0x608
[   35.417149]  kasan_report+0xdc/0x128
[   35.417215]  __asan_report_load8_noabort+0x20/0x30
[   35.417382]  kasan_atomics_helper+0x3df4/0x4858
[   35.417470]  kasan_atomics+0x198/0x2e0
[   35.417526]  kunit_try_run_case+0x170/0x3f0
[   35.417597]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.417656]  kthread+0x328/0x630
[   35.417715]  ret_from_fork+0x10/0x20
[   35.417783] 
[   35.417823] Allocated by task 296:
[   35.417862]  kasan_save_stack+0x3c/0x68
[   35.417949]  kasan_save_track+0x20/0x40
[   35.417996]  kasan_save_alloc_info+0x40/0x58
[   35.418043]  __kasan_kmalloc+0xd4/0xd8
[   35.418085]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.418127]  kasan_atomics+0xb8/0x2e0
[   35.418176]  kunit_try_run_case+0x170/0x3f0
[   35.418431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.418495]  kthread+0x328/0x630
[   35.418595]  ret_from_fork+0x10/0x20
[   35.418639] 
[   35.418679] The buggy address belongs to the object at fff00000c997d800
[   35.418679]  which belongs to the cache kmalloc-64 of size 64
[   35.418849] The buggy address is located 0 bytes to the right of
[   35.418849]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.419028] 
[   35.419096] The buggy address belongs to the physical page:
[   35.419174] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.419232] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.419282] page_type: f5(slab)
[   35.419323] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.419464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.419700] page dumped because: kasan: bad access detected
[   35.419758] 
[   35.419807] Memory state around the buggy address:
[   35.419937]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.420021]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.420294] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.420351]                                      ^
[   35.420408]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.420464]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.420505] ==================================================================
[   35.381907] ==================================================================
[   35.381957] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858
[   35.382007] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.382059] 
[   35.382089] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.382191] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.382219] Hardware name: linux,dummy-virt (DT)
[   35.382253] Call trace:
[   35.382287]  show_stack+0x20/0x38 (C)
[   35.382339]  dump_stack_lvl+0x8c/0xd0
[   35.382389]  print_report+0x118/0x608
[   35.382439]  kasan_report+0xdc/0x128
[   35.382488]  kasan_check_range+0x100/0x1a8
[   35.382535]  __kasan_check_write+0x20/0x30
[   35.382583]  kasan_atomics_helper+0x1414/0x4858
[   35.382646]  kasan_atomics+0x198/0x2e0
[   35.382694]  kunit_try_run_case+0x170/0x3f0
[   35.382745]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.382811]  kthread+0x328/0x630
[   35.382855]  ret_from_fork+0x10/0x20
[   35.382905] 
[   35.382928] Allocated by task 296:
[   35.382966]  kasan_save_stack+0x3c/0x68
[   35.383010]  kasan_save_track+0x20/0x40
[   35.383066]  kasan_save_alloc_info+0x40/0x58
[   35.383107]  __kasan_kmalloc+0xd4/0xd8
[   35.383147]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.383199]  kasan_atomics+0xb8/0x2e0
[   35.383238]  kunit_try_run_case+0x170/0x3f0
[   35.383280]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.383334]  kthread+0x328/0x630
[   35.383371]  ret_from_fork+0x10/0x20
[   35.383410] 
[   35.383431] The buggy address belongs to the object at fff00000c997d800
[   35.383431]  which belongs to the cache kmalloc-64 of size 64
[   35.383491] The buggy address is located 0 bytes to the right of
[   35.383491]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.383557] 
[   35.383579] The buggy address belongs to the physical page:
[   35.383614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.383664] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.383714] page_type: f5(slab)
[   35.384207] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.384285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.384328] page dumped because: kasan: bad access detected
[   35.384515] 
[   35.384540] Memory state around the buggy address:
[   35.384610]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.384657]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.384732] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.384774]                                      ^
[   35.384811]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.384980]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.385022] ==================================================================
[   35.239262] ==================================================================
[   35.239619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858
[   35.239775] Read of size 4 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.240064] 
[   35.240106] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.240571] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.240811] Hardware name: linux,dummy-virt (DT)
[   35.240947] Call trace:
[   35.241349]  show_stack+0x20/0x38 (C)
[   35.241645]  dump_stack_lvl+0x8c/0xd0
[   35.241813]  print_report+0x118/0x608
[   35.241875]  kasan_report+0xdc/0x128
[   35.242213]  __asan_report_load4_noabort+0x20/0x30
[   35.242840]  kasan_atomics_helper+0x3dd8/0x4858
[   35.243295]  kasan_atomics+0x198/0x2e0
[   35.243396]  kunit_try_run_case+0x170/0x3f0
[   35.243691]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.243899]  kthread+0x328/0x630
[   35.243957]  ret_from_fork+0x10/0x20
[   35.244008] 
[   35.244031] Allocated by task 296:
[   35.244510]  kasan_save_stack+0x3c/0x68
[   35.244667]  kasan_save_track+0x20/0x40
[   35.244871]  kasan_save_alloc_info+0x40/0x58
[   35.244931]  __kasan_kmalloc+0xd4/0xd8
[   35.245232]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.245466]  kasan_atomics+0xb8/0x2e0
[   35.245811]  kunit_try_run_case+0x170/0x3f0
[   35.246016]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.246182]  kthread+0x328/0x630
[   35.246273]  ret_from_fork+0x10/0x20
[   35.246352] 
[   35.246691] The buggy address belongs to the object at fff00000c997d800
[   35.246691]  which belongs to the cache kmalloc-64 of size 64
[   35.246777] The buggy address is located 0 bytes to the right of
[   35.246777]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.246981] 
[   35.247311] The buggy address belongs to the physical page:
[   35.247500] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.247812] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.248079] page_type: f5(slab)
[   35.248267] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.248342] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.248680] page dumped because: kasan: bad access detected
[   35.248745] 
[   35.249001] Memory state around the buggy address:
[   35.249217]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.249294]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.249457] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.249522]                                      ^
[   35.249559]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.249612]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.249730] ==================================================================
[   35.390706] ==================================================================
[   35.390780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858
[   35.390833] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.390886] 
[   35.391057] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.391272] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.391344] Hardware name: linux,dummy-virt (DT)
[   35.391378] Call trace:
[   35.391405]  show_stack+0x20/0x38 (C)
[   35.391456]  dump_stack_lvl+0x8c/0xd0
[   35.391518]  print_report+0x118/0x608
[   35.391708]  kasan_report+0xdc/0x128
[   35.391849]  kasan_check_range+0x100/0x1a8
[   35.391932]  __kasan_check_write+0x20/0x30
[   35.392057]  kasan_atomics_helper+0x14e4/0x4858
[   35.392143]  kasan_atomics+0x198/0x2e0
[   35.392311]  kunit_try_run_case+0x170/0x3f0
[   35.392396]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.392520]  kthread+0x328/0x630
[   35.392565]  ret_from_fork+0x10/0x20
[   35.392615] 
[   35.392638] Allocated by task 296:
[   35.392667]  kasan_save_stack+0x3c/0x68
[   35.392714]  kasan_save_track+0x20/0x40
[   35.392755]  kasan_save_alloc_info+0x40/0x58
[   35.392794]  __kasan_kmalloc+0xd4/0xd8
[   35.393122]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.393599]  kasan_atomics+0xb8/0x2e0
[   35.393718]  kunit_try_run_case+0x170/0x3f0
[   35.393795]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.393883]  kthread+0x328/0x630
[   35.393950]  ret_from_fork+0x10/0x20
[   35.394231] 
[   35.394311] The buggy address belongs to the object at fff00000c997d800
[   35.394311]  which belongs to the cache kmalloc-64 of size 64
[   35.394388] The buggy address is located 0 bytes to the right of
[   35.394388]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.394456] 
[   35.394674] The buggy address belongs to the physical page:
[   35.394783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.394863] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.394937] page_type: f5(slab)
[   35.394989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.395200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.395305] page dumped because: kasan: bad access detected
[   35.395383] 
[   35.395446] Memory state around the buggy address:
[   35.395531]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.395577]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.395637] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.395678]                                      ^
[   35.395715]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.395799]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.395842] ==================================================================
[   35.372699] ==================================================================
[   35.372764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858
[   35.372817] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.372869] 
[   35.372907] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.372997] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.373032] Hardware name: linux,dummy-virt (DT)
[   35.373077] Call trace:
[   35.373101]  show_stack+0x20/0x38 (C)
[   35.373167]  dump_stack_lvl+0x8c/0xd0
[   35.373219]  print_report+0x118/0x608
[   35.373371]  kasan_report+0xdc/0x128
[   35.373425]  kasan_check_range+0x100/0x1a8
[   35.373472]  __kasan_check_write+0x20/0x30
[   35.373525]  kasan_atomics_helper+0x1384/0x4858
[   35.373723]  kasan_atomics+0x198/0x2e0
[   35.373787]  kunit_try_run_case+0x170/0x3f0
[   35.373858]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.374091]  kthread+0x328/0x630
[   35.374173]  ret_from_fork+0x10/0x20
[   35.374229] 
[   35.374269] Allocated by task 296:
[   35.374310]  kasan_save_stack+0x3c/0x68
[   35.374356]  kasan_save_track+0x20/0x40
[   35.374403]  kasan_save_alloc_info+0x40/0x58
[   35.374467]  __kasan_kmalloc+0xd4/0xd8
[   35.374507]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.374550]  kasan_atomics+0xb8/0x2e0
[   35.374886]  kunit_try_run_case+0x170/0x3f0
[   35.374963]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.375035]  kthread+0x328/0x630
[   35.375268]  ret_from_fork+0x10/0x20
[   35.375362] 
[   35.375388] The buggy address belongs to the object at fff00000c997d800
[   35.375388]  which belongs to the cache kmalloc-64 of size 64
[   35.375460] The buggy address is located 0 bytes to the right of
[   35.375460]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.375563] 
[   35.375615] The buggy address belongs to the physical page:
[   35.375667] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.375718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.375876] page_type: f5(slab)
[   35.375917] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.375971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.376127] page dumped because: kasan: bad access detected
[   35.376187] 
[   35.376233] Memory state around the buggy address:
[   35.376268]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.376322]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.376376] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.376423]                                      ^
[   35.376466]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.376526]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.376567] ==================================================================
[   35.377056] ==================================================================
[   35.377260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858
[   35.377355] Read of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.377410] 
[   35.377443] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.377671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.377779] Hardware name: linux,dummy-virt (DT)
[   35.377847] Call trace:
[   35.377874]  show_stack+0x20/0x38 (C)
[   35.377926]  dump_stack_lvl+0x8c/0xd0
[   35.377995]  print_report+0x118/0x608
[   35.378047]  kasan_report+0xdc/0x128
[   35.378095]  __asan_report_load8_noabort+0x20/0x30
[   35.378146]  kasan_atomics_helper+0x3f04/0x4858
[   35.378209]  kasan_atomics+0x198/0x2e0
[   35.378258]  kunit_try_run_case+0x170/0x3f0
[   35.378311]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.378368]  kthread+0x328/0x630
[   35.378412]  ret_from_fork+0x10/0x20
[   35.378603] 
[   35.378678] Allocated by task 296:
[   35.378715]  kasan_save_stack+0x3c/0x68
[   35.378777]  kasan_save_track+0x20/0x40
[   35.379007]  kasan_save_alloc_info+0x40/0x58
[   35.379072]  __kasan_kmalloc+0xd4/0xd8
[   35.379131]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.379191]  kasan_atomics+0xb8/0x2e0
[   35.379231]  kunit_try_run_case+0x170/0x3f0
[   35.379272]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.379330]  kthread+0x328/0x630
[   35.379376]  ret_from_fork+0x10/0x20
[   35.379530] 
[   35.379592] The buggy address belongs to the object at fff00000c997d800
[   35.379592]  which belongs to the cache kmalloc-64 of size 64
[   35.379756] The buggy address is located 0 bytes to the right of
[   35.379756]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.379849] 
[   35.380093] The buggy address belongs to the physical page:
[   35.380133] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.380200] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.380249] page_type: f5(slab)
[   35.380292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.380559] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.380608] page dumped because: kasan: bad access detected
[   35.380672] 
[   35.380711] Memory state around the buggy address:
[   35.380775]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.381065]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.381152] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.381259]                                      ^
[   35.381329]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.381455]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.381537] ==================================================================
[   35.410994] ==================================================================
[   35.411050] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858
[   35.411125] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.411190] 
[   35.411221] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.411375] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.411439] Hardware name: linux,dummy-virt (DT)
[   35.411488] Call trace:
[   35.411612]  show_stack+0x20/0x38 (C)
[   35.411688]  dump_stack_lvl+0x8c/0xd0
[   35.411786]  print_report+0x118/0x608
[   35.411847]  kasan_report+0xdc/0x128
[   35.411896]  kasan_check_range+0x100/0x1a8
[   35.412097]  __kasan_check_write+0x20/0x30
[   35.412185]  kasan_atomics_helper+0x1644/0x4858
[   35.412299]  kasan_atomics+0x198/0x2e0
[   35.412377]  kunit_try_run_case+0x170/0x3f0
[   35.412490]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.412585]  kthread+0x328/0x630
[   35.412637]  ret_from_fork+0x10/0x20
[   35.412696] 
[   35.412719] Allocated by task 296:
[   35.412751]  kasan_save_stack+0x3c/0x68
[   35.412943]  kasan_save_track+0x20/0x40
[   35.412999]  kasan_save_alloc_info+0x40/0x58
[   35.413174]  __kasan_kmalloc+0xd4/0xd8
[   35.413241]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.413295]  kasan_atomics+0xb8/0x2e0
[   35.413358]  kunit_try_run_case+0x170/0x3f0
[   35.413438]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.413779]  kthread+0x328/0x630
[   35.413856]  ret_from_fork+0x10/0x20
[   35.413960] 
[   35.414009] The buggy address belongs to the object at fff00000c997d800
[   35.414009]  which belongs to the cache kmalloc-64 of size 64
[   35.414106] The buggy address is located 0 bytes to the right of
[   35.414106]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.414184] 
[   35.414207] The buggy address belongs to the physical page:
[   35.414561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.414647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.414845] page_type: f5(slab)
[   35.414969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.415023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.415066] page dumped because: kasan: bad access detected
[   35.415101] 
[   35.415122] Memory state around the buggy address:
[   35.415166]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.415213]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.415326] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.415375]                                      ^
[   35.415426]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.415472]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.415513] ==================================================================
[   35.299103] ==================================================================
[   35.299504] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858
[   35.299716] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.300025] 
[   35.300084] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.300390] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.300566] Hardware name: linux,dummy-virt (DT)
[   35.300658] Call trace:
[   35.300706]  show_stack+0x20/0x38 (C)
[   35.300796]  dump_stack_lvl+0x8c/0xd0
[   35.301204]  print_report+0x118/0x608
[   35.301292]  kasan_report+0xdc/0x128
[   35.301368]  __asan_report_store8_noabort+0x20/0x30
[   35.301717]  kasan_atomics_helper+0x3e5c/0x4858
[   35.302030]  kasan_atomics+0x198/0x2e0
[   35.302229]  kunit_try_run_case+0x170/0x3f0
[   35.302847]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.303057]  kthread+0x328/0x630
[   35.303168]  ret_from_fork+0x10/0x20
[   35.303252] 
[   35.303416] Allocated by task 296:
[   35.303756]  kasan_save_stack+0x3c/0x68
[   35.303944]  kasan_save_track+0x20/0x40
[   35.304435]  kasan_save_alloc_info+0x40/0x58
[   35.304508]  __kasan_kmalloc+0xd4/0xd8
[   35.304667]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.304912]  kasan_atomics+0xb8/0x2e0
[   35.304977]  kunit_try_run_case+0x170/0x3f0
[   35.305018]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.305109]  kthread+0x328/0x630
[   35.305165]  ret_from_fork+0x10/0x20
[   35.305216] 
[   35.305239] The buggy address belongs to the object at fff00000c997d800
[   35.305239]  which belongs to the cache kmalloc-64 of size 64
[   35.305301] The buggy address is located 0 bytes to the right of
[   35.305301]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.305369] 
[   35.305401] The buggy address belongs to the physical page:
[   35.305444] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.305512] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.305564] page_type: f5(slab)
[   35.305606] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.305659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.305703] page dumped because: kasan: bad access detected
[   35.305736] 
[   35.305763] Memory state around the buggy address:
[   35.305799]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.305850]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.305904] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.305945]                                      ^
[   35.305989]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.306051]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.306098] ==================================================================
[   35.406270] ==================================================================
[   35.406325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858
[   35.406377] Read of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.406456] 
[   35.406504] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.406599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.406647] Hardware name: linux,dummy-virt (DT)
[   35.406680] Call trace:
[   35.406718]  show_stack+0x20/0x38 (C)
[   35.406769]  dump_stack_lvl+0x8c/0xd0
[   35.406828]  print_report+0x118/0x608
[   35.406879]  kasan_report+0xdc/0x128
[   35.406927]  __asan_report_load8_noabort+0x20/0x30
[   35.407093]  kasan_atomics_helper+0x3db0/0x4858
[   35.407304]  kasan_atomics+0x198/0x2e0
[   35.407368]  kunit_try_run_case+0x170/0x3f0
[   35.407431]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.407497]  kthread+0x328/0x630
[   35.407684]  ret_from_fork+0x10/0x20
[   35.407803] 
[   35.407853] Allocated by task 296:
[   35.407907]  kasan_save_stack+0x3c/0x68
[   35.407996]  kasan_save_track+0x20/0x40
[   35.408050]  kasan_save_alloc_info+0x40/0x58
[   35.408115]  __kasan_kmalloc+0xd4/0xd8
[   35.408185]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.408228]  kasan_atomics+0xb8/0x2e0
[   35.408267]  kunit_try_run_case+0x170/0x3f0
[   35.408308]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.408388]  kthread+0x328/0x630
[   35.408423]  ret_from_fork+0x10/0x20
[   35.408462] 
[   35.408484] The buggy address belongs to the object at fff00000c997d800
[   35.408484]  which belongs to the cache kmalloc-64 of size 64
[   35.408665] The buggy address is located 0 bytes to the right of
[   35.408665]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.408762] 
[   35.408840] The buggy address belongs to the physical page:
[   35.408905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.409003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.409339] page_type: f5(slab)
[   35.409438] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.409525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.409580] page dumped because: kasan: bad access detected
[   35.409614] 
[   35.409635] Memory state around the buggy address:
[   35.409780]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.410000]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.410064] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.410146]                                      ^
[   35.410454]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.410559]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.410629] ==================================================================
[   35.348098] ==================================================================
[   35.348391] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858
[   35.348457] Write of size 8 at addr fff00000c997d830 by task kunit_try_catch/296
[   35.348511] 
[   35.348593] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT 
[   35.348796] Tainted: [B]=BAD_PAGE, [N]=TEST
[   35.348846] Hardware name: linux,dummy-virt (DT)
[   35.348902] Call trace:
[   35.348927]  show_stack+0x20/0x38 (C)
[   35.348980]  dump_stack_lvl+0x8c/0xd0
[   35.349050]  print_report+0x118/0x608
[   35.349125]  kasan_report+0xdc/0x128
[   35.349202]  kasan_check_range+0x100/0x1a8
[   35.349490]  __kasan_check_write+0x20/0x30
[   35.349556]  kasan_atomics_helper+0x1128/0x4858
[   35.349681]  kasan_atomics+0x198/0x2e0
[   35.349738]  kunit_try_run_case+0x170/0x3f0
[   35.349806]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.349880]  kthread+0x328/0x630
[   35.349932]  ret_from_fork+0x10/0x20
[   35.350000] 
[   35.350040] Allocated by task 296:
[   35.350084]  kasan_save_stack+0x3c/0x68
[   35.350131]  kasan_save_track+0x20/0x40
[   35.350190]  kasan_save_alloc_info+0x40/0x58
[   35.350244]  __kasan_kmalloc+0xd4/0xd8
[   35.350285]  __kmalloc_cache_noprof+0x16c/0x3c0
[   35.350329]  kasan_atomics+0xb8/0x2e0
[   35.350369]  kunit_try_run_case+0x170/0x3f0
[   35.350513]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   35.350666]  kthread+0x328/0x630
[   35.350712]  ret_from_fork+0x10/0x20
[   35.351014] 
[   35.351080] The buggy address belongs to the object at fff00000c997d800
[   35.351080]  which belongs to the cache kmalloc-64 of size 64
[   35.351173] The buggy address is located 0 bytes to the right of
[   35.351173]  allocated 48-byte region [fff00000c997d800, fff00000c997d830)
[   35.351259] 
[   35.351283] The buggy address belongs to the physical page:
[   35.351324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10997d
[   35.351389] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   35.351447] page_type: f5(slab)
[   35.351500] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000
[   35.351586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   35.351663] page dumped because: kasan: bad access detected
[   35.351715] 
[   35.351736] Memory state around the buggy address:
[   35.351770]  fff00000c997d700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.351964]  fff00000c997d780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   35.352017] >fff00000c997d800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   35.352058]                                      ^
[   35.352254]  fff00000c997d880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.352323]  fff00000c997d900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   35.352410] ==================================================================

[   25.788075] ==================================================================
[   25.788380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   25.788888] Read of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   25.789227] 
[   25.789317] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.789372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.789387] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.789412] Call Trace:
[   25.789428]  <TASK>
[   25.789448]  dump_stack_lvl+0x73/0xb0
[   25.789480]  print_report+0xd1/0x650
[   25.789504]  ? __virt_addr_valid+0x1db/0x2d0
[   25.789529]  ? kasan_atomics_helper+0x4b88/0x5450
[   25.789552]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.789579]  ? kasan_atomics_helper+0x4b88/0x5450
[   25.789604]  kasan_report+0x141/0x180
[   25.789627]  ? kasan_atomics_helper+0x4b88/0x5450
[   25.789654]  __asan_report_load4_noabort+0x18/0x20
[   25.789681]  kasan_atomics_helper+0x4b88/0x5450
[   25.789706]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.789730]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.789757]  ? kasan_atomics+0x152/0x310
[   25.789784]  kasan_atomics+0x1dc/0x310
[   25.789809]  ? __pfx_kasan_atomics+0x10/0x10
[   25.789838]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.789865]  ? __pfx_read_tsc+0x10/0x10
[   25.789889]  ? ktime_get_ts64+0x86/0x230
[   25.789916]  kunit_try_run_case+0x1a5/0x480
[   25.789945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.789971]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.789994]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.790032]  ? __kthread_parkme+0x82/0x180
[   25.790056]  ? preempt_count_sub+0x50/0x80
[   25.790091]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.790118]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.790143]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.790170]  kthread+0x337/0x6f0
[   25.790191]  ? trace_preempt_on+0x20/0xc0
[   25.790216]  ? __pfx_kthread+0x10/0x10
[   25.790238]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.790265]  ? calculate_sigpending+0x7b/0xa0
[   25.790290]  ? __pfx_kthread+0x10/0x10
[   25.790313]  ret_from_fork+0x116/0x1d0
[   25.790333]  ? __pfx_kthread+0x10/0x10
[   25.790355]  ret_from_fork_asm+0x1a/0x30
[   25.790387]  </TASK>
[   25.790402] 
[   25.802886] Allocated by task 314:
[   25.803100]  kasan_save_stack+0x45/0x70
[   25.803355]  kasan_save_track+0x18/0x40
[   25.803670]  kasan_save_alloc_info+0x3b/0x50
[   25.804023]  __kasan_kmalloc+0xb7/0xc0
[   25.804248]  __kmalloc_cache_noprof+0x189/0x420
[   25.804637]  kasan_atomics+0x95/0x310
[   25.804769]  kunit_try_run_case+0x1a5/0x480
[   25.804924]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.805191]  kthread+0x337/0x6f0
[   25.805361]  ret_from_fork+0x116/0x1d0
[   25.805550]  ret_from_fork_asm+0x1a/0x30
[   25.805751] 
[   25.805833] The buggy address belongs to the object at ffff888105a1e600
[   25.805833]  which belongs to the cache kmalloc-64 of size 64
[   25.806346] The buggy address is located 0 bytes to the right of
[   25.806346]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   25.806786] 
[   25.806859] The buggy address belongs to the physical page:
[   25.807502] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   25.807885] flags: 0x200000000000000(node=0|zone=2)
[   25.808129] page_type: f5(slab)
[   25.808523] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.809227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.809891] page dumped because: kasan: bad access detected
[   25.810339] 
[   25.810554] Memory state around the buggy address:
[   25.811072]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.811749]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.812213] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.812626]                                      ^
[   25.812971]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.813407]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.814074] ==================================================================
[   26.029322] ==================================================================
[   26.029677] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   26.030192] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.030473] 
[   26.030603] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.030654] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.030669] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.030694] Call Trace:
[   26.030715]  <TASK>
[   26.030736]  dump_stack_lvl+0x73/0xb0
[   26.030766]  print_report+0xd1/0x650
[   26.030791]  ? __virt_addr_valid+0x1db/0x2d0
[   26.030816]  ? kasan_atomics_helper+0x860/0x5450
[   26.030838]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.030865]  ? kasan_atomics_helper+0x860/0x5450
[   26.030888]  kasan_report+0x141/0x180
[   26.030911]  ? kasan_atomics_helper+0x860/0x5450
[   26.030970]  kasan_check_range+0x10c/0x1c0
[   26.030995]  __kasan_check_write+0x18/0x20
[   26.031020]  kasan_atomics_helper+0x860/0x5450
[   26.031054]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.031086]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.031114]  ? kasan_atomics+0x152/0x310
[   26.031142]  kasan_atomics+0x1dc/0x310
[   26.031174]  ? __pfx_kasan_atomics+0x10/0x10
[   26.031198]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.031234]  ? __pfx_read_tsc+0x10/0x10
[   26.031258]  ? ktime_get_ts64+0x86/0x230
[   26.031284]  kunit_try_run_case+0x1a5/0x480
[   26.031321]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.031346]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.031370]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.031404]  ? __kthread_parkme+0x82/0x180
[   26.031427]  ? preempt_count_sub+0x50/0x80
[   26.031452]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.031486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.031512]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.031538]  kthread+0x337/0x6f0
[   26.031569]  ? trace_preempt_on+0x20/0xc0
[   26.031595]  ? __pfx_kthread+0x10/0x10
[   26.031617]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.031652]  ? calculate_sigpending+0x7b/0xa0
[   26.031677]  ? __pfx_kthread+0x10/0x10
[   26.031701]  ret_from_fork+0x116/0x1d0
[   26.031733]  ? __pfx_kthread+0x10/0x10
[   26.031755]  ret_from_fork_asm+0x1a/0x30
[   26.031788]  </TASK>
[   26.031802] 
[   26.039379] Allocated by task 314:
[   26.039556]  kasan_save_stack+0x45/0x70
[   26.039740]  kasan_save_track+0x18/0x40
[   26.039954]  kasan_save_alloc_info+0x3b/0x50
[   26.040175]  __kasan_kmalloc+0xb7/0xc0
[   26.040348]  __kmalloc_cache_noprof+0x189/0x420
[   26.040532]  kasan_atomics+0x95/0x310
[   26.040659]  kunit_try_run_case+0x1a5/0x480
[   26.040801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.040996]  kthread+0x337/0x6f0
[   26.041150]  ret_from_fork+0x116/0x1d0
[   26.041356]  ret_from_fork_asm+0x1a/0x30
[   26.041550] 
[   26.041641] The buggy address belongs to the object at ffff888105a1e600
[   26.041641]  which belongs to the cache kmalloc-64 of size 64
[   26.042173] The buggy address is located 0 bytes to the right of
[   26.042173]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.042535] 
[   26.042605] The buggy address belongs to the physical page:
[   26.042786] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.043189] flags: 0x200000000000000(node=0|zone=2)
[   26.043445] page_type: f5(slab)
[   26.043640] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.044023] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.044401] page dumped because: kasan: bad access detected
[   26.044654] 
[   26.044721] Memory state around the buggy address:
[   26.044905]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.045230]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.045448] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.045682]                                      ^
[   26.045951]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.046274]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.046583] ==================================================================
[   26.119191] ==================================================================
[   26.119544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   26.119880] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.120172] 
[   26.120283] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.120335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.120349] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.120374] Call Trace:
[   26.120396]  <TASK>
[   26.120417]  dump_stack_lvl+0x73/0xb0
[   26.120447]  print_report+0xd1/0x650
[   26.120470]  ? __virt_addr_valid+0x1db/0x2d0
[   26.120495]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.120517]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.120545]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.120568]  kasan_report+0x141/0x180
[   26.120591]  ? kasan_atomics_helper+0xb6a/0x5450
[   26.120618]  kasan_check_range+0x10c/0x1c0
[   26.120642]  __kasan_check_write+0x18/0x20
[   26.120667]  kasan_atomics_helper+0xb6a/0x5450
[   26.120690]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.120713]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.120741]  ? kasan_atomics+0x152/0x310
[   26.120768]  kasan_atomics+0x1dc/0x310
[   26.120791]  ? __pfx_kasan_atomics+0x10/0x10
[   26.120814]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.120839]  ? __pfx_read_tsc+0x10/0x10
[   26.120862]  ? ktime_get_ts64+0x86/0x230
[   26.120889]  kunit_try_run_case+0x1a5/0x480
[   26.120916]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.120941]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.120964]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.120986]  ? __kthread_parkme+0x82/0x180
[   26.121009]  ? preempt_count_sub+0x50/0x80
[   26.121034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.121531]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.121592]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.121622]  kthread+0x337/0x6f0
[   26.121655]  ? trace_preempt_on+0x20/0xc0
[   26.121681]  ? __pfx_kthread+0x10/0x10
[   26.121704]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.121743]  ? calculate_sigpending+0x7b/0xa0
[   26.121770]  ? __pfx_kthread+0x10/0x10
[   26.121794]  ret_from_fork+0x116/0x1d0
[   26.121830]  ? __pfx_kthread+0x10/0x10
[   26.121853]  ret_from_fork_asm+0x1a/0x30
[   26.121897]  </TASK>
[   26.121912] 
[   26.129448] Allocated by task 314:
[   26.129635]  kasan_save_stack+0x45/0x70
[   26.129856]  kasan_save_track+0x18/0x40
[   26.130088]  kasan_save_alloc_info+0x3b/0x50
[   26.130258]  __kasan_kmalloc+0xb7/0xc0
[   26.130457]  __kmalloc_cache_noprof+0x189/0x420
[   26.130634]  kasan_atomics+0x95/0x310
[   26.130833]  kunit_try_run_case+0x1a5/0x480
[   26.131018]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.131284]  kthread+0x337/0x6f0
[   26.131436]  ret_from_fork+0x116/0x1d0
[   26.131635]  ret_from_fork_asm+0x1a/0x30
[   26.131844] 
[   26.131977] The buggy address belongs to the object at ffff888105a1e600
[   26.131977]  which belongs to the cache kmalloc-64 of size 64
[   26.132488] The buggy address is located 0 bytes to the right of
[   26.132488]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.132967] 
[   26.133041] The buggy address belongs to the physical page:
[   26.133221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.133460] flags: 0x200000000000000(node=0|zone=2)
[   26.133621] page_type: f5(slab)
[   26.133748] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.134144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.134475] page dumped because: kasan: bad access detected
[   26.134720] 
[   26.134809] Memory state around the buggy address:
[   26.135053]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.135361]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.135619] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.135969]                                      ^
[   26.136243]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.136572]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.136829] ==================================================================
[   26.858310] ==================================================================
[   26.858573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   26.858791] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.859047] 
[   26.859173] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.859225] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.859239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.859263] Call Trace:
[   26.859284]  <TASK>
[   26.859323]  dump_stack_lvl+0x73/0xb0
[   26.859354]  print_report+0xd1/0x650
[   26.859378]  ? __virt_addr_valid+0x1db/0x2d0
[   26.859403]  ? kasan_atomics_helper+0x1eaa/0x5450
[   26.859425]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.859452]  ? kasan_atomics_helper+0x1eaa/0x5450
[   26.859475]  kasan_report+0x141/0x180
[   26.859499]  ? kasan_atomics_helper+0x1eaa/0x5450
[   26.859525]  kasan_check_range+0x10c/0x1c0
[   26.859550]  __kasan_check_write+0x18/0x20
[   26.859575]  kasan_atomics_helper+0x1eaa/0x5450
[   26.859599]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.859622]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.859647]  ? kasan_atomics+0x152/0x310
[   26.859675]  kasan_atomics+0x1dc/0x310
[   26.859698]  ? __pfx_kasan_atomics+0x10/0x10
[   26.859721]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.859747]  ? __pfx_read_tsc+0x10/0x10
[   26.859770]  ? ktime_get_ts64+0x86/0x230
[   26.859796]  kunit_try_run_case+0x1a5/0x480
[   26.859823]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.859849]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.859872]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.859895]  ? __kthread_parkme+0x82/0x180
[   26.859919]  ? preempt_count_sub+0x50/0x80
[   26.859953]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.859980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.860007]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.860034]  kthread+0x337/0x6f0
[   26.860055]  ? trace_preempt_on+0x20/0xc0
[   26.860092]  ? __pfx_kthread+0x10/0x10
[   26.860114]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.860140]  ? calculate_sigpending+0x7b/0xa0
[   26.860166]  ? __pfx_kthread+0x10/0x10
[   26.860189]  ret_from_fork+0x116/0x1d0
[   26.860210]  ? __pfx_kthread+0x10/0x10
[   26.860232]  ret_from_fork_asm+0x1a/0x30
[   26.860263]  </TASK>
[   26.860277] 
[   26.866636] Allocated by task 314:
[   26.866812]  kasan_save_stack+0x45/0x70
[   26.867104]  kasan_save_track+0x18/0x40
[   26.867296]  kasan_save_alloc_info+0x3b/0x50
[   26.867506]  __kasan_kmalloc+0xb7/0xc0
[   26.867693]  __kmalloc_cache_noprof+0x189/0x420
[   26.867913]  kasan_atomics+0x95/0x310
[   26.868289]  kunit_try_run_case+0x1a5/0x480
[   26.868495]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.868747]  kthread+0x337/0x6f0
[   26.868912]  ret_from_fork+0x116/0x1d0
[   26.869097]  ret_from_fork_asm+0x1a/0x30
[   26.869234] 
[   26.869301] The buggy address belongs to the object at ffff888105a1e600
[   26.869301]  which belongs to the cache kmalloc-64 of size 64
[   26.869639] The buggy address is located 0 bytes to the right of
[   26.869639]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.870512] 
[   26.870605] The buggy address belongs to the physical page:
[   26.870848] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.871418] flags: 0x200000000000000(node=0|zone=2)
[   26.871576] page_type: f5(slab)
[   26.871692] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.871915] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.872271] page dumped because: kasan: bad access detected
[   26.872532] 
[   26.872623] Memory state around the buggy address:
[   26.872851]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.873170]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.873383] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.873689]                                      ^
[   26.873912]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.874245]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.874508] ==================================================================
[   26.780290] ==================================================================
[   26.780641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   26.781034] Read of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.781418] 
[   26.781531] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.781584] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.781599] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.781624] Call Trace:
[   26.781645]  <TASK>
[   26.781668]  dump_stack_lvl+0x73/0xb0
[   26.781699]  print_report+0xd1/0x650
[   26.781723]  ? __virt_addr_valid+0x1db/0x2d0
[   26.781749]  ? kasan_atomics_helper+0x4f30/0x5450
[   26.781772]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.781799]  ? kasan_atomics_helper+0x4f30/0x5450
[   26.781832]  kasan_report+0x141/0x180
[   26.781856]  ? kasan_atomics_helper+0x4f30/0x5450
[   26.781884]  __asan_report_load8_noabort+0x18/0x20
[   26.781909]  kasan_atomics_helper+0x4f30/0x5450
[   26.781955]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.781989]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.782017]  ? kasan_atomics+0x152/0x310
[   26.782044]  kasan_atomics+0x1dc/0x310
[   26.782087]  ? __pfx_kasan_atomics+0x10/0x10
[   26.782119]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.782146]  ? __pfx_read_tsc+0x10/0x10
[   26.782179]  ? ktime_get_ts64+0x86/0x230
[   26.782206]  kunit_try_run_case+0x1a5/0x480
[   26.782235]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.782259]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.782283]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.782316]  ? __kthread_parkme+0x82/0x180
[   26.782338]  ? preempt_count_sub+0x50/0x80
[   26.782363]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.782399]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.782425]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.782451]  kthread+0x337/0x6f0
[   26.782481]  ? trace_preempt_on+0x20/0xc0
[   26.782506]  ? __pfx_kthread+0x10/0x10
[   26.782528]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.782564]  ? calculate_sigpending+0x7b/0xa0
[   26.782589]  ? __pfx_kthread+0x10/0x10
[   26.782613]  ret_from_fork+0x116/0x1d0
[   26.782642]  ? __pfx_kthread+0x10/0x10
[   26.782664]  ret_from_fork_asm+0x1a/0x30
[   26.782707]  </TASK>
[   26.782721] 
[   26.790180] Allocated by task 314:
[   26.790345]  kasan_save_stack+0x45/0x70
[   26.790488]  kasan_save_track+0x18/0x40
[   26.790620]  kasan_save_alloc_info+0x3b/0x50
[   26.790764]  __kasan_kmalloc+0xb7/0xc0
[   26.790893]  __kmalloc_cache_noprof+0x189/0x420
[   26.791811]  kasan_atomics+0x95/0x310
[   26.792258]  kunit_try_run_case+0x1a5/0x480
[   26.792850]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.793748]  kthread+0x337/0x6f0
[   26.794172]  ret_from_fork+0x116/0x1d0
[   26.794688]  ret_from_fork_asm+0x1a/0x30
[   26.795258] 
[   26.795425] The buggy address belongs to the object at ffff888105a1e600
[   26.795425]  which belongs to the cache kmalloc-64 of size 64
[   26.796458] The buggy address is located 0 bytes to the right of
[   26.796458]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.796823] 
[   26.796898] The buggy address belongs to the physical page:
[   26.797075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.798020] flags: 0x200000000000000(node=0|zone=2)
[   26.798490] page_type: f5(slab)
[   26.798819] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.799625] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.800360] page dumped because: kasan: bad access detected
[   26.800864] 
[   26.801015] Memory state around the buggy address:
[   26.801385]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.801596]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.801801] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.802025]                                      ^
[   26.802385]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.803177]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.803801] ==================================================================
[   25.952020] ==================================================================
[   25.953042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   25.953512] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   25.953827] 
[   25.953917] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.953991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.954007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.954032] Call Trace:
[   25.954055]  <TASK>
[   25.954093]  dump_stack_lvl+0x73/0xb0
[   25.954125]  print_report+0xd1/0x650
[   25.954149]  ? __virt_addr_valid+0x1db/0x2d0
[   25.954175]  ? kasan_atomics_helper+0x5fe/0x5450
[   25.954207]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.954235]  ? kasan_atomics_helper+0x5fe/0x5450
[   25.954270]  kasan_report+0x141/0x180
[   25.954294]  ? kasan_atomics_helper+0x5fe/0x5450
[   25.954323]  kasan_check_range+0x10c/0x1c0
[   25.954347]  __kasan_check_write+0x18/0x20
[   25.954382]  kasan_atomics_helper+0x5fe/0x5450
[   25.954406]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.954440]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.954468]  ? kasan_atomics+0x152/0x310
[   25.954496]  kasan_atomics+0x1dc/0x310
[   25.954520]  ? __pfx_kasan_atomics+0x10/0x10
[   25.954553]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.954580]  ? __pfx_read_tsc+0x10/0x10
[   25.954614]  ? ktime_get_ts64+0x86/0x230
[   25.954641]  kunit_try_run_case+0x1a5/0x480
[   25.954669]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.954704]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.954727]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.954752]  ? __kthread_parkme+0x82/0x180
[   25.954785]  ? preempt_count_sub+0x50/0x80
[   25.954812]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.954839]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.954874]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.954901]  kthread+0x337/0x6f0
[   25.954933]  ? trace_preempt_on+0x20/0xc0
[   25.954970]  ? __pfx_kthread+0x10/0x10
[   25.954993]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.955020]  ? calculate_sigpending+0x7b/0xa0
[   25.955053]  ? __pfx_kthread+0x10/0x10
[   25.955086]  ret_from_fork+0x116/0x1d0
[   25.955108]  ? __pfx_kthread+0x10/0x10
[   25.955143]  ret_from_fork_asm+0x1a/0x30
[   25.955176]  </TASK>
[   25.955190] 
[   25.963591] Allocated by task 314:
[   25.963755]  kasan_save_stack+0x45/0x70
[   25.963973]  kasan_save_track+0x18/0x40
[   25.964169]  kasan_save_alloc_info+0x3b/0x50
[   25.964376]  __kasan_kmalloc+0xb7/0xc0
[   25.964577]  __kmalloc_cache_noprof+0x189/0x420
[   25.964782]  kasan_atomics+0x95/0x310
[   25.964977]  kunit_try_run_case+0x1a5/0x480
[   25.965208]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.965451]  kthread+0x337/0x6f0
[   25.965602]  ret_from_fork+0x116/0x1d0
[   25.965729]  ret_from_fork_asm+0x1a/0x30
[   25.965871] 
[   25.965937] The buggy address belongs to the object at ffff888105a1e600
[   25.965937]  which belongs to the cache kmalloc-64 of size 64
[   25.966299] The buggy address is located 0 bytes to the right of
[   25.966299]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   25.966912] 
[   25.967045] The buggy address belongs to the physical page:
[   25.967304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   25.967654] flags: 0x200000000000000(node=0|zone=2)
[   25.967886] page_type: f5(slab)
[   25.968219] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.968562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.968887] page dumped because: kasan: bad access detected
[   25.969197] 
[   25.969272] Memory state around the buggy address:
[   25.969429]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.969642]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.969863] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.970172]                                      ^
[   25.970396]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.970719]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.971168] ==================================================================
[   26.047450] ==================================================================
[   26.047798] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   26.048211] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.048531] 
[   26.048651] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.048712] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.048727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.048751] Call Trace:
[   26.048785]  <TASK>
[   26.048808]  dump_stack_lvl+0x73/0xb0
[   26.048839]  print_report+0xd1/0x650
[   26.048870]  ? __virt_addr_valid+0x1db/0x2d0
[   26.048896]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.048943]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.048971]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.048994]  kasan_report+0x141/0x180
[   26.049024]  ? kasan_atomics_helper+0x8f9/0x5450
[   26.049051]  kasan_check_range+0x10c/0x1c0
[   26.049092]  __kasan_check_write+0x18/0x20
[   26.049116]  kasan_atomics_helper+0x8f9/0x5450
[   26.049140]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.049173]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.049209]  ? kasan_atomics+0x152/0x310
[   26.049235]  kasan_atomics+0x1dc/0x310
[   26.049259]  ? __pfx_kasan_atomics+0x10/0x10
[   26.049292]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.049318]  ? __pfx_read_tsc+0x10/0x10
[   26.049341]  ? ktime_get_ts64+0x86/0x230
[   26.049377]  kunit_try_run_case+0x1a5/0x480
[   26.049404]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.049429]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.049457]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.049480]  ? __kthread_parkme+0x82/0x180
[   26.049502]  ? preempt_count_sub+0x50/0x80
[   26.049527]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.049553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.049580]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.049606]  kthread+0x337/0x6f0
[   26.049626]  ? trace_preempt_on+0x20/0xc0
[   26.049651]  ? __pfx_kthread+0x10/0x10
[   26.049673]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.049699]  ? calculate_sigpending+0x7b/0xa0
[   26.049724]  ? __pfx_kthread+0x10/0x10
[   26.049746]  ret_from_fork+0x116/0x1d0
[   26.049768]  ? __pfx_kthread+0x10/0x10
[   26.049790]  ret_from_fork_asm+0x1a/0x30
[   26.049828]  </TASK>
[   26.049843] 
[   26.057197] Allocated by task 314:
[   26.057381]  kasan_save_stack+0x45/0x70
[   26.057600]  kasan_save_track+0x18/0x40
[   26.057785]  kasan_save_alloc_info+0x3b/0x50
[   26.058007]  __kasan_kmalloc+0xb7/0xc0
[   26.058213]  __kmalloc_cache_noprof+0x189/0x420
[   26.058425]  kasan_atomics+0x95/0x310
[   26.058599]  kunit_try_run_case+0x1a5/0x480
[   26.058795]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.059099]  kthread+0x337/0x6f0
[   26.059221]  ret_from_fork+0x116/0x1d0
[   26.059350]  ret_from_fork_asm+0x1a/0x30
[   26.059546] 
[   26.059652] The buggy address belongs to the object at ffff888105a1e600
[   26.059652]  which belongs to the cache kmalloc-64 of size 64
[   26.060213] The buggy address is located 0 bytes to the right of
[   26.060213]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.060628] 
[   26.060712] The buggy address belongs to the physical page:
[   26.060990] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.061364] flags: 0x200000000000000(node=0|zone=2)
[   26.061584] page_type: f5(slab)
[   26.061724] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.062122] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.062433] page dumped because: kasan: bad access detected
[   26.062688] 
[   26.062770] Memory state around the buggy address:
[   26.063002]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.063327]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.063620] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.063848]                                      ^
[   26.064016]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.064236]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.064443] ==================================================================
[   26.725180] ==================================================================
[   26.725654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   26.726089] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.726438] 
[   26.726542] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.726604] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.726618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.726642] Call Trace:
[   26.726676]  <TASK>
[   26.726697]  dump_stack_lvl+0x73/0xb0
[   26.726727]  print_report+0xd1/0x650
[   26.726763]  ? __virt_addr_valid+0x1db/0x2d0
[   26.726788]  ? kasan_atomics_helper+0x1a7f/0x5450
[   26.726810]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.726849]  ? kasan_atomics_helper+0x1a7f/0x5450
[   26.726872]  kasan_report+0x141/0x180
[   26.726896]  ? kasan_atomics_helper+0x1a7f/0x5450
[   26.726934]  kasan_check_range+0x10c/0x1c0
[   26.726959]  __kasan_check_write+0x18/0x20
[   26.726993]  kasan_atomics_helper+0x1a7f/0x5450
[   26.727017]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.727041]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.727077]  ? kasan_atomics+0x152/0x310
[   26.727104]  kasan_atomics+0x1dc/0x310
[   26.727138]  ? __pfx_kasan_atomics+0x10/0x10
[   26.727161]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.727188]  ? __pfx_read_tsc+0x10/0x10
[   26.727222]  ? ktime_get_ts64+0x86/0x230
[   26.727249]  kunit_try_run_case+0x1a5/0x480
[   26.727275]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.727300]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.727322]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.727344]  ? __kthread_parkme+0x82/0x180
[   26.727367]  ? preempt_count_sub+0x50/0x80
[   26.727392]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.727418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.727443]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.727469]  kthread+0x337/0x6f0
[   26.727490]  ? trace_preempt_on+0x20/0xc0
[   26.727516]  ? __pfx_kthread+0x10/0x10
[   26.727537]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.727563]  ? calculate_sigpending+0x7b/0xa0
[   26.727589]  ? __pfx_kthread+0x10/0x10
[   26.727612]  ret_from_fork+0x116/0x1d0
[   26.727633]  ? __pfx_kthread+0x10/0x10
[   26.727655]  ret_from_fork_asm+0x1a/0x30
[   26.727687]  </TASK>
[   26.727700] 
[   26.735353] Allocated by task 314:
[   26.735486]  kasan_save_stack+0x45/0x70
[   26.735624]  kasan_save_track+0x18/0x40
[   26.735754]  kasan_save_alloc_info+0x3b/0x50
[   26.735906]  __kasan_kmalloc+0xb7/0xc0
[   26.736099]  __kmalloc_cache_noprof+0x189/0x420
[   26.736338]  kasan_atomics+0x95/0x310
[   26.736537]  kunit_try_run_case+0x1a5/0x480
[   26.736770]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.737137]  kthread+0x337/0x6f0
[   26.737302]  ret_from_fork+0x116/0x1d0
[   26.737508]  ret_from_fork_asm+0x1a/0x30
[   26.737677] 
[   26.737769] The buggy address belongs to the object at ffff888105a1e600
[   26.737769]  which belongs to the cache kmalloc-64 of size 64
[   26.738310] The buggy address is located 0 bytes to the right of
[   26.738310]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.738763] 
[   26.738860] The buggy address belongs to the physical page:
[   26.739147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.739493] flags: 0x200000000000000(node=0|zone=2)
[   26.739712] page_type: f5(slab)
[   26.739886] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.740238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.740532] page dumped because: kasan: bad access detected
[   26.740758] 
[   26.740846] Memory state around the buggy address:
[   26.741103]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.741387]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.741621] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.741834]                                      ^
[   26.741983]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.742204]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.742420] ==================================================================
[   25.743336] ==================================================================
[   25.743912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   25.744200] Read of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   25.744575] 
[   25.744672] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.744728] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.744742] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.744767] Call Trace:
[   25.744782]  <TASK>
[   25.744803]  dump_stack_lvl+0x73/0xb0
[   25.744835]  print_report+0xd1/0x650
[   25.744859]  ? __virt_addr_valid+0x1db/0x2d0
[   25.744885]  ? kasan_atomics_helper+0x4bbc/0x5450
[   25.744907]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.744933]  ? kasan_atomics_helper+0x4bbc/0x5450
[   25.744956]  kasan_report+0x141/0x180
[   25.744978]  ? kasan_atomics_helper+0x4bbc/0x5450
[   25.745004]  __asan_report_load4_noabort+0x18/0x20
[   25.745029]  kasan_atomics_helper+0x4bbc/0x5450
[   25.745051]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.745087]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.745113]  ? kasan_atomics+0x152/0x310
[   25.745140]  kasan_atomics+0x1dc/0x310
[   25.745163]  ? __pfx_kasan_atomics+0x10/0x10
[   25.745230]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.745259]  ? __pfx_read_tsc+0x10/0x10
[   25.745283]  ? ktime_get_ts64+0x86/0x230
[   25.745310]  kunit_try_run_case+0x1a5/0x480
[   25.745338]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.745362]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.745383]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.745406]  ? __kthread_parkme+0x82/0x180
[   25.745428]  ? preempt_count_sub+0x50/0x80
[   25.745454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.745479]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.745505]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.745530]  kthread+0x337/0x6f0
[   25.745550]  ? trace_preempt_on+0x20/0xc0
[   25.745574]  ? __pfx_kthread+0x10/0x10
[   25.745595]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.745620]  ? calculate_sigpending+0x7b/0xa0
[   25.745646]  ? __pfx_kthread+0x10/0x10
[   25.745668]  ret_from_fork+0x116/0x1d0
[   25.745688]  ? __pfx_kthread+0x10/0x10
[   25.745709]  ret_from_fork_asm+0x1a/0x30
[   25.745741]  </TASK>
[   25.745754] 
[   25.756727] Allocated by task 314:
[   25.757082]  kasan_save_stack+0x45/0x70
[   25.757276]  kasan_save_track+0x18/0x40
[   25.757441]  kasan_save_alloc_info+0x3b/0x50
[   25.757650]  __kasan_kmalloc+0xb7/0xc0
[   25.757918]  __kmalloc_cache_noprof+0x189/0x420
[   25.758116]  kasan_atomics+0x95/0x310
[   25.758311]  kunit_try_run_case+0x1a5/0x480
[   25.758524]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.758784]  kthread+0x337/0x6f0
[   25.758957]  ret_from_fork+0x116/0x1d0
[   25.759141]  ret_from_fork_asm+0x1a/0x30
[   25.759440] 
[   25.759509] The buggy address belongs to the object at ffff888105a1e600
[   25.759509]  which belongs to the cache kmalloc-64 of size 64
[   25.760414] The buggy address is located 0 bytes to the right of
[   25.760414]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   25.761324] 
[   25.761564] The buggy address belongs to the physical page:
[   25.761926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   25.762573] flags: 0x200000000000000(node=0|zone=2)
[   25.762850] page_type: f5(slab)
[   25.763245] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.763688] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.764160] page dumped because: kasan: bad access detected
[   25.764651] 
[   25.764753] Memory state around the buggy address:
[   25.765158]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.765589]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.765892] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.766435]                                      ^
[   25.766868]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.767378]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.767780] ==================================================================
[   26.596518] ==================================================================
[   26.596819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   26.597358] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.597593] 
[   26.597682] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.597737] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.597753] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.597778] Call Trace:
[   26.597802]  <TASK>
[   26.597832]  dump_stack_lvl+0x73/0xb0
[   26.597864]  print_report+0xd1/0x650
[   26.597889]  ? __virt_addr_valid+0x1db/0x2d0
[   26.597916]  ? kasan_atomics_helper+0x16e7/0x5450
[   26.597939]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.597967]  ? kasan_atomics_helper+0x16e7/0x5450
[   26.598012]  kasan_report+0x141/0x180
[   26.598036]  ? kasan_atomics_helper+0x16e7/0x5450
[   26.598083]  kasan_check_range+0x10c/0x1c0
[   26.598110]  __kasan_check_write+0x18/0x20
[   26.598135]  kasan_atomics_helper+0x16e7/0x5450
[   26.598160]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.598185]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.598213]  ? kasan_atomics+0x152/0x310
[   26.598241]  kasan_atomics+0x1dc/0x310
[   26.598267]  ? __pfx_kasan_atomics+0x10/0x10
[   26.598291]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.598321]  ? __pfx_read_tsc+0x10/0x10
[   26.598346]  ? ktime_get_ts64+0x86/0x230
[   26.598374]  kunit_try_run_case+0x1a5/0x480
[   26.598402]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.598429]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.598451]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.598476]  ? __kthread_parkme+0x82/0x180
[   26.598499]  ? preempt_count_sub+0x50/0x80
[   26.598525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.598553]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.598580]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.598607]  kthread+0x337/0x6f0
[   26.598630]  ? trace_preempt_on+0x20/0xc0
[   26.598656]  ? __pfx_kthread+0x10/0x10
[   26.598679]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.598706]  ? calculate_sigpending+0x7b/0xa0
[   26.598732]  ? __pfx_kthread+0x10/0x10
[   26.598756]  ret_from_fork+0x116/0x1d0
[   26.598778]  ? __pfx_kthread+0x10/0x10
[   26.598801]  ret_from_fork_asm+0x1a/0x30
[   26.598834]  </TASK>
[   26.598848] 
[   26.606909] Allocated by task 314:
[   26.607057]  kasan_save_stack+0x45/0x70
[   26.607222]  kasan_save_track+0x18/0x40
[   26.607613]  kasan_save_alloc_info+0x3b/0x50
[   26.608002]  __kasan_kmalloc+0xb7/0xc0
[   26.608349]  __kmalloc_cache_noprof+0x189/0x420
[   26.608755]  kasan_atomics+0x95/0x310
[   26.609116]  kunit_try_run_case+0x1a5/0x480
[   26.609521]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.610034]  kthread+0x337/0x6f0
[   26.610344]  ret_from_fork+0x116/0x1d0
[   26.610687]  ret_from_fork_asm+0x1a/0x30
[   26.611044] 
[   26.611254] The buggy address belongs to the object at ffff888105a1e600
[   26.611254]  which belongs to the cache kmalloc-64 of size 64
[   26.612545] The buggy address is located 0 bytes to the right of
[   26.612545]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.613925] 
[   26.614108] The buggy address belongs to the physical page:
[   26.614618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.615317] flags: 0x200000000000000(node=0|zone=2)
[   26.615764] page_type: f5(slab)
[   26.616081] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.616524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.616753] page dumped because: kasan: bad access detected
[   26.616933] 
[   26.617108] Memory state around the buggy address:
[   26.617540]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.618233]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.618851] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.619644]                                      ^
[   26.620138]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.620756]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.621229] ==================================================================
[   26.409138] ==================================================================
[   26.409470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   26.409789] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.410450] 
[   26.410675] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.410848] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.410869] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.410896] Call Trace:
[   26.410942]  <TASK>
[   26.410967]  dump_stack_lvl+0x73/0xb0
[   26.411038]  print_report+0xd1/0x650
[   26.411078]  ? __virt_addr_valid+0x1db/0x2d0
[   26.411107]  ? kasan_atomics_helper+0x12e6/0x5450
[   26.411130]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.411158]  ? kasan_atomics_helper+0x12e6/0x5450
[   26.411181]  kasan_report+0x141/0x180
[   26.411204]  ? kasan_atomics_helper+0x12e6/0x5450
[   26.411231]  kasan_check_range+0x10c/0x1c0
[   26.411256]  __kasan_check_write+0x18/0x20
[   26.411280]  kasan_atomics_helper+0x12e6/0x5450
[   26.411305]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.411329]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.411356]  ? kasan_atomics+0x152/0x310
[   26.411383]  kasan_atomics+0x1dc/0x310
[   26.411407]  ? __pfx_kasan_atomics+0x10/0x10
[   26.411430]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.411457]  ? __pfx_read_tsc+0x10/0x10
[   26.411480]  ? ktime_get_ts64+0x86/0x230
[   26.411507]  kunit_try_run_case+0x1a5/0x480
[   26.411534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.411559]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.411581]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.411604]  ? __kthread_parkme+0x82/0x180
[   26.411626]  ? preempt_count_sub+0x50/0x80
[   26.411652]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.411678]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.411703]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.411730]  kthread+0x337/0x6f0
[   26.411750]  ? trace_preempt_on+0x20/0xc0
[   26.411775]  ? __pfx_kthread+0x10/0x10
[   26.411797]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.411821]  ? calculate_sigpending+0x7b/0xa0
[   26.411847]  ? __pfx_kthread+0x10/0x10
[   26.411869]  ret_from_fork+0x116/0x1d0
[   26.411892]  ? __pfx_kthread+0x10/0x10
[   26.411916]  ret_from_fork_asm+0x1a/0x30
[   26.411949]  </TASK>
[   26.411963] 
[   26.423585] Allocated by task 314:
[   26.423934]  kasan_save_stack+0x45/0x70
[   26.424334]  kasan_save_track+0x18/0x40
[   26.424713]  kasan_save_alloc_info+0x3b/0x50
[   26.425153]  __kasan_kmalloc+0xb7/0xc0
[   26.425464]  __kmalloc_cache_noprof+0x189/0x420
[   26.425881]  kasan_atomics+0x95/0x310
[   26.426241]  kunit_try_run_case+0x1a5/0x480
[   26.426554]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.427107]  kthread+0x337/0x6f0
[   26.427404]  ret_from_fork+0x116/0x1d0
[   26.427721]  ret_from_fork_asm+0x1a/0x30
[   26.428139] 
[   26.428241] The buggy address belongs to the object at ffff888105a1e600
[   26.428241]  which belongs to the cache kmalloc-64 of size 64
[   26.428724] The buggy address is located 0 bytes to the right of
[   26.428724]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.429576] 
[   26.429684] The buggy address belongs to the physical page:
[   26.429919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.430609] flags: 0x200000000000000(node=0|zone=2)
[   26.430832] page_type: f5(slab)
[   26.431260] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.431699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.432299] page dumped because: kasan: bad access detected
[   26.432609] 
[   26.432831] Memory state around the buggy address:
[   26.433373]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.433810]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.434330] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.434624]                                      ^
[   26.434826]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.435395]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.435696] ==================================================================
[   26.175490] ==================================================================
[   26.175849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   26.176238] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.176561] 
[   26.176661] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.176714] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.176727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.176752] Call Trace:
[   26.176785]  <TASK>
[   26.176805]  dump_stack_lvl+0x73/0xb0
[   26.176835]  print_report+0xd1/0x650
[   26.176872]  ? __virt_addr_valid+0x1db/0x2d0
[   26.176897]  ? kasan_atomics_helper+0xd47/0x5450
[   26.176925]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.176961]  ? kasan_atomics_helper+0xd47/0x5450
[   26.176984]  kasan_report+0x141/0x180
[   26.177007]  ? kasan_atomics_helper+0xd47/0x5450
[   26.177044]  kasan_check_range+0x10c/0x1c0
[   26.177082]  __kasan_check_write+0x18/0x20
[   26.177128]  kasan_atomics_helper+0xd47/0x5450
[   26.177151]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.177175]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.177212]  ? kasan_atomics+0x152/0x310
[   26.177240]  kasan_atomics+0x1dc/0x310
[   26.177263]  ? __pfx_kasan_atomics+0x10/0x10
[   26.177295]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.177322]  ? __pfx_read_tsc+0x10/0x10
[   26.177356]  ? ktime_get_ts64+0x86/0x230
[   26.177382]  kunit_try_run_case+0x1a5/0x480
[   26.177410]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.177434]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.177456]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.177488]  ? __kthread_parkme+0x82/0x180
[   26.177510]  ? preempt_count_sub+0x50/0x80
[   26.177534]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.177571]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.177598]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.177624]  kthread+0x337/0x6f0
[   26.177645]  ? trace_preempt_on+0x20/0xc0
[   26.177670]  ? __pfx_kthread+0x10/0x10
[   26.177692]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.177717]  ? calculate_sigpending+0x7b/0xa0
[   26.177744]  ? __pfx_kthread+0x10/0x10
[   26.177766]  ret_from_fork+0x116/0x1d0
[   26.177787]  ? __pfx_kthread+0x10/0x10
[   26.177810]  ret_from_fork_asm+0x1a/0x30
[   26.177849]  </TASK>
[   26.177864] 
[   26.185388] Allocated by task 314:
[   26.185516]  kasan_save_stack+0x45/0x70
[   26.185715]  kasan_save_track+0x18/0x40
[   26.185904]  kasan_save_alloc_info+0x3b/0x50
[   26.186145]  __kasan_kmalloc+0xb7/0xc0
[   26.186311]  __kmalloc_cache_noprof+0x189/0x420
[   26.186534]  kasan_atomics+0x95/0x310
[   26.186712]  kunit_try_run_case+0x1a5/0x480
[   26.186910]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.187184]  kthread+0x337/0x6f0
[   26.187327]  ret_from_fork+0x116/0x1d0
[   26.187531]  ret_from_fork_asm+0x1a/0x30
[   26.187712] 
[   26.187788] The buggy address belongs to the object at ffff888105a1e600
[   26.187788]  which belongs to the cache kmalloc-64 of size 64
[   26.188313] The buggy address is located 0 bytes to the right of
[   26.188313]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.188721] 
[   26.188792] The buggy address belongs to the physical page:
[   26.188984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.189323] flags: 0x200000000000000(node=0|zone=2)
[   26.189572] page_type: f5(slab)
[   26.189736] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.190105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.190354] page dumped because: kasan: bad access detected
[   26.190521] 
[   26.190587] Memory state around the buggy address:
[   26.190736]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.191110]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.191428] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.191755]                                      ^
[   26.192002]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.192335]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.192617] ==================================================================
[   26.894865] ==================================================================
[   26.895283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   26.895636] Read of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.895997] 
[   26.896126] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.896180] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.896196] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.896222] Call Trace:
[   26.896246]  <TASK>
[   26.896267]  dump_stack_lvl+0x73/0xb0
[   26.896299]  print_report+0xd1/0x650
[   26.896324]  ? __virt_addr_valid+0x1db/0x2d0
[   26.896351]  ? kasan_atomics_helper+0x4f71/0x5450
[   26.896374]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.896403]  ? kasan_atomics_helper+0x4f71/0x5450
[   26.896428]  kasan_report+0x141/0x180
[   26.896452]  ? kasan_atomics_helper+0x4f71/0x5450
[   26.896481]  __asan_report_load8_noabort+0x18/0x20
[   26.896508]  kasan_atomics_helper+0x4f71/0x5450
[   26.896533]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.896557]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.896585]  ? kasan_atomics+0x152/0x310
[   26.896615]  kasan_atomics+0x1dc/0x310
[   26.896640]  ? __pfx_kasan_atomics+0x10/0x10
[   26.896664]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.896691]  ? __pfx_read_tsc+0x10/0x10
[   26.896716]  ? ktime_get_ts64+0x86/0x230
[   26.896743]  kunit_try_run_case+0x1a5/0x480
[   26.896772]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.896798]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.896822]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.896847]  ? __kthread_parkme+0x82/0x180
[   26.896870]  ? preempt_count_sub+0x50/0x80
[   26.896896]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.896946]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.896975]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.897003]  kthread+0x337/0x6f0
[   26.897025]  ? trace_preempt_on+0x20/0xc0
[   26.897052]  ? __pfx_kthread+0x10/0x10
[   26.897084]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.897112]  ? calculate_sigpending+0x7b/0xa0
[   26.897139]  ? __pfx_kthread+0x10/0x10
[   26.897165]  ret_from_fork+0x116/0x1d0
[   26.897188]  ? __pfx_kthread+0x10/0x10
[   26.897211]  ret_from_fork_asm+0x1a/0x30
[   26.897246]  </TASK>
[   26.897260] 
[   26.904729] Allocated by task 314:
[   26.904872]  kasan_save_stack+0x45/0x70
[   26.905084]  kasan_save_track+0x18/0x40
[   26.905279]  kasan_save_alloc_info+0x3b/0x50
[   26.905472]  __kasan_kmalloc+0xb7/0xc0
[   26.905605]  __kmalloc_cache_noprof+0x189/0x420
[   26.905818]  kasan_atomics+0x95/0x310
[   26.906043]  kunit_try_run_case+0x1a5/0x480
[   26.906284]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.906474]  kthread+0x337/0x6f0
[   26.906594]  ret_from_fork+0x116/0x1d0
[   26.906729]  ret_from_fork_asm+0x1a/0x30
[   26.906870] 
[   26.906965] The buggy address belongs to the object at ffff888105a1e600
[   26.906965]  which belongs to the cache kmalloc-64 of size 64
[   26.907332] The buggy address is located 0 bytes to the right of
[   26.907332]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.907744] 
[   26.907840] The buggy address belongs to the physical page:
[   26.908140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.908507] flags: 0x200000000000000(node=0|zone=2)
[   26.908751] page_type: f5(slab)
[   26.908942] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.909298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.909632] page dumped because: kasan: bad access detected
[   26.909824] 
[   26.909893] Memory state around the buggy address:
[   26.910077]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.910298]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.910515] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.910742]                                      ^
[   26.911001]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.911333]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.911659] ==================================================================
[   25.837908] ==================================================================
[   25.838189] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   25.838602] Read of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   25.838970] 
[   25.839096] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.839149] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.839164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.839265] Call Trace:
[   25.839293]  <TASK>
[   25.839346]  dump_stack_lvl+0x73/0xb0
[   25.839380]  print_report+0xd1/0x650
[   25.839433]  ? __virt_addr_valid+0x1db/0x2d0
[   25.839459]  ? kasan_atomics_helper+0x3df/0x5450
[   25.839493]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.839522]  ? kasan_atomics_helper+0x3df/0x5450
[   25.839545]  kasan_report+0x141/0x180
[   25.839569]  ? kasan_atomics_helper+0x3df/0x5450
[   25.839595]  kasan_check_range+0x10c/0x1c0
[   25.839620]  __kasan_check_read+0x15/0x20
[   25.839645]  kasan_atomics_helper+0x3df/0x5450
[   25.839669]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.839692]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.839720]  ? kasan_atomics+0x152/0x310
[   25.839748]  kasan_atomics+0x1dc/0x310
[   25.839772]  ? __pfx_kasan_atomics+0x10/0x10
[   25.839821]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.839847]  ? __pfx_read_tsc+0x10/0x10
[   25.839882]  ? ktime_get_ts64+0x86/0x230
[   25.839909]  kunit_try_run_case+0x1a5/0x480
[   25.839945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.839970]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.839993]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.840017]  ? __kthread_parkme+0x82/0x180
[   25.840039]  ? preempt_count_sub+0x50/0x80
[   25.840075]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.840101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.840127]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.840154]  kthread+0x337/0x6f0
[   25.840249]  ? trace_preempt_on+0x20/0xc0
[   25.840293]  ? __pfx_kthread+0x10/0x10
[   25.840317]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.840345]  ? calculate_sigpending+0x7b/0xa0
[   25.840401]  ? __pfx_kthread+0x10/0x10
[   25.840426]  ret_from_fork+0x116/0x1d0
[   25.840448]  ? __pfx_kthread+0x10/0x10
[   25.840481]  ret_from_fork_asm+0x1a/0x30
[   25.840514]  </TASK>
[   25.840528] 
[   25.850689] Allocated by task 314:
[   25.850876]  kasan_save_stack+0x45/0x70
[   25.851153]  kasan_save_track+0x18/0x40
[   25.851289]  kasan_save_alloc_info+0x3b/0x50
[   25.851632]  __kasan_kmalloc+0xb7/0xc0
[   25.851880]  __kmalloc_cache_noprof+0x189/0x420
[   25.852227]  kasan_atomics+0x95/0x310
[   25.852427]  kunit_try_run_case+0x1a5/0x480
[   25.852633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.852898]  kthread+0x337/0x6f0
[   25.853037]  ret_from_fork+0x116/0x1d0
[   25.853425]  ret_from_fork_asm+0x1a/0x30
[   25.853849] 
[   25.853966] The buggy address belongs to the object at ffff888105a1e600
[   25.853966]  which belongs to the cache kmalloc-64 of size 64
[   25.854663] The buggy address is located 0 bytes to the right of
[   25.854663]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   25.855263] 
[   25.855426] The buggy address belongs to the physical page:
[   25.855673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   25.855931] flags: 0x200000000000000(node=0|zone=2)
[   25.856180] page_type: f5(slab)
[   25.856500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.856822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.857048] page dumped because: kasan: bad access detected
[   25.857282] 
[   25.857396] Memory state around the buggy address:
[   25.857681]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.858380]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.858704] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.858920]                                      ^
[   25.859180]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.859626]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.860452] ==================================================================
[   26.687001] ==================================================================
[   26.688245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   26.688639] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.688878] 
[   26.689006] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.689073] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.689090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.689118] Call Trace:
[   26.689140]  <TASK>
[   26.689163]  dump_stack_lvl+0x73/0xb0
[   26.689194]  print_report+0xd1/0x650
[   26.689219]  ? __virt_addr_valid+0x1db/0x2d0
[   26.689245]  ? kasan_atomics_helper+0x194a/0x5450
[   26.689269]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.689298]  ? kasan_atomics_helper+0x194a/0x5450
[   26.689321]  kasan_report+0x141/0x180
[   26.689345]  ? kasan_atomics_helper+0x194a/0x5450
[   26.689373]  kasan_check_range+0x10c/0x1c0
[   26.689398]  __kasan_check_write+0x18/0x20
[   26.689434]  kasan_atomics_helper+0x194a/0x5450
[   26.689459]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.689494]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.689522]  ? kasan_atomics+0x152/0x310
[   26.689549]  kasan_atomics+0x1dc/0x310
[   26.689575]  ? __pfx_kasan_atomics+0x10/0x10
[   26.689598]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.689624]  ? __pfx_read_tsc+0x10/0x10
[   26.689648]  ? ktime_get_ts64+0x86/0x230
[   26.689675]  kunit_try_run_case+0x1a5/0x480
[   26.689702]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.689728]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.689751]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.689774]  ? __kthread_parkme+0x82/0x180
[   26.689797]  ? preempt_count_sub+0x50/0x80
[   26.689828]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.689855]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.689880]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.689906]  kthread+0x337/0x6f0
[   26.689936]  ? trace_preempt_on+0x20/0xc0
[   26.689963]  ? __pfx_kthread+0x10/0x10
[   26.689985]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.690011]  ? calculate_sigpending+0x7b/0xa0
[   26.690036]  ? __pfx_kthread+0x10/0x10
[   26.690070]  ret_from_fork+0x116/0x1d0
[   26.690093]  ? __pfx_kthread+0x10/0x10
[   26.690115]  ret_from_fork_asm+0x1a/0x30
[   26.690157]  </TASK>
[   26.690171] 
[   26.697874] Allocated by task 314:
[   26.698281]  kasan_save_stack+0x45/0x70
[   26.698487]  kasan_save_track+0x18/0x40
[   26.698670]  kasan_save_alloc_info+0x3b/0x50
[   26.698844]  __kasan_kmalloc+0xb7/0xc0
[   26.699092]  __kmalloc_cache_noprof+0x189/0x420
[   26.699273]  kasan_atomics+0x95/0x310
[   26.699402]  kunit_try_run_case+0x1a5/0x480
[   26.699546]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.699738]  kthread+0x337/0x6f0
[   26.699903]  ret_from_fork+0x116/0x1d0
[   26.700095]  ret_from_fork_asm+0x1a/0x30
[   26.700312] 
[   26.700404] The buggy address belongs to the object at ffff888105a1e600
[   26.700404]  which belongs to the cache kmalloc-64 of size 64
[   26.701085] The buggy address is located 0 bytes to the right of
[   26.701085]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.701448] 
[   26.701519] The buggy address belongs to the physical page:
[   26.701700] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.702244] flags: 0x200000000000000(node=0|zone=2)
[   26.702506] page_type: f5(slab)
[   26.702688] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.703075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.703551] page dumped because: kasan: bad access detected
[   26.703806] 
[   26.703919] Memory state around the buggy address:
[   26.704135]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.704378]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.704612] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.704966]                                      ^
[   26.705201]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.705504]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.705783] ==================================================================
[   26.841014] ==================================================================
[   26.841385] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   26.841607] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.841815] 
[   26.841904] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.841956] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.841971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.841996] Call Trace:
[   26.842018]  <TASK>
[   26.842040]  dump_stack_lvl+0x73/0xb0
[   26.842082]  print_report+0xd1/0x650
[   26.842106]  ? __virt_addr_valid+0x1db/0x2d0
[   26.842132]  ? kasan_atomics_helper+0x1e12/0x5450
[   26.842155]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.842183]  ? kasan_atomics_helper+0x1e12/0x5450
[   26.842206]  kasan_report+0x141/0x180
[   26.842229]  ? kasan_atomics_helper+0x1e12/0x5450
[   26.842257]  kasan_check_range+0x10c/0x1c0
[   26.842281]  __kasan_check_write+0x18/0x20
[   26.842306]  kasan_atomics_helper+0x1e12/0x5450
[   26.842329]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.842352]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.842379]  ? kasan_atomics+0x152/0x310
[   26.842406]  kasan_atomics+0x1dc/0x310
[   26.842429]  ? __pfx_kasan_atomics+0x10/0x10
[   26.842452]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.842479]  ? __pfx_read_tsc+0x10/0x10
[   26.842502]  ? ktime_get_ts64+0x86/0x230
[   26.842529]  kunit_try_run_case+0x1a5/0x480
[   26.842556]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.842582]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.842605]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.842629]  ? __kthread_parkme+0x82/0x180
[   26.842651]  ? preempt_count_sub+0x50/0x80
[   26.842676]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.842702]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.842728]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.842754]  kthread+0x337/0x6f0
[   26.842775]  ? trace_preempt_on+0x20/0xc0
[   26.842800]  ? __pfx_kthread+0x10/0x10
[   26.842823]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.842849]  ? calculate_sigpending+0x7b/0xa0
[   26.842874]  ? __pfx_kthread+0x10/0x10
[   26.842897]  ret_from_fork+0x116/0x1d0
[   26.842917]  ? __pfx_kthread+0x10/0x10
[   26.842952]  ret_from_fork_asm+0x1a/0x30
[   26.842984]  </TASK>
[   26.842997] 
[   26.850294] Allocated by task 314:
[   26.850483]  kasan_save_stack+0x45/0x70
[   26.850683]  kasan_save_track+0x18/0x40
[   26.850868]  kasan_save_alloc_info+0x3b/0x50
[   26.851238]  __kasan_kmalloc+0xb7/0xc0
[   26.851423]  __kmalloc_cache_noprof+0x189/0x420
[   26.851616]  kasan_atomics+0x95/0x310
[   26.851762]  kunit_try_run_case+0x1a5/0x480
[   26.851944]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.852123]  kthread+0x337/0x6f0
[   26.852236]  ret_from_fork+0x116/0x1d0
[   26.852358]  ret_from_fork_asm+0x1a/0x30
[   26.852486] 
[   26.852549] The buggy address belongs to the object at ffff888105a1e600
[   26.852549]  which belongs to the cache kmalloc-64 of size 64
[   26.852917] The buggy address is located 0 bytes to the right of
[   26.852917]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.853463] 
[   26.853557] The buggy address belongs to the physical page:
[   26.853806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.854308] flags: 0x200000000000000(node=0|zone=2)
[   26.854462] page_type: f5(slab)
[   26.854575] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.854787] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.854994] page dumped because: kasan: bad access detected
[   26.855160] 
[   26.855250] Memory state around the buggy address:
[   26.855469]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.855770]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.856282] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.856593]                                      ^
[   26.856805]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.857298]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.857536] ==================================================================
[   26.265867] ==================================================================
[   26.266233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   26.266568] Read of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.266893] 
[   26.267002] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.267053] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.267227] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.267254] Call Trace:
[   26.267277]  <TASK>
[   26.267298]  dump_stack_lvl+0x73/0xb0
[   26.267329]  print_report+0xd1/0x650
[   26.267353]  ? __virt_addr_valid+0x1db/0x2d0
[   26.267379]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.267402]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.267430]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.267453]  kasan_report+0x141/0x180
[   26.267476]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.267503]  __asan_report_load4_noabort+0x18/0x20
[   26.267529]  kasan_atomics_helper+0x4a36/0x5450
[   26.267552]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.267576]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.267603]  ? kasan_atomics+0x152/0x310
[   26.267631]  kasan_atomics+0x1dc/0x310
[   26.267655]  ? __pfx_kasan_atomics+0x10/0x10
[   26.267678]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.267717]  ? __pfx_read_tsc+0x10/0x10
[   26.267740]  ? ktime_get_ts64+0x86/0x230
[   26.267780]  kunit_try_run_case+0x1a5/0x480
[   26.267808]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.267833]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.267855]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.267879]  ? __kthread_parkme+0x82/0x180
[   26.267901]  ? preempt_count_sub+0x50/0x80
[   26.267945]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.267972]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.268007]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.268032]  kthread+0x337/0x6f0
[   26.268054]  ? trace_preempt_on+0x20/0xc0
[   26.268156]  ? __pfx_kthread+0x10/0x10
[   26.268188]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.268216]  ? calculate_sigpending+0x7b/0xa0
[   26.268241]  ? __pfx_kthread+0x10/0x10
[   26.268275]  ret_from_fork+0x116/0x1d0
[   26.268296]  ? __pfx_kthread+0x10/0x10
[   26.268319]  ret_from_fork_asm+0x1a/0x30
[   26.268360]  </TASK>
[   26.268374] 
[   26.277602] Allocated by task 314:
[   26.277774]  kasan_save_stack+0x45/0x70
[   26.278293]  kasan_save_track+0x18/0x40
[   26.278477]  kasan_save_alloc_info+0x3b/0x50
[   26.278668]  __kasan_kmalloc+0xb7/0xc0
[   26.278834]  __kmalloc_cache_noprof+0x189/0x420
[   26.279364]  kasan_atomics+0x95/0x310
[   26.279668]  kunit_try_run_case+0x1a5/0x480
[   26.280097]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.280559]  kthread+0x337/0x6f0
[   26.280814]  ret_from_fork+0x116/0x1d0
[   26.281143]  ret_from_fork_asm+0x1a/0x30
[   26.281542] 
[   26.281772] The buggy address belongs to the object at ffff888105a1e600
[   26.281772]  which belongs to the cache kmalloc-64 of size 64
[   26.282620] The buggy address is located 0 bytes to the right of
[   26.282620]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.283370] 
[   26.283629] The buggy address belongs to the physical page:
[   26.284272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.284605] flags: 0x200000000000000(node=0|zone=2)
[   26.284810] page_type: f5(slab)
[   26.285198] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.285539] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.285849] page dumped because: kasan: bad access detected
[   26.286506] 
[   26.286604] Memory state around the buggy address:
[   26.287183]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.287507]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.287795] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.288361]                                      ^
[   26.288720]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.289330]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.289788] ==================================================================
[   26.876121] ==================================================================
[   26.876675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   26.876912] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.877556] 
[   26.877656] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.877710] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.877725] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.877751] Call Trace:
[   26.877771]  <TASK>
[   26.877792]  dump_stack_lvl+0x73/0xb0
[   26.877830]  print_report+0xd1/0x650
[   26.877856]  ? __virt_addr_valid+0x1db/0x2d0
[   26.877882]  ? kasan_atomics_helper+0x1f43/0x5450
[   26.877906]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.878339]  ? kasan_atomics_helper+0x1f43/0x5450
[   26.878379]  kasan_report+0x141/0x180
[   26.878405]  ? kasan_atomics_helper+0x1f43/0x5450
[   26.878434]  kasan_check_range+0x10c/0x1c0
[   26.878460]  __kasan_check_write+0x18/0x20
[   26.878485]  kasan_atomics_helper+0x1f43/0x5450
[   26.878510]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.878534]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.878562]  ? kasan_atomics+0x152/0x310
[   26.878590]  kasan_atomics+0x1dc/0x310
[   26.878614]  ? __pfx_kasan_atomics+0x10/0x10
[   26.878638]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.878666]  ? __pfx_read_tsc+0x10/0x10
[   26.878690]  ? ktime_get_ts64+0x86/0x230
[   26.878718]  kunit_try_run_case+0x1a5/0x480
[   26.878746]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.878772]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.878796]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.878820]  ? __kthread_parkme+0x82/0x180
[   26.878842]  ? preempt_count_sub+0x50/0x80
[   26.878868]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.878896]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.878923]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.878960]  kthread+0x337/0x6f0
[   26.878982]  ? trace_preempt_on+0x20/0xc0
[   26.879008]  ? __pfx_kthread+0x10/0x10
[   26.879031]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.879058]  ? calculate_sigpending+0x7b/0xa0
[   26.879099]  ? __pfx_kthread+0x10/0x10
[   26.879123]  ret_from_fork+0x116/0x1d0
[   26.879144]  ? __pfx_kthread+0x10/0x10
[   26.879168]  ret_from_fork_asm+0x1a/0x30
[   26.879201]  </TASK>
[   26.879216] 
[   26.887033] Allocated by task 314:
[   26.887215]  kasan_save_stack+0x45/0x70
[   26.887365]  kasan_save_track+0x18/0x40
[   26.887500]  kasan_save_alloc_info+0x3b/0x50
[   26.887649]  __kasan_kmalloc+0xb7/0xc0
[   26.887779]  __kmalloc_cache_noprof+0x189/0x420
[   26.887932]  kasan_atomics+0x95/0x310
[   26.888170]  kunit_try_run_case+0x1a5/0x480
[   26.888393]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.888658]  kthread+0x337/0x6f0
[   26.888831]  ret_from_fork+0x116/0x1d0
[   26.889048]  ret_from_fork_asm+0x1a/0x30
[   26.889231] 
[   26.889325] The buggy address belongs to the object at ffff888105a1e600
[   26.889325]  which belongs to the cache kmalloc-64 of size 64
[   26.889756] The buggy address is located 0 bytes to the right of
[   26.889756]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.890162] 
[   26.890234] The buggy address belongs to the physical page:
[   26.890406] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.890772] flags: 0x200000000000000(node=0|zone=2)
[   26.891028] page_type: f5(slab)
[   26.891213] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.891572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.891964] page dumped because: kasan: bad access detected
[   26.892249] 
[   26.892346] Memory state around the buggy address:
[   26.892587]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.892936]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.893203] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.893418]                                      ^
[   26.893637]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.894002]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.894241] ==================================================================
[   25.992439] ==================================================================
[   25.993117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   25.993512] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   25.993849] 
[   25.993985] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.994041] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.994057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.994092] Call Trace:
[   25.994116]  <TASK>
[   25.994138]  dump_stack_lvl+0x73/0xb0
[   25.994168]  print_report+0xd1/0x650
[   25.994194]  ? __virt_addr_valid+0x1db/0x2d0
[   25.994219]  ? kasan_atomics_helper+0x72f/0x5450
[   25.994242]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.994270]  ? kasan_atomics_helper+0x72f/0x5450
[   25.994293]  kasan_report+0x141/0x180
[   25.994316]  ? kasan_atomics_helper+0x72f/0x5450
[   25.994343]  kasan_check_range+0x10c/0x1c0
[   25.994369]  __kasan_check_write+0x18/0x20
[   25.994394]  kasan_atomics_helper+0x72f/0x5450
[   25.994418]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.994441]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.994469]  ? kasan_atomics+0x152/0x310
[   25.994508]  kasan_atomics+0x1dc/0x310
[   25.994532]  ? __pfx_kasan_atomics+0x10/0x10
[   25.994568]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.994595]  ? __pfx_read_tsc+0x10/0x10
[   25.994619]  ? ktime_get_ts64+0x86/0x230
[   25.994658]  kunit_try_run_case+0x1a5/0x480
[   25.994686]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.994723]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.994746]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.994771]  ? __kthread_parkme+0x82/0x180
[   25.994805]  ? preempt_count_sub+0x50/0x80
[   25.994831]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.994858]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.994894]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.994946]  kthread+0x337/0x6f0
[   25.994969]  ? trace_preempt_on+0x20/0xc0
[   25.995005]  ? __pfx_kthread+0x10/0x10
[   25.995028]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.995054]  ? calculate_sigpending+0x7b/0xa0
[   25.995095]  ? __pfx_kthread+0x10/0x10
[   25.995119]  ret_from_fork+0x116/0x1d0
[   25.995140]  ? __pfx_kthread+0x10/0x10
[   25.995163]  ret_from_fork_asm+0x1a/0x30
[   25.995205]  </TASK>
[   25.995220] 
[   26.002763] Allocated by task 314:
[   26.002973]  kasan_save_stack+0x45/0x70
[   26.003184]  kasan_save_track+0x18/0x40
[   26.003329]  kasan_save_alloc_info+0x3b/0x50
[   26.003475]  __kasan_kmalloc+0xb7/0xc0
[   26.003681]  __kmalloc_cache_noprof+0x189/0x420
[   26.003900]  kasan_atomics+0x95/0x310
[   26.004100]  kunit_try_run_case+0x1a5/0x480
[   26.004250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.004446]  kthread+0x337/0x6f0
[   26.004611]  ret_from_fork+0x116/0x1d0
[   26.004797]  ret_from_fork_asm+0x1a/0x30
[   26.005042] 
[   26.005143] The buggy address belongs to the object at ffff888105a1e600
[   26.005143]  which belongs to the cache kmalloc-64 of size 64
[   26.005497] The buggy address is located 0 bytes to the right of
[   26.005497]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.005882] 
[   26.006023] The buggy address belongs to the physical page:
[   26.006287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.006646] flags: 0x200000000000000(node=0|zone=2)
[   26.006881] page_type: f5(slab)
[   26.007087] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.007430] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.007735] page dumped because: kasan: bad access detected
[   26.007903] 
[   26.007986] Memory state around the buggy address:
[   26.008191]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.008515]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.008855] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.009221]                                      ^
[   26.009446]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.009733]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.009976] ==================================================================
[   26.806153] ==================================================================
[   26.807189] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   26.807469] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.807689] 
[   26.807776] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.807833] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.807849] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.807874] Call Trace:
[   26.807898]  <TASK>
[   26.807923]  dump_stack_lvl+0x73/0xb0
[   26.807956]  print_report+0xd1/0x650
[   26.807981]  ? __virt_addr_valid+0x1db/0x2d0
[   26.808008]  ? kasan_atomics_helper+0x1ce1/0x5450
[   26.808030]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.808058]  ? kasan_atomics_helper+0x1ce1/0x5450
[   26.808094]  kasan_report+0x141/0x180
[   26.808117]  ? kasan_atomics_helper+0x1ce1/0x5450
[   26.808145]  kasan_check_range+0x10c/0x1c0
[   26.808171]  __kasan_check_write+0x18/0x20
[   26.808197]  kasan_atomics_helper+0x1ce1/0x5450
[   26.808222]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.808246]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.808274]  ? kasan_atomics+0x152/0x310
[   26.808301]  kasan_atomics+0x1dc/0x310
[   26.808325]  ? __pfx_kasan_atomics+0x10/0x10
[   26.808349]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.808375]  ? __pfx_read_tsc+0x10/0x10
[   26.808399]  ? ktime_get_ts64+0x86/0x230
[   26.808426]  kunit_try_run_case+0x1a5/0x480
[   26.808454]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.808480]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.808503]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.808527]  ? __kthread_parkme+0x82/0x180
[   26.808549]  ? preempt_count_sub+0x50/0x80
[   26.808575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.808601]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.808627]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.808652]  kthread+0x337/0x6f0
[   26.808674]  ? trace_preempt_on+0x20/0xc0
[   26.808698]  ? __pfx_kthread+0x10/0x10
[   26.808720]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.808746]  ? calculate_sigpending+0x7b/0xa0
[   26.808772]  ? __pfx_kthread+0x10/0x10
[   26.808795]  ret_from_fork+0x116/0x1d0
[   26.808815]  ? __pfx_kthread+0x10/0x10
[   26.808837]  ret_from_fork_asm+0x1a/0x30
[   26.808870]  </TASK>
[   26.808885] 
[   26.816178] Allocated by task 314:
[   26.816353]  kasan_save_stack+0x45/0x70
[   26.816583]  kasan_save_track+0x18/0x40
[   26.816728]  kasan_save_alloc_info+0x3b/0x50
[   26.816869]  __kasan_kmalloc+0xb7/0xc0
[   26.817049]  __kmalloc_cache_noprof+0x189/0x420
[   26.817287]  kasan_atomics+0x95/0x310
[   26.817446]  kunit_try_run_case+0x1a5/0x480
[   26.817639]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.817860]  kthread+0x337/0x6f0
[   26.818018]  ret_from_fork+0x116/0x1d0
[   26.818216]  ret_from_fork_asm+0x1a/0x30
[   26.818392] 
[   26.818471] The buggy address belongs to the object at ffff888105a1e600
[   26.818471]  which belongs to the cache kmalloc-64 of size 64
[   26.818852] The buggy address is located 0 bytes to the right of
[   26.818852]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.819329] 
[   26.819398] The buggy address belongs to the physical page:
[   26.819793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.820180] flags: 0x200000000000000(node=0|zone=2)
[   26.820372] page_type: f5(slab)
[   26.820544] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.820818] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.821159] page dumped because: kasan: bad access detected
[   26.821323] 
[   26.821414] Memory state around the buggy address:
[   26.821636]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.821905]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.822125] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.822336]                                      ^
[   26.822488]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.822695]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.823095] ==================================================================
[   26.437148] ==================================================================
[   26.437459] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   26.437785] Read of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.438093] 
[   26.438250] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.438312] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.438328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.438354] Call Trace:
[   26.438376]  <TASK>
[   26.438410]  dump_stack_lvl+0x73/0xb0
[   26.438442]  print_report+0xd1/0x650
[   26.438467]  ? __virt_addr_valid+0x1db/0x2d0
[   26.438493]  ? kasan_atomics_helper+0x49ce/0x5450
[   26.438515]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.438553]  ? kasan_atomics_helper+0x49ce/0x5450
[   26.438576]  kasan_report+0x141/0x180
[   26.438598]  ? kasan_atomics_helper+0x49ce/0x5450
[   26.438635]  __asan_report_load4_noabort+0x18/0x20
[   26.438662]  kasan_atomics_helper+0x49ce/0x5450
[   26.438686]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.438709]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.438735]  ? kasan_atomics+0x152/0x310
[   26.438762]  kasan_atomics+0x1dc/0x310
[   26.438786]  ? __pfx_kasan_atomics+0x10/0x10
[   26.438810]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.438845]  ? __pfx_read_tsc+0x10/0x10
[   26.438868]  ? ktime_get_ts64+0x86/0x230
[   26.438905]  kunit_try_run_case+0x1a5/0x480
[   26.438943]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.438968]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.438991]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.439014]  ? __kthread_parkme+0x82/0x180
[   26.439044]  ? preempt_count_sub+0x50/0x80
[   26.439085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.439111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.439137]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.439163]  kthread+0x337/0x6f0
[   26.439184]  ? trace_preempt_on+0x20/0xc0
[   26.439209]  ? __pfx_kthread+0x10/0x10
[   26.439230]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.439256]  ? calculate_sigpending+0x7b/0xa0
[   26.439280]  ? __pfx_kthread+0x10/0x10
[   26.439303]  ret_from_fork+0x116/0x1d0
[   26.439324]  ? __pfx_kthread+0x10/0x10
[   26.439346]  ret_from_fork_asm+0x1a/0x30
[   26.439378]  </TASK>
[   26.439391] 
[   26.448345] Allocated by task 314:
[   26.448504]  kasan_save_stack+0x45/0x70
[   26.448681]  kasan_save_track+0x18/0x40
[   26.448864]  kasan_save_alloc_info+0x3b/0x50
[   26.449146]  __kasan_kmalloc+0xb7/0xc0
[   26.449306]  __kmalloc_cache_noprof+0x189/0x420
[   26.449499]  kasan_atomics+0x95/0x310
[   26.449679]  kunit_try_run_case+0x1a5/0x480
[   26.449844]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.450160]  kthread+0x337/0x6f0
[   26.450305]  ret_from_fork+0x116/0x1d0
[   26.450473]  ret_from_fork_asm+0x1a/0x30
[   26.450645] 
[   26.450720] The buggy address belongs to the object at ffff888105a1e600
[   26.450720]  which belongs to the cache kmalloc-64 of size 64
[   26.451146] The buggy address is located 0 bytes to the right of
[   26.451146]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.451502] 
[   26.451586] The buggy address belongs to the physical page:
[   26.451836] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.452190] flags: 0x200000000000000(node=0|zone=2)
[   26.452422] page_type: f5(slab)
[   26.452554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.452785] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.453043] page dumped because: kasan: bad access detected
[   26.453309] 
[   26.453400] Memory state around the buggy address:
[   26.453647]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.453978]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.454377] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.454710]                                      ^
[   26.454963]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.455282]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.455490] ==================================================================
[   26.539951] ==================================================================
[   26.540429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   26.540763] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.541110] 
[   26.541205] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.541260] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.541274] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.541300] Call Trace:
[   26.541324]  <TASK>
[   26.541347]  dump_stack_lvl+0x73/0xb0
[   26.541378]  print_report+0xd1/0x650
[   26.541403]  ? __virt_addr_valid+0x1db/0x2d0
[   26.541429]  ? kasan_atomics_helper+0x151d/0x5450
[   26.541453]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.541480]  ? kasan_atomics_helper+0x151d/0x5450
[   26.541504]  kasan_report+0x141/0x180
[   26.541527]  ? kasan_atomics_helper+0x151d/0x5450
[   26.541554]  kasan_check_range+0x10c/0x1c0
[   26.541578]  __kasan_check_write+0x18/0x20
[   26.541603]  kasan_atomics_helper+0x151d/0x5450
[   26.541628]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.541651]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.541678]  ? kasan_atomics+0x152/0x310
[   26.541706]  kasan_atomics+0x1dc/0x310
[   26.541743]  ? __pfx_kasan_atomics+0x10/0x10
[   26.541766]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.541804]  ? __pfx_read_tsc+0x10/0x10
[   26.541835]  ? ktime_get_ts64+0x86/0x230
[   26.541863]  kunit_try_run_case+0x1a5/0x480
[   26.541890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.541916]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.541939]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.541963]  ? __kthread_parkme+0x82/0x180
[   26.541986]  ? preempt_count_sub+0x50/0x80
[   26.542013]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.542047]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.542097]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.542136]  kthread+0x337/0x6f0
[   26.542158]  ? trace_preempt_on+0x20/0xc0
[   26.542184]  ? __pfx_kthread+0x10/0x10
[   26.542206]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.542233]  ? calculate_sigpending+0x7b/0xa0
[   26.542260]  ? __pfx_kthread+0x10/0x10
[   26.542284]  ret_from_fork+0x116/0x1d0
[   26.542306]  ? __pfx_kthread+0x10/0x10
[   26.542329]  ret_from_fork_asm+0x1a/0x30
[   26.542363]  </TASK>
[   26.542379] 
[   26.550069] Allocated by task 314:
[   26.550276]  kasan_save_stack+0x45/0x70
[   26.550506]  kasan_save_track+0x18/0x40
[   26.550695]  kasan_save_alloc_info+0x3b/0x50
[   26.550906]  __kasan_kmalloc+0xb7/0xc0
[   26.551259]  __kmalloc_cache_noprof+0x189/0x420
[   26.551482]  kasan_atomics+0x95/0x310
[   26.551668]  kunit_try_run_case+0x1a5/0x480
[   26.551834]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.552153]  kthread+0x337/0x6f0
[   26.552341]  ret_from_fork+0x116/0x1d0
[   26.552543]  ret_from_fork_asm+0x1a/0x30
[   26.552741] 
[   26.552810] The buggy address belongs to the object at ffff888105a1e600
[   26.552810]  which belongs to the cache kmalloc-64 of size 64
[   26.553262] The buggy address is located 0 bytes to the right of
[   26.553262]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.553844] 
[   26.553937] The buggy address belongs to the physical page:
[   26.554271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.554610] flags: 0x200000000000000(node=0|zone=2)
[   26.554843] page_type: f5(slab)
[   26.555002] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.555344] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.555679] page dumped because: kasan: bad access detected
[   26.555907] 
[   26.556074] Memory state around the buggy address:
[   26.556287]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.556603]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.556849] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.557199]                                      ^
[   26.557395]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.557680]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.557983] ==================================================================
[   26.499211] ==================================================================
[   26.499764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   26.500163] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.500459] 
[   26.500596] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.500651] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.500667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.500692] Call Trace:
[   26.500727]  <TASK>
[   26.500749]  dump_stack_lvl+0x73/0xb0
[   26.500792]  print_report+0xd1/0x650
[   26.500826]  ? __virt_addr_valid+0x1db/0x2d0
[   26.500851]  ? kasan_atomics_helper+0x1467/0x5450
[   26.500884]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.500911]  ? kasan_atomics_helper+0x1467/0x5450
[   26.500934]  kasan_report+0x141/0x180
[   26.500956]  ? kasan_atomics_helper+0x1467/0x5450
[   26.500983]  kasan_check_range+0x10c/0x1c0
[   26.501008]  __kasan_check_write+0x18/0x20
[   26.501032]  kasan_atomics_helper+0x1467/0x5450
[   26.501055]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.501089]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.501116]  ? kasan_atomics+0x152/0x310
[   26.501144]  kasan_atomics+0x1dc/0x310
[   26.501168]  ? __pfx_kasan_atomics+0x10/0x10
[   26.501199]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.501234]  ? __pfx_read_tsc+0x10/0x10
[   26.501258]  ? ktime_get_ts64+0x86/0x230
[   26.501284]  kunit_try_run_case+0x1a5/0x480
[   26.501323]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.501347]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.501370]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.501394]  ? __kthread_parkme+0x82/0x180
[   26.501416]  ? preempt_count_sub+0x50/0x80
[   26.501441]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.501467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.501493]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.501519]  kthread+0x337/0x6f0
[   26.501540]  ? trace_preempt_on+0x20/0xc0
[   26.501574]  ? __pfx_kthread+0x10/0x10
[   26.501596]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.501622]  ? calculate_sigpending+0x7b/0xa0
[   26.501658]  ? __pfx_kthread+0x10/0x10
[   26.501682]  ret_from_fork+0x116/0x1d0
[   26.501702]  ? __pfx_kthread+0x10/0x10
[   26.501738]  ret_from_fork_asm+0x1a/0x30
[   26.501776]  </TASK>
[   26.501800] 
[   26.509808] Allocated by task 314:
[   26.510006]  kasan_save_stack+0x45/0x70
[   26.510214]  kasan_save_track+0x18/0x40
[   26.510348]  kasan_save_alloc_info+0x3b/0x50
[   26.510534]  __kasan_kmalloc+0xb7/0xc0
[   26.510728]  __kmalloc_cache_noprof+0x189/0x420
[   26.510942]  kasan_atomics+0x95/0x310
[   26.511156]  kunit_try_run_case+0x1a5/0x480
[   26.511350]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.511580]  kthread+0x337/0x6f0
[   26.511734]  ret_from_fork+0x116/0x1d0
[   26.511904]  ret_from_fork_asm+0x1a/0x30
[   26.512088] 
[   26.512159] The buggy address belongs to the object at ffff888105a1e600
[   26.512159]  which belongs to the cache kmalloc-64 of size 64
[   26.512631] The buggy address is located 0 bytes to the right of
[   26.512631]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.514220] 
[   26.514367] The buggy address belongs to the physical page:
[   26.514546] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.514785] flags: 0x200000000000000(node=0|zone=2)
[   26.514949] page_type: f5(slab)
[   26.515081] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.516120] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.516586] page dumped because: kasan: bad access detected
[   26.516829] 
[   26.516917] Memory state around the buggy address:
[   26.517134]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.517422]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.517706] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.518337]                                      ^
[   26.518758]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.519290]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.519789] ==================================================================
[   26.346402] ==================================================================
[   26.347362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   26.347723] Read of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.348038] 
[   26.348165] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.348243] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.348260] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.348285] Call Trace:
[   26.348367]  <TASK>
[   26.348393]  dump_stack_lvl+0x73/0xb0
[   26.348438]  print_report+0xd1/0x650
[   26.348464]  ? __virt_addr_valid+0x1db/0x2d0
[   26.348502]  ? kasan_atomics_helper+0x4a02/0x5450
[   26.348525]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.348554]  ? kasan_atomics_helper+0x4a02/0x5450
[   26.348587]  kasan_report+0x141/0x180
[   26.348611]  ? kasan_atomics_helper+0x4a02/0x5450
[   26.348638]  __asan_report_load4_noabort+0x18/0x20
[   26.348675]  kasan_atomics_helper+0x4a02/0x5450
[   26.348699]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.348722]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.348751]  ? kasan_atomics+0x152/0x310
[   26.348779]  kasan_atomics+0x1dc/0x310
[   26.348802]  ? __pfx_kasan_atomics+0x10/0x10
[   26.348825]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.348851]  ? __pfx_read_tsc+0x10/0x10
[   26.348875]  ? ktime_get_ts64+0x86/0x230
[   26.348903]  kunit_try_run_case+0x1a5/0x480
[   26.348931]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.348956]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.348978]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.349002]  ? __kthread_parkme+0x82/0x180
[   26.349025]  ? preempt_count_sub+0x50/0x80
[   26.349050]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.349086]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.349113]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.349139]  kthread+0x337/0x6f0
[   26.349160]  ? trace_preempt_on+0x20/0xc0
[   26.349185]  ? __pfx_kthread+0x10/0x10
[   26.349207]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.349233]  ? calculate_sigpending+0x7b/0xa0
[   26.349258]  ? __pfx_kthread+0x10/0x10
[   26.349281]  ret_from_fork+0x116/0x1d0
[   26.349311]  ? __pfx_kthread+0x10/0x10
[   26.349333]  ret_from_fork_asm+0x1a/0x30
[   26.349377]  </TASK>
[   26.349392] 
[   26.357638] Allocated by task 314:
[   26.357842]  kasan_save_stack+0x45/0x70
[   26.358108]  kasan_save_track+0x18/0x40
[   26.358289]  kasan_save_alloc_info+0x3b/0x50
[   26.358475]  __kasan_kmalloc+0xb7/0xc0
[   26.358669]  __kmalloc_cache_noprof+0x189/0x420
[   26.358886]  kasan_atomics+0x95/0x310
[   26.359162]  kunit_try_run_case+0x1a5/0x480
[   26.359358]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.359600]  kthread+0x337/0x6f0
[   26.359758]  ret_from_fork+0x116/0x1d0
[   26.359942]  ret_from_fork_asm+0x1a/0x30
[   26.360177] 
[   26.360292] The buggy address belongs to the object at ffff888105a1e600
[   26.360292]  which belongs to the cache kmalloc-64 of size 64
[   26.360826] The buggy address is located 0 bytes to the right of
[   26.360826]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.361362] 
[   26.361437] The buggy address belongs to the physical page:
[   26.361608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.361850] flags: 0x200000000000000(node=0|zone=2)
[   26.362096] page_type: f5(slab)
[   26.362286] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.362622] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.362963] page dumped because: kasan: bad access detected
[   26.363219] 
[   26.363313] Memory state around the buggy address:
[   26.363557]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.363854]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.364231] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.364440]                                      ^
[   26.364588]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.364798]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.365049] ==================================================================
[   26.667961] ==================================================================
[   26.668520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   26.668836] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.669078] 
[   26.669197] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.669264] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.669279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.669326] Call Trace:
[   26.669350]  <TASK>
[   26.669373]  dump_stack_lvl+0x73/0xb0
[   26.669417]  print_report+0xd1/0x650
[   26.669445]  ? __virt_addr_valid+0x1db/0x2d0
[   26.669473]  ? kasan_atomics_helper+0x18b1/0x5450
[   26.669499]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.669532]  ? kasan_atomics_helper+0x18b1/0x5450
[   26.669557]  kasan_report+0x141/0x180
[   26.669582]  ? kasan_atomics_helper+0x18b1/0x5450
[   26.669611]  kasan_check_range+0x10c/0x1c0
[   26.669637]  __kasan_check_write+0x18/0x20
[   26.669663]  kasan_atomics_helper+0x18b1/0x5450
[   26.669689]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.669714]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.669755]  ? kasan_atomics+0x152/0x310
[   26.669783]  kasan_atomics+0x1dc/0x310
[   26.669829]  ? __pfx_kasan_atomics+0x10/0x10
[   26.669854]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.669881]  ? __pfx_read_tsc+0x10/0x10
[   26.669904]  ? ktime_get_ts64+0x86/0x230
[   26.669955]  kunit_try_run_case+0x1a5/0x480
[   26.669984]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.670030]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.670056]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.670091]  ? __kthread_parkme+0x82/0x180
[   26.670115]  ? preempt_count_sub+0x50/0x80
[   26.670150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.670178]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.670206]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.670245]  kthread+0x337/0x6f0
[   26.670267]  ? trace_preempt_on+0x20/0xc0
[   26.670293]  ? __pfx_kthread+0x10/0x10
[   26.670325]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.670352]  ? calculate_sigpending+0x7b/0xa0
[   26.670379]  ? __pfx_kthread+0x10/0x10
[   26.670414]  ret_from_fork+0x116/0x1d0
[   26.670436]  ? __pfx_kthread+0x10/0x10
[   26.670459]  ret_from_fork_asm+0x1a/0x30
[   26.670494]  </TASK>
[   26.670508] 
[   26.678388] Allocated by task 314:
[   26.678520]  kasan_save_stack+0x45/0x70
[   26.678721]  kasan_save_track+0x18/0x40
[   26.678915]  kasan_save_alloc_info+0x3b/0x50
[   26.679287]  __kasan_kmalloc+0xb7/0xc0
[   26.679477]  __kmalloc_cache_noprof+0x189/0x420
[   26.679689]  kasan_atomics+0x95/0x310
[   26.679869]  kunit_try_run_case+0x1a5/0x480
[   26.680133]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.680376]  kthread+0x337/0x6f0
[   26.680541]  ret_from_fork+0x116/0x1d0
[   26.680722]  ret_from_fork_asm+0x1a/0x30
[   26.680903] 
[   26.681001] The buggy address belongs to the object at ffff888105a1e600
[   26.681001]  which belongs to the cache kmalloc-64 of size 64
[   26.681600] The buggy address is located 0 bytes to the right of
[   26.681600]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.682095] 
[   26.682225] The buggy address belongs to the physical page:
[   26.682459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.682733] flags: 0x200000000000000(node=0|zone=2)
[   26.682895] page_type: f5(slab)
[   26.683199] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.683563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.683871] page dumped because: kasan: bad access detected
[   26.684038] 
[   26.684115] Memory state around the buggy address:
[   26.684544]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.684889]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.685117] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.685325]                                      ^
[   26.685476]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.685688]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.686146] ==================================================================
[   26.291433] ==================================================================
[   26.291769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   26.292156] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.292452] 
[   26.292579] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.292646] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.292673] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.292699] Call Trace:
[   26.292724]  <TASK>
[   26.292746]  dump_stack_lvl+0x73/0xb0
[   26.292779]  print_report+0xd1/0x650
[   26.292805]  ? __virt_addr_valid+0x1db/0x2d0
[   26.292840]  ? kasan_atomics_helper+0x1079/0x5450
[   26.292863]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.292891]  ? kasan_atomics_helper+0x1079/0x5450
[   26.292924]  kasan_report+0x141/0x180
[   26.292947]  ? kasan_atomics_helper+0x1079/0x5450
[   26.292986]  kasan_check_range+0x10c/0x1c0
[   26.293010]  __kasan_check_write+0x18/0x20
[   26.293035]  kasan_atomics_helper+0x1079/0x5450
[   26.293069]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.293092]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.293128]  ? kasan_atomics+0x152/0x310
[   26.293156]  kasan_atomics+0x1dc/0x310
[   26.293179]  ? __pfx_kasan_atomics+0x10/0x10
[   26.293213]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.293239]  ? __pfx_read_tsc+0x10/0x10
[   26.293264]  ? ktime_get_ts64+0x86/0x230
[   26.293290]  kunit_try_run_case+0x1a5/0x480
[   26.293318]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.293342]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.293374]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.293398]  ? __kthread_parkme+0x82/0x180
[   26.293430]  ? preempt_count_sub+0x50/0x80
[   26.293456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.293481]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.293507]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.293532]  kthread+0x337/0x6f0
[   26.293553]  ? trace_preempt_on+0x20/0xc0
[   26.293577]  ? __pfx_kthread+0x10/0x10
[   26.293599]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.293625]  ? calculate_sigpending+0x7b/0xa0
[   26.293649]  ? __pfx_kthread+0x10/0x10
[   26.293672]  ret_from_fork+0x116/0x1d0
[   26.293692]  ? __pfx_kthread+0x10/0x10
[   26.293714]  ret_from_fork_asm+0x1a/0x30
[   26.293746]  </TASK>
[   26.293761] 
[   26.301564] Allocated by task 314:
[   26.301714]  kasan_save_stack+0x45/0x70
[   26.301907]  kasan_save_track+0x18/0x40
[   26.302309]  kasan_save_alloc_info+0x3b/0x50
[   26.302488]  __kasan_kmalloc+0xb7/0xc0
[   26.302616]  __kmalloc_cache_noprof+0x189/0x420
[   26.302767]  kasan_atomics+0x95/0x310
[   26.302960]  kunit_try_run_case+0x1a5/0x480
[   26.303176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.303452]  kthread+0x337/0x6f0
[   26.303641]  ret_from_fork+0x116/0x1d0
[   26.303826]  ret_from_fork_asm+0x1a/0x30
[   26.304016] 
[   26.304107] The buggy address belongs to the object at ffff888105a1e600
[   26.304107]  which belongs to the cache kmalloc-64 of size 64
[   26.304455] The buggy address is located 0 bytes to the right of
[   26.304455]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.304925] 
[   26.305022] The buggy address belongs to the physical page:
[   26.305279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.305659] flags: 0x200000000000000(node=0|zone=2)
[   26.305869] page_type: f5(slab)
[   26.306128] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.306379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.306599] page dumped because: kasan: bad access detected
[   26.306818] 
[   26.306907] Memory state around the buggy address:
[   26.307147]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.307486]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.307814] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.308205]                                      ^
[   26.308354]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.308562]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.309019] ==================================================================
[   26.309835] ==================================================================
[   26.310312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   26.310655] Read of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.310893] 
[   26.311075] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.311131] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.311146] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.311172] Call Trace:
[   26.311196]  <TASK>
[   26.311218]  dump_stack_lvl+0x73/0xb0
[   26.311249]  print_report+0xd1/0x650
[   26.311273]  ? __virt_addr_valid+0x1db/0x2d0
[   26.311299]  ? kasan_atomics_helper+0x4a1c/0x5450
[   26.311321]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.311349]  ? kasan_atomics_helper+0x4a1c/0x5450
[   26.311372]  kasan_report+0x141/0x180
[   26.311395]  ? kasan_atomics_helper+0x4a1c/0x5450
[   26.311422]  __asan_report_load4_noabort+0x18/0x20
[   26.311448]  kasan_atomics_helper+0x4a1c/0x5450
[   26.311472]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.311495]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.311534]  ? kasan_atomics+0x152/0x310
[   26.311560]  kasan_atomics+0x1dc/0x310
[   26.311584]  ? __pfx_kasan_atomics+0x10/0x10
[   26.311619]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.311645]  ? __pfx_read_tsc+0x10/0x10
[   26.311669]  ? ktime_get_ts64+0x86/0x230
[   26.311704]  kunit_try_run_case+0x1a5/0x480
[   26.311732]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.311757]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.311790]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.311814]  ? __kthread_parkme+0x82/0x180
[   26.311836]  ? preempt_count_sub+0x50/0x80
[   26.311871]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.311897]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.311923]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.311971]  kthread+0x337/0x6f0
[   26.311992]  ? trace_preempt_on+0x20/0xc0
[   26.312017]  ? __pfx_kthread+0x10/0x10
[   26.312038]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.312073]  ? calculate_sigpending+0x7b/0xa0
[   26.312100]  ? __pfx_kthread+0x10/0x10
[   26.312123]  ret_from_fork+0x116/0x1d0
[   26.312144]  ? __pfx_kthread+0x10/0x10
[   26.312165]  ret_from_fork_asm+0x1a/0x30
[   26.312197]  </TASK>
[   26.312212] 
[   26.319705] Allocated by task 314:
[   26.319846]  kasan_save_stack+0x45/0x70
[   26.320116]  kasan_save_track+0x18/0x40
[   26.320306]  kasan_save_alloc_info+0x3b/0x50
[   26.320510]  __kasan_kmalloc+0xb7/0xc0
[   26.320689]  __kmalloc_cache_noprof+0x189/0x420
[   26.320907]  kasan_atomics+0x95/0x310
[   26.321106]  kunit_try_run_case+0x1a5/0x480
[   26.321250]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.321420]  kthread+0x337/0x6f0
[   26.321584]  ret_from_fork+0x116/0x1d0
[   26.321793]  ret_from_fork_asm+0x1a/0x30
[   26.322078] 
[   26.322171] The buggy address belongs to the object at ffff888105a1e600
[   26.322171]  which belongs to the cache kmalloc-64 of size 64
[   26.322667] The buggy address is located 0 bytes to the right of
[   26.322667]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.323224] 
[   26.323320] The buggy address belongs to the physical page:
[   26.323558] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.323893] flags: 0x200000000000000(node=0|zone=2)
[   26.324139] page_type: f5(slab)
[   26.324308] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.324635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.324956] page dumped because: kasan: bad access detected
[   26.325189] 
[   26.325269] Memory state around the buggy address:
[   26.325483]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.325730]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.325971] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.326292]                                      ^
[   26.326540]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.326754]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.327158] ==================================================================
[   26.101313] ==================================================================
[   26.101668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   26.101970] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.102224] 
[   26.102315] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.102368] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.102384] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.102410] Call Trace:
[   26.102433]  <TASK>
[   26.102454]  dump_stack_lvl+0x73/0xb0
[   26.102485]  print_report+0xd1/0x650
[   26.102510]  ? __virt_addr_valid+0x1db/0x2d0
[   26.102536]  ? kasan_atomics_helper+0xac7/0x5450
[   26.102559]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.102586]  ? kasan_atomics_helper+0xac7/0x5450
[   26.102610]  kasan_report+0x141/0x180
[   26.102634]  ? kasan_atomics_helper+0xac7/0x5450
[   26.102661]  kasan_check_range+0x10c/0x1c0
[   26.102686]  __kasan_check_write+0x18/0x20
[   26.102710]  kasan_atomics_helper+0xac7/0x5450
[   26.102734]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.102758]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.102785]  ? kasan_atomics+0x152/0x310
[   26.102814]  kasan_atomics+0x1dc/0x310
[   26.102839]  ? __pfx_kasan_atomics+0x10/0x10
[   26.102862]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.102888]  ? __pfx_read_tsc+0x10/0x10
[   26.102913]  ? ktime_get_ts64+0x86/0x230
[   26.102973]  kunit_try_run_case+0x1a5/0x480
[   26.103002]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.103038]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.103077]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.103101]  ? __kthread_parkme+0x82/0x180
[   26.103124]  ? preempt_count_sub+0x50/0x80
[   26.103161]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.103188]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.103214]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.103253]  kthread+0x337/0x6f0
[   26.103274]  ? trace_preempt_on+0x20/0xc0
[   26.103311]  ? __pfx_kthread+0x10/0x10
[   26.103334]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.103360]  ? calculate_sigpending+0x7b/0xa0
[   26.103398]  ? __pfx_kthread+0x10/0x10
[   26.103422]  ret_from_fork+0x116/0x1d0
[   26.103444]  ? __pfx_kthread+0x10/0x10
[   26.103477]  ret_from_fork_asm+0x1a/0x30
[   26.103511]  </TASK>
[   26.103526] 
[   26.111377] Allocated by task 314:
[   26.111520]  kasan_save_stack+0x45/0x70
[   26.111661]  kasan_save_track+0x18/0x40
[   26.111793]  kasan_save_alloc_info+0x3b/0x50
[   26.111959]  __kasan_kmalloc+0xb7/0xc0
[   26.112121]  __kmalloc_cache_noprof+0x189/0x420
[   26.112297]  kasan_atomics+0x95/0x310
[   26.112425]  kunit_try_run_case+0x1a5/0x480
[   26.112567]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.112736]  kthread+0x337/0x6f0
[   26.112852]  ret_from_fork+0x116/0x1d0
[   26.113083]  ret_from_fork_asm+0x1a/0x30
[   26.113279] 
[   26.113367] The buggy address belongs to the object at ffff888105a1e600
[   26.113367]  which belongs to the cache kmalloc-64 of size 64
[   26.113884] The buggy address is located 0 bytes to the right of
[   26.113884]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.114450] 
[   26.114520] The buggy address belongs to the physical page:
[   26.114688] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.114956] flags: 0x200000000000000(node=0|zone=2)
[   26.115199] page_type: f5(slab)
[   26.115369] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.115761] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.116143] page dumped because: kasan: bad access detected
[   26.116310] 
[   26.116375] Memory state around the buggy address:
[   26.116524]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.116734]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.116971] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.117263]                                      ^
[   26.117490]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.117868]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.118264] ==================================================================
[   26.967672] ==================================================================
[   26.968057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   26.968361] Read of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.968598] 
[   26.968694] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.968750] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.968765] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.968830] Call Trace:
[   26.968857]  <TASK>
[   26.968905]  dump_stack_lvl+0x73/0xb0
[   26.969006]  print_report+0xd1/0x650
[   26.969058]  ? __virt_addr_valid+0x1db/0x2d0
[   26.969096]  ? kasan_atomics_helper+0x4fb2/0x5450
[   26.969121]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.969151]  ? kasan_atomics_helper+0x4fb2/0x5450
[   26.969175]  kasan_report+0x141/0x180
[   26.969199]  ? kasan_atomics_helper+0x4fb2/0x5450
[   26.969227]  __asan_report_load8_noabort+0x18/0x20
[   26.969254]  kasan_atomics_helper+0x4fb2/0x5450
[   26.969278]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.969302]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.969330]  ? kasan_atomics+0x152/0x310
[   26.969358]  kasan_atomics+0x1dc/0x310
[   26.969382]  ? __pfx_kasan_atomics+0x10/0x10
[   26.969406]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.969434]  ? __pfx_read_tsc+0x10/0x10
[   26.969458]  ? ktime_get_ts64+0x86/0x230
[   26.969487]  kunit_try_run_case+0x1a5/0x480
[   26.969515]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.969541]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.969564]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.969589]  ? __kthread_parkme+0x82/0x180
[   26.969613]  ? preempt_count_sub+0x50/0x80
[   26.969639]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.969666]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.969693]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.969719]  kthread+0x337/0x6f0
[   26.969742]  ? trace_preempt_on+0x20/0xc0
[   26.969768]  ? __pfx_kthread+0x10/0x10
[   26.969790]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.969817]  ? calculate_sigpending+0x7b/0xa0
[   26.969850]  ? __pfx_kthread+0x10/0x10
[   26.969873]  ret_from_fork+0x116/0x1d0
[   26.969937]  ? __pfx_kthread+0x10/0x10
[   26.969960]  ret_from_fork_asm+0x1a/0x30
[   26.969995]  </TASK>
[   26.970009] 
[   26.977330] Allocated by task 314:
[   26.977476]  kasan_save_stack+0x45/0x70
[   26.977697]  kasan_save_track+0x18/0x40
[   26.977895]  kasan_save_alloc_info+0x3b/0x50
[   26.978138]  __kasan_kmalloc+0xb7/0xc0
[   26.978366]  __kmalloc_cache_noprof+0x189/0x420
[   26.978592]  kasan_atomics+0x95/0x310
[   26.978794]  kunit_try_run_case+0x1a5/0x480
[   26.979043]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.979328]  kthread+0x337/0x6f0
[   26.979500]  ret_from_fork+0x116/0x1d0
[   26.979630]  ret_from_fork_asm+0x1a/0x30
[   26.979766] 
[   26.979859] The buggy address belongs to the object at ffff888105a1e600
[   26.979859]  which belongs to the cache kmalloc-64 of size 64
[   26.980414] The buggy address is located 0 bytes to the right of
[   26.980414]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.980959] 
[   26.981056] The buggy address belongs to the physical page:
[   26.981297] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.981629] flags: 0x200000000000000(node=0|zone=2)
[   26.981799] page_type: f5(slab)
[   26.981945] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.982185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.982494] page dumped because: kasan: bad access detected
[   26.982741] 
[   26.982829] Memory state around the buggy address:
[   26.983087]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.983337]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.983549] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.983757]                                      ^
[   26.984001]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.984349]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.984662] ==================================================================
[   26.762291] ==================================================================
[   26.762676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   26.763024] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.763311] 
[   26.763449] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.763503] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.763518] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.763543] Call Trace:
[   26.763567]  <TASK>
[   26.763589]  dump_stack_lvl+0x73/0xb0
[   26.763620]  print_report+0xd1/0x650
[   26.763643]  ? __virt_addr_valid+0x1db/0x2d0
[   26.763670]  ? kasan_atomics_helper+0x1c18/0x5450
[   26.763693]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.763721]  ? kasan_atomics_helper+0x1c18/0x5450
[   26.763745]  kasan_report+0x141/0x180
[   26.763770]  ? kasan_atomics_helper+0x1c18/0x5450
[   26.763798]  kasan_check_range+0x10c/0x1c0
[   26.763823]  __kasan_check_write+0x18/0x20
[   26.763848]  kasan_atomics_helper+0x1c18/0x5450
[   26.763872]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.763905]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.763957]  ? kasan_atomics+0x152/0x310
[   26.763984]  kasan_atomics+0x1dc/0x310
[   26.764008]  ? __pfx_kasan_atomics+0x10/0x10
[   26.764031]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.764058]  ? __pfx_read_tsc+0x10/0x10
[   26.764091]  ? ktime_get_ts64+0x86/0x230
[   26.764118]  kunit_try_run_case+0x1a5/0x480
[   26.764145]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.764170]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.764193]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.764216]  ? __kthread_parkme+0x82/0x180
[   26.764238]  ? preempt_count_sub+0x50/0x80
[   26.764263]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.764288]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.764314]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.764340]  kthread+0x337/0x6f0
[   26.764360]  ? trace_preempt_on+0x20/0xc0
[   26.764385]  ? __pfx_kthread+0x10/0x10
[   26.764408]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.764433]  ? calculate_sigpending+0x7b/0xa0
[   26.764458]  ? __pfx_kthread+0x10/0x10
[   26.764481]  ret_from_fork+0x116/0x1d0
[   26.764501]  ? __pfx_kthread+0x10/0x10
[   26.764523]  ret_from_fork_asm+0x1a/0x30
[   26.764555]  </TASK>
[   26.764570] 
[   26.772042] Allocated by task 314:
[   26.772181]  kasan_save_stack+0x45/0x70
[   26.772323]  kasan_save_track+0x18/0x40
[   26.772481]  kasan_save_alloc_info+0x3b/0x50
[   26.772710]  __kasan_kmalloc+0xb7/0xc0
[   26.772896]  __kmalloc_cache_noprof+0x189/0x420
[   26.773160]  kasan_atomics+0x95/0x310
[   26.773347]  kunit_try_run_case+0x1a5/0x480
[   26.773576]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.773806]  kthread+0x337/0x6f0
[   26.773969]  ret_from_fork+0x116/0x1d0
[   26.774175]  ret_from_fork_asm+0x1a/0x30
[   26.774354] 
[   26.774443] The buggy address belongs to the object at ffff888105a1e600
[   26.774443]  which belongs to the cache kmalloc-64 of size 64
[   26.774940] The buggy address is located 0 bytes to the right of
[   26.774940]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.775464] 
[   26.775548] The buggy address belongs to the physical page:
[   26.775784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.776155] flags: 0x200000000000000(node=0|zone=2)
[   26.776372] page_type: f5(slab)
[   26.776546] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.776851] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.777205] page dumped because: kasan: bad access detected
[   26.777420] 
[   26.777485] Memory state around the buggy address:
[   26.777634]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.777851]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.778085] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.778431]                                      ^
[   26.778651]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.778986]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.779328] ==================================================================
[   26.823725] ==================================================================
[   26.824085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   26.824613] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.824837] 
[   26.824922] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.824990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.825005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.825030] Call Trace:
[   26.825051]  <TASK>
[   26.825084]  dump_stack_lvl+0x73/0xb0
[   26.825115]  print_report+0xd1/0x650
[   26.825138]  ? __virt_addr_valid+0x1db/0x2d0
[   26.825163]  ? kasan_atomics_helper+0x1d7a/0x5450
[   26.825185]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.825213]  ? kasan_atomics_helper+0x1d7a/0x5450
[   26.825236]  kasan_report+0x141/0x180
[   26.825259]  ? kasan_atomics_helper+0x1d7a/0x5450
[   26.825286]  kasan_check_range+0x10c/0x1c0
[   26.825311]  __kasan_check_write+0x18/0x20
[   26.825335]  kasan_atomics_helper+0x1d7a/0x5450
[   26.825359]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.825382]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.825409]  ? kasan_atomics+0x152/0x310
[   26.825435]  kasan_atomics+0x1dc/0x310
[   26.825458]  ? __pfx_kasan_atomics+0x10/0x10
[   26.825482]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.825508]  ? __pfx_read_tsc+0x10/0x10
[   26.825531]  ? ktime_get_ts64+0x86/0x230
[   26.825557]  kunit_try_run_case+0x1a5/0x480
[   26.825584]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.825609]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.825631]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.825655]  ? __kthread_parkme+0x82/0x180
[   26.825676]  ? preempt_count_sub+0x50/0x80
[   26.825701]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.825727]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.825753]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.825779]  kthread+0x337/0x6f0
[   26.825800]  ? trace_preempt_on+0x20/0xc0
[   26.825830]  ? __pfx_kthread+0x10/0x10
[   26.825855]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.825882]  ? calculate_sigpending+0x7b/0xa0
[   26.825907]  ? __pfx_kthread+0x10/0x10
[   26.825940]  ret_from_fork+0x116/0x1d0
[   26.825963]  ? __pfx_kthread+0x10/0x10
[   26.825985]  ret_from_fork_asm+0x1a/0x30
[   26.826017]  </TASK>
[   26.826031] 
[   26.832889] Allocated by task 314:
[   26.833083]  kasan_save_stack+0x45/0x70
[   26.833279]  kasan_save_track+0x18/0x40
[   26.833469]  kasan_save_alloc_info+0x3b/0x50
[   26.833677]  __kasan_kmalloc+0xb7/0xc0
[   26.833868]  __kmalloc_cache_noprof+0x189/0x420
[   26.834095]  kasan_atomics+0x95/0x310
[   26.834275]  kunit_try_run_case+0x1a5/0x480
[   26.834486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.834742]  kthread+0x337/0x6f0
[   26.834904]  ret_from_fork+0x116/0x1d0
[   26.835082]  ret_from_fork_asm+0x1a/0x30
[   26.835244] 
[   26.835308] The buggy address belongs to the object at ffff888105a1e600
[   26.835308]  which belongs to the cache kmalloc-64 of size 64
[   26.835649] The buggy address is located 0 bytes to the right of
[   26.835649]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.836122] 
[   26.836218] The buggy address belongs to the physical page:
[   26.836464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.836806] flags: 0x200000000000000(node=0|zone=2)
[   26.837029] page_type: f5(slab)
[   26.837160] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.837389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.837615] page dumped because: kasan: bad access detected
[   26.837781] 
[   26.837850] Memory state around the buggy address:
[   26.838000]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.838551]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.838870] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.839198]                                      ^
[   26.839422]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.839754]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.840216] ==================================================================
[   26.193400] ==================================================================
[   26.193728] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   26.194024] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.194342] 
[   26.194441] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.194492] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.194506] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.194531] Call Trace:
[   26.194552]  <TASK>
[   26.194573]  dump_stack_lvl+0x73/0xb0
[   26.194603]  print_report+0xd1/0x650
[   26.194626]  ? __virt_addr_valid+0x1db/0x2d0
[   26.194651]  ? kasan_atomics_helper+0xde0/0x5450
[   26.194673]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.194699]  ? kasan_atomics_helper+0xde0/0x5450
[   26.194722]  kasan_report+0x141/0x180
[   26.194745]  ? kasan_atomics_helper+0xde0/0x5450
[   26.194772]  kasan_check_range+0x10c/0x1c0
[   26.194795]  __kasan_check_write+0x18/0x20
[   26.194820]  kasan_atomics_helper+0xde0/0x5450
[   26.194843]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.194867]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.194894]  ? kasan_atomics+0x152/0x310
[   26.194920]  kasan_atomics+0x1dc/0x310
[   26.194943]  ? __pfx_kasan_atomics+0x10/0x10
[   26.194966]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.194992]  ? __pfx_read_tsc+0x10/0x10
[   26.195015]  ? ktime_get_ts64+0x86/0x230
[   26.195041]  kunit_try_run_case+0x1a5/0x480
[   26.195108]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.195134]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.195156]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.195193]  ? __kthread_parkme+0x82/0x180
[   26.195215]  ? preempt_count_sub+0x50/0x80
[   26.195240]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.195275]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.195301]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.195327]  kthread+0x337/0x6f0
[   26.195357]  ? trace_preempt_on+0x20/0xc0
[   26.195383]  ? __pfx_kthread+0x10/0x10
[   26.195405]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.195431]  ? calculate_sigpending+0x7b/0xa0
[   26.195457]  ? __pfx_kthread+0x10/0x10
[   26.195479]  ret_from_fork+0x116/0x1d0
[   26.195499]  ? __pfx_kthread+0x10/0x10
[   26.195522]  ret_from_fork_asm+0x1a/0x30
[   26.195553]  </TASK>
[   26.195568] 
[   26.203087] Allocated by task 314:
[   26.203263]  kasan_save_stack+0x45/0x70
[   26.203466]  kasan_save_track+0x18/0x40
[   26.203659]  kasan_save_alloc_info+0x3b/0x50
[   26.203827]  __kasan_kmalloc+0xb7/0xc0
[   26.204052]  __kmalloc_cache_noprof+0x189/0x420
[   26.204244]  kasan_atomics+0x95/0x310
[   26.204433]  kunit_try_run_case+0x1a5/0x480
[   26.204575]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.204746]  kthread+0x337/0x6f0
[   26.204860]  ret_from_fork+0x116/0x1d0
[   26.205012]  ret_from_fork_asm+0x1a/0x30
[   26.205202] 
[   26.205291] The buggy address belongs to the object at ffff888105a1e600
[   26.205291]  which belongs to the cache kmalloc-64 of size 64
[   26.205831] The buggy address is located 0 bytes to the right of
[   26.205831]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.206403] 
[   26.206499] The buggy address belongs to the physical page:
[   26.206702] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.206961] flags: 0x200000000000000(node=0|zone=2)
[   26.207130] page_type: f5(slab)
[   26.207270] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.207633] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.208023] page dumped because: kasan: bad access detected
[   26.208280] 
[   26.208362] Memory state around the buggy address:
[   26.208524]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.208854]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.209195] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.209485]                                      ^
[   26.209693]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.210029]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.210338] ==================================================================
[   26.065196] ==================================================================
[   26.065549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   26.065897] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.066230] 
[   26.066343] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.066396] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.066410] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.066658] Call Trace:
[   26.066687]  <TASK>
[   26.066710]  dump_stack_lvl+0x73/0xb0
[   26.066744]  print_report+0xd1/0x650
[   26.066769]  ? __virt_addr_valid+0x1db/0x2d0
[   26.066794]  ? kasan_atomics_helper+0x992/0x5450
[   26.066817]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.066844]  ? kasan_atomics_helper+0x992/0x5450
[   26.066868]  kasan_report+0x141/0x180
[   26.066891]  ? kasan_atomics_helper+0x992/0x5450
[   26.066938]  kasan_check_range+0x10c/0x1c0
[   26.066964]  __kasan_check_write+0x18/0x20
[   26.066988]  kasan_atomics_helper+0x992/0x5450
[   26.067020]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.067044]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.067088]  ? kasan_atomics+0x152/0x310
[   26.067116]  kasan_atomics+0x1dc/0x310
[   26.067141]  ? __pfx_kasan_atomics+0x10/0x10
[   26.067166]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.067204]  ? __pfx_read_tsc+0x10/0x10
[   26.067229]  ? ktime_get_ts64+0x86/0x230
[   26.067268]  kunit_try_run_case+0x1a5/0x480
[   26.067297]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.067322]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.067354]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.067378]  ? __kthread_parkme+0x82/0x180
[   26.067402]  ? preempt_count_sub+0x50/0x80
[   26.067438]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.067465]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.067491]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.067526]  kthread+0x337/0x6f0
[   26.067546]  ? trace_preempt_on+0x20/0xc0
[   26.067571]  ? __pfx_kthread+0x10/0x10
[   26.067604]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.067629]  ? calculate_sigpending+0x7b/0xa0
[   26.067655]  ? __pfx_kthread+0x10/0x10
[   26.067686]  ret_from_fork+0x116/0x1d0
[   26.067707]  ? __pfx_kthread+0x10/0x10
[   26.067729]  ret_from_fork_asm+0x1a/0x30
[   26.067772]  </TASK>
[   26.067786] 
[   26.075456] Allocated by task 314:
[   26.075640]  kasan_save_stack+0x45/0x70
[   26.075833]  kasan_save_track+0x18/0x40
[   26.076080]  kasan_save_alloc_info+0x3b/0x50
[   26.076267]  __kasan_kmalloc+0xb7/0xc0
[   26.076449]  __kmalloc_cache_noprof+0x189/0x420
[   26.076623]  kasan_atomics+0x95/0x310
[   26.076825]  kunit_try_run_case+0x1a5/0x480
[   26.077055]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.077302]  kthread+0x337/0x6f0
[   26.077419]  ret_from_fork+0x116/0x1d0
[   26.077548]  ret_from_fork_asm+0x1a/0x30
[   26.077684] 
[   26.077750] The buggy address belongs to the object at ffff888105a1e600
[   26.077750]  which belongs to the cache kmalloc-64 of size 64
[   26.078185] The buggy address is located 0 bytes to the right of
[   26.078185]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.078733] 
[   26.078827] The buggy address belongs to the physical page:
[   26.079136] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.079491] flags: 0x200000000000000(node=0|zone=2)
[   26.079726] page_type: f5(slab)
[   26.079933] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.080270] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.080506] page dumped because: kasan: bad access detected
[   26.080674] 
[   26.080738] Memory state around the buggy address:
[   26.080890]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.081139]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.081477] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.081837]                                      ^
[   26.082104]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.082458]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.082788] ==================================================================
[   27.048455] ==================================================================
[   27.048788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   27.049493] Read of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   27.050089] 
[   27.050308] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   27.050465] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.050485] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.050512] Call Trace:
[   27.050538]  <TASK>
[   27.050561]  dump_stack_lvl+0x73/0xb0
[   27.050605]  print_report+0xd1/0x650
[   27.050632]  ? __virt_addr_valid+0x1db/0x2d0
[   27.050659]  ? kasan_atomics_helper+0x5115/0x5450
[   27.050683]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.050711]  ? kasan_atomics_helper+0x5115/0x5450
[   27.050736]  kasan_report+0x141/0x180
[   27.050759]  ? kasan_atomics_helper+0x5115/0x5450
[   27.050787]  __asan_report_load8_noabort+0x18/0x20
[   27.050814]  kasan_atomics_helper+0x5115/0x5450
[   27.050839]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.050865]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.050894]  ? kasan_atomics+0x152/0x310
[   27.050922]  kasan_atomics+0x1dc/0x310
[   27.050981]  ? __pfx_kasan_atomics+0x10/0x10
[   27.051006]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   27.051034]  ? __pfx_read_tsc+0x10/0x10
[   27.051058]  ? ktime_get_ts64+0x86/0x230
[   27.051096]  kunit_try_run_case+0x1a5/0x480
[   27.051125]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.051152]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   27.051175]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.051199]  ? __kthread_parkme+0x82/0x180
[   27.051223]  ? preempt_count_sub+0x50/0x80
[   27.051250]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.051276]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.051304]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.051330]  kthread+0x337/0x6f0
[   27.051353]  ? trace_preempt_on+0x20/0xc0
[   27.051379]  ? __pfx_kthread+0x10/0x10
[   27.051401]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.051428]  ? calculate_sigpending+0x7b/0xa0
[   27.051455]  ? __pfx_kthread+0x10/0x10
[   27.051479]  ret_from_fork+0x116/0x1d0
[   27.051500]  ? __pfx_kthread+0x10/0x10
[   27.051523]  ret_from_fork_asm+0x1a/0x30
[   27.051558]  </TASK>
[   27.051573] 
[   27.063755] Allocated by task 314:
[   27.064083]  kasan_save_stack+0x45/0x70
[   27.064301]  kasan_save_track+0x18/0x40
[   27.064484]  kasan_save_alloc_info+0x3b/0x50
[   27.064686]  __kasan_kmalloc+0xb7/0xc0
[   27.064859]  __kmalloc_cache_noprof+0x189/0x420
[   27.065337]  kasan_atomics+0x95/0x310
[   27.065648]  kunit_try_run_case+0x1a5/0x480
[   27.066185]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.066505]  kthread+0x337/0x6f0
[   27.066773]  ret_from_fork+0x116/0x1d0
[   27.067113]  ret_from_fork_asm+0x1a/0x30
[   27.067422] 
[   27.067529] The buggy address belongs to the object at ffff888105a1e600
[   27.067529]  which belongs to the cache kmalloc-64 of size 64
[   27.068240] The buggy address is located 0 bytes to the right of
[   27.068240]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   27.069102] 
[   27.069211] The buggy address belongs to the physical page:
[   27.069455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   27.069792] flags: 0x200000000000000(node=0|zone=2)
[   27.070324] page_type: f5(slab)
[   27.070636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.071310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.071769] page dumped because: kasan: bad access detected
[   27.072271] 
[   27.072510] Memory state around the buggy address:
[   27.072733]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.073294]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.073801] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.074293]                                      ^
[   27.074512]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.074810]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.075407] ==================================================================
[   25.861315] ==================================================================
[   25.862323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   25.863070] Read of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   25.863559] 
[   25.863832] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.863902] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.863918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.863954] Call Trace:
[   25.863972]  <TASK>
[   25.863993]  dump_stack_lvl+0x73/0xb0
[   25.864054]  print_report+0xd1/0x650
[   25.864095]  ? __virt_addr_valid+0x1db/0x2d0
[   25.864122]  ? kasan_atomics_helper+0x4b54/0x5450
[   25.864144]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.864172]  ? kasan_atomics_helper+0x4b54/0x5450
[   25.864222]  kasan_report+0x141/0x180
[   25.864246]  ? kasan_atomics_helper+0x4b54/0x5450
[   25.864273]  __asan_report_load4_noabort+0x18/0x20
[   25.864310]  kasan_atomics_helper+0x4b54/0x5450
[   25.864334]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.864357]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.864384]  ? kasan_atomics+0x152/0x310
[   25.864412]  kasan_atomics+0x1dc/0x310
[   25.864435]  ? __pfx_kasan_atomics+0x10/0x10
[   25.864458]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.864484]  ? __pfx_read_tsc+0x10/0x10
[   25.864508]  ? ktime_get_ts64+0x86/0x230
[   25.864534]  kunit_try_run_case+0x1a5/0x480
[   25.864562]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.864586]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.864609]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.864633]  ? __kthread_parkme+0x82/0x180
[   25.864654]  ? preempt_count_sub+0x50/0x80
[   25.864679]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.864705]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.864731]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.864757]  kthread+0x337/0x6f0
[   25.864779]  ? trace_preempt_on+0x20/0xc0
[   25.864805]  ? __pfx_kthread+0x10/0x10
[   25.864827]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.864853]  ? calculate_sigpending+0x7b/0xa0
[   25.864878]  ? __pfx_kthread+0x10/0x10
[   25.864901]  ret_from_fork+0x116/0x1d0
[   25.864922]  ? __pfx_kthread+0x10/0x10
[   25.864957]  ret_from_fork_asm+0x1a/0x30
[   25.864989]  </TASK>
[   25.865003] 
[   25.872907] Allocated by task 314:
[   25.874052]  kasan_save_stack+0x45/0x70
[   25.874703]  kasan_save_track+0x18/0x40
[   25.875312]  kasan_save_alloc_info+0x3b/0x50
[   25.875832]  __kasan_kmalloc+0xb7/0xc0
[   25.876445]  __kmalloc_cache_noprof+0x189/0x420
[   25.876698]  kasan_atomics+0x95/0x310
[   25.876831]  kunit_try_run_case+0x1a5/0x480
[   25.876980]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.877458]  kthread+0x337/0x6f0
[   25.877760]  ret_from_fork+0x116/0x1d0
[   25.878149]  ret_from_fork_asm+0x1a/0x30
[   25.878532] 
[   25.878686] The buggy address belongs to the object at ffff888105a1e600
[   25.878686]  which belongs to the cache kmalloc-64 of size 64
[   25.879654] The buggy address is located 0 bytes to the right of
[   25.879654]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   25.880186] 
[   25.880346] The buggy address belongs to the physical page:
[   25.880818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   25.881560] flags: 0x200000000000000(node=0|zone=2)
[   25.882096] page_type: f5(slab)
[   25.882396] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.883003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.883240] page dumped because: kasan: bad access detected
[   25.883409] 
[   25.883476] Memory state around the buggy address:
[   25.883631]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.883843]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.884089] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.884481]                                      ^
[   25.884717]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.884921]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.885581] ==================================================================
[   25.972632] ==================================================================
[   25.973160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   25.973428] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   25.973668] 
[   25.973798] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.973871] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.973887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.973913] Call Trace:
[   25.973939]  <TASK>
[   25.973961]  dump_stack_lvl+0x73/0xb0
[   25.974003]  print_report+0xd1/0x650
[   25.974027]  ? __virt_addr_valid+0x1db/0x2d0
[   25.974074]  ? kasan_atomics_helper+0x697/0x5450
[   25.974097]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.974124]  ? kasan_atomics_helper+0x697/0x5450
[   25.974148]  kasan_report+0x141/0x180
[   25.974172]  ? kasan_atomics_helper+0x697/0x5450
[   25.974198]  kasan_check_range+0x10c/0x1c0
[   25.974223]  __kasan_check_write+0x18/0x20
[   25.974248]  kasan_atomics_helper+0x697/0x5450
[   25.974281]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.974305]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.974343]  ? kasan_atomics+0x152/0x310
[   25.974372]  kasan_atomics+0x1dc/0x310
[   25.974396]  ? __pfx_kasan_atomics+0x10/0x10
[   25.974420]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.974446]  ? __pfx_read_tsc+0x10/0x10
[   25.974469]  ? ktime_get_ts64+0x86/0x230
[   25.974497]  kunit_try_run_case+0x1a5/0x480
[   25.974525]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.974550]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.974573]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.974598]  ? __kthread_parkme+0x82/0x180
[   25.974620]  ? preempt_count_sub+0x50/0x80
[   25.974646]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.974673]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.974699]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.974726]  kthread+0x337/0x6f0
[   25.974758]  ? trace_preempt_on+0x20/0xc0
[   25.974782]  ? __pfx_kthread+0x10/0x10
[   25.974805]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.974842]  ? calculate_sigpending+0x7b/0xa0
[   25.974868]  ? __pfx_kthread+0x10/0x10
[   25.974892]  ret_from_fork+0x116/0x1d0
[   25.974913]  ? __pfx_kthread+0x10/0x10
[   25.974935]  ret_from_fork_asm+0x1a/0x30
[   25.974968]  </TASK>
[   25.974983] 
[   25.983105] Allocated by task 314:
[   25.983244]  kasan_save_stack+0x45/0x70
[   25.983509]  kasan_save_track+0x18/0x40
[   25.983754]  kasan_save_alloc_info+0x3b/0x50
[   25.984111]  __kasan_kmalloc+0xb7/0xc0
[   25.984339]  __kmalloc_cache_noprof+0x189/0x420
[   25.984519]  kasan_atomics+0x95/0x310
[   25.984650]  kunit_try_run_case+0x1a5/0x480
[   25.984797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.985100]  kthread+0x337/0x6f0
[   25.985271]  ret_from_fork+0x116/0x1d0
[   25.985460]  ret_from_fork_asm+0x1a/0x30
[   25.985682] 
[   25.985785] The buggy address belongs to the object at ffff888105a1e600
[   25.985785]  which belongs to the cache kmalloc-64 of size 64
[   25.986385] The buggy address is located 0 bytes to the right of
[   25.986385]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   25.986756] 
[   25.986855] The buggy address belongs to the physical page:
[   25.987326] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   25.987724] flags: 0x200000000000000(node=0|zone=2)
[   25.988017] page_type: f5(slab)
[   25.988169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.988511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.988829] page dumped because: kasan: bad access detected
[   25.989077] 
[   25.989193] Memory state around the buggy address:
[   25.989387]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.989605]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.989823] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.990179]                                      ^
[   25.990410]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.990739]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.991089] ==================================================================
[   26.229071] ==================================================================
[   26.229666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   26.230473] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.230811] 
[   26.230969] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.231024] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.231040] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.231075] Call Trace:
[   26.231107]  <TASK>
[   26.231129]  dump_stack_lvl+0x73/0xb0
[   26.231173]  print_report+0xd1/0x650
[   26.231198]  ? __virt_addr_valid+0x1db/0x2d0
[   26.231222]  ? kasan_atomics_helper+0xf10/0x5450
[   26.231245]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.231281]  ? kasan_atomics_helper+0xf10/0x5450
[   26.231305]  kasan_report+0x141/0x180
[   26.231328]  ? kasan_atomics_helper+0xf10/0x5450
[   26.231366]  kasan_check_range+0x10c/0x1c0
[   26.231390]  __kasan_check_write+0x18/0x20
[   26.231416]  kasan_atomics_helper+0xf10/0x5450
[   26.231449]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.231472]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.231509]  ? kasan_atomics+0x152/0x310
[   26.231536]  kasan_atomics+0x1dc/0x310
[   26.231560]  ? __pfx_kasan_atomics+0x10/0x10
[   26.231591]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.231618]  ? __pfx_read_tsc+0x10/0x10
[   26.231641]  ? ktime_get_ts64+0x86/0x230
[   26.231678]  kunit_try_run_case+0x1a5/0x480
[   26.231706]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.231732]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.231763]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.231787]  ? __kthread_parkme+0x82/0x180
[   26.231809]  ? preempt_count_sub+0x50/0x80
[   26.231844]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.231870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.231903]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.231947]  kthread+0x337/0x6f0
[   26.231968]  ? trace_preempt_on+0x20/0xc0
[   26.232004]  ? __pfx_kthread+0x10/0x10
[   26.232026]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.232052]  ? calculate_sigpending+0x7b/0xa0
[   26.232095]  ? __pfx_kthread+0x10/0x10
[   26.232118]  ret_from_fork+0x116/0x1d0
[   26.232139]  ? __pfx_kthread+0x10/0x10
[   26.232172]  ret_from_fork_asm+0x1a/0x30
[   26.232204]  </TASK>
[   26.232218] 
[   26.240051] Allocated by task 314:
[   26.240266]  kasan_save_stack+0x45/0x70
[   26.240432]  kasan_save_track+0x18/0x40
[   26.240625]  kasan_save_alloc_info+0x3b/0x50
[   26.240823]  __kasan_kmalloc+0xb7/0xc0
[   26.241037]  __kmalloc_cache_noprof+0x189/0x420
[   26.241253]  kasan_atomics+0x95/0x310
[   26.241435]  kunit_try_run_case+0x1a5/0x480
[   26.241625]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.241798]  kthread+0x337/0x6f0
[   26.241938]  ret_from_fork+0x116/0x1d0
[   26.242078]  ret_from_fork_asm+0x1a/0x30
[   26.242299] 
[   26.242397] The buggy address belongs to the object at ffff888105a1e600
[   26.242397]  which belongs to the cache kmalloc-64 of size 64
[   26.242959] The buggy address is located 0 bytes to the right of
[   26.242959]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.243529] 
[   26.243618] The buggy address belongs to the physical page:
[   26.243789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.244053] flags: 0x200000000000000(node=0|zone=2)
[   26.244248] page_type: f5(slab)
[   26.244417] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.244781] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.245172] page dumped because: kasan: bad access detected
[   26.245445] 
[   26.245557] Memory state around the buggy address:
[   26.245767]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.246000]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.246328] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.246639]                                      ^
[   26.246800]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.247044]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.247262] ==================================================================
[   26.743367] ==================================================================
[   26.744122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   26.744556] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.744777] 
[   26.744866] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.744919] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.744942] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.744967] Call Trace:
[   26.744990]  <TASK>
[   26.745013]  dump_stack_lvl+0x73/0xb0
[   26.745044]  print_report+0xd1/0x650
[   26.745082]  ? __virt_addr_valid+0x1db/0x2d0
[   26.745107]  ? kasan_atomics_helper+0x1b22/0x5450
[   26.745131]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.745158]  ? kasan_atomics_helper+0x1b22/0x5450
[   26.745181]  kasan_report+0x141/0x180
[   26.745205]  ? kasan_atomics_helper+0x1b22/0x5450
[   26.745232]  kasan_check_range+0x10c/0x1c0
[   26.745258]  __kasan_check_write+0x18/0x20
[   26.745282]  kasan_atomics_helper+0x1b22/0x5450
[   26.745306]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.745330]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.745358]  ? kasan_atomics+0x152/0x310
[   26.745385]  kasan_atomics+0x1dc/0x310
[   26.745409]  ? __pfx_kasan_atomics+0x10/0x10
[   26.745432]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.745460]  ? __pfx_read_tsc+0x10/0x10
[   26.745487]  ? ktime_get_ts64+0x86/0x230
[   26.745528]  kunit_try_run_case+0x1a5/0x480
[   26.745557]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.745593]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.745616]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.745640]  ? __kthread_parkme+0x82/0x180
[   26.745661]  ? preempt_count_sub+0x50/0x80
[   26.745687]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.745714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.745740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.745766]  kthread+0x337/0x6f0
[   26.745788]  ? trace_preempt_on+0x20/0xc0
[   26.745813]  ? __pfx_kthread+0x10/0x10
[   26.745839]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.745865]  ? calculate_sigpending+0x7b/0xa0
[   26.745890]  ? __pfx_kthread+0x10/0x10
[   26.745913]  ret_from_fork+0x116/0x1d0
[   26.745945]  ? __pfx_kthread+0x10/0x10
[   26.745968]  ret_from_fork_asm+0x1a/0x30
[   26.746001]  </TASK>
[   26.746014] 
[   26.753629] Allocated by task 314:
[   26.753768]  kasan_save_stack+0x45/0x70
[   26.753992]  kasan_save_track+0x18/0x40
[   26.754187]  kasan_save_alloc_info+0x3b/0x50
[   26.754390]  __kasan_kmalloc+0xb7/0xc0
[   26.754571]  __kmalloc_cache_noprof+0x189/0x420
[   26.754790]  kasan_atomics+0x95/0x310
[   26.754969]  kunit_try_run_case+0x1a5/0x480
[   26.755180]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.755491]  kthread+0x337/0x6f0
[   26.755606]  ret_from_fork+0x116/0x1d0
[   26.755734]  ret_from_fork_asm+0x1a/0x30
[   26.755867] 
[   26.756070] The buggy address belongs to the object at ffff888105a1e600
[   26.756070]  which belongs to the cache kmalloc-64 of size 64
[   26.756595] The buggy address is located 0 bytes to the right of
[   26.756595]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.757178] 
[   26.757261] The buggy address belongs to the physical page:
[   26.757428] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.757665] flags: 0x200000000000000(node=0|zone=2)
[   26.757855] page_type: f5(slab)
[   26.758167] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.758504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.758831] page dumped because: kasan: bad access detected
[   26.759242] 
[   26.759312] Memory state around the buggy address:
[   26.759462]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.759674]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.759886] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.760165]                                      ^
[   26.760405]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.760755]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.761136] ==================================================================
[   26.521305] ==================================================================
[   26.521629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   26.522271] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.522614] 
[   26.522725] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.522781] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.522797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.522822] Call Trace:
[   26.522845]  <TASK>
[   26.522867]  dump_stack_lvl+0x73/0xb0
[   26.522901]  print_report+0xd1/0x650
[   26.522925]  ? __virt_addr_valid+0x1db/0x2d0
[   26.522952]  ? kasan_atomics_helper+0x50d4/0x5450
[   26.522975]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.523002]  ? kasan_atomics_helper+0x50d4/0x5450
[   26.523025]  kasan_report+0x141/0x180
[   26.523048]  ? kasan_atomics_helper+0x50d4/0x5450
[   26.523086]  __asan_report_store8_noabort+0x1b/0x30
[   26.523123]  kasan_atomics_helper+0x50d4/0x5450
[   26.523146]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.523169]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.523208]  ? kasan_atomics+0x152/0x310
[   26.523236]  kasan_atomics+0x1dc/0x310
[   26.523259]  ? __pfx_kasan_atomics+0x10/0x10
[   26.523282]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.523308]  ? __pfx_read_tsc+0x10/0x10
[   26.523332]  ? ktime_get_ts64+0x86/0x230
[   26.523359]  kunit_try_run_case+0x1a5/0x480
[   26.523386]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.523411]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.523433]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.523457]  ? __kthread_parkme+0x82/0x180
[   26.523521]  ? preempt_count_sub+0x50/0x80
[   26.523547]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.523806]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.523844]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.523871]  kthread+0x337/0x6f0
[   26.523892]  ? trace_preempt_on+0x20/0xc0
[   26.523917]  ? __pfx_kthread+0x10/0x10
[   26.523953]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.523980]  ? calculate_sigpending+0x7b/0xa0
[   26.524007]  ? __pfx_kthread+0x10/0x10
[   26.524030]  ret_from_fork+0x116/0x1d0
[   26.524052]  ? __pfx_kthread+0x10/0x10
[   26.524085]  ret_from_fork_asm+0x1a/0x30
[   26.524118]  </TASK>
[   26.524132] 
[   26.531846] Allocated by task 314:
[   26.531987]  kasan_save_stack+0x45/0x70
[   26.532200]  kasan_save_track+0x18/0x40
[   26.532403]  kasan_save_alloc_info+0x3b/0x50
[   26.532607]  __kasan_kmalloc+0xb7/0xc0
[   26.532788]  __kmalloc_cache_noprof+0x189/0x420
[   26.533154]  kasan_atomics+0x95/0x310
[   26.533324]  kunit_try_run_case+0x1a5/0x480
[   26.533467]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.533706]  kthread+0x337/0x6f0
[   26.533874]  ret_from_fork+0x116/0x1d0
[   26.534171]  ret_from_fork_asm+0x1a/0x30
[   26.534354] 
[   26.534448] The buggy address belongs to the object at ffff888105a1e600
[   26.534448]  which belongs to the cache kmalloc-64 of size 64
[   26.534951] The buggy address is located 0 bytes to the right of
[   26.534951]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.535467] 
[   26.535567] The buggy address belongs to the physical page:
[   26.535767] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.536004] flags: 0x200000000000000(node=0|zone=2)
[   26.536174] page_type: f5(slab)
[   26.536295] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.536656] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.537093] page dumped because: kasan: bad access detected
[   26.537342] 
[   26.537422] Memory state around the buggy address:
[   26.537583]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.537811]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.538082] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.538325]                                      ^
[   26.538500]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.538742]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.538990] ==================================================================
[   25.888134] ==================================================================
[   25.888590] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   25.888839] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   25.889424] 
[   25.889629] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.889687] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.889702] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.889728] Call Trace:
[   25.889753]  <TASK>
[   25.889795]  dump_stack_lvl+0x73/0xb0
[   25.889838]  print_report+0xd1/0x650
[   25.889865]  ? __virt_addr_valid+0x1db/0x2d0
[   25.889891]  ? kasan_atomics_helper+0x4a0/0x5450
[   25.889914]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.889943]  ? kasan_atomics_helper+0x4a0/0x5450
[   25.889986]  kasan_report+0x141/0x180
[   25.890024]  ? kasan_atomics_helper+0x4a0/0x5450
[   25.890052]  kasan_check_range+0x10c/0x1c0
[   25.890088]  __kasan_check_write+0x18/0x20
[   25.890113]  kasan_atomics_helper+0x4a0/0x5450
[   25.890137]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.890161]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.890189]  ? kasan_atomics+0x152/0x310
[   25.890216]  kasan_atomics+0x1dc/0x310
[   25.890241]  ? __pfx_kasan_atomics+0x10/0x10
[   25.890265]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.890292]  ? __pfx_read_tsc+0x10/0x10
[   25.890316]  ? ktime_get_ts64+0x86/0x230
[   25.890343]  kunit_try_run_case+0x1a5/0x480
[   25.890373]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.890400]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.890422]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.890446]  ? __kthread_parkme+0x82/0x180
[   25.890469]  ? preempt_count_sub+0x50/0x80
[   25.890495]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.890522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.890548]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.890574]  kthread+0x337/0x6f0
[   25.890596]  ? trace_preempt_on+0x20/0xc0
[   25.890620]  ? __pfx_kthread+0x10/0x10
[   25.890644]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.890670]  ? calculate_sigpending+0x7b/0xa0
[   25.890696]  ? __pfx_kthread+0x10/0x10
[   25.890720]  ret_from_fork+0x116/0x1d0
[   25.890740]  ? __pfx_kthread+0x10/0x10
[   25.890763]  ret_from_fork_asm+0x1a/0x30
[   25.890796]  </TASK>
[   25.890811] 
[   25.900559] Allocated by task 314:
[   25.900754]  kasan_save_stack+0x45/0x70
[   25.900992]  kasan_save_track+0x18/0x40
[   25.901237]  kasan_save_alloc_info+0x3b/0x50
[   25.901388]  __kasan_kmalloc+0xb7/0xc0
[   25.901515]  __kmalloc_cache_noprof+0x189/0x420
[   25.901664]  kasan_atomics+0x95/0x310
[   25.901867]  kunit_try_run_case+0x1a5/0x480
[   25.902294]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.902974]  kthread+0x337/0x6f0
[   25.903233]  ret_from_fork+0x116/0x1d0
[   25.903400]  ret_from_fork_asm+0x1a/0x30
[   25.903636] 
[   25.903732] The buggy address belongs to the object at ffff888105a1e600
[   25.903732]  which belongs to the cache kmalloc-64 of size 64
[   25.904321] The buggy address is located 0 bytes to the right of
[   25.904321]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   25.905043] 
[   25.905140] The buggy address belongs to the physical page:
[   25.905466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   25.905896] flags: 0x200000000000000(node=0|zone=2)
[   25.906108] page_type: f5(slab)
[   25.906230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.906577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.906924] page dumped because: kasan: bad access detected
[   25.907312] 
[   25.907405] Memory state around the buggy address:
[   25.907667]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.908108]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.908450] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.908723]                                      ^
[   25.908907]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.909196]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.909487] ==================================================================
[   26.328176] ==================================================================
[   26.328539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   26.328868] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.329267] 
[   26.329400] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.329456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.329471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.329498] Call Trace:
[   26.329522]  <TASK>
[   26.329544]  dump_stack_lvl+0x73/0xb0
[   26.329576]  print_report+0xd1/0x650
[   26.329602]  ? __virt_addr_valid+0x1db/0x2d0
[   26.329628]  ? kasan_atomics_helper+0x1148/0x5450
[   26.329651]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.329678]  ? kasan_atomics_helper+0x1148/0x5450
[   26.329702]  kasan_report+0x141/0x180
[   26.329725]  ? kasan_atomics_helper+0x1148/0x5450
[   26.329763]  kasan_check_range+0x10c/0x1c0
[   26.329788]  __kasan_check_write+0x18/0x20
[   26.329813]  kasan_atomics_helper+0x1148/0x5450
[   26.329849]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.329873]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.329900]  ? kasan_atomics+0x152/0x310
[   26.329927]  kasan_atomics+0x1dc/0x310
[   26.329950]  ? __pfx_kasan_atomics+0x10/0x10
[   26.329973]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.329999]  ? __pfx_read_tsc+0x10/0x10
[   26.330022]  ? ktime_get_ts64+0x86/0x230
[   26.330049]  kunit_try_run_case+0x1a5/0x480
[   26.330086]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.330111]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.330134]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.330157]  ? __kthread_parkme+0x82/0x180
[   26.330180]  ? preempt_count_sub+0x50/0x80
[   26.330221]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.330248]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.330274]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.330300]  kthread+0x337/0x6f0
[   26.330321]  ? trace_preempt_on+0x20/0xc0
[   26.330345]  ? __pfx_kthread+0x10/0x10
[   26.330367]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.330392]  ? calculate_sigpending+0x7b/0xa0
[   26.330418]  ? __pfx_kthread+0x10/0x10
[   26.330440]  ret_from_fork+0x116/0x1d0
[   26.330462]  ? __pfx_kthread+0x10/0x10
[   26.330484]  ret_from_fork_asm+0x1a/0x30
[   26.330516]  </TASK>
[   26.330530] 
[   26.338158] Allocated by task 314:
[   26.338352]  kasan_save_stack+0x45/0x70
[   26.338544]  kasan_save_track+0x18/0x40
[   26.338739]  kasan_save_alloc_info+0x3b/0x50
[   26.338907]  __kasan_kmalloc+0xb7/0xc0
[   26.339131]  __kmalloc_cache_noprof+0x189/0x420
[   26.339307]  kasan_atomics+0x95/0x310
[   26.339502]  kunit_try_run_case+0x1a5/0x480
[   26.339694]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.339931]  kthread+0x337/0x6f0
[   26.340116]  ret_from_fork+0x116/0x1d0
[   26.340276]  ret_from_fork_asm+0x1a/0x30
[   26.340462] 
[   26.340553] The buggy address belongs to the object at ffff888105a1e600
[   26.340553]  which belongs to the cache kmalloc-64 of size 64
[   26.341107] The buggy address is located 0 bytes to the right of
[   26.341107]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.341493] 
[   26.341563] The buggy address belongs to the physical page:
[   26.341734] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.342009] flags: 0x200000000000000(node=0|zone=2)
[   26.342290] page_type: f5(slab)
[   26.342493] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.342874] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.343353] page dumped because: kasan: bad access detected
[   26.343579] 
[   26.343644] Memory state around the buggy address:
[   26.343795]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.344150]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.344497] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.344861]                                      ^
[   26.345084]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.345364]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.345573] ==================================================================
[   26.384025] ==================================================================
[   26.384422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   26.384756] Read of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.385380] 
[   26.385501] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.385553] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.385568] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.385593] Call Trace:
[   26.385617]  <TASK>
[   26.385639]  dump_stack_lvl+0x73/0xb0
[   26.385670]  print_report+0xd1/0x650
[   26.385694]  ? __virt_addr_valid+0x1db/0x2d0
[   26.385719]  ? kasan_atomics_helper+0x49e8/0x5450
[   26.385742]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.385770]  ? kasan_atomics_helper+0x49e8/0x5450
[   26.385794]  kasan_report+0x141/0x180
[   26.385817]  ? kasan_atomics_helper+0x49e8/0x5450
[   26.385850]  __asan_report_load4_noabort+0x18/0x20
[   26.385876]  kasan_atomics_helper+0x49e8/0x5450
[   26.385900]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.385923]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.385960]  ? kasan_atomics+0x152/0x310
[   26.385988]  kasan_atomics+0x1dc/0x310
[   26.386021]  ? __pfx_kasan_atomics+0x10/0x10
[   26.386045]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.386089]  ? __pfx_read_tsc+0x10/0x10
[   26.386113]  ? ktime_get_ts64+0x86/0x230
[   26.386150]  kunit_try_run_case+0x1a5/0x480
[   26.386178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.386213]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.386236]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.386259]  ? __kthread_parkme+0x82/0x180
[   26.386283]  ? preempt_count_sub+0x50/0x80
[   26.386308]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.386336]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.386361]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.386387]  kthread+0x337/0x6f0
[   26.386408]  ? trace_preempt_on+0x20/0xc0
[   26.386433]  ? __pfx_kthread+0x10/0x10
[   26.386464]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.386490]  ? calculate_sigpending+0x7b/0xa0
[   26.386515]  ? __pfx_kthread+0x10/0x10
[   26.386548]  ret_from_fork+0x116/0x1d0
[   26.386569]  ? __pfx_kthread+0x10/0x10
[   26.386592]  ret_from_fork_asm+0x1a/0x30
[   26.386633]  </TASK>
[   26.386647] 
[   26.396426] Allocated by task 314:
[   26.396754]  kasan_save_stack+0x45/0x70
[   26.397177]  kasan_save_track+0x18/0x40
[   26.397446]  kasan_save_alloc_info+0x3b/0x50
[   26.397833]  __kasan_kmalloc+0xb7/0xc0
[   26.398265]  __kmalloc_cache_noprof+0x189/0x420
[   26.398568]  kasan_atomics+0x95/0x310
[   26.398861]  kunit_try_run_case+0x1a5/0x480
[   26.399268]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.399636]  kthread+0x337/0x6f0
[   26.399806]  ret_from_fork+0x116/0x1d0
[   26.400252]  ret_from_fork_asm+0x1a/0x30
[   26.400504] 
[   26.400754] The buggy address belongs to the object at ffff888105a1e600
[   26.400754]  which belongs to the cache kmalloc-64 of size 64
[   26.401347] The buggy address is located 0 bytes to the right of
[   26.401347]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.401852] 
[   26.402231] The buggy address belongs to the physical page:
[   26.402526] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.403202] flags: 0x200000000000000(node=0|zone=2)
[   26.403440] page_type: f5(slab)
[   26.403596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.403903] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.404221] page dumped because: kasan: bad access detected
[   26.404448] 
[   26.404531] Memory state around the buggy address:
[   26.404736]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.405482]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.406182] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.406631]                                      ^
[   26.406975]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.407294]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.407580] ==================================================================
[   26.365909] ==================================================================
[   26.366356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   26.366699] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.367137] 
[   26.367250] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.367302] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.367317] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.367342] Call Trace:
[   26.367365]  <TASK>
[   26.367388]  dump_stack_lvl+0x73/0xb0
[   26.367419]  print_report+0xd1/0x650
[   26.367443]  ? __virt_addr_valid+0x1db/0x2d0
[   26.367468]  ? kasan_atomics_helper+0x1217/0x5450
[   26.367491]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.367518]  ? kasan_atomics_helper+0x1217/0x5450
[   26.367541]  kasan_report+0x141/0x180
[   26.367564]  ? kasan_atomics_helper+0x1217/0x5450
[   26.367591]  kasan_check_range+0x10c/0x1c0
[   26.367616]  __kasan_check_write+0x18/0x20
[   26.367641]  kasan_atomics_helper+0x1217/0x5450
[   26.367664]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.367700]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.367728]  ? kasan_atomics+0x152/0x310
[   26.367767]  kasan_atomics+0x1dc/0x310
[   26.367791]  ? __pfx_kasan_atomics+0x10/0x10
[   26.367814]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.367841]  ? __pfx_read_tsc+0x10/0x10
[   26.367873]  ? ktime_get_ts64+0x86/0x230
[   26.367901]  kunit_try_run_case+0x1a5/0x480
[   26.367946]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.367972]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.367995]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.368018]  ? __kthread_parkme+0x82/0x180
[   26.368041]  ? preempt_count_sub+0x50/0x80
[   26.368077]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.368103]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.368129]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.368155]  kthread+0x337/0x6f0
[   26.368177]  ? trace_preempt_on+0x20/0xc0
[   26.368202]  ? __pfx_kthread+0x10/0x10
[   26.368224]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.368249]  ? calculate_sigpending+0x7b/0xa0
[   26.368275]  ? __pfx_kthread+0x10/0x10
[   26.368297]  ret_from_fork+0x116/0x1d0
[   26.368318]  ? __pfx_kthread+0x10/0x10
[   26.368349]  ret_from_fork_asm+0x1a/0x30
[   26.368382]  </TASK>
[   26.368396] 
[   26.376076] Allocated by task 314:
[   26.376260]  kasan_save_stack+0x45/0x70
[   26.376413]  kasan_save_track+0x18/0x40
[   26.376597]  kasan_save_alloc_info+0x3b/0x50
[   26.376781]  __kasan_kmalloc+0xb7/0xc0
[   26.376935]  __kmalloc_cache_noprof+0x189/0x420
[   26.377244]  kasan_atomics+0x95/0x310
[   26.377437]  kunit_try_run_case+0x1a5/0x480
[   26.377619]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.377859]  kthread+0x337/0x6f0
[   26.378117]  ret_from_fork+0x116/0x1d0
[   26.378292]  ret_from_fork_asm+0x1a/0x30
[   26.378491] 
[   26.378585] The buggy address belongs to the object at ffff888105a1e600
[   26.378585]  which belongs to the cache kmalloc-64 of size 64
[   26.379072] The buggy address is located 0 bytes to the right of
[   26.379072]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.379549] 
[   26.379643] The buggy address belongs to the physical page:
[   26.379891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.380190] flags: 0x200000000000000(node=0|zone=2)
[   26.380411] page_type: f5(slab)
[   26.380582] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.380882] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.381322] page dumped because: kasan: bad access detected
[   26.381578] 
[   26.381671] Memory state around the buggy address:
[   26.381885]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.382219]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.382525] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.382832]                                      ^
[   26.383091]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.383333]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.383544] ==================================================================
[   26.912464] ==================================================================
[   26.912827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   26.913708] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.914112] 
[   26.914228] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.914285] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.914301] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.914328] Call Trace:
[   26.914352]  <TASK>
[   26.914375]  dump_stack_lvl+0x73/0xb0
[   26.914415]  print_report+0xd1/0x650
[   26.914444]  ? __virt_addr_valid+0x1db/0x2d0
[   26.914471]  ? kasan_atomics_helper+0x2006/0x5450
[   26.914496]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.914525]  ? kasan_atomics_helper+0x2006/0x5450
[   26.914549]  kasan_report+0x141/0x180
[   26.914573]  ? kasan_atomics_helper+0x2006/0x5450
[   26.914602]  kasan_check_range+0x10c/0x1c0
[   26.914631]  __kasan_check_write+0x18/0x20
[   26.914658]  kasan_atomics_helper+0x2006/0x5450
[   26.914683]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.914707]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.914736]  ? kasan_atomics+0x152/0x310
[   26.914765]  kasan_atomics+0x1dc/0x310
[   26.914790]  ? __pfx_kasan_atomics+0x10/0x10
[   26.914815]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.914842]  ? __pfx_read_tsc+0x10/0x10
[   26.914867]  ? ktime_get_ts64+0x86/0x230
[   26.914896]  kunit_try_run_case+0x1a5/0x480
[   26.914949]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.914975]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.914999]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.915023]  ? __kthread_parkme+0x82/0x180
[   26.915047]  ? preempt_count_sub+0x50/0x80
[   26.915083]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.915111]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.915138]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.915166]  kthread+0x337/0x6f0
[   26.915189]  ? trace_preempt_on+0x20/0xc0
[   26.915216]  ? __pfx_kthread+0x10/0x10
[   26.915239]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.915267]  ? calculate_sigpending+0x7b/0xa0
[   26.915295]  ? __pfx_kthread+0x10/0x10
[   26.915319]  ret_from_fork+0x116/0x1d0
[   26.915341]  ? __pfx_kthread+0x10/0x10
[   26.915365]  ret_from_fork_asm+0x1a/0x30
[   26.915400]  </TASK>
[   26.915414] 
[   26.922894] Allocated by task 314:
[   26.923075]  kasan_save_stack+0x45/0x70
[   26.923283]  kasan_save_track+0x18/0x40
[   26.923466]  kasan_save_alloc_info+0x3b/0x50
[   26.923657]  __kasan_kmalloc+0xb7/0xc0
[   26.923818]  __kmalloc_cache_noprof+0x189/0x420
[   26.924069]  kasan_atomics+0x95/0x310
[   26.924234]  kunit_try_run_case+0x1a5/0x480
[   26.924429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.924647]  kthread+0x337/0x6f0
[   26.924813]  ret_from_fork+0x116/0x1d0
[   26.924997]  ret_from_fork_asm+0x1a/0x30
[   26.925173] 
[   26.925242] The buggy address belongs to the object at ffff888105a1e600
[   26.925242]  which belongs to the cache kmalloc-64 of size 64
[   26.925600] The buggy address is located 0 bytes to the right of
[   26.925600]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.926001] 
[   26.926083] The buggy address belongs to the physical page:
[   26.926343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.926699] flags: 0x200000000000000(node=0|zone=2)
[   26.926961] page_type: f5(slab)
[   26.927142] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.927487] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.927830] page dumped because: kasan: bad access detected
[   26.928119] 
[   26.928212] Memory state around the buggy address:
[   26.928440]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.928729]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.928985] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.929215]                                      ^
[   26.929371]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.929587]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.929859] ==================================================================
[   26.083587] ==================================================================
[   26.083983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   26.084288] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.084589] 
[   26.084678] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.084730] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.084745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.084769] Call Trace:
[   26.084791]  <TASK>
[   26.084811]  dump_stack_lvl+0x73/0xb0
[   26.084841]  print_report+0xd1/0x650
[   26.084865]  ? __virt_addr_valid+0x1db/0x2d0
[   26.084891]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.084936]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.084965]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.084988]  kasan_report+0x141/0x180
[   26.085012]  ? kasan_atomics_helper+0xa2b/0x5450
[   26.085040]  kasan_check_range+0x10c/0x1c0
[   26.085074]  __kasan_check_write+0x18/0x20
[   26.085101]  kasan_atomics_helper+0xa2b/0x5450
[   26.085127]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.085150]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.085178]  ? kasan_atomics+0x152/0x310
[   26.085215]  kasan_atomics+0x1dc/0x310
[   26.085240]  ? __pfx_kasan_atomics+0x10/0x10
[   26.085263]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.085301]  ? __pfx_read_tsc+0x10/0x10
[   26.085324]  ? ktime_get_ts64+0x86/0x230
[   26.085352]  kunit_try_run_case+0x1a5/0x480
[   26.085379]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.085405]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.085429]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.085453]  ? __kthread_parkme+0x82/0x180
[   26.085476]  ? preempt_count_sub+0x50/0x80
[   26.085501]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.085528]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.085555]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.085581]  kthread+0x337/0x6f0
[   26.085603]  ? trace_preempt_on+0x20/0xc0
[   26.085630]  ? __pfx_kthread+0x10/0x10
[   26.085652]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.085678]  ? calculate_sigpending+0x7b/0xa0
[   26.085704]  ? __pfx_kthread+0x10/0x10
[   26.085728]  ret_from_fork+0x116/0x1d0
[   26.085749]  ? __pfx_kthread+0x10/0x10
[   26.085772]  ret_from_fork_asm+0x1a/0x30
[   26.085806]  </TASK>
[   26.085825] 
[   26.093321] Allocated by task 314:
[   26.093503]  kasan_save_stack+0x45/0x70
[   26.093688]  kasan_save_track+0x18/0x40
[   26.093828]  kasan_save_alloc_info+0x3b/0x50
[   26.094001]  __kasan_kmalloc+0xb7/0xc0
[   26.094150]  __kmalloc_cache_noprof+0x189/0x420
[   26.094305]  kasan_atomics+0x95/0x310
[   26.094435]  kunit_try_run_case+0x1a5/0x480
[   26.094580]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.094753]  kthread+0x337/0x6f0
[   26.094870]  ret_from_fork+0x116/0x1d0
[   26.095025]  ret_from_fork_asm+0x1a/0x30
[   26.095172] 
[   26.095266] The buggy address belongs to the object at ffff888105a1e600
[   26.095266]  which belongs to the cache kmalloc-64 of size 64
[   26.095807] The buggy address is located 0 bytes to the right of
[   26.095807]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.096206] 
[   26.096278] The buggy address belongs to the physical page:
[   26.096450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.096690] flags: 0x200000000000000(node=0|zone=2)
[   26.096911] page_type: f5(slab)
[   26.097123] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.097504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.097867] page dumped because: kasan: bad access detected
[   26.098177] 
[   26.098269] Memory state around the buggy address:
[   26.098494]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.098830]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.099196] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.099515]                                      ^
[   26.099666]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.100024]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.100313] ==================================================================
[   26.247894] ==================================================================
[   26.248324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   26.248658] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.249013] 
[   26.249134] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.249188] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.249204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.249229] Call Trace:
[   26.249251]  <TASK>
[   26.249275]  dump_stack_lvl+0x73/0xb0
[   26.249304]  print_report+0xd1/0x650
[   26.249329]  ? __virt_addr_valid+0x1db/0x2d0
[   26.249354]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.249376]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.249404]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.249427]  kasan_report+0x141/0x180
[   26.249449]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.249476]  kasan_check_range+0x10c/0x1c0
[   26.249501]  __kasan_check_write+0x18/0x20
[   26.249526]  kasan_atomics_helper+0xfa9/0x5450
[   26.249549]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.249572]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.249599]  ? kasan_atomics+0x152/0x310
[   26.249625]  kasan_atomics+0x1dc/0x310
[   26.249649]  ? __pfx_kasan_atomics+0x10/0x10
[   26.249673]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.249699]  ? __pfx_read_tsc+0x10/0x10
[   26.249721]  ? ktime_get_ts64+0x86/0x230
[   26.249747]  kunit_try_run_case+0x1a5/0x480
[   26.249774]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.249800]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.249827]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.249860]  ? __kthread_parkme+0x82/0x180
[   26.249882]  ? preempt_count_sub+0x50/0x80
[   26.249907]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.249968]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.249993]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.250031]  kthread+0x337/0x6f0
[   26.250052]  ? trace_preempt_on+0x20/0xc0
[   26.250088]  ? __pfx_kthread+0x10/0x10
[   26.250111]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.250138]  ? calculate_sigpending+0x7b/0xa0
[   26.250164]  ? __pfx_kthread+0x10/0x10
[   26.250196]  ret_from_fork+0x116/0x1d0
[   26.250217]  ? __pfx_kthread+0x10/0x10
[   26.250240]  ret_from_fork_asm+0x1a/0x30
[   26.250284]  </TASK>
[   26.250298] 
[   26.257951] Allocated by task 314:
[   26.258108]  kasan_save_stack+0x45/0x70
[   26.258255]  kasan_save_track+0x18/0x40
[   26.258465]  kasan_save_alloc_info+0x3b/0x50
[   26.258672]  __kasan_kmalloc+0xb7/0xc0
[   26.258853]  __kmalloc_cache_noprof+0x189/0x420
[   26.259104]  kasan_atomics+0x95/0x310
[   26.259289]  kunit_try_run_case+0x1a5/0x480
[   26.259492]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.259738]  kthread+0x337/0x6f0
[   26.259902]  ret_from_fork+0x116/0x1d0
[   26.260096]  ret_from_fork_asm+0x1a/0x30
[   26.260301] 
[   26.260385] The buggy address belongs to the object at ffff888105a1e600
[   26.260385]  which belongs to the cache kmalloc-64 of size 64
[   26.260762] The buggy address is located 0 bytes to the right of
[   26.260762]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.261356] 
[   26.261447] The buggy address belongs to the physical page:
[   26.261686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.262045] flags: 0x200000000000000(node=0|zone=2)
[   26.262287] page_type: f5(slab)
[   26.262452] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.262772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.263118] page dumped because: kasan: bad access detected
[   26.263362] 
[   26.263459] Memory state around the buggy address:
[   26.263658]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.263979]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.264291] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.264567]                                      ^
[   26.264784]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.265074]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.265285] ==================================================================
[   25.769384] ==================================================================
[   25.769777] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   25.770157] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   25.770443] 
[   25.770587] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.770642] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.770656] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.770681] Call Trace:
[   25.770704]  <TASK>
[   25.770725]  dump_stack_lvl+0x73/0xb0
[   25.770755]  print_report+0xd1/0x650
[   25.770778]  ? __virt_addr_valid+0x1db/0x2d0
[   25.770803]  ? kasan_atomics_helper+0x4ba2/0x5450
[   25.770825]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.770851]  ? kasan_atomics_helper+0x4ba2/0x5450
[   25.770873]  kasan_report+0x141/0x180
[   25.770895]  ? kasan_atomics_helper+0x4ba2/0x5450
[   25.770921]  __asan_report_store4_noabort+0x1b/0x30
[   25.770946]  kasan_atomics_helper+0x4ba2/0x5450
[   25.770969]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.770991]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.771025]  ? kasan_atomics+0x152/0x310
[   25.771052]  kasan_atomics+0x1dc/0x310
[   25.771085]  ? __pfx_kasan_atomics+0x10/0x10
[   25.771107]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.771132]  ? __pfx_read_tsc+0x10/0x10
[   25.771155]  ? ktime_get_ts64+0x86/0x230
[   25.771181]  kunit_try_run_case+0x1a5/0x480
[   25.771208]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.771232]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.771254]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.771277]  ? __kthread_parkme+0x82/0x180
[   25.771309]  ? preempt_count_sub+0x50/0x80
[   25.771334]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.771362]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.771386]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.771411]  kthread+0x337/0x6f0
[   25.771431]  ? trace_preempt_on+0x20/0xc0
[   25.771455]  ? __pfx_kthread+0x10/0x10
[   25.771477]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.771501]  ? calculate_sigpending+0x7b/0xa0
[   25.771526]  ? __pfx_kthread+0x10/0x10
[   25.771548]  ret_from_fork+0x116/0x1d0
[   25.771568]  ? __pfx_kthread+0x10/0x10
[   25.771588]  ret_from_fork_asm+0x1a/0x30
[   25.771620]  </TASK>
[   25.771632] 
[   25.779471] Allocated by task 314:
[   25.779634]  kasan_save_stack+0x45/0x70
[   25.779779]  kasan_save_track+0x18/0x40
[   25.779910]  kasan_save_alloc_info+0x3b/0x50
[   25.780126]  __kasan_kmalloc+0xb7/0xc0
[   25.780487]  __kmalloc_cache_noprof+0x189/0x420
[   25.780704]  kasan_atomics+0x95/0x310
[   25.780856]  kunit_try_run_case+0x1a5/0x480
[   25.781039]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.781217]  kthread+0x337/0x6f0
[   25.781334]  ret_from_fork+0x116/0x1d0
[   25.781573]  ret_from_fork_asm+0x1a/0x30
[   25.781930] 
[   25.782041] The buggy address belongs to the object at ffff888105a1e600
[   25.782041]  which belongs to the cache kmalloc-64 of size 64
[   25.782472] The buggy address is located 0 bytes to the right of
[   25.782472]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   25.782831] 
[   25.782900] The buggy address belongs to the physical page:
[   25.783241] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   25.783596] flags: 0x200000000000000(node=0|zone=2)
[   25.783823] page_type: f5(slab)
[   25.784018] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.784463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.784685] page dumped because: kasan: bad access detected
[   25.784851] 
[   25.784914] Memory state around the buggy address:
[   25.785072]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.785568]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.786166] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.786500]                                      ^
[   25.786769]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.787044]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.787328] ==================================================================
[   26.011377] ==================================================================
[   26.011827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   26.012231] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.012586] 
[   26.012698] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.012752] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.012778] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.012803] Call Trace:
[   26.012819]  <TASK>
[   26.012852]  dump_stack_lvl+0x73/0xb0
[   26.012884]  print_report+0xd1/0x650
[   26.012933]  ? __virt_addr_valid+0x1db/0x2d0
[   26.012970]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.012994]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.013022]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.013057]  kasan_report+0x141/0x180
[   26.013090]  ? kasan_atomics_helper+0x7c7/0x5450
[   26.013117]  kasan_check_range+0x10c/0x1c0
[   26.013143]  __kasan_check_write+0x18/0x20
[   26.013168]  kasan_atomics_helper+0x7c7/0x5450
[   26.013192]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.013215]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.013252]  ? kasan_atomics+0x152/0x310
[   26.013280]  kasan_atomics+0x1dc/0x310
[   26.013304]  ? __pfx_kasan_atomics+0x10/0x10
[   26.013339]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.013366]  ? __pfx_read_tsc+0x10/0x10
[   26.013401]  ? ktime_get_ts64+0x86/0x230
[   26.013429]  kunit_try_run_case+0x1a5/0x480
[   26.013456]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.013493]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.013516]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.013539]  ? __kthread_parkme+0x82/0x180
[   26.013562]  ? preempt_count_sub+0x50/0x80
[   26.013597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.013623]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.013650]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.013687]  kthread+0x337/0x6f0
[   26.013709]  ? trace_preempt_on+0x20/0xc0
[   26.013734]  ? __pfx_kthread+0x10/0x10
[   26.013757]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.013783]  ? calculate_sigpending+0x7b/0xa0
[   26.013809]  ? __pfx_kthread+0x10/0x10
[   26.013839]  ret_from_fork+0x116/0x1d0
[   26.013861]  ? __pfx_kthread+0x10/0x10
[   26.013883]  ret_from_fork_asm+0x1a/0x30
[   26.013942]  </TASK>
[   26.013957] 
[   26.021282] Allocated by task 314:
[   26.021471]  kasan_save_stack+0x45/0x70
[   26.021607]  kasan_save_track+0x18/0x40
[   26.021733]  kasan_save_alloc_info+0x3b/0x50
[   26.021877]  __kasan_kmalloc+0xb7/0xc0
[   26.022105]  __kmalloc_cache_noprof+0x189/0x420
[   26.022324]  kasan_atomics+0x95/0x310
[   26.022503]  kunit_try_run_case+0x1a5/0x480
[   26.022704]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.022870]  kthread+0x337/0x6f0
[   26.023009]  ret_from_fork+0x116/0x1d0
[   26.023195]  ret_from_fork_asm+0x1a/0x30
[   26.023393] 
[   26.023483] The buggy address belongs to the object at ffff888105a1e600
[   26.023483]  which belongs to the cache kmalloc-64 of size 64
[   26.024053] The buggy address is located 0 bytes to the right of
[   26.024053]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.024576] 
[   26.024671] The buggy address belongs to the physical page:
[   26.024888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.025271] flags: 0x200000000000000(node=0|zone=2)
[   26.025506] page_type: f5(slab)
[   26.025673] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.026024] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.026354] page dumped because: kasan: bad access detected
[   26.026607] 
[   26.026674] Memory state around the buggy address:
[   26.026820]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.027042]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.027254] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.027553]                                      ^
[   26.027765]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.028113]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.028425] ==================================================================
[   26.139275] ==================================================================
[   26.139651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   26.140416] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.140786] 
[   26.140906] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.140991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.141007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.141033] Call Trace:
[   26.141076]  <TASK>
[   26.141098]  dump_stack_lvl+0x73/0xb0
[   26.141131]  print_report+0xd1/0x650
[   26.141156]  ? __virt_addr_valid+0x1db/0x2d0
[   26.141183]  ? kasan_atomics_helper+0xc70/0x5450
[   26.141205]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.141243]  ? kasan_atomics_helper+0xc70/0x5450
[   26.141266]  kasan_report+0x141/0x180
[   26.141300]  ? kasan_atomics_helper+0xc70/0x5450
[   26.141327]  kasan_check_range+0x10c/0x1c0
[   26.141353]  __kasan_check_write+0x18/0x20
[   26.141377]  kasan_atomics_helper+0xc70/0x5450
[   26.141401]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.141425]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.141452]  ? kasan_atomics+0x152/0x310
[   26.141488]  kasan_atomics+0x1dc/0x310
[   26.141511]  ? __pfx_kasan_atomics+0x10/0x10
[   26.141545]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.141572]  ? __pfx_read_tsc+0x10/0x10
[   26.141596]  ? ktime_get_ts64+0x86/0x230
[   26.141623]  kunit_try_run_case+0x1a5/0x480
[   26.141651]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.141685]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.141707]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.141731]  ? __kthread_parkme+0x82/0x180
[   26.141764]  ? preempt_count_sub+0x50/0x80
[   26.141791]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.141824]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.141850]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.141875]  kthread+0x337/0x6f0
[   26.141897]  ? trace_preempt_on+0x20/0xc0
[   26.141940]  ? __pfx_kthread+0x10/0x10
[   26.141963]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.141989]  ? calculate_sigpending+0x7b/0xa0
[   26.142014]  ? __pfx_kthread+0x10/0x10
[   26.142037]  ret_from_fork+0x116/0x1d0
[   26.142058]  ? __pfx_kthread+0x10/0x10
[   26.142089]  ret_from_fork_asm+0x1a/0x30
[   26.142122]  </TASK>
[   26.142136] 
[   26.149565] Allocated by task 314:
[   26.149753]  kasan_save_stack+0x45/0x70
[   26.149975]  kasan_save_track+0x18/0x40
[   26.150184]  kasan_save_alloc_info+0x3b/0x50
[   26.150381]  __kasan_kmalloc+0xb7/0xc0
[   26.150509]  __kmalloc_cache_noprof+0x189/0x420
[   26.150709]  kasan_atomics+0x95/0x310
[   26.150901]  kunit_try_run_case+0x1a5/0x480
[   26.151138]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.151360]  kthread+0x337/0x6f0
[   26.151503]  ret_from_fork+0x116/0x1d0
[   26.151686]  ret_from_fork_asm+0x1a/0x30
[   26.151893] 
[   26.151994] The buggy address belongs to the object at ffff888105a1e600
[   26.151994]  which belongs to the cache kmalloc-64 of size 64
[   26.152478] The buggy address is located 0 bytes to the right of
[   26.152478]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.153018] 
[   26.153106] The buggy address belongs to the physical page:
[   26.153361] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.153683] flags: 0x200000000000000(node=0|zone=2)
[   26.153851] page_type: f5(slab)
[   26.153996] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.154346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.154675] page dumped because: kasan: bad access detected
[   26.154945] 
[   26.155048] Memory state around the buggy address:
[   26.155262]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.155573]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.155798] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.156032]                                      ^
[   26.156220]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.156558]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.156898] ==================================================================
[   25.932895] ==================================================================
[   25.933253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   25.934099] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   25.934422] 
[   25.934544] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.934599] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.934626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.934652] Call Trace:
[   25.934676]  <TASK>
[   25.934710]  dump_stack_lvl+0x73/0xb0
[   25.934742]  print_report+0xd1/0x650
[   25.934778]  ? __virt_addr_valid+0x1db/0x2d0
[   25.934804]  ? kasan_atomics_helper+0x565/0x5450
[   25.934826]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.934865]  ? kasan_atomics_helper+0x565/0x5450
[   25.934889]  kasan_report+0x141/0x180
[   25.934913]  ? kasan_atomics_helper+0x565/0x5450
[   25.934950]  kasan_check_range+0x10c/0x1c0
[   25.934975]  __kasan_check_write+0x18/0x20
[   25.935007]  kasan_atomics_helper+0x565/0x5450
[   25.935031]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.935054]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.935100]  ? kasan_atomics+0x152/0x310
[   25.935128]  kasan_atomics+0x1dc/0x310
[   25.935153]  ? __pfx_kasan_atomics+0x10/0x10
[   25.935185]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.935212]  ? __pfx_read_tsc+0x10/0x10
[   25.935235]  ? ktime_get_ts64+0x86/0x230
[   25.935273]  kunit_try_run_case+0x1a5/0x480
[   25.935302]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.935327]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.935349]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.935374]  ? __kthread_parkme+0x82/0x180
[   25.935396]  ? preempt_count_sub+0x50/0x80
[   25.935422]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.935449]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.935485]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.935511]  kthread+0x337/0x6f0
[   25.935532]  ? trace_preempt_on+0x20/0xc0
[   25.935568]  ? __pfx_kthread+0x10/0x10
[   25.935590]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.935616]  ? calculate_sigpending+0x7b/0xa0
[   25.935642]  ? __pfx_kthread+0x10/0x10
[   25.935665]  ret_from_fork+0x116/0x1d0
[   25.935686]  ? __pfx_kthread+0x10/0x10
[   25.935708]  ret_from_fork_asm+0x1a/0x30
[   25.935742]  </TASK>
[   25.935756] 
[   25.943479] Allocated by task 314:
[   25.943659]  kasan_save_stack+0x45/0x70
[   25.943837]  kasan_save_track+0x18/0x40
[   25.943971]  kasan_save_alloc_info+0x3b/0x50
[   25.944130]  __kasan_kmalloc+0xb7/0xc0
[   25.944260]  __kmalloc_cache_noprof+0x189/0x420
[   25.944413]  kasan_atomics+0x95/0x310
[   25.944561]  kunit_try_run_case+0x1a5/0x480
[   25.944785]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.945080]  kthread+0x337/0x6f0
[   25.945323]  ret_from_fork+0x116/0x1d0
[   25.945512]  ret_from_fork_asm+0x1a/0x30
[   25.945708] 
[   25.945799] The buggy address belongs to the object at ffff888105a1e600
[   25.945799]  which belongs to the cache kmalloc-64 of size 64
[   25.946778] The buggy address is located 0 bytes to the right of
[   25.946778]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   25.947358] 
[   25.947451] The buggy address belongs to the physical page:
[   25.947677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   25.948071] flags: 0x200000000000000(node=0|zone=2)
[   25.948234] page_type: f5(slab)
[   25.948356] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.948586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.948810] page dumped because: kasan: bad access detected
[   25.949095] 
[   25.949187] Memory state around the buggy address:
[   25.949410]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.949737]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.950069] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.950324]                                      ^
[   25.950477]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.950690]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.950900] ==================================================================
[   26.157742] ==================================================================
[   26.158125] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   26.158470] Read of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.158798] 
[   26.158931] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.158994] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.159009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.159044] Call Trace:
[   26.159075]  <TASK>
[   26.159096]  dump_stack_lvl+0x73/0xb0
[   26.159127]  print_report+0xd1/0x650
[   26.159161]  ? __virt_addr_valid+0x1db/0x2d0
[   26.159186]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.159208]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.159246]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.159269]  kasan_report+0x141/0x180
[   26.159293]  ? kasan_atomics_helper+0x4a84/0x5450
[   26.159321]  __asan_report_load4_noabort+0x18/0x20
[   26.159356]  kasan_atomics_helper+0x4a84/0x5450
[   26.159380]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.159406]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.159446]  ? kasan_atomics+0x152/0x310
[   26.159476]  kasan_atomics+0x1dc/0x310
[   26.159500]  ? __pfx_kasan_atomics+0x10/0x10
[   26.159524]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.159551]  ? __pfx_read_tsc+0x10/0x10
[   26.159574]  ? ktime_get_ts64+0x86/0x230
[   26.159602]  kunit_try_run_case+0x1a5/0x480
[   26.159629]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.159657]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.159680]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.159704]  ? __kthread_parkme+0x82/0x180
[   26.159727]  ? preempt_count_sub+0x50/0x80
[   26.159752]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.159778]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.159803]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.159830]  kthread+0x337/0x6f0
[   26.159851]  ? trace_preempt_on+0x20/0xc0
[   26.159876]  ? __pfx_kthread+0x10/0x10
[   26.159898]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.159942]  ? calculate_sigpending+0x7b/0xa0
[   26.159977]  ? __pfx_kthread+0x10/0x10
[   26.160001]  ret_from_fork+0x116/0x1d0
[   26.160021]  ? __pfx_kthread+0x10/0x10
[   26.160054]  ret_from_fork_asm+0x1a/0x30
[   26.160095]  </TASK>
[   26.160109] 
[   26.167390] Allocated by task 314:
[   26.167569]  kasan_save_stack+0x45/0x70
[   26.167712]  kasan_save_track+0x18/0x40
[   26.167843]  kasan_save_alloc_info+0x3b/0x50
[   26.168014]  __kasan_kmalloc+0xb7/0xc0
[   26.168211]  __kmalloc_cache_noprof+0x189/0x420
[   26.168441]  kasan_atomics+0x95/0x310
[   26.168622]  kunit_try_run_case+0x1a5/0x480
[   26.168841]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.169096]  kthread+0x337/0x6f0
[   26.169269]  ret_from_fork+0x116/0x1d0
[   26.169454]  ret_from_fork_asm+0x1a/0x30
[   26.169590] 
[   26.169658] The buggy address belongs to the object at ffff888105a1e600
[   26.169658]  which belongs to the cache kmalloc-64 of size 64
[   26.170106] The buggy address is located 0 bytes to the right of
[   26.170106]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.170707] 
[   26.170817] The buggy address belongs to the physical page:
[   26.171109] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.171392] flags: 0x200000000000000(node=0|zone=2)
[   26.171641] page_type: f5(slab)
[   26.171821] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.172165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.172473] page dumped because: kasan: bad access detected
[   26.172717] 
[   26.172810] Memory state around the buggy address:
[   26.173053]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.173369]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.173620] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.173831]                                      ^
[   26.174008]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.174345]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.174652] ==================================================================
[   26.475653] ==================================================================
[   26.476132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   26.476468] Read of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.476750] 
[   26.476862] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.476925] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.476949] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.476984] Call Trace:
[   26.477006]  <TASK>
[   26.477028]  dump_stack_lvl+0x73/0xb0
[   26.477058]  print_report+0xd1/0x650
[   26.477091]  ? __virt_addr_valid+0x1db/0x2d0
[   26.477117]  ? kasan_atomics_helper+0x4eae/0x5450
[   26.477140]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.477168]  ? kasan_atomics_helper+0x4eae/0x5450
[   26.477191]  kasan_report+0x141/0x180
[   26.477214]  ? kasan_atomics_helper+0x4eae/0x5450
[   26.477241]  __asan_report_load8_noabort+0x18/0x20
[   26.477266]  kasan_atomics_helper+0x4eae/0x5450
[   26.477298]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.477321]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.477359]  ? kasan_atomics+0x152/0x310
[   26.477385]  kasan_atomics+0x1dc/0x310
[   26.477409]  ? __pfx_kasan_atomics+0x10/0x10
[   26.477431]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.477457]  ? __pfx_read_tsc+0x10/0x10
[   26.477480]  ? ktime_get_ts64+0x86/0x230
[   26.477506]  kunit_try_run_case+0x1a5/0x480
[   26.477533]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.477558]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.477580]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.477603]  ? __kthread_parkme+0x82/0x180
[   26.477625]  ? preempt_count_sub+0x50/0x80
[   26.477649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.477675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.477701]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.477726]  kthread+0x337/0x6f0
[   26.477747]  ? trace_preempt_on+0x20/0xc0
[   26.477771]  ? __pfx_kthread+0x10/0x10
[   26.477794]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.477823]  ? calculate_sigpending+0x7b/0xa0
[   26.477848]  ? __pfx_kthread+0x10/0x10
[   26.477870]  ret_from_fork+0x116/0x1d0
[   26.477891]  ? __pfx_kthread+0x10/0x10
[   26.477913]  ret_from_fork_asm+0x1a/0x30
[   26.477946]  </TASK>
[   26.477969] 
[   26.485485] Allocated by task 314:
[   26.486425]  kasan_save_stack+0x45/0x70
[   26.486664]  kasan_save_track+0x18/0x40
[   26.486862]  kasan_save_alloc_info+0x3b/0x50
[   26.487423]  __kasan_kmalloc+0xb7/0xc0
[   26.487838]  __kmalloc_cache_noprof+0x189/0x420
[   26.488154]  kasan_atomics+0x95/0x310
[   26.488680]  kunit_try_run_case+0x1a5/0x480
[   26.488978]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.489408]  kthread+0x337/0x6f0
[   26.489701]  ret_from_fork+0x116/0x1d0
[   26.490092]  ret_from_fork_asm+0x1a/0x30
[   26.490292] 
[   26.490379] The buggy address belongs to the object at ffff888105a1e600
[   26.490379]  which belongs to the cache kmalloc-64 of size 64
[   26.490870] The buggy address is located 0 bytes to the right of
[   26.490870]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.491655] 
[   26.491757] The buggy address belongs to the physical page:
[   26.492320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.492804] flags: 0x200000000000000(node=0|zone=2)
[   26.493229] page_type: f5(slab)
[   26.493547] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.494173] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.494677] page dumped because: kasan: bad access detected
[   26.495142] 
[   26.495372] Memory state around the buggy address:
[   26.495605]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.495894]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.496482] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.497104]                                      ^
[   26.497585]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.498055]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.498560] ==================================================================
[   26.558839] ==================================================================
[   26.559235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   26.559517] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.559762] 
[   26.559875] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.559938] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.559953] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.559991] Call Trace:
[   26.560014]  <TASK>
[   26.560035]  dump_stack_lvl+0x73/0xb0
[   26.560077]  print_report+0xd1/0x650
[   26.560101]  ? __virt_addr_valid+0x1db/0x2d0
[   26.560128]  ? kasan_atomics_helper+0x15b6/0x5450
[   26.560151]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.560179]  ? kasan_atomics_helper+0x15b6/0x5450
[   26.560202]  kasan_report+0x141/0x180
[   26.560226]  ? kasan_atomics_helper+0x15b6/0x5450
[   26.560252]  kasan_check_range+0x10c/0x1c0
[   26.560277]  __kasan_check_write+0x18/0x20
[   26.560302]  kasan_atomics_helper+0x15b6/0x5450
[   26.560325]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.560348]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.560375]  ? kasan_atomics+0x152/0x310
[   26.560402]  kasan_atomics+0x1dc/0x310
[   26.560426]  ? __pfx_kasan_atomics+0x10/0x10
[   26.560448]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.560474]  ? __pfx_read_tsc+0x10/0x10
[   26.560498]  ? ktime_get_ts64+0x86/0x230
[   26.560524]  kunit_try_run_case+0x1a5/0x480
[   26.560551]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.560575]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.560598]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.560629]  ? __kthread_parkme+0x82/0x180
[   26.560662]  ? preempt_count_sub+0x50/0x80
[   26.560688]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.560714]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.560750]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.560777]  kthread+0x337/0x6f0
[   26.560798]  ? trace_preempt_on+0x20/0xc0
[   26.560824]  ? __pfx_kthread+0x10/0x10
[   26.560846]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.560872]  ? calculate_sigpending+0x7b/0xa0
[   26.560898]  ? __pfx_kthread+0x10/0x10
[   26.560921]  ret_from_fork+0x116/0x1d0
[   26.560941]  ? __pfx_kthread+0x10/0x10
[   26.560964]  ret_from_fork_asm+0x1a/0x30
[   26.560996]  </TASK>
[   26.561010] 
[   26.568536] Allocated by task 314:
[   26.568693]  kasan_save_stack+0x45/0x70
[   26.568879]  kasan_save_track+0x18/0x40
[   26.569145]  kasan_save_alloc_info+0x3b/0x50
[   26.569344]  __kasan_kmalloc+0xb7/0xc0
[   26.569521]  __kmalloc_cache_noprof+0x189/0x420
[   26.569720]  kasan_atomics+0x95/0x310
[   26.569899]  kunit_try_run_case+0x1a5/0x480
[   26.570102]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.570318]  kthread+0x337/0x6f0
[   26.570445]  ret_from_fork+0x116/0x1d0
[   26.570668]  ret_from_fork_asm+0x1a/0x30
[   26.570856] 
[   26.570926] The buggy address belongs to the object at ffff888105a1e600
[   26.570926]  which belongs to the cache kmalloc-64 of size 64
[   26.571453] The buggy address is located 0 bytes to the right of
[   26.571453]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.571956] 
[   26.572053] The buggy address belongs to the physical page:
[   26.572279] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.572619] flags: 0x200000000000000(node=0|zone=2)
[   26.572838] page_type: f5(slab)
[   26.573048] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.573379] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.573636] page dumped because: kasan: bad access detected
[   26.573805] 
[   26.573874] Memory state around the buggy address:
[   26.574026]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.574248]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.574460] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.574767]                                      ^
[   26.575154]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.575488]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.575797] ==================================================================
[   27.003751] ==================================================================
[   27.004108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   27.004447] Read of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   27.004750] 
[   27.004842] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   27.004896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.004912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.004957] Call Trace:
[   27.004980]  <TASK>
[   27.005002]  dump_stack_lvl+0x73/0xb0
[   27.005034]  print_report+0xd1/0x650
[   27.005068]  ? __virt_addr_valid+0x1db/0x2d0
[   27.005098]  ? kasan_atomics_helper+0x4fa5/0x5450
[   27.005122]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.005151]  ? kasan_atomics_helper+0x4fa5/0x5450
[   27.005175]  kasan_report+0x141/0x180
[   27.005198]  ? kasan_atomics_helper+0x4fa5/0x5450
[   27.005227]  __asan_report_load8_noabort+0x18/0x20
[   27.005254]  kasan_atomics_helper+0x4fa5/0x5450
[   27.005280]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.005305]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.005332]  ? kasan_atomics+0x152/0x310
[   27.005360]  kasan_atomics+0x1dc/0x310
[   27.005385]  ? __pfx_kasan_atomics+0x10/0x10
[   27.005433]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   27.005461]  ? __pfx_read_tsc+0x10/0x10
[   27.005486]  ? ktime_get_ts64+0x86/0x230
[   27.005515]  kunit_try_run_case+0x1a5/0x480
[   27.005543]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.005569]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   27.005610]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.005635]  ? __kthread_parkme+0x82/0x180
[   27.005658]  ? preempt_count_sub+0x50/0x80
[   27.005684]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.005712]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.005740]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.005766]  kthread+0x337/0x6f0
[   27.005788]  ? trace_preempt_on+0x20/0xc0
[   27.005814]  ? __pfx_kthread+0x10/0x10
[   27.005857]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.005884]  ? calculate_sigpending+0x7b/0xa0
[   27.005942]  ? __pfx_kthread+0x10/0x10
[   27.005967]  ret_from_fork+0x116/0x1d0
[   27.005989]  ? __pfx_kthread+0x10/0x10
[   27.006012]  ret_from_fork_asm+0x1a/0x30
[   27.006044]  </TASK>
[   27.006068] 
[   27.013236] Allocated by task 314:
[   27.013418]  kasan_save_stack+0x45/0x70
[   27.013637]  kasan_save_track+0x18/0x40
[   27.013842]  kasan_save_alloc_info+0x3b/0x50
[   27.014131]  __kasan_kmalloc+0xb7/0xc0
[   27.014323]  __kmalloc_cache_noprof+0x189/0x420
[   27.014570]  kasan_atomics+0x95/0x310
[   27.014736]  kunit_try_run_case+0x1a5/0x480
[   27.014899]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.015181]  kthread+0x337/0x6f0
[   27.015351]  ret_from_fork+0x116/0x1d0
[   27.015492]  ret_from_fork_asm+0x1a/0x30
[   27.015633] 
[   27.015701] The buggy address belongs to the object at ffff888105a1e600
[   27.015701]  which belongs to the cache kmalloc-64 of size 64
[   27.016168] The buggy address is located 0 bytes to the right of
[   27.016168]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   27.016727] 
[   27.016824] The buggy address belongs to the physical page:
[   27.017104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   27.017348] flags: 0x200000000000000(node=0|zone=2)
[   27.017511] page_type: f5(slab)
[   27.017669] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.018080] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.018441] page dumped because: kasan: bad access detected
[   27.018698] 
[   27.018791] Memory state around the buggy address:
[   27.019070]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.019367]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.019670] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.019980]                                      ^
[   27.020157]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.020373]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.020695] ==================================================================
[   26.706750] ==================================================================
[   26.707100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   26.707617] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.707849] 
[   26.707990] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.708051] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.708083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.708108] Call Trace:
[   26.708131]  <TASK>
[   26.708162]  dump_stack_lvl+0x73/0xb0
[   26.708192]  print_report+0xd1/0x650
[   26.708217]  ? __virt_addr_valid+0x1db/0x2d0
[   26.708243]  ? kasan_atomics_helper+0x19e3/0x5450
[   26.708265]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.708293]  ? kasan_atomics_helper+0x19e3/0x5450
[   26.708318]  kasan_report+0x141/0x180
[   26.708342]  ? kasan_atomics_helper+0x19e3/0x5450
[   26.708370]  kasan_check_range+0x10c/0x1c0
[   26.708395]  __kasan_check_write+0x18/0x20
[   26.708420]  kasan_atomics_helper+0x19e3/0x5450
[   26.708444]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.708478]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.708505]  ? kasan_atomics+0x152/0x310
[   26.708544]  kasan_atomics+0x1dc/0x310
[   26.708568]  ? __pfx_kasan_atomics+0x10/0x10
[   26.708591]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.708630]  ? __pfx_read_tsc+0x10/0x10
[   26.708653]  ? ktime_get_ts64+0x86/0x230
[   26.708679]  kunit_try_run_case+0x1a5/0x480
[   26.708718]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.708742]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.708777]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.708800]  ? __kthread_parkme+0x82/0x180
[   26.708822]  ? preempt_count_sub+0x50/0x80
[   26.708859]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.708885]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.708911]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.708967]  kthread+0x337/0x6f0
[   26.708988]  ? trace_preempt_on+0x20/0xc0
[   26.709014]  ? __pfx_kthread+0x10/0x10
[   26.709046]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.709081]  ? calculate_sigpending+0x7b/0xa0
[   26.709107]  ? __pfx_kthread+0x10/0x10
[   26.709130]  ret_from_fork+0x116/0x1d0
[   26.709151]  ? __pfx_kthread+0x10/0x10
[   26.709173]  ret_from_fork_asm+0x1a/0x30
[   26.709205]  </TASK>
[   26.709219] 
[   26.716880] Allocated by task 314:
[   26.717180]  kasan_save_stack+0x45/0x70
[   26.717397]  kasan_save_track+0x18/0x40
[   26.717641]  kasan_save_alloc_info+0x3b/0x50
[   26.717858]  __kasan_kmalloc+0xb7/0xc0
[   26.718141]  __kmalloc_cache_noprof+0x189/0x420
[   26.718370]  kasan_atomics+0x95/0x310
[   26.718511]  kunit_try_run_case+0x1a5/0x480
[   26.718664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.718837]  kthread+0x337/0x6f0
[   26.719038]  ret_from_fork+0x116/0x1d0
[   26.719232]  ret_from_fork_asm+0x1a/0x30
[   26.719455] 
[   26.719552] The buggy address belongs to the object at ffff888105a1e600
[   26.719552]  which belongs to the cache kmalloc-64 of size 64
[   26.720109] The buggy address is located 0 bytes to the right of
[   26.720109]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.720613] 
[   26.720695] The buggy address belongs to the physical page:
[   26.720964] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.721229] flags: 0x200000000000000(node=0|zone=2)
[   26.721392] page_type: f5(slab)
[   26.721511] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.721736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.722041] page dumped because: kasan: bad access detected
[   26.722297] 
[   26.722385] Memory state around the buggy address:
[   26.722603]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.722914]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.723346] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.723656]                                      ^
[   26.723825]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.724327]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.724548] ==================================================================
[   27.021675] ==================================================================
[   27.022207] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   27.022533] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   27.022823] 
[   27.022938] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   27.022991] Tainted: [B]=BAD_PAGE, [N]=TEST
[   27.023008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   27.023031] Call Trace:
[   27.023054]  <TASK>
[   27.023087]  dump_stack_lvl+0x73/0xb0
[   27.023117]  print_report+0xd1/0x650
[   27.023141]  ? __virt_addr_valid+0x1db/0x2d0
[   27.023167]  ? kasan_atomics_helper+0x224c/0x5450
[   27.023190]  ? kasan_complete_mode_report_info+0x2a/0x200
[   27.023218]  ? kasan_atomics_helper+0x224c/0x5450
[   27.023243]  kasan_report+0x141/0x180
[   27.023266]  ? kasan_atomics_helper+0x224c/0x5450
[   27.023293]  kasan_check_range+0x10c/0x1c0
[   27.023318]  __kasan_check_write+0x18/0x20
[   27.023343]  kasan_atomics_helper+0x224c/0x5450
[   27.023367]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   27.023390]  ? __kmalloc_cache_noprof+0x189/0x420
[   27.023418]  ? kasan_atomics+0x152/0x310
[   27.023445]  kasan_atomics+0x1dc/0x310
[   27.023469]  ? __pfx_kasan_atomics+0x10/0x10
[   27.023493]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   27.023519]  ? __pfx_read_tsc+0x10/0x10
[   27.023543]  ? ktime_get_ts64+0x86/0x230
[   27.023570]  kunit_try_run_case+0x1a5/0x480
[   27.023598]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.023623]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   27.023645]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   27.023669]  ? __kthread_parkme+0x82/0x180
[   27.023691]  ? preempt_count_sub+0x50/0x80
[   27.023716]  ? __pfx_kunit_try_run_case+0x10/0x10
[   27.023742]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.023768]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   27.023794]  kthread+0x337/0x6f0
[   27.023815]  ? trace_preempt_on+0x20/0xc0
[   27.023840]  ? __pfx_kthread+0x10/0x10
[   27.023861]  ? _raw_spin_unlock_irq+0x47/0x80
[   27.023888]  ? calculate_sigpending+0x7b/0xa0
[   27.024542]  ? __pfx_kthread+0x10/0x10
[   27.024568]  ret_from_fork+0x116/0x1d0
[   27.024599]  ? __pfx_kthread+0x10/0x10
[   27.024622]  ret_from_fork_asm+0x1a/0x30
[   27.024655]  </TASK>
[   27.024671] 
[   27.035539] Allocated by task 314:
[   27.035717]  kasan_save_stack+0x45/0x70
[   27.035908]  kasan_save_track+0x18/0x40
[   27.036477]  kasan_save_alloc_info+0x3b/0x50
[   27.036819]  __kasan_kmalloc+0xb7/0xc0
[   27.037114]  __kmalloc_cache_noprof+0x189/0x420
[   27.037510]  kasan_atomics+0x95/0x310
[   27.037694]  kunit_try_run_case+0x1a5/0x480
[   27.037900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   27.038427]  kthread+0x337/0x6f0
[   27.038712]  ret_from_fork+0x116/0x1d0
[   27.038912]  ret_from_fork_asm+0x1a/0x30
[   27.039273] 
[   27.039364] The buggy address belongs to the object at ffff888105a1e600
[   27.039364]  which belongs to the cache kmalloc-64 of size 64
[   27.039854] The buggy address is located 0 bytes to the right of
[   27.039854]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   27.040820] 
[   27.041069] The buggy address belongs to the physical page:
[   27.041578] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   27.042178] flags: 0x200000000000000(node=0|zone=2)
[   27.042427] page_type: f5(slab)
[   27.042590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.042905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.043222] page dumped because: kasan: bad access detected
[   27.043455] 
[   27.043542] Memory state around the buggy address:
[   27.043752]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.044453]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.045043] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.045551]                                      ^
[   27.045908]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.046510]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.047045] ==================================================================
[   25.814687] ==================================================================
[   25.815192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   25.815493] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   25.815870] 
[   25.816029] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.816095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.816111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.816136] Call Trace:
[   25.816160]  <TASK>
[   25.816243]  dump_stack_lvl+0x73/0xb0
[   25.816279]  print_report+0xd1/0x650
[   25.816339]  ? __virt_addr_valid+0x1db/0x2d0
[   25.816369]  ? kasan_atomics_helper+0x4b6e/0x5450
[   25.816392]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.816431]  ? kasan_atomics_helper+0x4b6e/0x5450
[   25.816454]  kasan_report+0x141/0x180
[   25.816504]  ? kasan_atomics_helper+0x4b6e/0x5450
[   25.816531]  __asan_report_store4_noabort+0x1b/0x30
[   25.816558]  kasan_atomics_helper+0x4b6e/0x5450
[   25.816592]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.816616]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.816669]  ? kasan_atomics+0x152/0x310
[   25.816697]  kasan_atomics+0x1dc/0x310
[   25.816732]  ? __pfx_kasan_atomics+0x10/0x10
[   25.816756]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.816782]  ? __pfx_read_tsc+0x10/0x10
[   25.816806]  ? ktime_get_ts64+0x86/0x230
[   25.816833]  kunit_try_run_case+0x1a5/0x480
[   25.816860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.816886]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.816938]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.816976]  ? __kthread_parkme+0x82/0x180
[   25.817010]  ? preempt_count_sub+0x50/0x80
[   25.817036]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.817072]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.817114]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.817141]  kthread+0x337/0x6f0
[   25.817171]  ? trace_preempt_on+0x20/0xc0
[   25.817259]  ? __pfx_kthread+0x10/0x10
[   25.817283]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.817309]  ? calculate_sigpending+0x7b/0xa0
[   25.817335]  ? __pfx_kthread+0x10/0x10
[   25.817358]  ret_from_fork+0x116/0x1d0
[   25.817379]  ? __pfx_kthread+0x10/0x10
[   25.817401]  ret_from_fork_asm+0x1a/0x30
[   25.817434]  </TASK>
[   25.817448] 
[   25.826804] Allocated by task 314:
[   25.827052]  kasan_save_stack+0x45/0x70
[   25.827357]  kasan_save_track+0x18/0x40
[   25.827608]  kasan_save_alloc_info+0x3b/0x50
[   25.827799]  __kasan_kmalloc+0xb7/0xc0
[   25.828103]  __kmalloc_cache_noprof+0x189/0x420
[   25.828398]  kasan_atomics+0x95/0x310
[   25.828593]  kunit_try_run_case+0x1a5/0x480
[   25.828870]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.829210]  kthread+0x337/0x6f0
[   25.829444]  ret_from_fork+0x116/0x1d0
[   25.829827]  ret_from_fork_asm+0x1a/0x30
[   25.830114] 
[   25.830274] The buggy address belongs to the object at ffff888105a1e600
[   25.830274]  which belongs to the cache kmalloc-64 of size 64
[   25.830842] The buggy address is located 0 bytes to the right of
[   25.830842]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   25.831448] 
[   25.831521] The buggy address belongs to the physical page:
[   25.831801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   25.832375] flags: 0x200000000000000(node=0|zone=2)
[   25.832617] page_type: f5(slab)
[   25.832787] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.833503] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.833831] page dumped because: kasan: bad access detected
[   25.834000] 
[   25.834083] Memory state around the buggy address:
[   25.834361]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.835085]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.835665] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.835887]                                      ^
[   25.836043]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.836378]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.837103] ==================================================================
[   26.211023] ==================================================================
[   26.211531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   26.211863] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.212174] 
[   26.212261] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.212314] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.212329] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.212354] Call Trace:
[   26.212376]  <TASK>
[   26.212396]  dump_stack_lvl+0x73/0xb0
[   26.212425]  print_report+0xd1/0x650
[   26.212449]  ? __virt_addr_valid+0x1db/0x2d0
[   26.212475]  ? kasan_atomics_helper+0xe78/0x5450
[   26.212497]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.212524]  ? kasan_atomics_helper+0xe78/0x5450
[   26.212549]  kasan_report+0x141/0x180
[   26.212574]  ? kasan_atomics_helper+0xe78/0x5450
[   26.212602]  kasan_check_range+0x10c/0x1c0
[   26.212629]  __kasan_check_write+0x18/0x20
[   26.212653]  kasan_atomics_helper+0xe78/0x5450
[   26.212676]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.212700]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.212727]  ? kasan_atomics+0x152/0x310
[   26.212755]  kasan_atomics+0x1dc/0x310
[   26.212778]  ? __pfx_kasan_atomics+0x10/0x10
[   26.212801]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.212827]  ? __pfx_read_tsc+0x10/0x10
[   26.212850]  ? ktime_get_ts64+0x86/0x230
[   26.212877]  kunit_try_run_case+0x1a5/0x480
[   26.212905]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.212954]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.212977]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.213010]  ? __kthread_parkme+0x82/0x180
[   26.213033]  ? preempt_count_sub+0x50/0x80
[   26.213074]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.213101]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.213130]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.213160]  kthread+0x337/0x6f0
[   26.213181]  ? trace_preempt_on+0x20/0xc0
[   26.213206]  ? __pfx_kthread+0x10/0x10
[   26.213229]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.213255]  ? calculate_sigpending+0x7b/0xa0
[   26.213279]  ? __pfx_kthread+0x10/0x10
[   26.213303]  ret_from_fork+0x116/0x1d0
[   26.213323]  ? __pfx_kthread+0x10/0x10
[   26.213346]  ret_from_fork_asm+0x1a/0x30
[   26.213379]  </TASK>
[   26.213394] 
[   26.220833] Allocated by task 314:
[   26.221070]  kasan_save_stack+0x45/0x70
[   26.221268]  kasan_save_track+0x18/0x40
[   26.221448]  kasan_save_alloc_info+0x3b/0x50
[   26.221651]  __kasan_kmalloc+0xb7/0xc0
[   26.221840]  __kmalloc_cache_noprof+0x189/0x420
[   26.222094]  kasan_atomics+0x95/0x310
[   26.222268]  kunit_try_run_case+0x1a5/0x480
[   26.222490]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.222749]  kthread+0x337/0x6f0
[   26.222895]  ret_from_fork+0x116/0x1d0
[   26.223128]  ret_from_fork_asm+0x1a/0x30
[   26.223337] 
[   26.223405] The buggy address belongs to the object at ffff888105a1e600
[   26.223405]  which belongs to the cache kmalloc-64 of size 64
[   26.223756] The buggy address is located 0 bytes to the right of
[   26.223756]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.224147] 
[   26.224218] The buggy address belongs to the physical page:
[   26.224387] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.224685] flags: 0x200000000000000(node=0|zone=2)
[   26.224950] page_type: f5(slab)
[   26.225125] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.225457] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.225783] page dumped because: kasan: bad access detected
[   26.226077] 
[   26.226167] Memory state around the buggy address:
[   26.226390]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.226718]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.227078] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.227414]                                      ^
[   26.227637]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.227967]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.228234] ==================================================================
[   26.930485] ==================================================================
[   26.930833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   26.931450] Read of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.931795] 
[   26.931912] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.931986] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.932002] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.932028] Call Trace:
[   26.932049]  <TASK>
[   26.932079]  dump_stack_lvl+0x73/0xb0
[   26.932111]  print_report+0xd1/0x650
[   26.932135]  ? __virt_addr_valid+0x1db/0x2d0
[   26.932160]  ? kasan_atomics_helper+0x4f98/0x5450
[   26.932184]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.932211]  ? kasan_atomics_helper+0x4f98/0x5450
[   26.932235]  kasan_report+0x141/0x180
[   26.932258]  ? kasan_atomics_helper+0x4f98/0x5450
[   26.932286]  __asan_report_load8_noabort+0x18/0x20
[   26.932312]  kasan_atomics_helper+0x4f98/0x5450
[   26.932335]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.932359]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.932386]  ? kasan_atomics+0x152/0x310
[   26.932413]  kasan_atomics+0x1dc/0x310
[   26.932437]  ? __pfx_kasan_atomics+0x10/0x10
[   26.932460]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.932486]  ? __pfx_read_tsc+0x10/0x10
[   26.932510]  ? ktime_get_ts64+0x86/0x230
[   26.932537]  kunit_try_run_case+0x1a5/0x480
[   26.932565]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.932590]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.932614]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.932638]  ? __kthread_parkme+0x82/0x180
[   26.932660]  ? preempt_count_sub+0x50/0x80
[   26.932685]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.932713]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.932739]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.932766]  kthread+0x337/0x6f0
[   26.932787]  ? trace_preempt_on+0x20/0xc0
[   26.932812]  ? __pfx_kthread+0x10/0x10
[   26.932835]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.932864]  ? calculate_sigpending+0x7b/0xa0
[   26.932891]  ? __pfx_kthread+0x10/0x10
[   26.932934]  ret_from_fork+0x116/0x1d0
[   26.932957]  ? __pfx_kthread+0x10/0x10
[   26.932980]  ret_from_fork_asm+0x1a/0x30
[   26.933014]  </TASK>
[   26.933029] 
[   26.939911] Allocated by task 314:
[   26.940071]  kasan_save_stack+0x45/0x70
[   26.940220]  kasan_save_track+0x18/0x40
[   26.940357]  kasan_save_alloc_info+0x3b/0x50
[   26.940506]  __kasan_kmalloc+0xb7/0xc0
[   26.940638]  __kmalloc_cache_noprof+0x189/0x420
[   26.940860]  kasan_atomics+0x95/0x310
[   26.941105]  kunit_try_run_case+0x1a5/0x480
[   26.941326]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.941617]  kthread+0x337/0x6f0
[   26.941792]  ret_from_fork+0x116/0x1d0
[   26.942025]  ret_from_fork_asm+0x1a/0x30
[   26.942244] 
[   26.942364] The buggy address belongs to the object at ffff888105a1e600
[   26.942364]  which belongs to the cache kmalloc-64 of size 64
[   26.942898] The buggy address is located 0 bytes to the right of
[   26.942898]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.943317] 
[   26.943391] The buggy address belongs to the physical page:
[   26.943586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.943978] flags: 0x200000000000000(node=0|zone=2)
[   26.944238] page_type: f5(slab)
[   26.944442] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.944759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.945090] page dumped because: kasan: bad access detected
[   26.945345] 
[   26.945442] Memory state around the buggy address:
[   26.945649]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.945938]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.946173] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.946391]                                      ^
[   26.946547]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.946767]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.947151] ==================================================================
[   25.910422] ==================================================================
[   25.911440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   25.911840] Write of size 4 at addr ffff888105a1e630 by task kunit_try_catch/314
[   25.912268] 
[   25.912442] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.912499] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.912514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.912539] Call Trace:
[   25.912564]  <TASK>
[   25.912585]  dump_stack_lvl+0x73/0xb0
[   25.912619]  print_report+0xd1/0x650
[   25.912690]  ? __virt_addr_valid+0x1db/0x2d0
[   25.912719]  ? kasan_atomics_helper+0x4b3a/0x5450
[   25.912743]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.912819]  ? kasan_atomics_helper+0x4b3a/0x5450
[   25.912843]  kasan_report+0x141/0x180
[   25.912878]  ? kasan_atomics_helper+0x4b3a/0x5450
[   25.912906]  __asan_report_store4_noabort+0x1b/0x30
[   25.912944]  kasan_atomics_helper+0x4b3a/0x5450
[   25.912968]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.912991]  ? __kmalloc_cache_noprof+0x189/0x420
[   25.913020]  ? kasan_atomics+0x152/0x310
[   25.913049]  kasan_atomics+0x1dc/0x310
[   25.913083]  ? __pfx_kasan_atomics+0x10/0x10
[   25.913107]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   25.913135]  ? __pfx_read_tsc+0x10/0x10
[   25.913159]  ? ktime_get_ts64+0x86/0x230
[   25.913187]  kunit_try_run_case+0x1a5/0x480
[   25.913215]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.913242]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   25.913265]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.913289]  ? __kthread_parkme+0x82/0x180
[   25.913312]  ? preempt_count_sub+0x50/0x80
[   25.913339]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.913366]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.913393]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.913419]  kthread+0x337/0x6f0
[   25.913442]  ? trace_preempt_on+0x20/0xc0
[   25.913468]  ? __pfx_kthread+0x10/0x10
[   25.913490]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.913517]  ? calculate_sigpending+0x7b/0xa0
[   25.913544]  ? __pfx_kthread+0x10/0x10
[   25.913568]  ret_from_fork+0x116/0x1d0
[   25.913588]  ? __pfx_kthread+0x10/0x10
[   25.913611]  ret_from_fork_asm+0x1a/0x30
[   25.913645]  </TASK>
[   25.913659] 
[   25.924919] Allocated by task 314:
[   25.925110]  kasan_save_stack+0x45/0x70
[   25.925259]  kasan_save_track+0x18/0x40
[   25.925579]  kasan_save_alloc_info+0x3b/0x50
[   25.925792]  __kasan_kmalloc+0xb7/0xc0
[   25.926012]  __kmalloc_cache_noprof+0x189/0x420
[   25.926278]  kasan_atomics+0x95/0x310
[   25.926453]  kunit_try_run_case+0x1a5/0x480
[   25.926645]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.926823]  kthread+0x337/0x6f0
[   25.927072]  ret_from_fork+0x116/0x1d0
[   25.927269]  ret_from_fork_asm+0x1a/0x30
[   25.927417] 
[   25.927488] The buggy address belongs to the object at ffff888105a1e600
[   25.927488]  which belongs to the cache kmalloc-64 of size 64
[   25.928030] The buggy address is located 0 bytes to the right of
[   25.928030]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   25.928497] 
[   25.928567] The buggy address belongs to the physical page:
[   25.928732] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   25.928982] flags: 0x200000000000000(node=0|zone=2)
[   25.929249] page_type: f5(slab)
[   25.929414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.929755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.930042] page dumped because: kasan: bad access detected
[   25.930216] 
[   25.930280] Memory state around the buggy address:
[   25.930429]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.930677]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.931004] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.931341]                                      ^
[   25.931587]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.931910]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.932259] ==================================================================
[   26.456437] ==================================================================
[   26.457419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   26.457763] Read of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.458145] 
[   26.458262] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.458317] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.458344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.458369] Call Trace:
[   26.458392]  <TASK>
[   26.458424]  dump_stack_lvl+0x73/0xb0
[   26.458456]  print_report+0xd1/0x650
[   26.458480]  ? __virt_addr_valid+0x1db/0x2d0
[   26.458515]  ? kasan_atomics_helper+0x13b5/0x5450
[   26.458539]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.458578]  ? kasan_atomics_helper+0x13b5/0x5450
[   26.458601]  kasan_report+0x141/0x180
[   26.458624]  ? kasan_atomics_helper+0x13b5/0x5450
[   26.458660]  kasan_check_range+0x10c/0x1c0
[   26.458685]  __kasan_check_read+0x15/0x20
[   26.458710]  kasan_atomics_helper+0x13b5/0x5450
[   26.458745]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.458768]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.458795]  ? kasan_atomics+0x152/0x310
[   26.458831]  kasan_atomics+0x1dc/0x310
[   26.458854]  ? __pfx_kasan_atomics+0x10/0x10
[   26.458888]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.458913]  ? __pfx_read_tsc+0x10/0x10
[   26.458949]  ? ktime_get_ts64+0x86/0x230
[   26.458975]  kunit_try_run_case+0x1a5/0x480
[   26.459003]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.459035]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.459057]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.459096]  ? __kthread_parkme+0x82/0x180
[   26.459119]  ? preempt_count_sub+0x50/0x80
[   26.459143]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.459169]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.459195]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.459220]  kthread+0x337/0x6f0
[   26.459242]  ? trace_preempt_on+0x20/0xc0
[   26.459267]  ? __pfx_kthread+0x10/0x10
[   26.459288]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.459314]  ? calculate_sigpending+0x7b/0xa0
[   26.459339]  ? __pfx_kthread+0x10/0x10
[   26.459362]  ret_from_fork+0x116/0x1d0
[   26.459382]  ? __pfx_kthread+0x10/0x10
[   26.459405]  ret_from_fork_asm+0x1a/0x30
[   26.459446]  </TASK>
[   26.459459] 
[   26.466849] Allocated by task 314:
[   26.466989]  kasan_save_stack+0x45/0x70
[   26.467149]  kasan_save_track+0x18/0x40
[   26.467352]  kasan_save_alloc_info+0x3b/0x50
[   26.467587]  __kasan_kmalloc+0xb7/0xc0
[   26.467797]  __kmalloc_cache_noprof+0x189/0x420
[   26.468058]  kasan_atomics+0x95/0x310
[   26.468275]  kunit_try_run_case+0x1a5/0x480
[   26.468482]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.468731]  kthread+0x337/0x6f0
[   26.468893]  ret_from_fork+0x116/0x1d0
[   26.469282]  ret_from_fork_asm+0x1a/0x30
[   26.469480] 
[   26.469580] The buggy address belongs to the object at ffff888105a1e600
[   26.469580]  which belongs to the cache kmalloc-64 of size 64
[   26.470159] The buggy address is located 0 bytes to the right of
[   26.470159]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.470628] 
[   26.470724] The buggy address belongs to the physical page:
[   26.471019] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.471350] flags: 0x200000000000000(node=0|zone=2)
[   26.471568] page_type: f5(slab)
[   26.471748] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.472090] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.472415] page dumped because: kasan: bad access detected
[   26.472627] 
[   26.472718] Memory state around the buggy address:
[   26.472982]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.473322]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.473631] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.473921]                                      ^
[   26.474213]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.474527]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.474814] ==================================================================
[   26.622007] ==================================================================
[   26.622716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   26.623523] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.624242] 
[   26.624422] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.624481] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.624509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.624548] Call Trace:
[   26.624573]  <TASK>
[   26.624596]  dump_stack_lvl+0x73/0xb0
[   26.624642]  print_report+0xd1/0x650
[   26.624668]  ? __virt_addr_valid+0x1db/0x2d0
[   26.624695]  ? kasan_atomics_helper+0x177f/0x5450
[   26.624719]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.624748]  ? kasan_atomics_helper+0x177f/0x5450
[   26.624772]  kasan_report+0x141/0x180
[   26.624797]  ? kasan_atomics_helper+0x177f/0x5450
[   26.624826]  kasan_check_range+0x10c/0x1c0
[   26.624853]  __kasan_check_write+0x18/0x20
[   26.624878]  kasan_atomics_helper+0x177f/0x5450
[   26.624903]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.624936]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.624965]  ? kasan_atomics+0x152/0x310
[   26.624994]  kasan_atomics+0x1dc/0x310
[   26.625019]  ? __pfx_kasan_atomics+0x10/0x10
[   26.625043]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.625080]  ? __pfx_read_tsc+0x10/0x10
[   26.625105]  ? ktime_get_ts64+0x86/0x230
[   26.625133]  kunit_try_run_case+0x1a5/0x480
[   26.625162]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.625187]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.625211]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.625235]  ? __kthread_parkme+0x82/0x180
[   26.625258]  ? preempt_count_sub+0x50/0x80
[   26.625285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.625313]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.625340]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.625367]  kthread+0x337/0x6f0
[   26.625390]  ? trace_preempt_on+0x20/0xc0
[   26.625415]  ? __pfx_kthread+0x10/0x10
[   26.625438]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.625465]  ? calculate_sigpending+0x7b/0xa0
[   26.625491]  ? __pfx_kthread+0x10/0x10
[   26.625515]  ret_from_fork+0x116/0x1d0
[   26.625536]  ? __pfx_kthread+0x10/0x10
[   26.625559]  ret_from_fork_asm+0x1a/0x30
[   26.625592]  </TASK>
[   26.625608] 
[   26.639373] Allocated by task 314:
[   26.639669]  kasan_save_stack+0x45/0x70
[   26.640005]  kasan_save_track+0x18/0x40
[   26.640422]  kasan_save_alloc_info+0x3b/0x50
[   26.640787]  __kasan_kmalloc+0xb7/0xc0
[   26.640921]  __kmalloc_cache_noprof+0x189/0x420
[   26.641086]  kasan_atomics+0x95/0x310
[   26.641218]  kunit_try_run_case+0x1a5/0x480
[   26.641363]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.641535]  kthread+0x337/0x6f0
[   26.641654]  ret_from_fork+0x116/0x1d0
[   26.641785]  ret_from_fork_asm+0x1a/0x30
[   26.641934] 
[   26.642005] The buggy address belongs to the object at ffff888105a1e600
[   26.642005]  which belongs to the cache kmalloc-64 of size 64
[   26.642401] The buggy address is located 0 bytes to the right of
[   26.642401]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.642998] 
[   26.643106] The buggy address belongs to the physical page:
[   26.643320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.643568] flags: 0x200000000000000(node=0|zone=2)
[   26.643831] page_type: f5(slab)
[   26.644044] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.644341] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.644687] page dumped because: kasan: bad access detected
[   26.644933] 
[   26.645075] Memory state around the buggy address:
[   26.645230]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.645508]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.645858] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.646349]                                      ^
[   26.646503]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.647053]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.647361] ==================================================================
[   26.648382] ==================================================================
[   26.648774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   26.649146] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.649488] 
[   26.649616] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.649684] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.649701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.649728] Call Trace:
[   26.649752]  <TASK>
[   26.649775]  dump_stack_lvl+0x73/0xb0
[   26.649808]  print_report+0xd1/0x650
[   26.649840]  ? __virt_addr_valid+0x1db/0x2d0
[   26.649867]  ? kasan_atomics_helper+0x1818/0x5450
[   26.649891]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.649921]  ? kasan_atomics_helper+0x1818/0x5450
[   26.649958]  kasan_report+0x141/0x180
[   26.649982]  ? kasan_atomics_helper+0x1818/0x5450
[   26.650011]  kasan_check_range+0x10c/0x1c0
[   26.650038]  __kasan_check_write+0x18/0x20
[   26.650073]  kasan_atomics_helper+0x1818/0x5450
[   26.650098]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.650123]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.650152]  ? kasan_atomics+0x152/0x310
[   26.650182]  kasan_atomics+0x1dc/0x310
[   26.650217]  ? __pfx_kasan_atomics+0x10/0x10
[   26.650241]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.650280]  ? __pfx_read_tsc+0x10/0x10
[   26.650304]  ? ktime_get_ts64+0x86/0x230
[   26.650333]  kunit_try_run_case+0x1a5/0x480
[   26.650363]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.650389]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.650414]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.650438]  ? __kthread_parkme+0x82/0x180
[   26.650462]  ? preempt_count_sub+0x50/0x80
[   26.650488]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.650516]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.650544]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.650572]  kthread+0x337/0x6f0
[   26.650593]  ? trace_preempt_on+0x20/0xc0
[   26.650620]  ? __pfx_kthread+0x10/0x10
[   26.650652]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.650680]  ? calculate_sigpending+0x7b/0xa0
[   26.650707]  ? __pfx_kthread+0x10/0x10
[   26.650742]  ret_from_fork+0x116/0x1d0
[   26.650764]  ? __pfx_kthread+0x10/0x10
[   26.650787]  ret_from_fork_asm+0x1a/0x30
[   26.650831]  </TASK>
[   26.650846] 
[   26.659119] Allocated by task 314:
[   26.659322]  kasan_save_stack+0x45/0x70
[   26.659520]  kasan_save_track+0x18/0x40
[   26.659709]  kasan_save_alloc_info+0x3b/0x50
[   26.659927]  __kasan_kmalloc+0xb7/0xc0
[   26.660135]  __kmalloc_cache_noprof+0x189/0x420
[   26.660336]  kasan_atomics+0x95/0x310
[   26.660508]  kunit_try_run_case+0x1a5/0x480
[   26.660735]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.660992]  kthread+0x337/0x6f0
[   26.661144]  ret_from_fork+0x116/0x1d0
[   26.661363]  ret_from_fork_asm+0x1a/0x30
[   26.661517] 
[   26.661586] The buggy address belongs to the object at ffff888105a1e600
[   26.661586]  which belongs to the cache kmalloc-64 of size 64
[   26.661963] The buggy address is located 0 bytes to the right of
[   26.661963]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.662563] 
[   26.662674] The buggy address belongs to the physical page:
[   26.662934] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.663213] flags: 0x200000000000000(node=0|zone=2)
[   26.663380] page_type: f5(slab)
[   26.663504] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.663846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.664556] page dumped because: kasan: bad access detected
[   26.664818] 
[   26.664939] Memory state around the buggy address:
[   26.665205]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.665465]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.665685] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.666328]                                      ^
[   26.666573]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.666857]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.667305] ==================================================================
[   26.948023] ==================================================================
[   26.948425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   26.948782] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.949161] 
[   26.949280] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.949335] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.949351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.949376] Call Trace:
[   26.949401]  <TASK>
[   26.949424]  dump_stack_lvl+0x73/0xb0
[   26.949457]  print_report+0xd1/0x650
[   26.949483]  ? __virt_addr_valid+0x1db/0x2d0
[   26.949510]  ? kasan_atomics_helper+0x20c8/0x5450
[   26.949533]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.949561]  ? kasan_atomics_helper+0x20c8/0x5450
[   26.949586]  kasan_report+0x141/0x180
[   26.949611]  ? kasan_atomics_helper+0x20c8/0x5450
[   26.949640]  kasan_check_range+0x10c/0x1c0
[   26.949666]  __kasan_check_write+0x18/0x20
[   26.949691]  kasan_atomics_helper+0x20c8/0x5450
[   26.949716]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.949741]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.949769]  ? kasan_atomics+0x152/0x310
[   26.949797]  kasan_atomics+0x1dc/0x310
[   26.949828]  ? __pfx_kasan_atomics+0x10/0x10
[   26.949852]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.949879]  ? __pfx_read_tsc+0x10/0x10
[   26.949904]  ? ktime_get_ts64+0x86/0x230
[   26.949954]  kunit_try_run_case+0x1a5/0x480
[   26.949983]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.950010]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.950035]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.950149]  ? __kthread_parkme+0x82/0x180
[   26.950178]  ? preempt_count_sub+0x50/0x80
[   26.950206]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.950234]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.950262]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.950289]  kthread+0x337/0x6f0
[   26.950311]  ? trace_preempt_on+0x20/0xc0
[   26.950338]  ? __pfx_kthread+0x10/0x10
[   26.950361]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.950389]  ? calculate_sigpending+0x7b/0xa0
[   26.950416]  ? __pfx_kthread+0x10/0x10
[   26.950440]  ret_from_fork+0x116/0x1d0
[   26.950463]  ? __pfx_kthread+0x10/0x10
[   26.950487]  ret_from_fork_asm+0x1a/0x30
[   26.950521]  </TASK>
[   26.950536] 
[   26.958335] Allocated by task 314:
[   26.958540]  kasan_save_stack+0x45/0x70
[   26.958751]  kasan_save_track+0x18/0x40
[   26.958972]  kasan_save_alloc_info+0x3b/0x50
[   26.959199]  __kasan_kmalloc+0xb7/0xc0
[   26.959387]  __kmalloc_cache_noprof+0x189/0x420
[   26.959546]  kasan_atomics+0x95/0x310
[   26.959738]  kunit_try_run_case+0x1a5/0x480
[   26.960012]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.960281]  kthread+0x337/0x6f0
[   26.960473]  ret_from_fork+0x116/0x1d0
[   26.960689]  ret_from_fork_asm+0x1a/0x30
[   26.960877] 
[   26.961031] The buggy address belongs to the object at ffff888105a1e600
[   26.961031]  which belongs to the cache kmalloc-64 of size 64
[   26.961574] The buggy address is located 0 bytes to the right of
[   26.961574]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.962172] 
[   26.962277] The buggy address belongs to the physical page:
[   26.962540] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.962887] flags: 0x200000000000000(node=0|zone=2)
[   26.963188] page_type: f5(slab)
[   26.963356] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.963699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.963999] page dumped because: kasan: bad access detected
[   26.964273] 
[   26.964367] Memory state around the buggy address:
[   26.964631]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.964894]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.965181] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.965579]                                      ^
[   26.965846]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.966220]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.966468] ==================================================================
[   26.576684] ==================================================================
[   26.577406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   26.578073] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.578390] 
[   26.578477] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.578532] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.578547] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.578572] Call Trace:
[   26.578595]  <TASK>
[   26.578616]  dump_stack_lvl+0x73/0xb0
[   26.578649]  print_report+0xd1/0x650
[   26.578673]  ? __virt_addr_valid+0x1db/0x2d0
[   26.578699]  ? kasan_atomics_helper+0x164f/0x5450
[   26.578722]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.578750]  ? kasan_atomics_helper+0x164f/0x5450
[   26.578773]  kasan_report+0x141/0x180
[   26.578796]  ? kasan_atomics_helper+0x164f/0x5450
[   26.578824]  kasan_check_range+0x10c/0x1c0
[   26.578851]  __kasan_check_write+0x18/0x20
[   26.578878]  kasan_atomics_helper+0x164f/0x5450
[   26.578903]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.578927]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.578954]  ? kasan_atomics+0x152/0x310
[   26.578981]  kasan_atomics+0x1dc/0x310
[   26.579004]  ? __pfx_kasan_atomics+0x10/0x10
[   26.579028]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.579055]  ? __pfx_read_tsc+0x10/0x10
[   26.579093]  ? ktime_get_ts64+0x86/0x230
[   26.579121]  kunit_try_run_case+0x1a5/0x480
[   26.579149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.579174]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.579199]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.579223]  ? __kthread_parkme+0x82/0x180
[   26.579246]  ? preempt_count_sub+0x50/0x80
[   26.579271]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.579298]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.579324]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.579350]  kthread+0x337/0x6f0
[   26.579371]  ? trace_preempt_on+0x20/0xc0
[   26.579396]  ? __pfx_kthread+0x10/0x10
[   26.579418]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.579444]  ? calculate_sigpending+0x7b/0xa0
[   26.579469]  ? __pfx_kthread+0x10/0x10
[   26.579493]  ret_from_fork+0x116/0x1d0
[   26.579514]  ? __pfx_kthread+0x10/0x10
[   26.579537]  ret_from_fork_asm+0x1a/0x30
[   26.579570]  </TASK>
[   26.579583] 
[   26.588172] Allocated by task 314:
[   26.588367]  kasan_save_stack+0x45/0x70
[   26.588586]  kasan_save_track+0x18/0x40
[   26.588777]  kasan_save_alloc_info+0x3b/0x50
[   26.589019]  __kasan_kmalloc+0xb7/0xc0
[   26.589201]  __kmalloc_cache_noprof+0x189/0x420
[   26.589422]  kasan_atomics+0x95/0x310
[   26.589616]  kunit_try_run_case+0x1a5/0x480
[   26.589792]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.590043]  kthread+0x337/0x6f0
[   26.590241]  ret_from_fork+0x116/0x1d0
[   26.590423]  ret_from_fork_asm+0x1a/0x30
[   26.590567] 
[   26.590658] The buggy address belongs to the object at ffff888105a1e600
[   26.590658]  which belongs to the cache kmalloc-64 of size 64
[   26.591286] The buggy address is located 0 bytes to the right of
[   26.591286]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.591641] 
[   26.591713] The buggy address belongs to the physical page:
[   26.591986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.592347] flags: 0x200000000000000(node=0|zone=2)
[   26.592577] page_type: f5(slab)
[   26.592743] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.593152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.593384] page dumped because: kasan: bad access detected
[   26.593555] 
[   26.593642] Memory state around the buggy address:
[   26.593870]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.594478]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.594740] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.594986]                                      ^
[   26.595219]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.595477]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.595743] ==================================================================
[   26.985693] ==================================================================
[   26.986115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   26.986457] Write of size 8 at addr ffff888105a1e630 by task kunit_try_catch/314
[   26.986787] 
[   26.986898] CPU: 0 UID: 0 PID: 314 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.986972] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.986988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.987033] Call Trace:
[   26.987056]  <TASK>
[   26.987086]  dump_stack_lvl+0x73/0xb0
[   26.987118]  print_report+0xd1/0x650
[   26.987142]  ? __virt_addr_valid+0x1db/0x2d0
[   26.987168]  ? kasan_atomics_helper+0x218a/0x5450
[   26.987192]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.987220]  ? kasan_atomics_helper+0x218a/0x5450
[   26.987243]  kasan_report+0x141/0x180
[   26.987267]  ? kasan_atomics_helper+0x218a/0x5450
[   26.987294]  kasan_check_range+0x10c/0x1c0
[   26.987318]  __kasan_check_write+0x18/0x20
[   26.987343]  kasan_atomics_helper+0x218a/0x5450
[   26.987367]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.987391]  ? __kmalloc_cache_noprof+0x189/0x420
[   26.987417]  ? kasan_atomics+0x152/0x310
[   26.987445]  kasan_atomics+0x1dc/0x310
[   26.987469]  ? __pfx_kasan_atomics+0x10/0x10
[   26.987493]  ? __pfx_queued_spin_lock_slowpath+0x10/0x10
[   26.987520]  ? __pfx_read_tsc+0x10/0x10
[   26.987561]  ? ktime_get_ts64+0x86/0x230
[   26.987588]  kunit_try_run_case+0x1a5/0x480
[   26.987616]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.987641]  ? _raw_spin_lock_irqsave+0xf9/0x100
[   26.987664]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.987688]  ? __kthread_parkme+0x82/0x180
[   26.987711]  ? preempt_count_sub+0x50/0x80
[   26.987737]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.987763]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.987790]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.987816]  kthread+0x337/0x6f0
[   26.987837]  ? trace_preempt_on+0x20/0xc0
[   26.987862]  ? __pfx_kthread+0x10/0x10
[   26.987884]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.987910]  ? calculate_sigpending+0x7b/0xa0
[   26.987958]  ? __pfx_kthread+0x10/0x10
[   26.987981]  ret_from_fork+0x116/0x1d0
[   26.988002]  ? __pfx_kthread+0x10/0x10
[   26.988027]  ret_from_fork_asm+0x1a/0x30
[   26.988071]  </TASK>
[   26.988086] 
[   26.995460] Allocated by task 314:
[   26.995655]  kasan_save_stack+0x45/0x70
[   26.995884]  kasan_save_track+0x18/0x40
[   26.996111]  kasan_save_alloc_info+0x3b/0x50
[   26.996347]  __kasan_kmalloc+0xb7/0xc0
[   26.996535]  __kmalloc_cache_noprof+0x189/0x420
[   26.996776]  kasan_atomics+0x95/0x310
[   26.996980]  kunit_try_run_case+0x1a5/0x480
[   26.997210]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.997423]  kthread+0x337/0x6f0
[   26.997600]  ret_from_fork+0x116/0x1d0
[   26.997776]  ret_from_fork_asm+0x1a/0x30
[   26.998012] 
[   26.998111] The buggy address belongs to the object at ffff888105a1e600
[   26.998111]  which belongs to the cache kmalloc-64 of size 64
[   26.998470] The buggy address is located 0 bytes to the right of
[   26.998470]  allocated 48-byte region [ffff888105a1e600, ffff888105a1e630)
[   26.998938] 
[   26.999035] The buggy address belongs to the physical page:
[   26.999294] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105a1e
[   26.999644] flags: 0x200000000000000(node=0|zone=2)
[   26.999842] page_type: f5(slab)
[   26.999988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   27.000315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   27.000680] page dumped because: kasan: bad access detected
[   27.000947] 
[   27.001073] Memory state around the buggy address:
[   27.001248]  ffff888105a1e500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.001463]  ffff888105a1e580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   27.001770] >ffff888105a1e600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   27.002121]                                      ^
[   27.002314]  ffff888105a1e680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.002531]  ffff888105a1e700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   27.002861] ==================================================================

[   25.764585] ==================================================================
[   25.764814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450
[   25.765284] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.765630] 
[   25.765737] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.765797] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.765811] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.765833] Call Trace:
[   25.765849]  <TASK>
[   25.765864]  dump_stack_lvl+0x73/0xb0
[   25.765891]  print_report+0xd1/0x650
[   25.765915]  ? __virt_addr_valid+0x1db/0x2d0
[   25.765938]  ? kasan_atomics_helper+0x860/0x5450
[   25.765961]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.765988]  ? kasan_atomics_helper+0x860/0x5450
[   25.766011]  kasan_report+0x141/0x180
[   25.766033]  ? kasan_atomics_helper+0x860/0x5450
[   25.766061]  kasan_check_range+0x10c/0x1c0
[   25.766086]  __kasan_check_write+0x18/0x20
[   25.766110]  kasan_atomics_helper+0x860/0x5450
[   25.766134]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.766158]  ? kasan_save_alloc_info+0x3b/0x50
[   25.766187]  kasan_atomics+0x1dc/0x310
[   25.766211]  ? __pfx_kasan_atomics+0x10/0x10
[   25.766236]  ? __pfx_read_tsc+0x10/0x10
[   25.766259]  ? ktime_get_ts64+0x86/0x230
[   25.766284]  kunit_try_run_case+0x1a5/0x480
[   25.766319]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.766344]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.766366]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.766390]  ? __kthread_parkme+0x82/0x180
[   25.766411]  ? preempt_count_sub+0x50/0x80
[   25.766435]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.766461]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.766486]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.766512]  kthread+0x337/0x6f0
[   25.766533]  ? trace_preempt_on+0x20/0xc0
[   25.766558]  ? __pfx_kthread+0x10/0x10
[   25.766581]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.766607]  ? calculate_sigpending+0x7b/0xa0
[   25.766632]  ? __pfx_kthread+0x10/0x10
[   25.766656]  ret_from_fork+0x116/0x1d0
[   25.766676]  ? __pfx_kthread+0x10/0x10
[   25.766698]  ret_from_fork_asm+0x1a/0x30
[   25.766730]  </TASK>
[   25.766742] 
[   25.774283] Allocated by task 313:
[   25.774473]  kasan_save_stack+0x45/0x70
[   25.774875]  kasan_save_track+0x18/0x40
[   25.775075]  kasan_save_alloc_info+0x3b/0x50
[   25.775288]  __kasan_kmalloc+0xb7/0xc0
[   25.775464]  __kmalloc_cache_noprof+0x189/0x420
[   25.775664]  kasan_atomics+0x95/0x310
[   25.775844]  kunit_try_run_case+0x1a5/0x480
[   25.776034]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.776221]  kthread+0x337/0x6f0
[   25.776355]  ret_from_fork+0x116/0x1d0
[   25.776488]  ret_from_fork_asm+0x1a/0x30
[   25.776625] 
[   25.776693] The buggy address belongs to the object at ffff88810490f900
[   25.776693]  which belongs to the cache kmalloc-64 of size 64
[   25.777093] The buggy address is located 0 bytes to the right of
[   25.777093]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.777757] 
[   25.777856] The buggy address belongs to the physical page:
[   25.778110] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.778430] flags: 0x200000000000000(node=0|zone=2)
[   25.778627] page_type: f5(slab)
[   25.779119] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.779377] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.779941] page dumped because: kasan: bad access detected
[   25.780192] 
[   25.780288] Memory state around the buggy address:
[   25.780513]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.780836]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.781099] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.781364]                                      ^
[   25.781567]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.782106]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.782387] ==================================================================
[   26.608015] ==================================================================
[   26.608775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450
[   26.609159] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.609466] 
[   26.609878] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.609946] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.609962] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.609987] Call Trace:
[   26.610009]  <TASK>
[   26.610031]  dump_stack_lvl+0x73/0xb0
[   26.610062]  print_report+0xd1/0x650
[   26.610086]  ? __virt_addr_valid+0x1db/0x2d0
[   26.610111]  ? kasan_atomics_helper+0x1eaa/0x5450
[   26.610133]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.610160]  ? kasan_atomics_helper+0x1eaa/0x5450
[   26.610183]  kasan_report+0x141/0x180
[   26.610205]  ? kasan_atomics_helper+0x1eaa/0x5450
[   26.610232]  kasan_check_range+0x10c/0x1c0
[   26.610256]  __kasan_check_write+0x18/0x20
[   26.610280]  kasan_atomics_helper+0x1eaa/0x5450
[   26.610303]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.610336]  ? kasan_save_alloc_info+0x3b/0x50
[   26.610365]  kasan_atomics+0x1dc/0x310
[   26.610388]  ? __pfx_kasan_atomics+0x10/0x10
[   26.610413]  ? __pfx_read_tsc+0x10/0x10
[   26.610472]  ? ktime_get_ts64+0x86/0x230
[   26.610511]  kunit_try_run_case+0x1a5/0x480
[   26.610538]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.610562]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.610586]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.610609]  ? __kthread_parkme+0x82/0x180
[   26.610631]  ? preempt_count_sub+0x50/0x80
[   26.610655]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.610681]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.610706]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.610731]  kthread+0x337/0x6f0
[   26.610752]  ? trace_preempt_on+0x20/0xc0
[   26.610778]  ? __pfx_kthread+0x10/0x10
[   26.610801]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.610826]  ? calculate_sigpending+0x7b/0xa0
[   26.610850]  ? __pfx_kthread+0x10/0x10
[   26.610874]  ret_from_fork+0x116/0x1d0
[   26.610895]  ? __pfx_kthread+0x10/0x10
[   26.610917]  ret_from_fork_asm+0x1a/0x30
[   26.610950]  </TASK>
[   26.610964] 
[   26.622370] Allocated by task 313:
[   26.622517]  kasan_save_stack+0x45/0x70
[   26.622770]  kasan_save_track+0x18/0x40
[   26.622969]  kasan_save_alloc_info+0x3b/0x50
[   26.623183]  __kasan_kmalloc+0xb7/0xc0
[   26.623387]  __kmalloc_cache_noprof+0x189/0x420
[   26.623606]  kasan_atomics+0x95/0x310
[   26.623846]  kunit_try_run_case+0x1a5/0x480
[   26.623988]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.624407]  kthread+0x337/0x6f0
[   26.624675]  ret_from_fork+0x116/0x1d0
[   26.624808]  ret_from_fork_asm+0x1a/0x30
[   26.624949] 
[   26.625022] The buggy address belongs to the object at ffff88810490f900
[   26.625022]  which belongs to the cache kmalloc-64 of size 64
[   26.625487] The buggy address is located 0 bytes to the right of
[   26.625487]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.626151] 
[   26.626282] The buggy address belongs to the physical page:
[   26.626608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.626868] flags: 0x200000000000000(node=0|zone=2)
[   26.627127] page_type: f5(slab)
[   26.627300] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.627677] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.628018] page dumped because: kasan: bad access detected
[   26.628260] 
[   26.628390] Memory state around the buggy address:
[   26.628665]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.628872]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.629109] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.629375]                                      ^
[   26.629712]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.630064]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.630327] ==================================================================
[   26.282888] ==================================================================
[   26.283136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450
[   26.283424] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.283847] 
[   26.283943] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.284004] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.284018] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.284052] Call Trace:
[   26.284068]  <TASK>
[   26.284086]  dump_stack_lvl+0x73/0xb0
[   26.284127]  print_report+0xd1/0x650
[   26.284151]  ? __virt_addr_valid+0x1db/0x2d0
[   26.284176]  ? kasan_atomics_helper+0x50d4/0x5450
[   26.284198]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.284226]  ? kasan_atomics_helper+0x50d4/0x5450
[   26.284248]  kasan_report+0x141/0x180
[   26.284271]  ? kasan_atomics_helper+0x50d4/0x5450
[   26.284322]  __asan_report_store8_noabort+0x1b/0x30
[   26.284348]  kasan_atomics_helper+0x50d4/0x5450
[   26.284373]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.284397]  ? kasan_save_alloc_info+0x3b/0x50
[   26.284425]  kasan_atomics+0x1dc/0x310
[   26.284449]  ? __pfx_kasan_atomics+0x10/0x10
[   26.284495]  ? __pfx_read_tsc+0x10/0x10
[   26.284521]  ? ktime_get_ts64+0x86/0x230
[   26.284548]  kunit_try_run_case+0x1a5/0x480
[   26.284575]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.284600]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.284623]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.284648]  ? __kthread_parkme+0x82/0x180
[   26.284670]  ? preempt_count_sub+0x50/0x80
[   26.284695]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.284721]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.284748]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.284774]  kthread+0x337/0x6f0
[   26.284796]  ? trace_preempt_on+0x20/0xc0
[   26.284820]  ? __pfx_kthread+0x10/0x10
[   26.284843]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.284868]  ? calculate_sigpending+0x7b/0xa0
[   26.284893]  ? __pfx_kthread+0x10/0x10
[   26.284916]  ret_from_fork+0x116/0x1d0
[   26.284937]  ? __pfx_kthread+0x10/0x10
[   26.284959]  ret_from_fork_asm+0x1a/0x30
[   26.285000]  </TASK>
[   26.285014] 
[   26.291983] Allocated by task 313:
[   26.292175]  kasan_save_stack+0x45/0x70
[   26.292377]  kasan_save_track+0x18/0x40
[   26.292553]  kasan_save_alloc_info+0x3b/0x50
[   26.292700]  __kasan_kmalloc+0xb7/0xc0
[   26.292828]  __kmalloc_cache_noprof+0x189/0x420
[   26.292978]  kasan_atomics+0x95/0x310
[   26.293104]  kunit_try_run_case+0x1a5/0x480
[   26.293303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.293615]  kthread+0x337/0x6f0
[   26.293789]  ret_from_fork+0x116/0x1d0
[   26.293974]  ret_from_fork_asm+0x1a/0x30
[   26.294190] 
[   26.294286] The buggy address belongs to the object at ffff88810490f900
[   26.294286]  which belongs to the cache kmalloc-64 of size 64
[   26.294870] The buggy address is located 0 bytes to the right of
[   26.294870]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.295448] 
[   26.295571] The buggy address belongs to the physical page:
[   26.295826] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.296158] flags: 0x200000000000000(node=0|zone=2)
[   26.296350] page_type: f5(slab)
[   26.296565] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.296888] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.297213] page dumped because: kasan: bad access detected
[   26.297434] 
[   26.297524] Memory state around the buggy address:
[   26.297676]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.297894]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.298108] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.298450]                                      ^
[   26.298686]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.298996]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.299302] ==================================================================
[   26.769984] ==================================================================
[   26.771166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450
[   26.771659] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.771991] 
[   26.772159] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.772263] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.772279] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.772304] Call Trace:
[   26.772347]  <TASK>
[   26.772396]  dump_stack_lvl+0x73/0xb0
[   26.772452]  print_report+0xd1/0x650
[   26.772513]  ? __virt_addr_valid+0x1db/0x2d0
[   26.772538]  ? kasan_atomics_helper+0x218a/0x5450
[   26.772560]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.772588]  ? kasan_atomics_helper+0x218a/0x5450
[   26.772612]  kasan_report+0x141/0x180
[   26.772634]  ? kasan_atomics_helper+0x218a/0x5450
[   26.772660]  kasan_check_range+0x10c/0x1c0
[   26.772685]  __kasan_check_write+0x18/0x20
[   26.772709]  kasan_atomics_helper+0x218a/0x5450
[   26.772731]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.772784]  ? kasan_save_alloc_info+0x3b/0x50
[   26.772814]  kasan_atomics+0x1dc/0x310
[   26.772837]  ? __pfx_kasan_atomics+0x10/0x10
[   26.772863]  ? __pfx_read_tsc+0x10/0x10
[   26.772913]  ? ktime_get_ts64+0x86/0x230
[   26.772941]  kunit_try_run_case+0x1a5/0x480
[   26.772968]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.772993]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.773017]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.773040]  ? __kthread_parkme+0x82/0x180
[   26.773064]  ? preempt_count_sub+0x50/0x80
[   26.773089]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.773115]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.773140]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.773166]  kthread+0x337/0x6f0
[   26.773187]  ? trace_preempt_on+0x20/0xc0
[   26.773212]  ? __pfx_kthread+0x10/0x10
[   26.773234]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.773260]  ? calculate_sigpending+0x7b/0xa0
[   26.773285]  ? __pfx_kthread+0x10/0x10
[   26.773320]  ret_from_fork+0x116/0x1d0
[   26.773341]  ? __pfx_kthread+0x10/0x10
[   26.773362]  ret_from_fork_asm+0x1a/0x30
[   26.773396]  </TASK>
[   26.773411] 
[   26.781075] Allocated by task 313:
[   26.781284]  kasan_save_stack+0x45/0x70
[   26.781549]  kasan_save_track+0x18/0x40
[   26.781747]  kasan_save_alloc_info+0x3b/0x50
[   26.781919]  __kasan_kmalloc+0xb7/0xc0
[   26.782125]  __kmalloc_cache_noprof+0x189/0x420
[   26.782353]  kasan_atomics+0x95/0x310
[   26.782481]  kunit_try_run_case+0x1a5/0x480
[   26.782716]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.782993]  kthread+0x337/0x6f0
[   26.783175]  ret_from_fork+0x116/0x1d0
[   26.783365]  ret_from_fork_asm+0x1a/0x30
[   26.783499] 
[   26.783566] The buggy address belongs to the object at ffff88810490f900
[   26.783566]  which belongs to the cache kmalloc-64 of size 64
[   26.784135] The buggy address is located 0 bytes to the right of
[   26.784135]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.784667] 
[   26.784739] The buggy address belongs to the physical page:
[   26.784951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.785380] flags: 0x200000000000000(node=0|zone=2)
[   26.785778] page_type: f5(slab)
[   26.785898] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.786263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.786663] page dumped because: kasan: bad access detected
[   26.786905] 
[   26.787024] Memory state around the buggy address:
[   26.787233]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.787613]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.787925] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.788223]                                      ^
[   26.788482]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.788797]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.789096] ==================================================================
[   26.223815] ==================================================================
[   26.224160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450
[   26.224518] Read of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.224853] 
[   26.224977] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.225038] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.225053] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.225076] Call Trace:
[   26.225094]  <TASK>
[   26.225121]  dump_stack_lvl+0x73/0xb0
[   26.225151]  print_report+0xd1/0x650
[   26.225175]  ? __virt_addr_valid+0x1db/0x2d0
[   26.225210]  ? kasan_atomics_helper+0x13b5/0x5450
[   26.225232]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.225260]  ? kasan_atomics_helper+0x13b5/0x5450
[   26.225290]  kasan_report+0x141/0x180
[   26.225328]  ? kasan_atomics_helper+0x13b5/0x5450
[   26.225355]  kasan_check_range+0x10c/0x1c0
[   26.225379]  __kasan_check_read+0x15/0x20
[   26.225404]  kasan_atomics_helper+0x13b5/0x5450
[   26.225429]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.225454]  ? kasan_save_alloc_info+0x3b/0x50
[   26.225513]  kasan_atomics+0x1dc/0x310
[   26.225537]  ? __pfx_kasan_atomics+0x10/0x10
[   26.225572]  ? __pfx_read_tsc+0x10/0x10
[   26.225596]  ? ktime_get_ts64+0x86/0x230
[   26.225623]  kunit_try_run_case+0x1a5/0x480
[   26.225649]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.225682]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.225706]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.225740]  ? __kthread_parkme+0x82/0x180
[   26.225763]  ? preempt_count_sub+0x50/0x80
[   26.225788]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.225814]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.225840]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.225866]  kthread+0x337/0x6f0
[   26.225887]  ? trace_preempt_on+0x20/0xc0
[   26.225911]  ? __pfx_kthread+0x10/0x10
[   26.225934]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.225959]  ? calculate_sigpending+0x7b/0xa0
[   26.225984]  ? __pfx_kthread+0x10/0x10
[   26.226007]  ret_from_fork+0x116/0x1d0
[   26.226027]  ? __pfx_kthread+0x10/0x10
[   26.226049]  ret_from_fork_asm+0x1a/0x30
[   26.226081]  </TASK>
[   26.226094] 
[   26.235893] Allocated by task 313:
[   26.236072]  kasan_save_stack+0x45/0x70
[   26.236250]  kasan_save_track+0x18/0x40
[   26.236431]  kasan_save_alloc_info+0x3b/0x50
[   26.236628]  __kasan_kmalloc+0xb7/0xc0
[   26.236799]  __kmalloc_cache_noprof+0x189/0x420
[   26.236997]  kasan_atomics+0x95/0x310
[   26.237591]  kunit_try_run_case+0x1a5/0x480
[   26.237925]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.238355]  kthread+0x337/0x6f0
[   26.238594]  ret_from_fork+0x116/0x1d0
[   26.238769]  ret_from_fork_asm+0x1a/0x30
[   26.238950] 
[   26.239034] The buggy address belongs to the object at ffff88810490f900
[   26.239034]  which belongs to the cache kmalloc-64 of size 64
[   26.239793] The buggy address is located 0 bytes to the right of
[   26.239793]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.240454] 
[   26.240758] The buggy address belongs to the physical page:
[   26.241206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.241829] flags: 0x200000000000000(node=0|zone=2)
[   26.242244] page_type: f5(slab)
[   26.242690] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.243144] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.243680] page dumped because: kasan: bad access detected
[   26.244118] 
[   26.244364] Memory state around the buggy address:
[   26.244613]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.244900]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.245187] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.245744]                                      ^
[   26.245963]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.246249]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.246783] ==================================================================
[   25.782894] ==================================================================
[   25.783195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450
[   25.783478] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.783955] 
[   25.784047] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.784095] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.784110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.784132] Call Trace:
[   25.784147]  <TASK>
[   25.784164]  dump_stack_lvl+0x73/0xb0
[   25.784193]  print_report+0xd1/0x650
[   25.784216]  ? __virt_addr_valid+0x1db/0x2d0
[   25.784241]  ? kasan_atomics_helper+0x8f9/0x5450
[   25.784265]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.784295]  ? kasan_atomics_helper+0x8f9/0x5450
[   25.784330]  kasan_report+0x141/0x180
[   25.784353]  ? kasan_atomics_helper+0x8f9/0x5450
[   25.784380]  kasan_check_range+0x10c/0x1c0
[   25.784405]  __kasan_check_write+0x18/0x20
[   25.784429]  kasan_atomics_helper+0x8f9/0x5450
[   25.784453]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.784478]  ? kasan_save_alloc_info+0x3b/0x50
[   25.784518]  kasan_atomics+0x1dc/0x310
[   25.784543]  ? __pfx_kasan_atomics+0x10/0x10
[   25.784568]  ? __pfx_read_tsc+0x10/0x10
[   25.784590]  ? ktime_get_ts64+0x86/0x230
[   25.784616]  kunit_try_run_case+0x1a5/0x480
[   25.784643]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.784667]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.784701]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.784725]  ? __kthread_parkme+0x82/0x180
[   25.784746]  ? preempt_count_sub+0x50/0x80
[   25.784771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.784797]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.784822]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.784849]  kthread+0x337/0x6f0
[   25.784870]  ? trace_preempt_on+0x20/0xc0
[   25.784894]  ? __pfx_kthread+0x10/0x10
[   25.784917]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.784942]  ? calculate_sigpending+0x7b/0xa0
[   25.784966]  ? __pfx_kthread+0x10/0x10
[   25.784989]  ret_from_fork+0x116/0x1d0
[   25.785010]  ? __pfx_kthread+0x10/0x10
[   25.785032]  ret_from_fork_asm+0x1a/0x30
[   25.785063]  </TASK>
[   25.785077] 
[   25.792884] Allocated by task 313:
[   25.793064]  kasan_save_stack+0x45/0x70
[   25.793231]  kasan_save_track+0x18/0x40
[   25.793372]  kasan_save_alloc_info+0x3b/0x50
[   25.793534]  __kasan_kmalloc+0xb7/0xc0
[   25.793716]  __kmalloc_cache_noprof+0x189/0x420
[   25.793933]  kasan_atomics+0x95/0x310
[   25.794251]  kunit_try_run_case+0x1a5/0x480
[   25.794439]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.794612]  kthread+0x337/0x6f0
[   25.794973]  ret_from_fork+0x116/0x1d0
[   25.795166]  ret_from_fork_asm+0x1a/0x30
[   25.795373] 
[   25.795467] The buggy address belongs to the object at ffff88810490f900
[   25.795467]  which belongs to the cache kmalloc-64 of size 64
[   25.795993] The buggy address is located 0 bytes to the right of
[   25.795993]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.796429] 
[   25.796504] The buggy address belongs to the physical page:
[   25.796762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.797110] flags: 0x200000000000000(node=0|zone=2)
[   25.797298] page_type: f5(slab)
[   25.797424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.797648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.797966] page dumped because: kasan: bad access detected
[   25.798208] 
[   25.798296] Memory state around the buggy address:
[   25.798988]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.799427]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.799827] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.800041]                                      ^
[   25.800191]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.800540]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.801130] ==================================================================
[   26.299776] ==================================================================
[   26.300010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450
[   26.300301] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.300740] 
[   26.300862] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.300921] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.300936] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.300967] Call Trace:
[   26.300983]  <TASK>
[   26.301000]  dump_stack_lvl+0x73/0xb0
[   26.301042]  print_report+0xd1/0x650
[   26.301065]  ? __virt_addr_valid+0x1db/0x2d0
[   26.301089]  ? kasan_atomics_helper+0x151d/0x5450
[   26.301112]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.301139]  ? kasan_atomics_helper+0x151d/0x5450
[   26.301171]  kasan_report+0x141/0x180
[   26.301195]  ? kasan_atomics_helper+0x151d/0x5450
[   26.301222]  kasan_check_range+0x10c/0x1c0
[   26.301256]  __kasan_check_write+0x18/0x20
[   26.301281]  kasan_atomics_helper+0x151d/0x5450
[   26.301314]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.301337]  ? kasan_save_alloc_info+0x3b/0x50
[   26.301366]  kasan_atomics+0x1dc/0x310
[   26.301390]  ? __pfx_kasan_atomics+0x10/0x10
[   26.301415]  ? __pfx_read_tsc+0x10/0x10
[   26.301438]  ? ktime_get_ts64+0x86/0x230
[   26.301464]  kunit_try_run_case+0x1a5/0x480
[   26.301511]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.301536]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.301561]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.301592]  ? __kthread_parkme+0x82/0x180
[   26.301614]  ? preempt_count_sub+0x50/0x80
[   26.301638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.301675]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.301700]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.301726]  kthread+0x337/0x6f0
[   26.301751]  ? trace_preempt_on+0x20/0xc0
[   26.301775]  ? __pfx_kthread+0x10/0x10
[   26.301798]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.301823]  ? calculate_sigpending+0x7b/0xa0
[   26.301848]  ? __pfx_kthread+0x10/0x10
[   26.301871]  ret_from_fork+0x116/0x1d0
[   26.301891]  ? __pfx_kthread+0x10/0x10
[   26.301913]  ret_from_fork_asm+0x1a/0x30
[   26.301945]  </TASK>
[   26.301959] 
[   26.309114] Allocated by task 313:
[   26.309291]  kasan_save_stack+0x45/0x70
[   26.309535]  kasan_save_track+0x18/0x40
[   26.309730]  kasan_save_alloc_info+0x3b/0x50
[   26.309972]  __kasan_kmalloc+0xb7/0xc0
[   26.310157]  __kmalloc_cache_noprof+0x189/0x420
[   26.310336]  kasan_atomics+0x95/0x310
[   26.310465]  kunit_try_run_case+0x1a5/0x480
[   26.310627]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.310798]  kthread+0x337/0x6f0
[   26.310914]  ret_from_fork+0x116/0x1d0
[   26.311040]  ret_from_fork_asm+0x1a/0x30
[   26.311237] 
[   26.311352] The buggy address belongs to the object at ffff88810490f900
[   26.311352]  which belongs to the cache kmalloc-64 of size 64
[   26.311905] The buggy address is located 0 bytes to the right of
[   26.311905]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.312455] 
[   26.312577] The buggy address belongs to the physical page:
[   26.312838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.313216] flags: 0x200000000000000(node=0|zone=2)
[   26.313431] page_type: f5(slab)
[   26.313614] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.313933] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.314277] page dumped because: kasan: bad access detected
[   26.314585] 
[   26.314684] Memory state around the buggy address:
[   26.314910]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.315128]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.315351] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.315589]                                      ^
[   26.315747]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.316107]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.316443] ==================================================================
[   25.661520] ==================================================================
[   25.662431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450
[   25.662719] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.663560] 
[   25.663690] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.663739] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.663754] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.663776] Call Trace:
[   25.663792]  <TASK>
[   25.663808]  dump_stack_lvl+0x73/0xb0
[   25.663839]  print_report+0xd1/0x650
[   25.663863]  ? __virt_addr_valid+0x1db/0x2d0
[   25.663886]  ? kasan_atomics_helper+0x565/0x5450
[   25.663908]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.663936]  ? kasan_atomics_helper+0x565/0x5450
[   25.663958]  kasan_report+0x141/0x180
[   25.663981]  ? kasan_atomics_helper+0x565/0x5450
[   25.664026]  kasan_check_range+0x10c/0x1c0
[   25.664400]  __kasan_check_write+0x18/0x20
[   25.664431]  kasan_atomics_helper+0x565/0x5450
[   25.664455]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.664479]  ? kasan_save_alloc_info+0x3b/0x50
[   25.664509]  kasan_atomics+0x1dc/0x310
[   25.664533]  ? __pfx_kasan_atomics+0x10/0x10
[   25.664558]  ? __pfx_read_tsc+0x10/0x10
[   25.664580]  ? ktime_get_ts64+0x86/0x230
[   25.664605]  kunit_try_run_case+0x1a5/0x480
[   25.664632]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.664658]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.664691]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.664715]  ? __kthread_parkme+0x82/0x180
[   25.664737]  ? preempt_count_sub+0x50/0x80
[   25.664761]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.664788]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.664813]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.664839]  kthread+0x337/0x6f0
[   25.664861]  ? trace_preempt_on+0x20/0xc0
[   25.664884]  ? __pfx_kthread+0x10/0x10
[   25.664906]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.664932]  ? calculate_sigpending+0x7b/0xa0
[   25.664956]  ? __pfx_kthread+0x10/0x10
[   25.664979]  ret_from_fork+0x116/0x1d0
[   25.664999]  ? __pfx_kthread+0x10/0x10
[   25.665021]  ret_from_fork_asm+0x1a/0x30
[   25.665053]  </TASK>
[   25.665065] 
[   25.675127] Allocated by task 313:
[   25.675326]  kasan_save_stack+0x45/0x70
[   25.675481]  kasan_save_track+0x18/0x40
[   25.675985]  kasan_save_alloc_info+0x3b/0x50
[   25.676166]  __kasan_kmalloc+0xb7/0xc0
[   25.676469]  __kmalloc_cache_noprof+0x189/0x420
[   25.676886]  kasan_atomics+0x95/0x310
[   25.677064]  kunit_try_run_case+0x1a5/0x480
[   25.677263]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.677681]  kthread+0x337/0x6f0
[   25.677867]  ret_from_fork+0x116/0x1d0
[   25.678041]  ret_from_fork_asm+0x1a/0x30
[   25.678214] 
[   25.678319] The buggy address belongs to the object at ffff88810490f900
[   25.678319]  which belongs to the cache kmalloc-64 of size 64
[   25.679193] The buggy address is located 0 bytes to the right of
[   25.679193]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.680023] 
[   25.680135] The buggy address belongs to the physical page:
[   25.680505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.680991] flags: 0x200000000000000(node=0|zone=2)
[   25.681348] page_type: f5(slab)
[   25.681496] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.682047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.682389] page dumped because: kasan: bad access detected
[   25.682873] 
[   25.682963] Memory state around the buggy address:
[   25.683339]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.683676]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.684266] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.684724]                                      ^
[   25.684900]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.685220]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.685536] ==================================================================
[   26.181800] ==================================================================
[   26.182166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450
[   26.182517] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.183091] 
[   26.183227] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.183286] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.183300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.183331] Call Trace:
[   26.183348]  <TASK>
[   26.183364]  dump_stack_lvl+0x73/0xb0
[   26.183394]  print_report+0xd1/0x650
[   26.183417]  ? __virt_addr_valid+0x1db/0x2d0
[   26.183441]  ? kasan_atomics_helper+0x12e6/0x5450
[   26.183464]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.183492]  ? kasan_atomics_helper+0x12e6/0x5450
[   26.183515]  kasan_report+0x141/0x180
[   26.183540]  ? kasan_atomics_helper+0x12e6/0x5450
[   26.183567]  kasan_check_range+0x10c/0x1c0
[   26.183591]  __kasan_check_write+0x18/0x20
[   26.183616]  kasan_atomics_helper+0x12e6/0x5450
[   26.183640]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.183664]  ? kasan_save_alloc_info+0x3b/0x50
[   26.183727]  kasan_atomics+0x1dc/0x310
[   26.183751]  ? __pfx_kasan_atomics+0x10/0x10
[   26.183787]  ? __pfx_read_tsc+0x10/0x10
[   26.183810]  ? ktime_get_ts64+0x86/0x230
[   26.183863]  kunit_try_run_case+0x1a5/0x480
[   26.183891]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.183926]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.183950]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.183974]  ? __kthread_parkme+0x82/0x180
[   26.183996]  ? preempt_count_sub+0x50/0x80
[   26.184021]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.184047]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.184100]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.184126]  kthread+0x337/0x6f0
[   26.184148]  ? trace_preempt_on+0x20/0xc0
[   26.184182]  ? __pfx_kthread+0x10/0x10
[   26.184204]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.184229]  ? calculate_sigpending+0x7b/0xa0
[   26.184254]  ? __pfx_kthread+0x10/0x10
[   26.184277]  ret_from_fork+0x116/0x1d0
[   26.184333]  ? __pfx_kthread+0x10/0x10
[   26.184356]  ret_from_fork_asm+0x1a/0x30
[   26.184398]  </TASK>
[   26.184412] 
[   26.192223] Allocated by task 313:
[   26.192382]  kasan_save_stack+0x45/0x70
[   26.192670]  kasan_save_track+0x18/0x40
[   26.192810]  kasan_save_alloc_info+0x3b/0x50
[   26.192954]  __kasan_kmalloc+0xb7/0xc0
[   26.193138]  __kmalloc_cache_noprof+0x189/0x420
[   26.193412]  kasan_atomics+0x95/0x310
[   26.193675]  kunit_try_run_case+0x1a5/0x480
[   26.193908]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.194165]  kthread+0x337/0x6f0
[   26.194287]  ret_from_fork+0x116/0x1d0
[   26.194454]  ret_from_fork_asm+0x1a/0x30
[   26.194684] 
[   26.194776] The buggy address belongs to the object at ffff88810490f900
[   26.194776]  which belongs to the cache kmalloc-64 of size 64
[   26.195284] The buggy address is located 0 bytes to the right of
[   26.195284]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.195774] 
[   26.195853] The buggy address belongs to the physical page:
[   26.196146] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.196466] flags: 0x200000000000000(node=0|zone=2)
[   26.196704] page_type: f5(slab)
[   26.196878] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.197108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.197380] page dumped because: kasan: bad access detected
[   26.197671] 
[   26.197772] Memory state around the buggy address:
[   26.197996]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.198388]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.198678] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.198962]                                      ^
[   26.199149]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.199441]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.199731] ==================================================================
[   25.884845] ==================================================================
[   25.885162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450
[   25.885484] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.886203] 
[   25.886548] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.886699] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.886719] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.886743] Call Trace:
[   25.886759]  <TASK>
[   25.886776]  dump_stack_lvl+0x73/0xb0
[   25.886807]  print_report+0xd1/0x650
[   25.886868]  ? __virt_addr_valid+0x1db/0x2d0
[   25.886895]  ? kasan_atomics_helper+0xb6a/0x5450
[   25.886917]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.886945]  ? kasan_atomics_helper+0xb6a/0x5450
[   25.886968]  kasan_report+0x141/0x180
[   25.886992]  ? kasan_atomics_helper+0xb6a/0x5450
[   25.887018]  kasan_check_range+0x10c/0x1c0
[   25.887043]  __kasan_check_write+0x18/0x20
[   25.887068]  kasan_atomics_helper+0xb6a/0x5450
[   25.887093]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.887118]  ? kasan_save_alloc_info+0x3b/0x50
[   25.887148]  kasan_atomics+0x1dc/0x310
[   25.887172]  ? __pfx_kasan_atomics+0x10/0x10
[   25.887197]  ? __pfx_read_tsc+0x10/0x10
[   25.887221]  ? ktime_get_ts64+0x86/0x230
[   25.887248]  kunit_try_run_case+0x1a5/0x480
[   25.887274]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.887299]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.887334]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.887358]  ? __kthread_parkme+0x82/0x180
[   25.887380]  ? preempt_count_sub+0x50/0x80
[   25.887406]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.887431]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.887456]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.887481]  kthread+0x337/0x6f0
[   25.887511]  ? trace_preempt_on+0x20/0xc0
[   25.887536]  ? __pfx_kthread+0x10/0x10
[   25.887558]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.887583]  ? calculate_sigpending+0x7b/0xa0
[   25.887608]  ? __pfx_kthread+0x10/0x10
[   25.887631]  ret_from_fork+0x116/0x1d0
[   25.887652]  ? __pfx_kthread+0x10/0x10
[   25.887683]  ret_from_fork_asm+0x1a/0x30
[   25.887715]  </TASK>
[   25.887729] 
[   25.896223] Allocated by task 313:
[   25.896443]  kasan_save_stack+0x45/0x70
[   25.896664]  kasan_save_track+0x18/0x40
[   25.896930]  kasan_save_alloc_info+0x3b/0x50
[   25.897132]  __kasan_kmalloc+0xb7/0xc0
[   25.897259]  __kmalloc_cache_noprof+0x189/0x420
[   25.897421]  kasan_atomics+0x95/0x310
[   25.897551]  kunit_try_run_case+0x1a5/0x480
[   25.897756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.898001]  kthread+0x337/0x6f0
[   25.898351]  ret_from_fork+0x116/0x1d0
[   25.898544]  ret_from_fork_asm+0x1a/0x30
[   25.898764] 
[   25.898833] The buggy address belongs to the object at ffff88810490f900
[   25.898833]  which belongs to the cache kmalloc-64 of size 64
[   25.899172] The buggy address is located 0 bytes to the right of
[   25.899172]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.900203] 
[   25.900301] The buggy address belongs to the physical page:
[   25.900529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.900765] flags: 0x200000000000000(node=0|zone=2)
[   25.900923] page_type: f5(slab)
[   25.901087] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.901426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.901753] page dumped because: kasan: bad access detected
[   25.902201] 
[   25.902273] Memory state around the buggy address:
[   25.902435]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.902648]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.902963] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.903279]                                      ^
[   25.903508]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.904033]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.904263] ==================================================================
[   26.265578] ==================================================================
[   26.265857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450
[   26.266181] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.266538] 
[   26.266646] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.266694] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.266709] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.266733] Call Trace:
[   26.266751]  <TASK>
[   26.266769]  dump_stack_lvl+0x73/0xb0
[   26.266799]  print_report+0xd1/0x650
[   26.266832]  ? __virt_addr_valid+0x1db/0x2d0
[   26.266857]  ? kasan_atomics_helper+0x1467/0x5450
[   26.266879]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.266906]  ? kasan_atomics_helper+0x1467/0x5450
[   26.266929]  kasan_report+0x141/0x180
[   26.266952]  ? kasan_atomics_helper+0x1467/0x5450
[   26.266979]  kasan_check_range+0x10c/0x1c0
[   26.267004]  __kasan_check_write+0x18/0x20
[   26.267029]  kasan_atomics_helper+0x1467/0x5450
[   26.267052]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.267076]  ? kasan_save_alloc_info+0x3b/0x50
[   26.267106]  kasan_atomics+0x1dc/0x310
[   26.267129]  ? __pfx_kasan_atomics+0x10/0x10
[   26.267154]  ? __pfx_read_tsc+0x10/0x10
[   26.267178]  ? ktime_get_ts64+0x86/0x230
[   26.267203]  kunit_try_run_case+0x1a5/0x480
[   26.267231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.267257]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.267281]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.267316]  ? __kthread_parkme+0x82/0x180
[   26.267350]  ? preempt_count_sub+0x50/0x80
[   26.267374]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.267413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.267440]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.267465]  kthread+0x337/0x6f0
[   26.267506]  ? trace_preempt_on+0x20/0xc0
[   26.267540]  ? __pfx_kthread+0x10/0x10
[   26.267562]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.267588]  ? calculate_sigpending+0x7b/0xa0
[   26.267623]  ? __pfx_kthread+0x10/0x10
[   26.267647]  ret_from_fork+0x116/0x1d0
[   26.267667]  ? __pfx_kthread+0x10/0x10
[   26.267698]  ret_from_fork_asm+0x1a/0x30
[   26.267731]  </TASK>
[   26.267744] 
[   26.275228] Allocated by task 313:
[   26.275394]  kasan_save_stack+0x45/0x70
[   26.275624]  kasan_save_track+0x18/0x40
[   26.275795]  kasan_save_alloc_info+0x3b/0x50
[   26.275940]  __kasan_kmalloc+0xb7/0xc0
[   26.276069]  __kmalloc_cache_noprof+0x189/0x420
[   26.276220]  kasan_atomics+0x95/0x310
[   26.276357]  kunit_try_run_case+0x1a5/0x480
[   26.276520]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.276694]  kthread+0x337/0x6f0
[   26.276818]  ret_from_fork+0x116/0x1d0
[   26.277001]  ret_from_fork_asm+0x1a/0x30
[   26.277193] 
[   26.277314] The buggy address belongs to the object at ffff88810490f900
[   26.277314]  which belongs to the cache kmalloc-64 of size 64
[   26.277868] The buggy address is located 0 bytes to the right of
[   26.277868]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.278417] 
[   26.278534] The buggy address belongs to the physical page:
[   26.278781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.279130] flags: 0x200000000000000(node=0|zone=2)
[   26.279367] page_type: f5(slab)
[   26.279506] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.279738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.280019] page dumped because: kasan: bad access detected
[   26.280266] 
[   26.280381] Memory state around the buggy address:
[   26.280630]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.280971]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.281280] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.281600]                                      ^
[   26.281792]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.282084]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.282399] ==================================================================
[   26.587891] ==================================================================
[   26.588184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450
[   26.588526] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.588848] 
[   26.588938] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.588990] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.589005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.589029] Call Trace:
[   26.589061]  <TASK>
[   26.589082]  dump_stack_lvl+0x73/0xb0
[   26.589124]  print_report+0xd1/0x650
[   26.589147]  ? __virt_addr_valid+0x1db/0x2d0
[   26.589172]  ? kasan_atomics_helper+0x1e12/0x5450
[   26.589193]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.589220]  ? kasan_atomics_helper+0x1e12/0x5450
[   26.589243]  kasan_report+0x141/0x180
[   26.589266]  ? kasan_atomics_helper+0x1e12/0x5450
[   26.589292]  kasan_check_range+0x10c/0x1c0
[   26.589325]  __kasan_check_write+0x18/0x20
[   26.589359]  kasan_atomics_helper+0x1e12/0x5450
[   26.589381]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.589405]  ? kasan_save_alloc_info+0x3b/0x50
[   26.589445]  kasan_atomics+0x1dc/0x310
[   26.589468]  ? __pfx_kasan_atomics+0x10/0x10
[   26.589503]  ? __pfx_read_tsc+0x10/0x10
[   26.589526]  ? ktime_get_ts64+0x86/0x230
[   26.589552]  kunit_try_run_case+0x1a5/0x480
[   26.589587]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.589611]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.589635]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.589657]  ? __kthread_parkme+0x82/0x180
[   26.589679]  ? preempt_count_sub+0x50/0x80
[   26.589703]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.589730]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.589759]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.589784]  kthread+0x337/0x6f0
[   26.589806]  ? trace_preempt_on+0x20/0xc0
[   26.589840]  ? __pfx_kthread+0x10/0x10
[   26.589861]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.589889]  ? calculate_sigpending+0x7b/0xa0
[   26.589925]  ? __pfx_kthread+0x10/0x10
[   26.589949]  ret_from_fork+0x116/0x1d0
[   26.589979]  ? __pfx_kthread+0x10/0x10
[   26.590001]  ret_from_fork_asm+0x1a/0x30
[   26.590044]  </TASK>
[   26.590057] 
[   26.598038] Allocated by task 313:
[   26.598225]  kasan_save_stack+0x45/0x70
[   26.598459]  kasan_save_track+0x18/0x40
[   26.598640]  kasan_save_alloc_info+0x3b/0x50
[   26.598829]  __kasan_kmalloc+0xb7/0xc0
[   26.598957]  __kmalloc_cache_noprof+0x189/0x420
[   26.599107]  kasan_atomics+0x95/0x310
[   26.599276]  kunit_try_run_case+0x1a5/0x480
[   26.599486]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.599749]  kthread+0x337/0x6f0
[   26.599925]  ret_from_fork+0x116/0x1d0
[   26.600164]  ret_from_fork_asm+0x1a/0x30
[   26.600300] 
[   26.600377] The buggy address belongs to the object at ffff88810490f900
[   26.600377]  which belongs to the cache kmalloc-64 of size 64
[   26.600958] The buggy address is located 0 bytes to the right of
[   26.600958]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.601637] 
[   26.601760] The buggy address belongs to the physical page:
[   26.602004] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.602336] flags: 0x200000000000000(node=0|zone=2)
[   26.602497] page_type: f5(slab)
[   26.602652] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.602904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.603231] page dumped because: kasan: bad access detected
[   26.603414] 
[   26.603480] Memory state around the buggy address:
[   26.603640]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.604247]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.605352] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.605637]                                      ^
[   26.605804]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.606019]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.606228] ==================================================================
[   25.643171] ==================================================================
[   25.643470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450
[   25.643808] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.644321] 
[   25.644429] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.644480] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.644495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.644517] Call Trace:
[   25.644533]  <TASK>
[   25.644551]  dump_stack_lvl+0x73/0xb0
[   25.644579]  print_report+0xd1/0x650
[   25.644604]  ? __virt_addr_valid+0x1db/0x2d0
[   25.644629]  ? kasan_atomics_helper+0x4b3a/0x5450
[   25.644652]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.644679]  ? kasan_atomics_helper+0x4b3a/0x5450
[   25.644703]  kasan_report+0x141/0x180
[   25.644727]  ? kasan_atomics_helper+0x4b3a/0x5450
[   25.644754]  __asan_report_store4_noabort+0x1b/0x30
[   25.644779]  kasan_atomics_helper+0x4b3a/0x5450
[   25.644803]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.644827]  ? kasan_save_alloc_info+0x3b/0x50
[   25.644856]  kasan_atomics+0x1dc/0x310
[   25.644881]  ? __pfx_kasan_atomics+0x10/0x10
[   25.644906]  ? __pfx_read_tsc+0x10/0x10
[   25.644928]  ? ktime_get_ts64+0x86/0x230
[   25.644953]  kunit_try_run_case+0x1a5/0x480
[   25.644980]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.645004]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.645027]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.645051]  ? __kthread_parkme+0x82/0x180
[   25.645072]  ? preempt_count_sub+0x50/0x80
[   25.645154]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.645183]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.645209]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.645234]  kthread+0x337/0x6f0
[   25.645255]  ? trace_preempt_on+0x20/0xc0
[   25.645278]  ? __pfx_kthread+0x10/0x10
[   25.645299]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.645337]  ? calculate_sigpending+0x7b/0xa0
[   25.645362]  ? __pfx_kthread+0x10/0x10
[   25.645385]  ret_from_fork+0x116/0x1d0
[   25.645404]  ? __pfx_kthread+0x10/0x10
[   25.645426]  ret_from_fork_asm+0x1a/0x30
[   25.645458]  </TASK>
[   25.645471] 
[   25.652965] Allocated by task 313:
[   25.653130]  kasan_save_stack+0x45/0x70
[   25.653270]  kasan_save_track+0x18/0x40
[   25.653464]  kasan_save_alloc_info+0x3b/0x50
[   25.653728]  __kasan_kmalloc+0xb7/0xc0
[   25.653927]  __kmalloc_cache_noprof+0x189/0x420
[   25.654112]  kasan_atomics+0x95/0x310
[   25.654298]  kunit_try_run_case+0x1a5/0x480
[   25.654455]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.654879]  kthread+0x337/0x6f0
[   25.655001]  ret_from_fork+0x116/0x1d0
[   25.655128]  ret_from_fork_asm+0x1a/0x30
[   25.655294] 
[   25.655393] The buggy address belongs to the object at ffff88810490f900
[   25.655393]  which belongs to the cache kmalloc-64 of size 64
[   25.656008] The buggy address is located 0 bytes to the right of
[   25.656008]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.656445] 
[   25.656594] The buggy address belongs to the physical page:
[   25.657054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.657368] flags: 0x200000000000000(node=0|zone=2)
[   25.657525] page_type: f5(slab)
[   25.657640] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.657867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.658137] page dumped because: kasan: bad access detected
[   25.658554] 
[   25.658837] Memory state around the buggy address:
[   25.659064]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.659489]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.659703] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.659910]                                      ^
[   25.660059]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.660503]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.661044] ==================================================================
[   26.514429] ==================================================================
[   26.514967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450
[   26.515360] Read of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.515688] 
[   26.515768] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.515815] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.515829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.515851] Call Trace:
[   26.515867]  <TASK>
[   26.515884]  dump_stack_lvl+0x73/0xb0
[   26.515909]  print_report+0xd1/0x650
[   26.515932]  ? __virt_addr_valid+0x1db/0x2d0
[   26.515954]  ? kasan_atomics_helper+0x4f30/0x5450
[   26.515977]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.516003]  ? kasan_atomics_helper+0x4f30/0x5450
[   26.516027]  kasan_report+0x141/0x180
[   26.516049]  ? kasan_atomics_helper+0x4f30/0x5450
[   26.516076]  __asan_report_load8_noabort+0x18/0x20
[   26.516100]  kasan_atomics_helper+0x4f30/0x5450
[   26.516123]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.516147]  ? kasan_save_alloc_info+0x3b/0x50
[   26.516175]  kasan_atomics+0x1dc/0x310
[   26.516199]  ? __pfx_kasan_atomics+0x10/0x10
[   26.516224]  ? __pfx_read_tsc+0x10/0x10
[   26.516246]  ? ktime_get_ts64+0x86/0x230
[   26.516270]  kunit_try_run_case+0x1a5/0x480
[   26.516296]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.516332]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.516355]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.516378]  ? __kthread_parkme+0x82/0x180
[   26.516400]  ? preempt_count_sub+0x50/0x80
[   26.516424]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.516450]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.516475]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.516501]  kthread+0x337/0x6f0
[   26.516521]  ? trace_preempt_on+0x20/0xc0
[   26.516545]  ? __pfx_kthread+0x10/0x10
[   26.516566]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.516591]  ? calculate_sigpending+0x7b/0xa0
[   26.516630]  ? __pfx_kthread+0x10/0x10
[   26.516653]  ret_from_fork+0x116/0x1d0
[   26.516673]  ? __pfx_kthread+0x10/0x10
[   26.516695]  ret_from_fork_asm+0x1a/0x30
[   26.516726]  </TASK>
[   26.516738] 
[   26.523483] Allocated by task 313:
[   26.523658]  kasan_save_stack+0x45/0x70
[   26.523858]  kasan_save_track+0x18/0x40
[   26.524050]  kasan_save_alloc_info+0x3b/0x50
[   26.524264]  __kasan_kmalloc+0xb7/0xc0
[   26.524468]  __kmalloc_cache_noprof+0x189/0x420
[   26.524662]  kasan_atomics+0x95/0x310
[   26.524789]  kunit_try_run_case+0x1a5/0x480
[   26.524943]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.525195]  kthread+0x337/0x6f0
[   26.525367]  ret_from_fork+0x116/0x1d0
[   26.525551]  ret_from_fork_asm+0x1a/0x30
[   26.525734] 
[   26.525804] The buggy address belongs to the object at ffff88810490f900
[   26.525804]  which belongs to the cache kmalloc-64 of size 64
[   26.526146] The buggy address is located 0 bytes to the right of
[   26.526146]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.526940] 
[   26.527041] The buggy address belongs to the physical page:
[   26.527290] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.527647] flags: 0x200000000000000(node=0|zone=2)
[   26.527851] page_type: f5(slab)
[   26.527969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.528195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.528427] page dumped because: kasan: bad access detected
[   26.528594] 
[   26.528659] Memory state around the buggy address:
[   26.528808]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.529019]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.529229] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.529568]                                      ^
[   26.529796]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.530114]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.530434] ==================================================================
[   26.789813] ==================================================================
[   26.790115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450
[   26.790365] Read of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.790689] 
[   26.791089] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.791155] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.791169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.791196] Call Trace:
[   26.791217]  <TASK>
[   26.791239]  dump_stack_lvl+0x73/0xb0
[   26.791270]  print_report+0xd1/0x650
[   26.791294]  ? __virt_addr_valid+0x1db/0x2d0
[   26.791332]  ? kasan_atomics_helper+0x4fa5/0x5450
[   26.791355]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.791382]  ? kasan_atomics_helper+0x4fa5/0x5450
[   26.791405]  kasan_report+0x141/0x180
[   26.791428]  ? kasan_atomics_helper+0x4fa5/0x5450
[   26.791455]  __asan_report_load8_noabort+0x18/0x20
[   26.791480]  kasan_atomics_helper+0x4fa5/0x5450
[   26.791503]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.791527]  ? kasan_save_alloc_info+0x3b/0x50
[   26.791555]  kasan_atomics+0x1dc/0x310
[   26.791578]  ? __pfx_kasan_atomics+0x10/0x10
[   26.791603]  ? __pfx_read_tsc+0x10/0x10
[   26.791627]  ? ktime_get_ts64+0x86/0x230
[   26.791652]  kunit_try_run_case+0x1a5/0x480
[   26.791679]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.791704]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.791736]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.791758]  ? __kthread_parkme+0x82/0x180
[   26.791780]  ? preempt_count_sub+0x50/0x80
[   26.791804]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.791830]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.791856]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.791920]  kthread+0x337/0x6f0
[   26.791965]  ? trace_preempt_on+0x20/0xc0
[   26.792034]  ? __pfx_kthread+0x10/0x10
[   26.792101]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.792171]  ? calculate_sigpending+0x7b/0xa0
[   26.792219]  ? __pfx_kthread+0x10/0x10
[   26.792242]  ret_from_fork+0x116/0x1d0
[   26.792261]  ? __pfx_kthread+0x10/0x10
[   26.792283]  ret_from_fork_asm+0x1a/0x30
[   26.792326]  </TASK>
[   26.792339] 
[   26.799563] Allocated by task 313:
[   26.799688]  kasan_save_stack+0x45/0x70
[   26.799825]  kasan_save_track+0x18/0x40
[   26.799951]  kasan_save_alloc_info+0x3b/0x50
[   26.800222]  __kasan_kmalloc+0xb7/0xc0
[   26.800488]  __kmalloc_cache_noprof+0x189/0x420
[   26.800788]  kasan_atomics+0x95/0x310
[   26.801038]  kunit_try_run_case+0x1a5/0x480
[   26.801303]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.801794]  kthread+0x337/0x6f0
[   26.801970]  ret_from_fork+0x116/0x1d0
[   26.802170]  ret_from_fork_asm+0x1a/0x30
[   26.802348] 
[   26.802415] The buggy address belongs to the object at ffff88810490f900
[   26.802415]  which belongs to the cache kmalloc-64 of size 64
[   26.803099] The buggy address is located 0 bytes to the right of
[   26.803099]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.803637] 
[   26.803709] The buggy address belongs to the physical page:
[   26.803872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.804217] flags: 0x200000000000000(node=0|zone=2)
[   26.804540] page_type: f5(slab)
[   26.804740] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.805075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.805367] page dumped because: kasan: bad access detected
[   26.805779] 
[   26.805898] Memory state around the buggy address:
[   26.806115]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.806439]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.806794] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.807038]                                      ^
[   26.807182]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.807444]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.808155] ==================================================================
[   25.564453] ==================================================================
[   25.564749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450
[   25.565190] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.565642] 
[   25.565882] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.565953] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.565968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.565991] Call Trace:
[   25.566008]  <TASK>
[   25.566026]  dump_stack_lvl+0x73/0xb0
[   25.566054]  print_report+0xd1/0x650
[   25.566078]  ? __virt_addr_valid+0x1db/0x2d0
[   25.566122]  ? kasan_atomics_helper+0x4b6e/0x5450
[   25.566143]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.566170]  ? kasan_atomics_helper+0x4b6e/0x5450
[   25.566193]  kasan_report+0x141/0x180
[   25.566215]  ? kasan_atomics_helper+0x4b6e/0x5450
[   25.566242]  __asan_report_store4_noabort+0x1b/0x30
[   25.566267]  kasan_atomics_helper+0x4b6e/0x5450
[   25.566291]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.566326]  ? kasan_save_alloc_info+0x3b/0x50
[   25.566355]  kasan_atomics+0x1dc/0x310
[   25.566377]  ? __pfx_kasan_atomics+0x10/0x10
[   25.566421]  ? __pfx_read_tsc+0x10/0x10
[   25.566444]  ? ktime_get_ts64+0x86/0x230
[   25.566468]  kunit_try_run_case+0x1a5/0x480
[   25.566494]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.566520]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.566545]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.566577]  ? __kthread_parkme+0x82/0x180
[   25.566617]  ? preempt_count_sub+0x50/0x80
[   25.566640]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.566667]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.566707]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.566734]  kthread+0x337/0x6f0
[   25.566756]  ? trace_preempt_on+0x20/0xc0
[   25.566779]  ? __pfx_kthread+0x10/0x10
[   25.566801]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.566827]  ? calculate_sigpending+0x7b/0xa0
[   25.566851]  ? __pfx_kthread+0x10/0x10
[   25.566874]  ret_from_fork+0x116/0x1d0
[   25.566895]  ? __pfx_kthread+0x10/0x10
[   25.566917]  ret_from_fork_asm+0x1a/0x30
[   25.566948]  </TASK>
[   25.566960] 
[   25.574596] Allocated by task 313:
[   25.574884]  kasan_save_stack+0x45/0x70
[   25.575030]  kasan_save_track+0x18/0x40
[   25.575161]  kasan_save_alloc_info+0x3b/0x50
[   25.575382]  __kasan_kmalloc+0xb7/0xc0
[   25.575815]  __kmalloc_cache_noprof+0x189/0x420
[   25.576004]  kasan_atomics+0x95/0x310
[   25.576134]  kunit_try_run_case+0x1a5/0x480
[   25.576277]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.576530]  kthread+0x337/0x6f0
[   25.576970]  ret_from_fork+0x116/0x1d0
[   25.577173]  ret_from_fork_asm+0x1a/0x30
[   25.577380] 
[   25.577471] The buggy address belongs to the object at ffff88810490f900
[   25.577471]  which belongs to the cache kmalloc-64 of size 64
[   25.577982] The buggy address is located 0 bytes to the right of
[   25.577982]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.578518] 
[   25.578612] The buggy address belongs to the physical page:
[   25.578831] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.579068] flags: 0x200000000000000(node=0|zone=2)
[   25.579490] page_type: f5(slab)
[   25.579665] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.580063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.580301] page dumped because: kasan: bad access detected
[   25.580553] 
[   25.580661] Memory state around the buggy address:
[   25.581018]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.581509]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.582030] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.582338]                                      ^
[   25.582533]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.582913]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.583178] ==================================================================
[   25.623800] ==================================================================
[   25.624091] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450
[   25.624408] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.624828] 
[   25.624910] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.624958] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.624972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.624995] Call Trace:
[   25.625012]  <TASK>
[   25.625028]  dump_stack_lvl+0x73/0xb0
[   25.625055]  print_report+0xd1/0x650
[   25.625077]  ? __virt_addr_valid+0x1db/0x2d0
[   25.625101]  ? kasan_atomics_helper+0x4a0/0x5450
[   25.625123]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.625149]  ? kasan_atomics_helper+0x4a0/0x5450
[   25.625173]  kasan_report+0x141/0x180
[   25.625196]  ? kasan_atomics_helper+0x4a0/0x5450
[   25.625222]  kasan_check_range+0x10c/0x1c0
[   25.625246]  __kasan_check_write+0x18/0x20
[   25.625271]  kasan_atomics_helper+0x4a0/0x5450
[   25.625295]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.625331]  ? kasan_save_alloc_info+0x3b/0x50
[   25.625360]  kasan_atomics+0x1dc/0x310
[   25.625383]  ? __pfx_kasan_atomics+0x10/0x10
[   25.625408]  ? __pfx_read_tsc+0x10/0x10
[   25.625430]  ? ktime_get_ts64+0x86/0x230
[   25.625454]  kunit_try_run_case+0x1a5/0x480
[   25.625481]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.625507]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.625529]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.625552]  ? __kthread_parkme+0x82/0x180
[   25.625573]  ? preempt_count_sub+0x50/0x80
[   25.625597]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.625623]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.625647]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.625673]  kthread+0x337/0x6f0
[   25.625694]  ? trace_preempt_on+0x20/0xc0
[   25.625716]  ? __pfx_kthread+0x10/0x10
[   25.625742]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.625767]  ? calculate_sigpending+0x7b/0xa0
[   25.625791]  ? __pfx_kthread+0x10/0x10
[   25.625814]  ret_from_fork+0x116/0x1d0
[   25.625833]  ? __pfx_kthread+0x10/0x10
[   25.625855]  ret_from_fork_asm+0x1a/0x30
[   25.625887]  </TASK>
[   25.625899] 
[   25.634458] Allocated by task 313:
[   25.634637]  kasan_save_stack+0x45/0x70
[   25.634819]  kasan_save_track+0x18/0x40
[   25.634997]  kasan_save_alloc_info+0x3b/0x50
[   25.635184]  __kasan_kmalloc+0xb7/0xc0
[   25.635352]  __kmalloc_cache_noprof+0x189/0x420
[   25.635519]  kasan_atomics+0x95/0x310
[   25.635647]  kunit_try_run_case+0x1a5/0x480
[   25.635790]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.635959]  kthread+0x337/0x6f0
[   25.636074]  ret_from_fork+0x116/0x1d0
[   25.636200]  ret_from_fork_asm+0x1a/0x30
[   25.636715] 
[   25.636820] The buggy address belongs to the object at ffff88810490f900
[   25.636820]  which belongs to the cache kmalloc-64 of size 64
[   25.637346] The buggy address is located 0 bytes to the right of
[   25.637346]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.638062] 
[   25.638135] The buggy address belongs to the physical page:
[   25.638319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.638564] flags: 0x200000000000000(node=0|zone=2)
[   25.639016] page_type: f5(slab)
[   25.639190] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.639544] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.640124] page dumped because: kasan: bad access detected
[   25.640366] 
[   25.640464] Memory state around the buggy address:
[   25.640657]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.640965]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.641213] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.641431]                                      ^
[   25.641613]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.641924]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.642237] ==================================================================
[   26.631089] ==================================================================
[   26.631457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450
[   26.632072] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.632449] 
[   26.632890] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.632948] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.632963] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.632988] Call Trace:
[   26.633010]  <TASK>
[   26.633032]  dump_stack_lvl+0x73/0xb0
[   26.633064]  print_report+0xd1/0x650
[   26.633087]  ? __virt_addr_valid+0x1db/0x2d0
[   26.633113]  ? kasan_atomics_helper+0x1f43/0x5450
[   26.633135]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.633162]  ? kasan_atomics_helper+0x1f43/0x5450
[   26.633185]  kasan_report+0x141/0x180
[   26.633207]  ? kasan_atomics_helper+0x1f43/0x5450
[   26.633459]  kasan_check_range+0x10c/0x1c0
[   26.633504]  __kasan_check_write+0x18/0x20
[   26.633531]  kasan_atomics_helper+0x1f43/0x5450
[   26.633557]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.633582]  ? kasan_save_alloc_info+0x3b/0x50
[   26.633611]  kasan_atomics+0x1dc/0x310
[   26.633635]  ? __pfx_kasan_atomics+0x10/0x10
[   26.633659]  ? __pfx_read_tsc+0x10/0x10
[   26.633683]  ? ktime_get_ts64+0x86/0x230
[   26.633710]  kunit_try_run_case+0x1a5/0x480
[   26.633736]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.633766]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.633790]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.633813]  ? __kthread_parkme+0x82/0x180
[   26.633836]  ? preempt_count_sub+0x50/0x80
[   26.633860]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.633886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.633913]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.633938]  kthread+0x337/0x6f0
[   26.633960]  ? trace_preempt_on+0x20/0xc0
[   26.633984]  ? __pfx_kthread+0x10/0x10
[   26.634006]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.634031]  ? calculate_sigpending+0x7b/0xa0
[   26.634057]  ? __pfx_kthread+0x10/0x10
[   26.634079]  ret_from_fork+0x116/0x1d0
[   26.634099]  ? __pfx_kthread+0x10/0x10
[   26.634121]  ret_from_fork_asm+0x1a/0x30
[   26.634155]  </TASK>
[   26.634170] 
[   26.644375] Allocated by task 313:
[   26.644531]  kasan_save_stack+0x45/0x70
[   26.644744]  kasan_save_track+0x18/0x40
[   26.644914]  kasan_save_alloc_info+0x3b/0x50
[   26.645124]  __kasan_kmalloc+0xb7/0xc0
[   26.645287]  __kmalloc_cache_noprof+0x189/0x420
[   26.645801]  kasan_atomics+0x95/0x310
[   26.645996]  kunit_try_run_case+0x1a5/0x480
[   26.646148]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.646556]  kthread+0x337/0x6f0
[   26.646798]  ret_from_fork+0x116/0x1d0
[   26.646946]  ret_from_fork_asm+0x1a/0x30
[   26.647230] 
[   26.647457] The buggy address belongs to the object at ffff88810490f900
[   26.647457]  which belongs to the cache kmalloc-64 of size 64
[   26.647953] The buggy address is located 0 bytes to the right of
[   26.647953]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.648514] 
[   26.648817] The buggy address belongs to the physical page:
[   26.649045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.649431] flags: 0x200000000000000(node=0|zone=2)
[   26.649817] page_type: f5(slab)
[   26.649960] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.650463] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.650963] page dumped because: kasan: bad access detected
[   26.651172] 
[   26.651407] Memory state around the buggy address:
[   26.651578]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.652004]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.652379] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.652745]                                      ^
[   26.652937]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.653230]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.653770] ==================================================================
[   26.751332] ==================================================================
[   26.751624] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450
[   26.752164] Read of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.752418] 
[   26.752506] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.752585] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.752600] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.752664] Call Trace:
[   26.752688]  <TASK>
[   26.752734]  dump_stack_lvl+0x73/0xb0
[   26.752768]  print_report+0xd1/0x650
[   26.752792]  ? __virt_addr_valid+0x1db/0x2d0
[   26.752819]  ? kasan_atomics_helper+0x4fb2/0x5450
[   26.752842]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.752869]  ? kasan_atomics_helper+0x4fb2/0x5450
[   26.752892]  kasan_report+0x141/0x180
[   26.752915]  ? kasan_atomics_helper+0x4fb2/0x5450
[   26.752941]  __asan_report_load8_noabort+0x18/0x20
[   26.752997]  kasan_atomics_helper+0x4fb2/0x5450
[   26.753022]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.753046]  ? kasan_save_alloc_info+0x3b/0x50
[   26.753074]  kasan_atomics+0x1dc/0x310
[   26.753098]  ? __pfx_kasan_atomics+0x10/0x10
[   26.753153]  ? __pfx_read_tsc+0x10/0x10
[   26.753177]  ? ktime_get_ts64+0x86/0x230
[   26.753204]  kunit_try_run_case+0x1a5/0x480
[   26.753231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.753255]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.753280]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.753315]  ? __kthread_parkme+0x82/0x180
[   26.753337]  ? preempt_count_sub+0x50/0x80
[   26.753362]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.753417]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.753466]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.753506]  kthread+0x337/0x6f0
[   26.753527]  ? trace_preempt_on+0x20/0xc0
[   26.753552]  ? __pfx_kthread+0x10/0x10
[   26.753573]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.753599]  ? calculate_sigpending+0x7b/0xa0
[   26.753624]  ? __pfx_kthread+0x10/0x10
[   26.753647]  ret_from_fork+0x116/0x1d0
[   26.753667]  ? __pfx_kthread+0x10/0x10
[   26.753689]  ret_from_fork_asm+0x1a/0x30
[   26.753722]  </TASK>
[   26.753736] 
[   26.761260] Allocated by task 313:
[   26.761483]  kasan_save_stack+0x45/0x70
[   26.761716]  kasan_save_track+0x18/0x40
[   26.761979]  kasan_save_alloc_info+0x3b/0x50
[   26.762216]  __kasan_kmalloc+0xb7/0xc0
[   26.762405]  __kmalloc_cache_noprof+0x189/0x420
[   26.762718]  kasan_atomics+0x95/0x310
[   26.762951]  kunit_try_run_case+0x1a5/0x480
[   26.763095]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.763344]  kthread+0x337/0x6f0
[   26.763604]  ret_from_fork+0x116/0x1d0
[   26.763839]  ret_from_fork_asm+0x1a/0x30
[   26.764040] 
[   26.764135] The buggy address belongs to the object at ffff88810490f900
[   26.764135]  which belongs to the cache kmalloc-64 of size 64
[   26.764727] The buggy address is located 0 bytes to the right of
[   26.764727]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.765274] 
[   26.765354] The buggy address belongs to the physical page:
[   26.765634] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.766028] flags: 0x200000000000000(node=0|zone=2)
[   26.766283] page_type: f5(slab)
[   26.766444] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.766790] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.767131] page dumped because: kasan: bad access detected
[   26.767384] 
[   26.767471] Memory state around the buggy address:
[   26.767738]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.767945]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.768148] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.768397]                                      ^
[   26.768607]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.768910]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.769350] ==================================================================
[   26.144080] ==================================================================
[   26.144410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450
[   26.144951] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.145182] 
[   26.145269] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.145334] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.145350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.145374] Call Trace:
[   26.145390]  <TASK>
[   26.145406]  dump_stack_lvl+0x73/0xb0
[   26.145436]  print_report+0xd1/0x650
[   26.145460]  ? __virt_addr_valid+0x1db/0x2d0
[   26.145484]  ? kasan_atomics_helper+0x1217/0x5450
[   26.145508]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.145544]  ? kasan_atomics_helper+0x1217/0x5450
[   26.145567]  kasan_report+0x141/0x180
[   26.145591]  ? kasan_atomics_helper+0x1217/0x5450
[   26.145654]  kasan_check_range+0x10c/0x1c0
[   26.145681]  __kasan_check_write+0x18/0x20
[   26.145706]  kasan_atomics_helper+0x1217/0x5450
[   26.145745]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.145769]  ? kasan_save_alloc_info+0x3b/0x50
[   26.145798]  kasan_atomics+0x1dc/0x310
[   26.145822]  ? __pfx_kasan_atomics+0x10/0x10
[   26.145847]  ? __pfx_read_tsc+0x10/0x10
[   26.145870]  ? ktime_get_ts64+0x86/0x230
[   26.145896]  kunit_try_run_case+0x1a5/0x480
[   26.145922]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.145947]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.145971]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.145994]  ? __kthread_parkme+0x82/0x180
[   26.146016]  ? preempt_count_sub+0x50/0x80
[   26.146041]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.146068]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.146094]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.146120]  kthread+0x337/0x6f0
[   26.146141]  ? trace_preempt_on+0x20/0xc0
[   26.146165]  ? __pfx_kthread+0x10/0x10
[   26.146187]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.146213]  ? calculate_sigpending+0x7b/0xa0
[   26.146238]  ? __pfx_kthread+0x10/0x10
[   26.146261]  ret_from_fork+0x116/0x1d0
[   26.146281]  ? __pfx_kthread+0x10/0x10
[   26.146304]  ret_from_fork_asm+0x1a/0x30
[   26.146377]  </TASK>
[   26.146391] 
[   26.154242] Allocated by task 313:
[   26.154389]  kasan_save_stack+0x45/0x70
[   26.154529]  kasan_save_track+0x18/0x40
[   26.154659]  kasan_save_alloc_info+0x3b/0x50
[   26.154802]  __kasan_kmalloc+0xb7/0xc0
[   26.155147]  __kmalloc_cache_noprof+0x189/0x420
[   26.155389]  kasan_atomics+0x95/0x310
[   26.155592]  kunit_try_run_case+0x1a5/0x480
[   26.155804]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.156056]  kthread+0x337/0x6f0
[   26.156246]  ret_from_fork+0x116/0x1d0
[   26.156507]  ret_from_fork_asm+0x1a/0x30
[   26.156719] 
[   26.156813] The buggy address belongs to the object at ffff88810490f900
[   26.156813]  which belongs to the cache kmalloc-64 of size 64
[   26.157498] The buggy address is located 0 bytes to the right of
[   26.157498]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.158066] 
[   26.158140] The buggy address belongs to the physical page:
[   26.158320] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.158922] flags: 0x200000000000000(node=0|zone=2)
[   26.159225] page_type: f5(slab)
[   26.159460] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.159837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.160063] page dumped because: kasan: bad access detected
[   26.160230] 
[   26.160300] Memory state around the buggy address:
[   26.160477]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.160838]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.161160] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.161483]                                      ^
[   26.161717]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.162042]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.162467] ==================================================================
[   25.605084] ==================================================================
[   25.605413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450
[   25.606767] Read of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.607058] 
[   25.607159] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.607208] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.607223] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.607245] Call Trace:
[   25.607262]  <TASK>
[   25.607278]  dump_stack_lvl+0x73/0xb0
[   25.607320]  print_report+0xd1/0x650
[   25.607344]  ? __virt_addr_valid+0x1db/0x2d0
[   25.607368]  ? kasan_atomics_helper+0x4b54/0x5450
[   25.607390]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.607417]  ? kasan_atomics_helper+0x4b54/0x5450
[   25.607439]  kasan_report+0x141/0x180
[   25.607462]  ? kasan_atomics_helper+0x4b54/0x5450
[   25.607489]  __asan_report_load4_noabort+0x18/0x20
[   25.607515]  kasan_atomics_helper+0x4b54/0x5450
[   25.607538]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.607562]  ? kasan_save_alloc_info+0x3b/0x50
[   25.607591]  kasan_atomics+0x1dc/0x310
[   25.607614]  ? __pfx_kasan_atomics+0x10/0x10
[   25.607639]  ? __pfx_read_tsc+0x10/0x10
[   25.607661]  ? ktime_get_ts64+0x86/0x230
[   25.607686]  kunit_try_run_case+0x1a5/0x480
[   25.607712]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.607738]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.607760]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.607795]  ? __kthread_parkme+0x82/0x180
[   25.607817]  ? preempt_count_sub+0x50/0x80
[   25.607841]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.607867]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.607892]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.607918]  kthread+0x337/0x6f0
[   25.607939]  ? trace_preempt_on+0x20/0xc0
[   25.607962]  ? __pfx_kthread+0x10/0x10
[   25.607985]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.608009]  ? calculate_sigpending+0x7b/0xa0
[   25.608034]  ? __pfx_kthread+0x10/0x10
[   25.608057]  ret_from_fork+0x116/0x1d0
[   25.608077]  ? __pfx_kthread+0x10/0x10
[   25.608099]  ret_from_fork_asm+0x1a/0x30
[   25.608131]  </TASK>
[   25.608144] 
[   25.615213] Allocated by task 313:
[   25.615408]  kasan_save_stack+0x45/0x70
[   25.615771]  kasan_save_track+0x18/0x40
[   25.615972]  kasan_save_alloc_info+0x3b/0x50
[   25.616177]  __kasan_kmalloc+0xb7/0xc0
[   25.616376]  __kmalloc_cache_noprof+0x189/0x420
[   25.616611]  kasan_atomics+0x95/0x310
[   25.616847]  kunit_try_run_case+0x1a5/0x480
[   25.617047]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.617278]  kthread+0x337/0x6f0
[   25.617433]  ret_from_fork+0x116/0x1d0
[   25.617606]  ret_from_fork_asm+0x1a/0x30
[   25.617964] 
[   25.618043] The buggy address belongs to the object at ffff88810490f900
[   25.618043]  which belongs to the cache kmalloc-64 of size 64
[   25.618513] The buggy address is located 0 bytes to the right of
[   25.618513]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.618947] 
[   25.619017] The buggy address belongs to the physical page:
[   25.619183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.619484] flags: 0x200000000000000(node=0|zone=2)
[   25.619836] page_type: f5(slab)
[   25.620007] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.620354] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.620831] page dumped because: kasan: bad access detected
[   25.621002] 
[   25.621068] Memory state around the buggy address:
[   25.621219]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.621541]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.622112] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.622404]                                      ^
[   25.622661]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.622947]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.623196] ==================================================================
[   25.985518] ==================================================================
[   25.986544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450
[   25.987970] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.989131] 
[   25.989501] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.989557] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.989573] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.989596] Call Trace:
[   25.989614]  <TASK>
[   25.989634]  dump_stack_lvl+0x73/0xb0
[   25.989664]  print_report+0xd1/0x650
[   25.989688]  ? __virt_addr_valid+0x1db/0x2d0
[   25.989713]  ? kasan_atomics_helper+0xe78/0x5450
[   25.989734]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.989766]  ? kasan_atomics_helper+0xe78/0x5450
[   25.989789]  kasan_report+0x141/0x180
[   25.989813]  ? kasan_atomics_helper+0xe78/0x5450
[   25.989839]  kasan_check_range+0x10c/0x1c0
[   25.989863]  __kasan_check_write+0x18/0x20
[   25.989888]  kasan_atomics_helper+0xe78/0x5450
[   25.989912]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.989935]  ? kasan_save_alloc_info+0x3b/0x50
[   25.989963]  kasan_atomics+0x1dc/0x310
[   25.989987]  ? __pfx_kasan_atomics+0x10/0x10
[   25.990011]  ? __pfx_read_tsc+0x10/0x10
[   25.990034]  ? ktime_get_ts64+0x86/0x230
[   25.990059]  kunit_try_run_case+0x1a5/0x480
[   25.990085]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.990109]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.990132]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.990155]  ? __kthread_parkme+0x82/0x180
[   25.990177]  ? preempt_count_sub+0x50/0x80
[   25.990201]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.990227]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.990252]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.990278]  kthread+0x337/0x6f0
[   25.990299]  ? trace_preempt_on+0x20/0xc0
[   25.990333]  ? __pfx_kthread+0x10/0x10
[   25.990355]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.990380]  ? calculate_sigpending+0x7b/0xa0
[   25.990405]  ? __pfx_kthread+0x10/0x10
[   25.990427]  ret_from_fork+0x116/0x1d0
[   25.990446]  ? __pfx_kthread+0x10/0x10
[   25.990469]  ret_from_fork_asm+0x1a/0x30
[   25.990500]  </TASK>
[   25.990513] 
[   26.002155] Allocated by task 313:
[   26.002323]  kasan_save_stack+0x45/0x70
[   26.002562]  kasan_save_track+0x18/0x40
[   26.002999]  kasan_save_alloc_info+0x3b/0x50
[   26.003185]  __kasan_kmalloc+0xb7/0xc0
[   26.003329]  __kmalloc_cache_noprof+0x189/0x420
[   26.003502]  kasan_atomics+0x95/0x310
[   26.003776]  kunit_try_run_case+0x1a5/0x480
[   26.004056]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.004327]  kthread+0x337/0x6f0
[   26.004501]  ret_from_fork+0x116/0x1d0
[   26.004648]  ret_from_fork_asm+0x1a/0x30
[   26.004916] 
[   26.004998] The buggy address belongs to the object at ffff88810490f900
[   26.004998]  which belongs to the cache kmalloc-64 of size 64
[   26.005560] The buggy address is located 0 bytes to the right of
[   26.005560]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.006113] 
[   26.006224] The buggy address belongs to the physical page:
[   26.006470] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.006845] flags: 0x200000000000000(node=0|zone=2)
[   26.007089] page_type: f5(slab)
[   26.007252] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.007639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.007970] page dumped because: kasan: bad access detected
[   26.008387] 
[   26.008473] Memory state around the buggy address:
[   26.008788]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.009122]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.009390] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.009844]                                      ^
[   26.010004]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.010245]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.010590] ==================================================================
[   26.072040] ==================================================================
[   26.072407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450
[   26.073065] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.073365] 
[   26.073463] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.073512] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.073527] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.073550] Call Trace:
[   26.073567]  <TASK>
[   26.073585]  dump_stack_lvl+0x73/0xb0
[   26.073614]  print_report+0xd1/0x650
[   26.073636]  ? __virt_addr_valid+0x1db/0x2d0
[   26.073675]  ? kasan_atomics_helper+0x1079/0x5450
[   26.073698]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.073736]  ? kasan_atomics_helper+0x1079/0x5450
[   26.073763]  kasan_report+0x141/0x180
[   26.073786]  ? kasan_atomics_helper+0x1079/0x5450
[   26.073813]  kasan_check_range+0x10c/0x1c0
[   26.073846]  __kasan_check_write+0x18/0x20
[   26.073871]  kasan_atomics_helper+0x1079/0x5450
[   26.073894]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.073928]  ? kasan_save_alloc_info+0x3b/0x50
[   26.073958]  kasan_atomics+0x1dc/0x310
[   26.073981]  ? __pfx_kasan_atomics+0x10/0x10
[   26.074014]  ? __pfx_read_tsc+0x10/0x10
[   26.074037]  ? ktime_get_ts64+0x86/0x230
[   26.074063]  kunit_try_run_case+0x1a5/0x480
[   26.074101]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.074125]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.074158]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.074181]  ? __kthread_parkme+0x82/0x180
[   26.074203]  ? preempt_count_sub+0x50/0x80
[   26.074237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.074263]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.074289]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.074323]  kthread+0x337/0x6f0
[   26.074344]  ? trace_preempt_on+0x20/0xc0
[   26.074368]  ? __pfx_kthread+0x10/0x10
[   26.074389]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.074415]  ? calculate_sigpending+0x7b/0xa0
[   26.074440]  ? __pfx_kthread+0x10/0x10
[   26.074462]  ret_from_fork+0x116/0x1d0
[   26.074483]  ? __pfx_kthread+0x10/0x10
[   26.074504]  ret_from_fork_asm+0x1a/0x30
[   26.074536]  </TASK>
[   26.074548] 
[   26.081442] Allocated by task 313:
[   26.081768]  kasan_save_stack+0x45/0x70
[   26.082180]  kasan_save_track+0x18/0x40
[   26.082344]  kasan_save_alloc_info+0x3b/0x50
[   26.082539]  __kasan_kmalloc+0xb7/0xc0
[   26.082668]  __kmalloc_cache_noprof+0x189/0x420
[   26.082816]  kasan_atomics+0x95/0x310
[   26.082966]  kunit_try_run_case+0x1a5/0x480
[   26.083172]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.083433]  kthread+0x337/0x6f0
[   26.083598]  ret_from_fork+0x116/0x1d0
[   26.083789]  ret_from_fork_asm+0x1a/0x30
[   26.084085] 
[   26.084164] The buggy address belongs to the object at ffff88810490f900
[   26.084164]  which belongs to the cache kmalloc-64 of size 64
[   26.084767] The buggy address is located 0 bytes to the right of
[   26.084767]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.085314] 
[   26.085421] The buggy address belongs to the physical page:
[   26.085687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.086013] flags: 0x200000000000000(node=0|zone=2)
[   26.086255] page_type: f5(slab)
[   26.086425] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.086755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.087032] page dumped because: kasan: bad access detected
[   26.087198] 
[   26.087263] Memory state around the buggy address:
[   26.087505]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.087820]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.088131] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.088402]                                      ^
[   26.088610]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.088937]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.089218] ==================================================================
[   26.480087] ==================================================================
[   26.480439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450
[   26.480843] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.481083] 
[   26.481161] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.481207] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.481221] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.481244] Call Trace:
[   26.481258]  <TASK>
[   26.481275]  dump_stack_lvl+0x73/0xb0
[   26.481301]  print_report+0xd1/0x650
[   26.481335]  ? __virt_addr_valid+0x1db/0x2d0
[   26.481358]  ? kasan_atomics_helper+0x1b22/0x5450
[   26.481380]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.481407]  ? kasan_atomics_helper+0x1b22/0x5450
[   26.481430]  kasan_report+0x141/0x180
[   26.481452]  ? kasan_atomics_helper+0x1b22/0x5450
[   26.481478]  kasan_check_range+0x10c/0x1c0
[   26.481503]  __kasan_check_write+0x18/0x20
[   26.481527]  kasan_atomics_helper+0x1b22/0x5450
[   26.481550]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.481585]  ? kasan_save_alloc_info+0x3b/0x50
[   26.481614]  kasan_atomics+0x1dc/0x310
[   26.481637]  ? __pfx_kasan_atomics+0x10/0x10
[   26.481662]  ? __pfx_read_tsc+0x10/0x10
[   26.481684]  ? ktime_get_ts64+0x86/0x230
[   26.481709]  kunit_try_run_case+0x1a5/0x480
[   26.481734]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.481765]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.481788]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.481811]  ? __kthread_parkme+0x82/0x180
[   26.481832]  ? preempt_count_sub+0x50/0x80
[   26.481857]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.481886]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.481912]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.481939]  kthread+0x337/0x6f0
[   26.481960]  ? trace_preempt_on+0x20/0xc0
[   26.481983]  ? __pfx_kthread+0x10/0x10
[   26.482005]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.482031]  ? calculate_sigpending+0x7b/0xa0
[   26.482058]  ? __pfx_kthread+0x10/0x10
[   26.482083]  ret_from_fork+0x116/0x1d0
[   26.482104]  ? __pfx_kthread+0x10/0x10
[   26.482126]  ret_from_fork_asm+0x1a/0x30
[   26.482157]  </TASK>
[   26.482170] 
[   26.489362] Allocated by task 313:
[   26.489608]  kasan_save_stack+0x45/0x70
[   26.489792]  kasan_save_track+0x18/0x40
[   26.489965]  kasan_save_alloc_info+0x3b/0x50
[   26.490143]  __kasan_kmalloc+0xb7/0xc0
[   26.490321]  __kmalloc_cache_noprof+0x189/0x420
[   26.490520]  kasan_atomics+0x95/0x310
[   26.490687]  kunit_try_run_case+0x1a5/0x480
[   26.490848]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.491017]  kthread+0x337/0x6f0
[   26.491133]  ret_from_fork+0x116/0x1d0
[   26.491259]  ret_from_fork_asm+0x1a/0x30
[   26.491452] 
[   26.491600] The buggy address belongs to the object at ffff88810490f900
[   26.491600]  which belongs to the cache kmalloc-64 of size 64
[   26.492127] The buggy address is located 0 bytes to the right of
[   26.492127]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.492653] 
[   26.492722] The buggy address belongs to the physical page:
[   26.492891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.493122] flags: 0x200000000000000(node=0|zone=2)
[   26.493277] page_type: f5(slab)
[   26.493404] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.493630] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.493854] page dumped because: kasan: bad access detected
[   26.494053] 
[   26.494140] Memory state around the buggy address:
[   26.494367]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.494674]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.494981] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.495284]                                      ^
[   26.495507]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.495816]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.496047] ==================================================================
[   26.654482] ==================================================================
[   26.655273] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450
[   26.655773] Read of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.656132] 
[   26.656456] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.656518] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.656533] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.656557] Call Trace:
[   26.656580]  <TASK>
[   26.656600]  dump_stack_lvl+0x73/0xb0
[   26.656631]  print_report+0xd1/0x650
[   26.656656]  ? __virt_addr_valid+0x1db/0x2d0
[   26.656682]  ? kasan_atomics_helper+0x4f71/0x5450
[   26.656704]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.656730]  ? kasan_atomics_helper+0x4f71/0x5450
[   26.656754]  kasan_report+0x141/0x180
[   26.656776]  ? kasan_atomics_helper+0x4f71/0x5450
[   26.656804]  __asan_report_load8_noabort+0x18/0x20
[   26.656828]  kasan_atomics_helper+0x4f71/0x5450
[   26.656852]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.656876]  ? kasan_save_alloc_info+0x3b/0x50
[   26.656905]  kasan_atomics+0x1dc/0x310
[   26.656928]  ? __pfx_kasan_atomics+0x10/0x10
[   26.656953]  ? __pfx_read_tsc+0x10/0x10
[   26.656976]  ? ktime_get_ts64+0x86/0x230
[   26.657002]  kunit_try_run_case+0x1a5/0x480
[   26.657028]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.657054]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.657079]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.657103]  ? __kthread_parkme+0x82/0x180
[   26.657124]  ? preempt_count_sub+0x50/0x80
[   26.657149]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.657176]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.657201]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.657227]  kthread+0x337/0x6f0
[   26.657248]  ? trace_preempt_on+0x20/0xc0
[   26.657273]  ? __pfx_kthread+0x10/0x10
[   26.657295]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.657332]  ? calculate_sigpending+0x7b/0xa0
[   26.657358]  ? __pfx_kthread+0x10/0x10
[   26.657381]  ret_from_fork+0x116/0x1d0
[   26.657402]  ? __pfx_kthread+0x10/0x10
[   26.657424]  ret_from_fork_asm+0x1a/0x30
[   26.657456]  </TASK>
[   26.657470] 
[   26.666797] Allocated by task 313:
[   26.666988]  kasan_save_stack+0x45/0x70
[   26.667181]  kasan_save_track+0x18/0x40
[   26.667917]  kasan_save_alloc_info+0x3b/0x50
[   26.668113]  __kasan_kmalloc+0xb7/0xc0
[   26.668302]  __kmalloc_cache_noprof+0x189/0x420
[   26.668744]  kasan_atomics+0x95/0x310
[   26.668942]  kunit_try_run_case+0x1a5/0x480
[   26.669278]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.669658]  kthread+0x337/0x6f0
[   26.669816]  ret_from_fork+0x116/0x1d0
[   26.670120]  ret_from_fork_asm+0x1a/0x30
[   26.670323] 
[   26.670591] The buggy address belongs to the object at ffff88810490f900
[   26.670591]  which belongs to the cache kmalloc-64 of size 64
[   26.671171] The buggy address is located 0 bytes to the right of
[   26.671171]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.671774] 
[   26.672082] The buggy address belongs to the physical page:
[   26.672329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.672761] flags: 0x200000000000000(node=0|zone=2)
[   26.673062] page_type: f5(slab)
[   26.673204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.673525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.673972] page dumped because: kasan: bad access detected
[   26.674283] 
[   26.674366] Memory state around the buggy address:
[   26.674614]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.675156]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.675529] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.675952]                                      ^
[   26.676156]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.676586]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.676828] ==================================================================
[   26.463157] ==================================================================
[   26.463432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450
[   26.463783] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.464002] 
[   26.464081] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.464127] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.464141] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.464164] Call Trace:
[   26.464180]  <TASK>
[   26.464197]  dump_stack_lvl+0x73/0xb0
[   26.464224]  print_report+0xd1/0x650
[   26.464246]  ? __virt_addr_valid+0x1db/0x2d0
[   26.464270]  ? kasan_atomics_helper+0x1a7f/0x5450
[   26.464291]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.464330]  ? kasan_atomics_helper+0x1a7f/0x5450
[   26.464353]  kasan_report+0x141/0x180
[   26.464375]  ? kasan_atomics_helper+0x1a7f/0x5450
[   26.464402]  kasan_check_range+0x10c/0x1c0
[   26.464427]  __kasan_check_write+0x18/0x20
[   26.464451]  kasan_atomics_helper+0x1a7f/0x5450
[   26.464474]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.464498]  ? kasan_save_alloc_info+0x3b/0x50
[   26.464540]  kasan_atomics+0x1dc/0x310
[   26.464563]  ? __pfx_kasan_atomics+0x10/0x10
[   26.464587]  ? __pfx_read_tsc+0x10/0x10
[   26.464610]  ? ktime_get_ts64+0x86/0x230
[   26.464635]  kunit_try_run_case+0x1a5/0x480
[   26.464660]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.464685]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.464707]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.464730]  ? __kthread_parkme+0x82/0x180
[   26.464751]  ? preempt_count_sub+0x50/0x80
[   26.464775]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.464801]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.464826]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.464852]  kthread+0x337/0x6f0
[   26.464873]  ? trace_preempt_on+0x20/0xc0
[   26.464896]  ? __pfx_kthread+0x10/0x10
[   26.464918]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.464943]  ? calculate_sigpending+0x7b/0xa0
[   26.464968]  ? __pfx_kthread+0x10/0x10
[   26.464990]  ret_from_fork+0x116/0x1d0
[   26.465010]  ? __pfx_kthread+0x10/0x10
[   26.465031]  ret_from_fork_asm+0x1a/0x30
[   26.465063]  </TASK>
[   26.465075] 
[   26.471928] Allocated by task 313:
[   26.472050]  kasan_save_stack+0x45/0x70
[   26.472249]  kasan_save_track+0x18/0x40
[   26.472606]  kasan_save_alloc_info+0x3b/0x50
[   26.472811]  __kasan_kmalloc+0xb7/0xc0
[   26.472992]  __kmalloc_cache_noprof+0x189/0x420
[   26.473205]  kasan_atomics+0x95/0x310
[   26.473393]  kunit_try_run_case+0x1a5/0x480
[   26.473565]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.473741]  kthread+0x337/0x6f0
[   26.473856]  ret_from_fork+0x116/0x1d0
[   26.473983]  ret_from_fork_asm+0x1a/0x30
[   26.474116] 
[   26.474181] The buggy address belongs to the object at ffff88810490f900
[   26.474181]  which belongs to the cache kmalloc-64 of size 64
[   26.475033] The buggy address is located 0 bytes to the right of
[   26.475033]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.475693] 
[   26.475763] The buggy address belongs to the physical page:
[   26.475996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.476324] flags: 0x200000000000000(node=0|zone=2)
[   26.476558] page_type: f5(slab)
[   26.476684] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.476986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.477281] page dumped because: kasan: bad access detected
[   26.477505] 
[   26.477595] Memory state around the buggy address:
[   26.477788]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.478072]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.478281] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.478746]                                      ^
[   26.478966]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.479218]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.479436] ==================================================================
[   25.709898] ==================================================================
[   25.710179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450
[   25.710472] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.710778] 
[   25.710860] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.710908] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.710922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.710945] Call Trace:
[   25.710980]  <TASK>
[   25.710997]  dump_stack_lvl+0x73/0xb0
[   25.711025]  print_report+0xd1/0x650
[   25.711048]  ? __virt_addr_valid+0x1db/0x2d0
[   25.711071]  ? kasan_atomics_helper+0x697/0x5450
[   25.711093]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.711120]  ? kasan_atomics_helper+0x697/0x5450
[   25.711143]  kasan_report+0x141/0x180
[   25.711166]  ? kasan_atomics_helper+0x697/0x5450
[   25.711193]  kasan_check_range+0x10c/0x1c0
[   25.711218]  __kasan_check_write+0x18/0x20
[   25.711242]  kasan_atomics_helper+0x697/0x5450
[   25.711265]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.711289]  ? kasan_save_alloc_info+0x3b/0x50
[   25.711330]  kasan_atomics+0x1dc/0x310
[   25.711354]  ? __pfx_kasan_atomics+0x10/0x10
[   25.711378]  ? __pfx_read_tsc+0x10/0x10
[   25.711400]  ? ktime_get_ts64+0x86/0x230
[   25.711425]  kunit_try_run_case+0x1a5/0x480
[   25.711451]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.711476]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.711511]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.711535]  ? __kthread_parkme+0x82/0x180
[   25.711558]  ? preempt_count_sub+0x50/0x80
[   25.711583]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.711609]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.711636]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.711662]  kthread+0x337/0x6f0
[   25.711692]  ? trace_preempt_on+0x20/0xc0
[   25.711716]  ? __pfx_kthread+0x10/0x10
[   25.711738]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.711764]  ? calculate_sigpending+0x7b/0xa0
[   25.711789]  ? __pfx_kthread+0x10/0x10
[   25.711812]  ret_from_fork+0x116/0x1d0
[   25.711832]  ? __pfx_kthread+0x10/0x10
[   25.711856]  ret_from_fork_asm+0x1a/0x30
[   25.711888]  </TASK>
[   25.711901] 
[   25.719587] Allocated by task 313:
[   25.719711]  kasan_save_stack+0x45/0x70
[   25.719872]  kasan_save_track+0x18/0x40
[   25.720063]  kasan_save_alloc_info+0x3b/0x50
[   25.720264]  __kasan_kmalloc+0xb7/0xc0
[   25.720450]  __kmalloc_cache_noprof+0x189/0x420
[   25.720658]  kasan_atomics+0x95/0x310
[   25.720836]  kunit_try_run_case+0x1a5/0x480
[   25.720979]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.721145]  kthread+0x337/0x6f0
[   25.721403]  ret_from_fork+0x116/0x1d0
[   25.721922]  ret_from_fork_asm+0x1a/0x30
[   25.722097] 
[   25.722178] The buggy address belongs to the object at ffff88810490f900
[   25.722178]  which belongs to the cache kmalloc-64 of size 64
[   25.722530] The buggy address is located 0 bytes to the right of
[   25.722530]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.723408] 
[   25.723476] The buggy address belongs to the physical page:
[   25.723640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.723864] flags: 0x200000000000000(node=0|zone=2)
[   25.724014] page_type: f5(slab)
[   25.724233] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.724587] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.724919] page dumped because: kasan: bad access detected
[   25.725170] 
[   25.725261] Memory state around the buggy address:
[   25.725490]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.725935]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.726154] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.726458]                                      ^
[   25.726820]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.727034]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.727242] ==================================================================
[   25.526162] ==================================================================
[   25.526497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450
[   25.527188] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.527449] 
[   25.527596] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.527643] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.527655] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.527719] Call Trace:
[   25.527736]  <TASK>
[   25.527751]  dump_stack_lvl+0x73/0xb0
[   25.527779]  print_report+0xd1/0x650
[   25.527801]  ? __virt_addr_valid+0x1db/0x2d0
[   25.527824]  ? kasan_atomics_helper+0x4ba2/0x5450
[   25.527844]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.527870]  ? kasan_atomics_helper+0x4ba2/0x5450
[   25.527891]  kasan_report+0x141/0x180
[   25.527913]  ? kasan_atomics_helper+0x4ba2/0x5450
[   25.527938]  __asan_report_store4_noabort+0x1b/0x30
[   25.527963]  kasan_atomics_helper+0x4ba2/0x5450
[   25.527984]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.528007]  ? kasan_save_alloc_info+0x3b/0x50
[   25.528034]  kasan_atomics+0x1dc/0x310
[   25.528056]  ? __pfx_kasan_atomics+0x10/0x10
[   25.528080]  ? __pfx_read_tsc+0x10/0x10
[   25.528101]  ? ktime_get_ts64+0x86/0x230
[   25.528125]  kunit_try_run_case+0x1a5/0x480
[   25.528150]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.528172]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.528194]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.528215]  ? __kthread_parkme+0x82/0x180
[   25.528235]  ? preempt_count_sub+0x50/0x80
[   25.528258]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.528282]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.528319]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.528343]  kthread+0x337/0x6f0
[   25.528362]  ? trace_preempt_on+0x20/0xc0
[   25.528386]  ? __pfx_kthread+0x10/0x10
[   25.528407]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.528432]  ? calculate_sigpending+0x7b/0xa0
[   25.528456]  ? __pfx_kthread+0x10/0x10
[   25.528477]  ret_from_fork+0x116/0x1d0
[   25.528497]  ? __pfx_kthread+0x10/0x10
[   25.528518]  ret_from_fork_asm+0x1a/0x30
[   25.528550]  </TASK>
[   25.528561] 
[   25.535678] Allocated by task 313:
[   25.535850]  kasan_save_stack+0x45/0x70
[   25.536059]  kasan_save_track+0x18/0x40
[   25.536241]  kasan_save_alloc_info+0x3b/0x50
[   25.536443]  __kasan_kmalloc+0xb7/0xc0
[   25.536566]  __kmalloc_cache_noprof+0x189/0x420
[   25.536710]  kasan_atomics+0x95/0x310
[   25.536832]  kunit_try_run_case+0x1a5/0x480
[   25.537279]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.537614]  kthread+0x337/0x6f0
[   25.537807]  ret_from_fork+0x116/0x1d0
[   25.538149]  ret_from_fork_asm+0x1a/0x30
[   25.538420] 
[   25.538680] The buggy address belongs to the object at ffff88810490f900
[   25.538680]  which belongs to the cache kmalloc-64 of size 64
[   25.539161] The buggy address is located 0 bytes to the right of
[   25.539161]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.540002] 
[   25.540111] The buggy address belongs to the physical page:
[   25.540329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.540823] flags: 0x200000000000000(node=0|zone=2)
[   25.540993] page_type: f5(slab)
[   25.541110] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.541349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.541839] page dumped because: kasan: bad access detected
[   25.542128] 
[   25.542192] Memory state around the buggy address:
[   25.542350]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.542560]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.542947] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.543289]                                      ^
[   25.543524]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.543843]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.544153] ==================================================================
[   25.745735] ==================================================================
[   25.746097] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450
[   25.746945] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.747260] 
[   25.747407] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.747456] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.747471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.747502] Call Trace:
[   25.747515]  <TASK>
[   25.747532]  dump_stack_lvl+0x73/0xb0
[   25.747561]  print_report+0xd1/0x650
[   25.747585]  ? __virt_addr_valid+0x1db/0x2d0
[   25.747609]  ? kasan_atomics_helper+0x7c7/0x5450
[   25.747632]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.747660]  ? kasan_atomics_helper+0x7c7/0x5450
[   25.747721]  kasan_report+0x141/0x180
[   25.747747]  ? kasan_atomics_helper+0x7c7/0x5450
[   25.747774]  kasan_check_range+0x10c/0x1c0
[   25.747799]  __kasan_check_write+0x18/0x20
[   25.747822]  kasan_atomics_helper+0x7c7/0x5450
[   25.747846]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.747870]  ? kasan_save_alloc_info+0x3b/0x50
[   25.747899]  kasan_atomics+0x1dc/0x310
[   25.747923]  ? __pfx_kasan_atomics+0x10/0x10
[   25.747948]  ? __pfx_read_tsc+0x10/0x10
[   25.747970]  ? ktime_get_ts64+0x86/0x230
[   25.747995]  kunit_try_run_case+0x1a5/0x480
[   25.748022]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.748047]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.748070]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.748094]  ? __kthread_parkme+0x82/0x180
[   25.748116]  ? preempt_count_sub+0x50/0x80
[   25.748140]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.748167]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.748193]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.748220]  kthread+0x337/0x6f0
[   25.748241]  ? trace_preempt_on+0x20/0xc0
[   25.748265]  ? __pfx_kthread+0x10/0x10
[   25.748287]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.748326]  ? calculate_sigpending+0x7b/0xa0
[   25.748351]  ? __pfx_kthread+0x10/0x10
[   25.748374]  ret_from_fork+0x116/0x1d0
[   25.748395]  ? __pfx_kthread+0x10/0x10
[   25.748417]  ret_from_fork_asm+0x1a/0x30
[   25.748448]  </TASK>
[   25.748462] 
[   25.756009] Allocated by task 313:
[   25.756174]  kasan_save_stack+0x45/0x70
[   25.756388]  kasan_save_track+0x18/0x40
[   25.756583]  kasan_save_alloc_info+0x3b/0x50
[   25.756842]  __kasan_kmalloc+0xb7/0xc0
[   25.756979]  __kmalloc_cache_noprof+0x189/0x420
[   25.757131]  kasan_atomics+0x95/0x310
[   25.757259]  kunit_try_run_case+0x1a5/0x480
[   25.757413]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.758064]  kthread+0x337/0x6f0
[   25.758257]  ret_from_fork+0x116/0x1d0
[   25.758456]  ret_from_fork_asm+0x1a/0x30
[   25.758649] 
[   25.758793] The buggy address belongs to the object at ffff88810490f900
[   25.758793]  which belongs to the cache kmalloc-64 of size 64
[   25.759331] The buggy address is located 0 bytes to the right of
[   25.759331]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.759927] 
[   25.760021] The buggy address belongs to the physical page:
[   25.760252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.760623] flags: 0x200000000000000(node=0|zone=2)
[   25.760902] page_type: f5(slab)
[   25.761070] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.761384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.761772] page dumped because: kasan: bad access detected
[   25.761994] 
[   25.762071] Memory state around the buggy address:
[   25.762260]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.762486]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.762700] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.763211]                                      ^
[   25.763468]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.763787]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.764073] ==================================================================
[   26.125023] ==================================================================
[   26.125789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450
[   26.126077] Read of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.126294] 
[   26.126387] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.126437] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.126452] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.126475] Call Trace:
[   26.126492]  <TASK>
[   26.126509]  dump_stack_lvl+0x73/0xb0
[   26.126537]  print_report+0xd1/0x650
[   26.126559]  ? __virt_addr_valid+0x1db/0x2d0
[   26.126583]  ? kasan_atomics_helper+0x4a02/0x5450
[   26.126630]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.126657]  ? kasan_atomics_helper+0x4a02/0x5450
[   26.126692]  kasan_report+0x141/0x180
[   26.126715]  ? kasan_atomics_helper+0x4a02/0x5450
[   26.126742]  __asan_report_load4_noabort+0x18/0x20
[   26.126768]  kasan_atomics_helper+0x4a02/0x5450
[   26.126791]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.126815]  ? kasan_save_alloc_info+0x3b/0x50
[   26.126843]  kasan_atomics+0x1dc/0x310
[   26.126868]  ? __pfx_kasan_atomics+0x10/0x10
[   26.126893]  ? __pfx_read_tsc+0x10/0x10
[   26.126916]  ? ktime_get_ts64+0x86/0x230
[   26.126941]  kunit_try_run_case+0x1a5/0x480
[   26.126976]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.127001]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.127024]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.127058]  ? __kthread_parkme+0x82/0x180
[   26.127080]  ? preempt_count_sub+0x50/0x80
[   26.127104]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.127130]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.127156]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.127182]  kthread+0x337/0x6f0
[   26.127203]  ? trace_preempt_on+0x20/0xc0
[   26.127227]  ? __pfx_kthread+0x10/0x10
[   26.127248]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.127274]  ? calculate_sigpending+0x7b/0xa0
[   26.127299]  ? __pfx_kthread+0x10/0x10
[   26.127334]  ret_from_fork+0x116/0x1d0
[   26.127355]  ? __pfx_kthread+0x10/0x10
[   26.127377]  ret_from_fork_asm+0x1a/0x30
[   26.127408]  </TASK>
[   26.127422] 
[   26.135294] Allocated by task 313:
[   26.135457]  kasan_save_stack+0x45/0x70
[   26.135680]  kasan_save_track+0x18/0x40
[   26.135845]  kasan_save_alloc_info+0x3b/0x50
[   26.136054]  __kasan_kmalloc+0xb7/0xc0
[   26.136230]  __kmalloc_cache_noprof+0x189/0x420
[   26.136447]  kasan_atomics+0x95/0x310
[   26.136652]  kunit_try_run_case+0x1a5/0x480
[   26.136836]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.137139]  kthread+0x337/0x6f0
[   26.137270]  ret_from_fork+0x116/0x1d0
[   26.137404]  ret_from_fork_asm+0x1a/0x30
[   26.137538] 
[   26.137603] The buggy address belongs to the object at ffff88810490f900
[   26.137603]  which belongs to the cache kmalloc-64 of size 64
[   26.137938] The buggy address is located 0 bytes to the right of
[   26.137938]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.138282] 
[   26.138378] The buggy address belongs to the physical page:
[   26.138618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.139007] flags: 0x200000000000000(node=0|zone=2)
[   26.139233] page_type: f5(slab)
[   26.139400] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.140079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.140419] page dumped because: kasan: bad access detected
[   26.140799] 
[   26.140878] Memory state around the buggy address:
[   26.141025]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.141230]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.141445] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.141760]                                      ^
[   26.142030]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.142439]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.142815] ==================================================================
[   26.247758] ==================================================================
[   26.248400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450
[   26.248939] Read of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.249449] 
[   26.249558] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.249607] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.249622] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.249645] Call Trace:
[   26.249665]  <TASK>
[   26.249683]  dump_stack_lvl+0x73/0xb0
[   26.249716]  print_report+0xd1/0x650
[   26.249744]  ? __virt_addr_valid+0x1db/0x2d0
[   26.249768]  ? kasan_atomics_helper+0x4eae/0x5450
[   26.249791]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.249818]  ? kasan_atomics_helper+0x4eae/0x5450
[   26.249840]  kasan_report+0x141/0x180
[   26.249864]  ? kasan_atomics_helper+0x4eae/0x5450
[   26.249891]  __asan_report_load8_noabort+0x18/0x20
[   26.249917]  kasan_atomics_helper+0x4eae/0x5450
[   26.249940]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.249965]  ? kasan_save_alloc_info+0x3b/0x50
[   26.249994]  kasan_atomics+0x1dc/0x310
[   26.250018]  ? __pfx_kasan_atomics+0x10/0x10
[   26.250043]  ? __pfx_read_tsc+0x10/0x10
[   26.250065]  ? ktime_get_ts64+0x86/0x230
[   26.250092]  kunit_try_run_case+0x1a5/0x480
[   26.250118]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.250143]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.250166]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.250190]  ? __kthread_parkme+0x82/0x180
[   26.250212]  ? preempt_count_sub+0x50/0x80
[   26.250236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.250263]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.250288]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.250346]  kthread+0x337/0x6f0
[   26.250368]  ? trace_preempt_on+0x20/0xc0
[   26.250393]  ? __pfx_kthread+0x10/0x10
[   26.250415]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.250441]  ? calculate_sigpending+0x7b/0xa0
[   26.250467]  ? __pfx_kthread+0x10/0x10
[   26.250508]  ret_from_fork+0x116/0x1d0
[   26.250528]  ? __pfx_kthread+0x10/0x10
[   26.250560]  ret_from_fork_asm+0x1a/0x30
[   26.250592]  </TASK>
[   26.250605] 
[   26.257599] Allocated by task 313:
[   26.257783]  kasan_save_stack+0x45/0x70
[   26.257983]  kasan_save_track+0x18/0x40
[   26.258167]  kasan_save_alloc_info+0x3b/0x50
[   26.258363]  __kasan_kmalloc+0xb7/0xc0
[   26.258582]  __kmalloc_cache_noprof+0x189/0x420
[   26.258781]  kasan_atomics+0x95/0x310
[   26.258965]  kunit_try_run_case+0x1a5/0x480
[   26.259159]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.259386]  kthread+0x337/0x6f0
[   26.259594]  ret_from_fork+0x116/0x1d0
[   26.259755]  ret_from_fork_asm+0x1a/0x30
[   26.259928] 
[   26.260019] The buggy address belongs to the object at ffff88810490f900
[   26.260019]  which belongs to the cache kmalloc-64 of size 64
[   26.260452] The buggy address is located 0 bytes to the right of
[   26.260452]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.260845] 
[   26.260939] The buggy address belongs to the physical page:
[   26.261204] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.261599] flags: 0x200000000000000(node=0|zone=2)
[   26.261807] page_type: f5(slab)
[   26.261924] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.262150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.262430] page dumped because: kasan: bad access detected
[   26.262707] 
[   26.262824] Memory state around the buggy address:
[   26.263069]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.263416]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.263766] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.264010]                                      ^
[   26.264254]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.264587]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.264886] ==================================================================
[   25.727613] ==================================================================
[   25.727992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450
[   25.728473] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.728994] 
[   25.729367] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.729421] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.729436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.729459] Call Trace:
[   25.729477]  <TASK>
[   25.729495]  dump_stack_lvl+0x73/0xb0
[   25.729523]  print_report+0xd1/0x650
[   25.729546]  ? __virt_addr_valid+0x1db/0x2d0
[   25.729570]  ? kasan_atomics_helper+0x72f/0x5450
[   25.729592]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.729620]  ? kasan_atomics_helper+0x72f/0x5450
[   25.729643]  kasan_report+0x141/0x180
[   25.729666]  ? kasan_atomics_helper+0x72f/0x5450
[   25.729693]  kasan_check_range+0x10c/0x1c0
[   25.729718]  __kasan_check_write+0x18/0x20
[   25.729746]  kasan_atomics_helper+0x72f/0x5450
[   25.729820]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.729844]  ? kasan_save_alloc_info+0x3b/0x50
[   25.729873]  kasan_atomics+0x1dc/0x310
[   25.729896]  ? __pfx_kasan_atomics+0x10/0x10
[   25.729921]  ? __pfx_read_tsc+0x10/0x10
[   25.729944]  ? ktime_get_ts64+0x86/0x230
[   25.729968]  kunit_try_run_case+0x1a5/0x480
[   25.729994]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.730019]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.730042]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.730065]  ? __kthread_parkme+0x82/0x180
[   25.730086]  ? preempt_count_sub+0x50/0x80
[   25.730110]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.730137]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.730163]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.730189]  kthread+0x337/0x6f0
[   25.730210]  ? trace_preempt_on+0x20/0xc0
[   25.730233]  ? __pfx_kthread+0x10/0x10
[   25.730255]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.730281]  ? calculate_sigpending+0x7b/0xa0
[   25.730317]  ? __pfx_kthread+0x10/0x10
[   25.730342]  ret_from_fork+0x116/0x1d0
[   25.730362]  ? __pfx_kthread+0x10/0x10
[   25.730384]  ret_from_fork_asm+0x1a/0x30
[   25.730416]  </TASK>
[   25.730428] 
[   25.737992] Allocated by task 313:
[   25.738166]  kasan_save_stack+0x45/0x70
[   25.738337]  kasan_save_track+0x18/0x40
[   25.738465]  kasan_save_alloc_info+0x3b/0x50
[   25.738667]  __kasan_kmalloc+0xb7/0xc0
[   25.738862]  __kmalloc_cache_noprof+0x189/0x420
[   25.739072]  kasan_atomics+0x95/0x310
[   25.739240]  kunit_try_run_case+0x1a5/0x480
[   25.739418]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.739766]  kthread+0x337/0x6f0
[   25.739900]  ret_from_fork+0x116/0x1d0
[   25.740074]  ret_from_fork_asm+0x1a/0x30
[   25.740234] 
[   25.740322] The buggy address belongs to the object at ffff88810490f900
[   25.740322]  which belongs to the cache kmalloc-64 of size 64
[   25.740819] The buggy address is located 0 bytes to the right of
[   25.740819]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.741276] 
[   25.741592] The buggy address belongs to the physical page:
[   25.742045] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.742330] flags: 0x200000000000000(node=0|zone=2)
[   25.742649] page_type: f5(slab)
[   25.742808] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.743085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.743373] page dumped because: kasan: bad access detected
[   25.743601] 
[   25.743671] Memory state around the buggy address:
[   25.743890]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.744153]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.744439] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.744740]                                      ^
[   25.744884]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.745084]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.745283] ==================================================================
[   26.677663] ==================================================================
[   26.678347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450
[   26.678786] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.679171] 
[   26.679504] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.679578] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.679593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.679620] Call Trace:
[   26.679642]  <TASK>
[   26.679664]  dump_stack_lvl+0x73/0xb0
[   26.679696]  print_report+0xd1/0x650
[   26.679720]  ? __virt_addr_valid+0x1db/0x2d0
[   26.679745]  ? kasan_atomics_helper+0x2006/0x5450
[   26.679768]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.679795]  ? kasan_atomics_helper+0x2006/0x5450
[   26.679817]  kasan_report+0x141/0x180
[   26.679841]  ? kasan_atomics_helper+0x2006/0x5450
[   26.679867]  kasan_check_range+0x10c/0x1c0
[   26.679892]  __kasan_check_write+0x18/0x20
[   26.679915]  kasan_atomics_helper+0x2006/0x5450
[   26.679939]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.679962]  ? kasan_save_alloc_info+0x3b/0x50
[   26.679990]  kasan_atomics+0x1dc/0x310
[   26.680015]  ? __pfx_kasan_atomics+0x10/0x10
[   26.680040]  ? __pfx_read_tsc+0x10/0x10
[   26.680063]  ? ktime_get_ts64+0x86/0x230
[   26.680089]  kunit_try_run_case+0x1a5/0x480
[   26.680115]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.680140]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.680164]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.680186]  ? __kthread_parkme+0x82/0x180
[   26.680211]  ? preempt_count_sub+0x50/0x80
[   26.680236]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.680261]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.680287]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.680322]  kthread+0x337/0x6f0
[   26.680343]  ? trace_preempt_on+0x20/0xc0
[   26.680369]  ? __pfx_kthread+0x10/0x10
[   26.680392]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.680418]  ? calculate_sigpending+0x7b/0xa0
[   26.680446]  ? __pfx_kthread+0x10/0x10
[   26.680470]  ret_from_fork+0x116/0x1d0
[   26.680491]  ? __pfx_kthread+0x10/0x10
[   26.680513]  ret_from_fork_asm+0x1a/0x30
[   26.680547]  </TASK>
[   26.680561] 
[   26.690746] Allocated by task 313:
[   26.691028]  kasan_save_stack+0x45/0x70
[   26.691281]  kasan_save_track+0x18/0x40
[   26.691576]  kasan_save_alloc_info+0x3b/0x50
[   26.691764]  __kasan_kmalloc+0xb7/0xc0
[   26.692060]  __kmalloc_cache_noprof+0x189/0x420
[   26.692278]  kasan_atomics+0x95/0x310
[   26.692620]  kunit_try_run_case+0x1a5/0x480
[   26.692910]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.693108]  kthread+0x337/0x6f0
[   26.693403]  ret_from_fork+0x116/0x1d0
[   26.693553]  ret_from_fork_asm+0x1a/0x30
[   26.693861] 
[   26.693958] The buggy address belongs to the object at ffff88810490f900
[   26.693958]  which belongs to the cache kmalloc-64 of size 64
[   26.694549] The buggy address is located 0 bytes to the right of
[   26.694549]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.695197] 
[   26.695343] The buggy address belongs to the physical page:
[   26.695610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.696122] flags: 0x200000000000000(node=0|zone=2)
[   26.696449] page_type: f5(slab)
[   26.696643] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.697114] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.697560] page dumped because: kasan: bad access detected
[   26.697878] 
[   26.697979] Memory state around the buggy address:
[   26.698141]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.698460]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.698968] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.699330]                                      ^
[   26.699562]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.699975]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.700359] ==================================================================
[   25.905029] ==================================================================
[   25.905298] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450
[   25.905715] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.905998] 
[   25.906082] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.906131] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.906146] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.906169] Call Trace:
[   25.906188]  <TASK>
[   25.906205]  dump_stack_lvl+0x73/0xb0
[   25.906233]  print_report+0xd1/0x650
[   25.906256]  ? __virt_addr_valid+0x1db/0x2d0
[   25.906281]  ? kasan_atomics_helper+0xc70/0x5450
[   25.906303]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.906341]  ? kasan_atomics_helper+0xc70/0x5450
[   25.906364]  kasan_report+0x141/0x180
[   25.906388]  ? kasan_atomics_helper+0xc70/0x5450
[   25.906416]  kasan_check_range+0x10c/0x1c0
[   25.906441]  __kasan_check_write+0x18/0x20
[   25.906465]  kasan_atomics_helper+0xc70/0x5450
[   25.906499]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.906523]  ? kasan_save_alloc_info+0x3b/0x50
[   25.906552]  kasan_atomics+0x1dc/0x310
[   25.906576]  ? __pfx_kasan_atomics+0x10/0x10
[   25.906601]  ? __pfx_read_tsc+0x10/0x10
[   25.906625]  ? ktime_get_ts64+0x86/0x230
[   25.906651]  kunit_try_run_case+0x1a5/0x480
[   25.906679]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.906704]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.906729]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.906752]  ? __kthread_parkme+0x82/0x180
[   25.906774]  ? preempt_count_sub+0x50/0x80
[   25.906799]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.906825]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.906852]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.906882]  kthread+0x337/0x6f0
[   25.906905]  ? trace_preempt_on+0x20/0xc0
[   25.906931]  ? __pfx_kthread+0x10/0x10
[   25.906953]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.906979]  ? calculate_sigpending+0x7b/0xa0
[   25.907004]  ? __pfx_kthread+0x10/0x10
[   25.907027]  ret_from_fork+0x116/0x1d0
[   25.907048]  ? __pfx_kthread+0x10/0x10
[   25.907069]  ret_from_fork_asm+0x1a/0x30
[   25.907101]  </TASK>
[   25.907115] 
[   25.914895] Allocated by task 313:
[   25.915075]  kasan_save_stack+0x45/0x70
[   25.915277]  kasan_save_track+0x18/0x40
[   25.915443]  kasan_save_alloc_info+0x3b/0x50
[   25.915773]  __kasan_kmalloc+0xb7/0xc0
[   25.915932]  __kmalloc_cache_noprof+0x189/0x420
[   25.916120]  kasan_atomics+0x95/0x310
[   25.916274]  kunit_try_run_case+0x1a5/0x480
[   25.916466]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.916954]  kthread+0x337/0x6f0
[   25.917118]  ret_from_fork+0x116/0x1d0
[   25.917281]  ret_from_fork_asm+0x1a/0x30
[   25.917462] 
[   25.917590] The buggy address belongs to the object at ffff88810490f900
[   25.917590]  which belongs to the cache kmalloc-64 of size 64
[   25.918110] The buggy address is located 0 bytes to the right of
[   25.918110]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.918626] 
[   25.918770] The buggy address belongs to the physical page:
[   25.919011] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.919247] flags: 0x200000000000000(node=0|zone=2)
[   25.919421] page_type: f5(slab)
[   25.919572] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.920156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.920489] page dumped because: kasan: bad access detected
[   25.920878] 
[   25.920953] Memory state around the buggy address:
[   25.921104]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.921325]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.922129] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.922482]                                      ^
[   25.922668]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.923143]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.923416] ==================================================================
[   26.402191] ==================================================================
[   26.402436] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450
[   26.402701] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.402920] 
[   26.402999] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.403045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.403059] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.403083] Call Trace:
[   26.403101]  <TASK>
[   26.403119]  dump_stack_lvl+0x73/0xb0
[   26.403147]  print_report+0xd1/0x650
[   26.403169]  ? __virt_addr_valid+0x1db/0x2d0
[   26.403204]  ? kasan_atomics_helper+0x18b1/0x5450
[   26.403227]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.403255]  ? kasan_atomics_helper+0x18b1/0x5450
[   26.403277]  kasan_report+0x141/0x180
[   26.403300]  ? kasan_atomics_helper+0x18b1/0x5450
[   26.403341]  kasan_check_range+0x10c/0x1c0
[   26.403366]  __kasan_check_write+0x18/0x20
[   26.403391]  kasan_atomics_helper+0x18b1/0x5450
[   26.403414]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.403438]  ? kasan_save_alloc_info+0x3b/0x50
[   26.403468]  kasan_atomics+0x1dc/0x310
[   26.403511]  ? __pfx_kasan_atomics+0x10/0x10
[   26.403537]  ? __pfx_read_tsc+0x10/0x10
[   26.403559]  ? ktime_get_ts64+0x86/0x230
[   26.403585]  kunit_try_run_case+0x1a5/0x480
[   26.403611]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.403636]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.403660]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.403683]  ? __kthread_parkme+0x82/0x180
[   26.403705]  ? preempt_count_sub+0x50/0x80
[   26.403730]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.403756]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.403782]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.403807]  kthread+0x337/0x6f0
[   26.403827]  ? trace_preempt_on+0x20/0xc0
[   26.403853]  ? __pfx_kthread+0x10/0x10
[   26.403874]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.403900]  ? calculate_sigpending+0x7b/0xa0
[   26.403925]  ? __pfx_kthread+0x10/0x10
[   26.403947]  ret_from_fork+0x116/0x1d0
[   26.403968]  ? __pfx_kthread+0x10/0x10
[   26.403990]  ret_from_fork_asm+0x1a/0x30
[   26.404022]  </TASK>
[   26.404035] 
[   26.410850] Allocated by task 313:
[   26.411007]  kasan_save_stack+0x45/0x70
[   26.411217]  kasan_save_track+0x18/0x40
[   26.411424]  kasan_save_alloc_info+0x3b/0x50
[   26.411642]  __kasan_kmalloc+0xb7/0xc0
[   26.411813]  __kmalloc_cache_noprof+0x189/0x420
[   26.412021]  kasan_atomics+0x95/0x310
[   26.412226]  kunit_try_run_case+0x1a5/0x480
[   26.412462]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.412703]  kthread+0x337/0x6f0
[   26.412819]  ret_from_fork+0x116/0x1d0
[   26.412946]  ret_from_fork_asm+0x1a/0x30
[   26.413082] 
[   26.413150] The buggy address belongs to the object at ffff88810490f900
[   26.413150]  which belongs to the cache kmalloc-64 of size 64
[   26.413521] The buggy address is located 0 bytes to the right of
[   26.413521]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.413900] 
[   26.413981] The buggy address belongs to the physical page:
[   26.414162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.414406] flags: 0x200000000000000(node=0|zone=2)
[   26.414590] page_type: f5(slab)
[   26.414762] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.415150] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.415535] page dumped because: kasan: bad access detected
[   26.415731] 
[   26.415797] Memory state around the buggy address:
[   26.415948]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.416188]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.416592] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.416955]                                      ^
[   26.417172]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.417548]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.417865] ==================================================================
[   25.923972] ==================================================================
[   25.924219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450
[   25.924543] Read of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.924914] 
[   25.925023] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.925069] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.925083] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.925107] Call Trace:
[   25.925123]  <TASK>
[   25.925140]  dump_stack_lvl+0x73/0xb0
[   25.925168]  print_report+0xd1/0x650
[   25.925192]  ? __virt_addr_valid+0x1db/0x2d0
[   25.925216]  ? kasan_atomics_helper+0x4a84/0x5450
[   25.925238]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.925266]  ? kasan_atomics_helper+0x4a84/0x5450
[   25.925289]  kasan_report+0x141/0x180
[   25.925320]  ? kasan_atomics_helper+0x4a84/0x5450
[   25.925348]  __asan_report_load4_noabort+0x18/0x20
[   25.925373]  kasan_atomics_helper+0x4a84/0x5450
[   25.925398]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.925423]  ? kasan_save_alloc_info+0x3b/0x50
[   25.925452]  kasan_atomics+0x1dc/0x310
[   25.925477]  ? __pfx_kasan_atomics+0x10/0x10
[   25.925502]  ? __pfx_read_tsc+0x10/0x10
[   25.925543]  ? ktime_get_ts64+0x86/0x230
[   25.925569]  kunit_try_run_case+0x1a5/0x480
[   25.925596]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.925621]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.925644]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.925668]  ? __kthread_parkme+0x82/0x180
[   25.925690]  ? preempt_count_sub+0x50/0x80
[   25.925715]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.925746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.925773]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.925799]  kthread+0x337/0x6f0
[   25.925820]  ? trace_preempt_on+0x20/0xc0
[   25.925845]  ? __pfx_kthread+0x10/0x10
[   25.925867]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.925894]  ? calculate_sigpending+0x7b/0xa0
[   25.925919]  ? __pfx_kthread+0x10/0x10
[   25.925942]  ret_from_fork+0x116/0x1d0
[   25.925963]  ? __pfx_kthread+0x10/0x10
[   25.925986]  ret_from_fork_asm+0x1a/0x30
[   25.926018]  </TASK>
[   25.926031] 
[   25.933468] Allocated by task 313:
[   25.933654]  kasan_save_stack+0x45/0x70
[   25.933859]  kasan_save_track+0x18/0x40
[   25.934024]  kasan_save_alloc_info+0x3b/0x50
[   25.934220]  __kasan_kmalloc+0xb7/0xc0
[   25.934409]  __kmalloc_cache_noprof+0x189/0x420
[   25.934699]  kasan_atomics+0x95/0x310
[   25.934830]  kunit_try_run_case+0x1a5/0x480
[   25.935030]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.935272]  kthread+0x337/0x6f0
[   25.935442]  ret_from_fork+0x116/0x1d0
[   25.935643]  ret_from_fork_asm+0x1a/0x30
[   25.935829] 
[   25.935914] The buggy address belongs to the object at ffff88810490f900
[   25.935914]  which belongs to the cache kmalloc-64 of size 64
[   25.936375] The buggy address is located 0 bytes to the right of
[   25.936375]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.936810] 
[   25.936881] The buggy address belongs to the physical page:
[   25.937051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.937286] flags: 0x200000000000000(node=0|zone=2)
[   25.937516] page_type: f5(slab)
[   25.937826] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.938165] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.938499] page dumped because: kasan: bad access detected
[   25.938743] 
[   25.938940] Memory state around the buggy address:
[   25.939151]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.939376]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.939891] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.940212]                                      ^
[   25.940425]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.940979]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.941286] ==================================================================
[   26.418277] ==================================================================
[   26.418577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450
[   26.418833] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.419337] 
[   26.419440] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.419505] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.419519] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.419541] Call Trace:
[   26.419555]  <TASK>
[   26.419571]  dump_stack_lvl+0x73/0xb0
[   26.419600]  print_report+0xd1/0x650
[   26.419624]  ? __virt_addr_valid+0x1db/0x2d0
[   26.419648]  ? kasan_atomics_helper+0x194a/0x5450
[   26.419670]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.419697]  ? kasan_atomics_helper+0x194a/0x5450
[   26.419720]  kasan_report+0x141/0x180
[   26.419743]  ? kasan_atomics_helper+0x194a/0x5450
[   26.419770]  kasan_check_range+0x10c/0x1c0
[   26.419795]  __kasan_check_write+0x18/0x20
[   26.419819]  kasan_atomics_helper+0x194a/0x5450
[   26.419843]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.419866]  ? kasan_save_alloc_info+0x3b/0x50
[   26.419895]  kasan_atomics+0x1dc/0x310
[   26.419919]  ? __pfx_kasan_atomics+0x10/0x10
[   26.419944]  ? __pfx_read_tsc+0x10/0x10
[   26.419967]  ? ktime_get_ts64+0x86/0x230
[   26.419993]  kunit_try_run_case+0x1a5/0x480
[   26.420019]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.420044]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.420067]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.420090]  ? __kthread_parkme+0x82/0x180
[   26.420112]  ? preempt_count_sub+0x50/0x80
[   26.420136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.420162]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.420188]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.420214]  kthread+0x337/0x6f0
[   26.420235]  ? trace_preempt_on+0x20/0xc0
[   26.420259]  ? __pfx_kthread+0x10/0x10
[   26.420281]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.420316]  ? calculate_sigpending+0x7b/0xa0
[   26.420340]  ? __pfx_kthread+0x10/0x10
[   26.420363]  ret_from_fork+0x116/0x1d0
[   26.420384]  ? __pfx_kthread+0x10/0x10
[   26.420407]  ret_from_fork_asm+0x1a/0x30
[   26.420439]  </TASK>
[   26.420453] 
[   26.430830] Allocated by task 313:
[   26.430965]  kasan_save_stack+0x45/0x70
[   26.431108]  kasan_save_track+0x18/0x40
[   26.431259]  kasan_save_alloc_info+0x3b/0x50
[   26.431695]  __kasan_kmalloc+0xb7/0xc0
[   26.432598]  __kmalloc_cache_noprof+0x189/0x420
[   26.433002]  kasan_atomics+0x95/0x310
[   26.433336]  kunit_try_run_case+0x1a5/0x480
[   26.434522]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.435060]  kthread+0x337/0x6f0
[   26.435399]  ret_from_fork+0x116/0x1d0
[   26.436000]  ret_from_fork_asm+0x1a/0x30
[   26.436147] 
[   26.436215] The buggy address belongs to the object at ffff88810490f900
[   26.436215]  which belongs to the cache kmalloc-64 of size 64
[   26.437235] The buggy address is located 0 bytes to the right of
[   26.437235]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.438376] 
[   26.438558] The buggy address belongs to the physical page:
[   26.438959] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.439284] flags: 0x200000000000000(node=0|zone=2)
[   26.439529] page_type: f5(slab)
[   26.439856] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.440777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.441006] page dumped because: kasan: bad access detected
[   26.441171] 
[   26.441236] Memory state around the buggy address:
[   26.441567]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.442147]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.442778] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.443405]                                      ^
[   26.443855]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.444470]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.445091] ==================================================================
[   26.011096] ==================================================================
[   26.011602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450
[   26.012015] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.012339] 
[   26.012449] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.012510] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.012525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.012548] Call Trace:
[   26.012565]  <TASK>
[   26.012582]  dump_stack_lvl+0x73/0xb0
[   26.012611]  print_report+0xd1/0x650
[   26.012634]  ? __virt_addr_valid+0x1db/0x2d0
[   26.012658]  ? kasan_atomics_helper+0xf10/0x5450
[   26.012689]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.012716]  ? kasan_atomics_helper+0xf10/0x5450
[   26.012738]  kasan_report+0x141/0x180
[   26.012761]  ? kasan_atomics_helper+0xf10/0x5450
[   26.012791]  kasan_check_range+0x10c/0x1c0
[   26.012819]  __kasan_check_write+0x18/0x20
[   26.012844]  kasan_atomics_helper+0xf10/0x5450
[   26.012869]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.012940]  ? kasan_save_alloc_info+0x3b/0x50
[   26.012984]  kasan_atomics+0x1dc/0x310
[   26.013010]  ? __pfx_kasan_atomics+0x10/0x10
[   26.013035]  ? __pfx_read_tsc+0x10/0x10
[   26.013060]  ? ktime_get_ts64+0x86/0x230
[   26.013086]  kunit_try_run_case+0x1a5/0x480
[   26.013113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.013139]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.013164]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.013188]  ? __kthread_parkme+0x82/0x180
[   26.013212]  ? preempt_count_sub+0x50/0x80
[   26.013237]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.013264]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.013291]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.013338]  kthread+0x337/0x6f0
[   26.013360]  ? trace_preempt_on+0x20/0xc0
[   26.013385]  ? __pfx_kthread+0x10/0x10
[   26.013418]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.013445]  ? calculate_sigpending+0x7b/0xa0
[   26.013472]  ? __pfx_kthread+0x10/0x10
[   26.013504]  ret_from_fork+0x116/0x1d0
[   26.013526]  ? __pfx_kthread+0x10/0x10
[   26.013558]  ret_from_fork_asm+0x1a/0x30
[   26.013591]  </TASK>
[   26.013605] 
[   26.026257] Allocated by task 313:
[   26.026416]  kasan_save_stack+0x45/0x70
[   26.026799]  kasan_save_track+0x18/0x40
[   26.026989]  kasan_save_alloc_info+0x3b/0x50
[   26.027207]  __kasan_kmalloc+0xb7/0xc0
[   26.027399]  __kmalloc_cache_noprof+0x189/0x420
[   26.027611]  kasan_atomics+0x95/0x310
[   26.027740]  kunit_try_run_case+0x1a5/0x480
[   26.027883]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.028198]  kthread+0x337/0x6f0
[   26.028387]  ret_from_fork+0x116/0x1d0
[   26.028643]  ret_from_fork_asm+0x1a/0x30
[   26.029146] 
[   26.029250] The buggy address belongs to the object at ffff88810490f900
[   26.029250]  which belongs to the cache kmalloc-64 of size 64
[   26.029646] The buggy address is located 0 bytes to the right of
[   26.029646]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.030299] 
[   26.030377] The buggy address belongs to the physical page:
[   26.030795] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.031161] flags: 0x200000000000000(node=0|zone=2)
[   26.031384] page_type: f5(slab)
[   26.031635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.032003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.032509] page dumped because: kasan: bad access detected
[   26.032846] 
[   26.032947] Memory state around the buggy address:
[   26.033153]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.033478]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.033864] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.034135]                                      ^
[   26.034374]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.034898]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.035188] ==================================================================
[   26.163100] ==================================================================
[   26.163352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450
[   26.163949] Read of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.164341] 
[   26.164503] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.164552] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.164566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.164588] Call Trace:
[   26.164606]  <TASK>
[   26.164622]  dump_stack_lvl+0x73/0xb0
[   26.164652]  print_report+0xd1/0x650
[   26.164676]  ? __virt_addr_valid+0x1db/0x2d0
[   26.164702]  ? kasan_atomics_helper+0x49e8/0x5450
[   26.164725]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.164752]  ? kasan_atomics_helper+0x49e8/0x5450
[   26.164775]  kasan_report+0x141/0x180
[   26.164799]  ? kasan_atomics_helper+0x49e8/0x5450
[   26.164826]  __asan_report_load4_noabort+0x18/0x20
[   26.164852]  kasan_atomics_helper+0x49e8/0x5450
[   26.164875]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.164931]  ? kasan_save_alloc_info+0x3b/0x50
[   26.164962]  kasan_atomics+0x1dc/0x310
[   26.164986]  ? __pfx_kasan_atomics+0x10/0x10
[   26.165022]  ? __pfx_read_tsc+0x10/0x10
[   26.165045]  ? ktime_get_ts64+0x86/0x230
[   26.165071]  kunit_try_run_case+0x1a5/0x480
[   26.165098]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.165123]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.165147]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.165170]  ? __kthread_parkme+0x82/0x180
[   26.165193]  ? preempt_count_sub+0x50/0x80
[   26.165218]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.165244]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.165270]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.165296]  kthread+0x337/0x6f0
[   26.165328]  ? trace_preempt_on+0x20/0xc0
[   26.165352]  ? __pfx_kthread+0x10/0x10
[   26.165375]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.165400]  ? calculate_sigpending+0x7b/0xa0
[   26.165425]  ? __pfx_kthread+0x10/0x10
[   26.165449]  ret_from_fork+0x116/0x1d0
[   26.165469]  ? __pfx_kthread+0x10/0x10
[   26.165501]  ret_from_fork_asm+0x1a/0x30
[   26.165533]  </TASK>
[   26.165547] 
[   26.173097] Allocated by task 313:
[   26.173274]  kasan_save_stack+0x45/0x70
[   26.173484]  kasan_save_track+0x18/0x40
[   26.173698]  kasan_save_alloc_info+0x3b/0x50
[   26.173898]  __kasan_kmalloc+0xb7/0xc0
[   26.174028]  __kmalloc_cache_noprof+0x189/0x420
[   26.174199]  kasan_atomics+0x95/0x310
[   26.174390]  kunit_try_run_case+0x1a5/0x480
[   26.174746]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.175149]  kthread+0x337/0x6f0
[   26.175302]  ret_from_fork+0x116/0x1d0
[   26.175442]  ret_from_fork_asm+0x1a/0x30
[   26.175763] 
[   26.175876] The buggy address belongs to the object at ffff88810490f900
[   26.175876]  which belongs to the cache kmalloc-64 of size 64
[   26.176470] The buggy address is located 0 bytes to the right of
[   26.176470]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.176924] 
[   26.176993] The buggy address belongs to the physical page:
[   26.177247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.177670] flags: 0x200000000000000(node=0|zone=2)
[   26.177851] page_type: f5(slab)
[   26.177969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.178357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.178759] page dumped because: kasan: bad access detected
[   26.178928] 
[   26.178994] Memory state around the buggy address:
[   26.179146]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.179470]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.179841] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.180157]                                      ^
[   26.180337]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.180807]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.181127] ==================================================================
[   25.501961] ==================================================================
[   25.503047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450
[   25.503784] Read of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.504757] 
[   25.504945] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.504998] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.505011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.505032] Call Trace:
[   25.505047]  <TASK>
[   25.505063]  dump_stack_lvl+0x73/0xb0
[   25.505094]  print_report+0xd1/0x650
[   25.505117]  ? __virt_addr_valid+0x1db/0x2d0
[   25.505140]  ? kasan_atomics_helper+0x4bbc/0x5450
[   25.505161]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.505187]  ? kasan_atomics_helper+0x4bbc/0x5450
[   25.505209]  kasan_report+0x141/0x180
[   25.505230]  ? kasan_atomics_helper+0x4bbc/0x5450
[   25.505256]  __asan_report_load4_noabort+0x18/0x20
[   25.505280]  kasan_atomics_helper+0x4bbc/0x5450
[   25.505302]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.505339]  ? kasan_save_alloc_info+0x3b/0x50
[   25.505367]  kasan_atomics+0x1dc/0x310
[   25.505389]  ? __pfx_kasan_atomics+0x10/0x10
[   25.505413]  ? __pfx_read_tsc+0x10/0x10
[   25.505435]  ? ktime_get_ts64+0x86/0x230
[   25.505459]  kunit_try_run_case+0x1a5/0x480
[   25.505496]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.505521]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.505543]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.505566]  ? __kthread_parkme+0x82/0x180
[   25.505586]  ? preempt_count_sub+0x50/0x80
[   25.505608]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.505633]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.505658]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.505731]  kthread+0x337/0x6f0
[   25.505760]  ? trace_preempt_on+0x20/0xc0
[   25.505785]  ? __pfx_kthread+0x10/0x10
[   25.505806]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.505831]  ? calculate_sigpending+0x7b/0xa0
[   25.505855]  ? __pfx_kthread+0x10/0x10
[   25.505877]  ret_from_fork+0x116/0x1d0
[   25.505897]  ? __pfx_kthread+0x10/0x10
[   25.505918]  ret_from_fork_asm+0x1a/0x30
[   25.505950]  </TASK>
[   25.505964] 
[   25.518303] Allocated by task 313:
[   25.518511]  kasan_save_stack+0x45/0x70
[   25.518669]  kasan_save_track+0x18/0x40
[   25.518878]  kasan_save_alloc_info+0x3b/0x50
[   25.519052]  __kasan_kmalloc+0xb7/0xc0
[   25.519197]  __kmalloc_cache_noprof+0x189/0x420
[   25.519366]  kasan_atomics+0x95/0x310
[   25.519627]  kunit_try_run_case+0x1a5/0x480
[   25.519830]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.520060]  kthread+0x337/0x6f0
[   25.520223]  ret_from_fork+0x116/0x1d0
[   25.520361]  ret_from_fork_asm+0x1a/0x30
[   25.520495] 
[   25.520562] The buggy address belongs to the object at ffff88810490f900
[   25.520562]  which belongs to the cache kmalloc-64 of size 64
[   25.521046] The buggy address is located 0 bytes to the right of
[   25.521046]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.521513] 
[   25.521609] The buggy address belongs to the physical page:
[   25.522131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.522454] flags: 0x200000000000000(node=0|zone=2)
[   25.522677] page_type: f5(slab)
[   25.522880] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.523132] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.523481] page dumped because: kasan: bad access detected
[   25.523778] 
[   25.523855] Memory state around the buggy address:
[   25.524036]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.524245]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.524512] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.524822]                                      ^
[   25.525038]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.525352]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.525574] ==================================================================
[   26.035795] ==================================================================
[   26.036094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450
[   26.036417] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.036703] 
[   26.036851] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.037111] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.037130] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.037169] Call Trace:
[   26.037186]  <TASK>
[   26.037203]  dump_stack_lvl+0x73/0xb0
[   26.037234]  print_report+0xd1/0x650
[   26.037258]  ? __virt_addr_valid+0x1db/0x2d0
[   26.037291]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.037330]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.037359]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.037383]  kasan_report+0x141/0x180
[   26.037406]  ? kasan_atomics_helper+0xfa9/0x5450
[   26.037431]  kasan_check_range+0x10c/0x1c0
[   26.037456]  __kasan_check_write+0x18/0x20
[   26.037479]  kasan_atomics_helper+0xfa9/0x5450
[   26.037503]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.037527]  ? kasan_save_alloc_info+0x3b/0x50
[   26.037556]  kasan_atomics+0x1dc/0x310
[   26.037578]  ? __pfx_kasan_atomics+0x10/0x10
[   26.037603]  ? __pfx_read_tsc+0x10/0x10
[   26.037627]  ? ktime_get_ts64+0x86/0x230
[   26.037653]  kunit_try_run_case+0x1a5/0x480
[   26.037681]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.037706]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.037729]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.037756]  ? __kthread_parkme+0x82/0x180
[   26.037778]  ? preempt_count_sub+0x50/0x80
[   26.037803]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.037829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.037854]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.037880]  kthread+0x337/0x6f0
[   26.037900]  ? trace_preempt_on+0x20/0xc0
[   26.037926]  ? __pfx_kthread+0x10/0x10
[   26.038025]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.038054]  ? calculate_sigpending+0x7b/0xa0
[   26.038080]  ? __pfx_kthread+0x10/0x10
[   26.038102]  ret_from_fork+0x116/0x1d0
[   26.038124]  ? __pfx_kthread+0x10/0x10
[   26.038145]  ret_from_fork_asm+0x1a/0x30
[   26.038177]  </TASK>
[   26.038189] 
[   26.045888] Allocated by task 313:
[   26.046081]  kasan_save_stack+0x45/0x70
[   26.046261]  kasan_save_track+0x18/0x40
[   26.046464]  kasan_save_alloc_info+0x3b/0x50
[   26.046668]  __kasan_kmalloc+0xb7/0xc0
[   26.046856]  __kmalloc_cache_noprof+0x189/0x420
[   26.047037]  kasan_atomics+0x95/0x310
[   26.047200]  kunit_try_run_case+0x1a5/0x480
[   26.047394]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.047661]  kthread+0x337/0x6f0
[   26.047829]  ret_from_fork+0x116/0x1d0
[   26.048022]  ret_from_fork_asm+0x1a/0x30
[   26.048213] 
[   26.048315] The buggy address belongs to the object at ffff88810490f900
[   26.048315]  which belongs to the cache kmalloc-64 of size 64
[   26.048915] The buggy address is located 0 bytes to the right of
[   26.048915]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.049425] 
[   26.049571] The buggy address belongs to the physical page:
[   26.049775] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.050129] flags: 0x200000000000000(node=0|zone=2)
[   26.050366] page_type: f5(slab)
[   26.050520] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.050822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.051120] page dumped because: kasan: bad access detected
[   26.051289] 
[   26.051364] Memory state around the buggy address:
[   26.051513]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.051724]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.052034] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.052379]                                      ^
[   26.052596]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.052904]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.053343] ==================================================================
[   26.725545] ==================================================================
[   26.725810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450
[   26.726048] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.726271] 
[   26.726391] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.726448] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.726464] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.726501] Call Trace:
[   26.726523]  <TASK>
[   26.726545]  dump_stack_lvl+0x73/0xb0
[   26.726576]  print_report+0xd1/0x650
[   26.726601]  ? __virt_addr_valid+0x1db/0x2d0
[   26.726627]  ? kasan_atomics_helper+0x20c8/0x5450
[   26.726649]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.726676]  ? kasan_atomics_helper+0x20c8/0x5450
[   26.726698]  kasan_report+0x141/0x180
[   26.726721]  ? kasan_atomics_helper+0x20c8/0x5450
[   26.726748]  kasan_check_range+0x10c/0x1c0
[   26.726772]  __kasan_check_write+0x18/0x20
[   26.726798]  kasan_atomics_helper+0x20c8/0x5450
[   26.726823]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.726847]  ? kasan_save_alloc_info+0x3b/0x50
[   26.726876]  kasan_atomics+0x1dc/0x310
[   26.726899]  ? __pfx_kasan_atomics+0x10/0x10
[   26.726924]  ? __pfx_read_tsc+0x10/0x10
[   26.726947]  ? ktime_get_ts64+0x86/0x230
[   26.726974]  kunit_try_run_case+0x1a5/0x480
[   26.727000]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.727026]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.727050]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.727073]  ? __kthread_parkme+0x82/0x180
[   26.727095]  ? preempt_count_sub+0x50/0x80
[   26.727120]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.727145]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.727171]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.727196]  kthread+0x337/0x6f0
[   26.727217]  ? trace_preempt_on+0x20/0xc0
[   26.727242]  ? __pfx_kthread+0x10/0x10
[   26.727264]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.727289]  ? calculate_sigpending+0x7b/0xa0
[   26.727326]  ? __pfx_kthread+0x10/0x10
[   26.727351]  ret_from_fork+0x116/0x1d0
[   26.727371]  ? __pfx_kthread+0x10/0x10
[   26.727393]  ret_from_fork_asm+0x1a/0x30
[   26.727426]  </TASK>
[   26.727439] 
[   26.741135] Allocated by task 313:
[   26.741522]  kasan_save_stack+0x45/0x70
[   26.741929]  kasan_save_track+0x18/0x40
[   26.742317]  kasan_save_alloc_info+0x3b/0x50
[   26.742678]  __kasan_kmalloc+0xb7/0xc0
[   26.742897]  __kmalloc_cache_noprof+0x189/0x420
[   26.743211]  kasan_atomics+0x95/0x310
[   26.743351]  kunit_try_run_case+0x1a5/0x480
[   26.743510]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.744050]  kthread+0x337/0x6f0
[   26.744391]  ret_from_fork+0x116/0x1d0
[   26.744803]  ret_from_fork_asm+0x1a/0x30
[   26.745293] 
[   26.745495] The buggy address belongs to the object at ffff88810490f900
[   26.745495]  which belongs to the cache kmalloc-64 of size 64
[   26.745924] The buggy address is located 0 bytes to the right of
[   26.745924]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.746275] 
[   26.746357] The buggy address belongs to the physical page:
[   26.746541] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.746950] flags: 0x200000000000000(node=0|zone=2)
[   26.747223] page_type: f5(slab)
[   26.747401] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.747737] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.748053] page dumped because: kasan: bad access detected
[   26.748212] 
[   26.748275] Memory state around the buggy address:
[   26.748493]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.748853]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.749253] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.749630]                                      ^
[   26.749874]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.750089]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.750459] ==================================================================
[   26.351817] ==================================================================
[   26.352086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450
[   26.352322] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.352714] 
[   26.352820] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.352868] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.352892] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.352914] Call Trace:
[   26.352931]  <TASK>
[   26.352948]  dump_stack_lvl+0x73/0xb0
[   26.352988]  print_report+0xd1/0x650
[   26.353012]  ? __virt_addr_valid+0x1db/0x2d0
[   26.353037]  ? kasan_atomics_helper+0x16e7/0x5450
[   26.353060]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.353087]  ? kasan_atomics_helper+0x16e7/0x5450
[   26.353110]  kasan_report+0x141/0x180
[   26.353133]  ? kasan_atomics_helper+0x16e7/0x5450
[   26.353160]  kasan_check_range+0x10c/0x1c0
[   26.353186]  __kasan_check_write+0x18/0x20
[   26.353210]  kasan_atomics_helper+0x16e7/0x5450
[   26.353234]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.353258]  ? kasan_save_alloc_info+0x3b/0x50
[   26.353288]  kasan_atomics+0x1dc/0x310
[   26.353324]  ? __pfx_kasan_atomics+0x10/0x10
[   26.353360]  ? __pfx_read_tsc+0x10/0x10
[   26.353383]  ? ktime_get_ts64+0x86/0x230
[   26.353409]  kunit_try_run_case+0x1a5/0x480
[   26.353445]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.353470]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.353513]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.353538]  ? __kthread_parkme+0x82/0x180
[   26.353560]  ? preempt_count_sub+0x50/0x80
[   26.353585]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.353612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.353638]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.353663]  kthread+0x337/0x6f0
[   26.353684]  ? trace_preempt_on+0x20/0xc0
[   26.353708]  ? __pfx_kthread+0x10/0x10
[   26.353742]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.353768]  ? calculate_sigpending+0x7b/0xa0
[   26.353803]  ? __pfx_kthread+0x10/0x10
[   26.353827]  ret_from_fork+0x116/0x1d0
[   26.353847]  ? __pfx_kthread+0x10/0x10
[   26.353869]  ret_from_fork_asm+0x1a/0x30
[   26.353902]  </TASK>
[   26.353915] 
[   26.360774] Allocated by task 313:
[   26.360947]  kasan_save_stack+0x45/0x70
[   26.361142]  kasan_save_track+0x18/0x40
[   26.361339]  kasan_save_alloc_info+0x3b/0x50
[   26.361552]  __kasan_kmalloc+0xb7/0xc0
[   26.361718]  __kmalloc_cache_noprof+0x189/0x420
[   26.361927]  kasan_atomics+0x95/0x310
[   26.362057]  kunit_try_run_case+0x1a5/0x480
[   26.362199]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.362379]  kthread+0x337/0x6f0
[   26.362521]  ret_from_fork+0x116/0x1d0
[   26.362651]  ret_from_fork_asm+0x1a/0x30
[   26.362808] 
[   26.362900] The buggy address belongs to the object at ffff88810490f900
[   26.362900]  which belongs to the cache kmalloc-64 of size 64
[   26.363497] The buggy address is located 0 bytes to the right of
[   26.363497]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.364094] 
[   26.364187] The buggy address belongs to the physical page:
[   26.364443] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.364836] flags: 0x200000000000000(node=0|zone=2)
[   26.365068] page_type: f5(slab)
[   26.365233] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.365631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.365927] page dumped because: kasan: bad access detected
[   26.366176] 
[   26.366265] Memory state around the buggy address:
[   26.366502]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.366807]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.367100] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.367423]                                      ^
[   26.367597]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.367811]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.368019] ==================================================================
[   26.496537] ==================================================================
[   26.496767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450
[   26.496992] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.497208] 
[   26.497415] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.497464] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.497479] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.497500] Call Trace:
[   26.497516]  <TASK>
[   26.497546]  dump_stack_lvl+0x73/0xb0
[   26.497574]  print_report+0xd1/0x650
[   26.497596]  ? __virt_addr_valid+0x1db/0x2d0
[   26.497620]  ? kasan_atomics_helper+0x1c18/0x5450
[   26.497641]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.497674]  ? kasan_atomics_helper+0x1c18/0x5450
[   26.497697]  kasan_report+0x141/0x180
[   26.497720]  ? kasan_atomics_helper+0x1c18/0x5450
[   26.497751]  kasan_check_range+0x10c/0x1c0
[   26.497775]  __kasan_check_write+0x18/0x20
[   26.497800]  kasan_atomics_helper+0x1c18/0x5450
[   26.497822]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.497845]  ? kasan_save_alloc_info+0x3b/0x50
[   26.497874]  kasan_atomics+0x1dc/0x310
[   26.497898]  ? __pfx_kasan_atomics+0x10/0x10
[   26.497923]  ? __pfx_read_tsc+0x10/0x10
[   26.497945]  ? ktime_get_ts64+0x86/0x230
[   26.497971]  kunit_try_run_case+0x1a5/0x480
[   26.497997]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.498022]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.498046]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.498070]  ? __kthread_parkme+0x82/0x180
[   26.498092]  ? preempt_count_sub+0x50/0x80
[   26.498116]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.498143]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.498168]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.498193]  kthread+0x337/0x6f0
[   26.498215]  ? trace_preempt_on+0x20/0xc0
[   26.498239]  ? __pfx_kthread+0x10/0x10
[   26.498260]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.498285]  ? calculate_sigpending+0x7b/0xa0
[   26.498321]  ? __pfx_kthread+0x10/0x10
[   26.498344]  ret_from_fork+0x116/0x1d0
[   26.498365]  ? __pfx_kthread+0x10/0x10
[   26.498387]  ret_from_fork_asm+0x1a/0x30
[   26.498419]  </TASK>
[   26.498432] 
[   26.506074] Allocated by task 313:
[   26.506247]  kasan_save_stack+0x45/0x70
[   26.506449]  kasan_save_track+0x18/0x40
[   26.506853]  kasan_save_alloc_info+0x3b/0x50
[   26.507059]  __kasan_kmalloc+0xb7/0xc0
[   26.507225]  __kmalloc_cache_noprof+0x189/0x420
[   26.507385]  kasan_atomics+0x95/0x310
[   26.507594]  kunit_try_run_case+0x1a5/0x480
[   26.507808]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.508062]  kthread+0x337/0x6f0
[   26.508214]  ret_from_fork+0x116/0x1d0
[   26.508384]  ret_from_fork_asm+0x1a/0x30
[   26.508574] 
[   26.508670] The buggy address belongs to the object at ffff88810490f900
[   26.508670]  which belongs to the cache kmalloc-64 of size 64
[   26.509118] The buggy address is located 0 bytes to the right of
[   26.509118]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.509721] 
[   26.509793] The buggy address belongs to the physical page:
[   26.510013] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.510324] flags: 0x200000000000000(node=0|zone=2)
[   26.510567] page_type: f5(slab)
[   26.510719] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.511006] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.511246] page dumped because: kasan: bad access detected
[   26.511429] 
[   26.511496] Memory state around the buggy address:
[   26.511647]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.511857]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.512068] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.512387]                                      ^
[   26.512607]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.513148]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.513848] ==================================================================
[   26.833177] ==================================================================
[   26.834410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450
[   26.835316] Read of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.836224] 
[   26.836554] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.836611] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.836627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.836653] Call Trace:
[   26.836675]  <TASK>
[   26.836697]  dump_stack_lvl+0x73/0xb0
[   26.836731]  print_report+0xd1/0x650
[   26.836755]  ? __virt_addr_valid+0x1db/0x2d0
[   26.836794]  ? kasan_atomics_helper+0x5115/0x5450
[   26.836838]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.836866]  ? kasan_atomics_helper+0x5115/0x5450
[   26.836889]  kasan_report+0x141/0x180
[   26.836912]  ? kasan_atomics_helper+0x5115/0x5450
[   26.836940]  __asan_report_load8_noabort+0x18/0x20
[   26.836965]  kasan_atomics_helper+0x5115/0x5450
[   26.836989]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.837012]  ? kasan_save_alloc_info+0x3b/0x50
[   26.837040]  kasan_atomics+0x1dc/0x310
[   26.837065]  ? __pfx_kasan_atomics+0x10/0x10
[   26.837090]  ? __pfx_read_tsc+0x10/0x10
[   26.837113]  ? ktime_get_ts64+0x86/0x230
[   26.837139]  kunit_try_run_case+0x1a5/0x480
[   26.837166]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.837192]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.837215]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.837238]  ? __kthread_parkme+0x82/0x180
[   26.837260]  ? preempt_count_sub+0x50/0x80
[   26.837285]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.837324]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.837350]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.837376]  kthread+0x337/0x6f0
[   26.837397]  ? trace_preempt_on+0x20/0xc0
[   26.837422]  ? __pfx_kthread+0x10/0x10
[   26.837444]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.837470]  ? calculate_sigpending+0x7b/0xa0
[   26.837504]  ? __pfx_kthread+0x10/0x10
[   26.837526]  ret_from_fork+0x116/0x1d0
[   26.837547]  ? __pfx_kthread+0x10/0x10
[   26.837569]  ret_from_fork_asm+0x1a/0x30
[   26.837602]  </TASK>
[   26.837615] 
[   26.847899] Allocated by task 313:
[   26.848213]  kasan_save_stack+0x45/0x70
[   26.848492]  kasan_save_track+0x18/0x40
[   26.848788]  kasan_save_alloc_info+0x3b/0x50
[   26.849050]  __kasan_kmalloc+0xb7/0xc0
[   26.849190]  __kmalloc_cache_noprof+0x189/0x420
[   26.849541]  kasan_atomics+0x95/0x310
[   26.849848]  kunit_try_run_case+0x1a5/0x480
[   26.850005]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.850359]  kthread+0x337/0x6f0
[   26.850671]  ret_from_fork+0x116/0x1d0
[   26.850876]  ret_from_fork_asm+0x1a/0x30
[   26.851058] 
[   26.851137] The buggy address belongs to the object at ffff88810490f900
[   26.851137]  which belongs to the cache kmalloc-64 of size 64
[   26.852016] The buggy address is located 0 bytes to the right of
[   26.852016]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.852493] 
[   26.852767] The buggy address belongs to the physical page:
[   26.853147] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.853549] flags: 0x200000000000000(node=0|zone=2)
[   26.854074] page_type: f5(slab)
[   26.854458] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.854821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.855044] page dumped because: kasan: bad access detected
[   26.855208] 
[   26.855272] Memory state around the buggy address:
[   26.855437]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.855661]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.856398] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.856802]                                      ^
[   26.856988]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.857376]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.857818] ==================================================================
[   26.089960] ==================================================================
[   26.090289] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450
[   26.090649] Read of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.090936] 
[   26.091043] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.091093] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.091107] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.091130] Call Trace:
[   26.091146]  <TASK>
[   26.091162]  dump_stack_lvl+0x73/0xb0
[   26.091190]  print_report+0xd1/0x650
[   26.091214]  ? __virt_addr_valid+0x1db/0x2d0
[   26.091237]  ? kasan_atomics_helper+0x4a1c/0x5450
[   26.091260]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.091286]  ? kasan_atomics_helper+0x4a1c/0x5450
[   26.091320]  kasan_report+0x141/0x180
[   26.091344]  ? kasan_atomics_helper+0x4a1c/0x5450
[   26.091370]  __asan_report_load4_noabort+0x18/0x20
[   26.091395]  kasan_atomics_helper+0x4a1c/0x5450
[   26.091418]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.091442]  ? kasan_save_alloc_info+0x3b/0x50
[   26.091471]  kasan_atomics+0x1dc/0x310
[   26.091507]  ? __pfx_kasan_atomics+0x10/0x10
[   26.091532]  ? __pfx_read_tsc+0x10/0x10
[   26.091554]  ? ktime_get_ts64+0x86/0x230
[   26.091593]  kunit_try_run_case+0x1a5/0x480
[   26.091622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.091650]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.091675]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.091698]  ? __kthread_parkme+0x82/0x180
[   26.091720]  ? preempt_count_sub+0x50/0x80
[   26.091745]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.091771]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.091797]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.091823]  kthread+0x337/0x6f0
[   26.091844]  ? trace_preempt_on+0x20/0xc0
[   26.091867]  ? __pfx_kthread+0x10/0x10
[   26.091889]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.091914]  ? calculate_sigpending+0x7b/0xa0
[   26.091939]  ? __pfx_kthread+0x10/0x10
[   26.091961]  ret_from_fork+0x116/0x1d0
[   26.091982]  ? __pfx_kthread+0x10/0x10
[   26.092004]  ret_from_fork_asm+0x1a/0x30
[   26.092036]  </TASK>
[   26.092049] 
[   26.099230] Allocated by task 313:
[   26.099367]  kasan_save_stack+0x45/0x70
[   26.099503]  kasan_save_track+0x18/0x40
[   26.099635]  kasan_save_alloc_info+0x3b/0x50
[   26.099778]  __kasan_kmalloc+0xb7/0xc0
[   26.099906]  __kmalloc_cache_noprof+0x189/0x420
[   26.100056]  kasan_atomics+0x95/0x310
[   26.100183]  kunit_try_run_case+0x1a5/0x480
[   26.100341]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.100590]  kthread+0x337/0x6f0
[   26.100790]  ret_from_fork+0x116/0x1d0
[   26.101011]  ret_from_fork_asm+0x1a/0x30
[   26.101243] 
[   26.101357] The buggy address belongs to the object at ffff88810490f900
[   26.101357]  which belongs to the cache kmalloc-64 of size 64
[   26.101969] The buggy address is located 0 bytes to the right of
[   26.101969]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.102469] 
[   26.102572] The buggy address belongs to the physical page:
[   26.102801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.103037] flags: 0x200000000000000(node=0|zone=2)
[   26.103194] page_type: f5(slab)
[   26.103320] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.103674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.104413] page dumped because: kasan: bad access detected
[   26.104716] 
[   26.104822] Memory state around the buggy address:
[   26.105013]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.105318]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.105684] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.106018]                                      ^
[   26.106169]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.106426]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.107015] ==================================================================
[   26.445956] ==================================================================
[   26.446290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450
[   26.447212] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.447450] 
[   26.447554] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.447603] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.447617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.447640] Call Trace:
[   26.447656]  <TASK>
[   26.447673]  dump_stack_lvl+0x73/0xb0
[   26.447701]  print_report+0xd1/0x650
[   26.447724]  ? __virt_addr_valid+0x1db/0x2d0
[   26.447748]  ? kasan_atomics_helper+0x19e3/0x5450
[   26.447770]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.447797]  ? kasan_atomics_helper+0x19e3/0x5450
[   26.447820]  kasan_report+0x141/0x180
[   26.447843]  ? kasan_atomics_helper+0x19e3/0x5450
[   26.447869]  kasan_check_range+0x10c/0x1c0
[   26.447894]  __kasan_check_write+0x18/0x20
[   26.447917]  kasan_atomics_helper+0x19e3/0x5450
[   26.447940]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.447964]  ? kasan_save_alloc_info+0x3b/0x50
[   26.447992]  kasan_atomics+0x1dc/0x310
[   26.448016]  ? __pfx_kasan_atomics+0x10/0x10
[   26.448041]  ? __pfx_read_tsc+0x10/0x10
[   26.448063]  ? ktime_get_ts64+0x86/0x230
[   26.448089]  kunit_try_run_case+0x1a5/0x480
[   26.448114]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.448139]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.448162]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.448185]  ? __kthread_parkme+0x82/0x180
[   26.448206]  ? preempt_count_sub+0x50/0x80
[   26.448231]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.448257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.448282]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.448318]  kthread+0x337/0x6f0
[   26.448340]  ? trace_preempt_on+0x20/0xc0
[   26.448365]  ? __pfx_kthread+0x10/0x10
[   26.448386]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.448412]  ? calculate_sigpending+0x7b/0xa0
[   26.448437]  ? __pfx_kthread+0x10/0x10
[   26.448460]  ret_from_fork+0x116/0x1d0
[   26.448480]  ? __pfx_kthread+0x10/0x10
[   26.448502]  ret_from_fork_asm+0x1a/0x30
[   26.448533]  </TASK>
[   26.448546] 
[   26.455848] Allocated by task 313:
[   26.455983]  kasan_save_stack+0x45/0x70
[   26.456124]  kasan_save_track+0x18/0x40
[   26.456255]  kasan_save_alloc_info+0x3b/0x50
[   26.456450]  __kasan_kmalloc+0xb7/0xc0
[   26.456636]  __kmalloc_cache_noprof+0x189/0x420
[   26.456857]  kasan_atomics+0x95/0x310
[   26.457044]  kunit_try_run_case+0x1a5/0x480
[   26.457223]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.457463]  kthread+0x337/0x6f0
[   26.457611]  ret_from_fork+0x116/0x1d0
[   26.457742]  ret_from_fork_asm+0x1a/0x30
[   26.457878] 
[   26.457945] The buggy address belongs to the object at ffff88810490f900
[   26.457945]  which belongs to the cache kmalloc-64 of size 64
[   26.458286] The buggy address is located 0 bytes to the right of
[   26.458286]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.458744] 
[   26.458814] The buggy address belongs to the physical page:
[   26.458994] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.459333] flags: 0x200000000000000(node=0|zone=2)
[   26.459490] page_type: f5(slab)
[   26.459762] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.460010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.460359] page dumped because: kasan: bad access detected
[   26.460620] 
[   26.460684] Memory state around the buggy address:
[   26.460831]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.461040]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.461246] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.461619]                                      ^
[   26.462039]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.462358]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.462700] ==================================================================
[   25.801542] ==================================================================
[   25.801779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450
[   25.802007] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.802479] 
[   25.802600] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.802648] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.802663] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.802687] Call Trace:
[   25.802705]  <TASK>
[   25.802721]  dump_stack_lvl+0x73/0xb0
[   25.802750]  print_report+0xd1/0x650
[   25.802773]  ? __virt_addr_valid+0x1db/0x2d0
[   25.802798]  ? kasan_atomics_helper+0x992/0x5450
[   25.802820]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.802847]  ? kasan_atomics_helper+0x992/0x5450
[   25.802869]  kasan_report+0x141/0x180
[   25.802893]  ? kasan_atomics_helper+0x992/0x5450
[   25.802920]  kasan_check_range+0x10c/0x1c0
[   25.802944]  __kasan_check_write+0x18/0x20
[   25.802968]  kasan_atomics_helper+0x992/0x5450
[   25.802992]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.803016]  ? kasan_save_alloc_info+0x3b/0x50
[   25.803045]  kasan_atomics+0x1dc/0x310
[   25.803069]  ? __pfx_kasan_atomics+0x10/0x10
[   25.803094]  ? __pfx_read_tsc+0x10/0x10
[   25.803117]  ? ktime_get_ts64+0x86/0x230
[   25.803142]  kunit_try_run_case+0x1a5/0x480
[   25.803169]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.803195]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.803218]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.803241]  ? __kthread_parkme+0x82/0x180
[   25.803263]  ? preempt_count_sub+0x50/0x80
[   25.803289]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.803325]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.803353]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.803378]  kthread+0x337/0x6f0
[   25.803400]  ? trace_preempt_on+0x20/0xc0
[   25.803425]  ? __pfx_kthread+0x10/0x10
[   25.803447]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.803473]  ? calculate_sigpending+0x7b/0xa0
[   25.803501]  ? __pfx_kthread+0x10/0x10
[   25.803523]  ret_from_fork+0x116/0x1d0
[   25.803543]  ? __pfx_kthread+0x10/0x10
[   25.803566]  ret_from_fork_asm+0x1a/0x30
[   25.803597]  </TASK>
[   25.803609] 
[   25.811466] Allocated by task 313:
[   25.811658]  kasan_save_stack+0x45/0x70
[   25.811868]  kasan_save_track+0x18/0x40
[   25.812056]  kasan_save_alloc_info+0x3b/0x50
[   25.812242]  __kasan_kmalloc+0xb7/0xc0
[   25.812419]  __kmalloc_cache_noprof+0x189/0x420
[   25.812633]  kasan_atomics+0x95/0x310
[   25.812927]  kunit_try_run_case+0x1a5/0x480
[   25.813076]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.813247]  kthread+0x337/0x6f0
[   25.813376]  ret_from_fork+0x116/0x1d0
[   25.813506]  ret_from_fork_asm+0x1a/0x30
[   25.813642] 
[   25.813735] The buggy address belongs to the object at ffff88810490f900
[   25.813735]  which belongs to the cache kmalloc-64 of size 64
[   25.815147] The buggy address is located 0 bytes to the right of
[   25.815147]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.815598] 
[   25.815717] The buggy address belongs to the physical page:
[   25.816064] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.816432] flags: 0x200000000000000(node=0|zone=2)
[   25.816679] page_type: f5(slab)
[   25.816847] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.817075] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.817299] page dumped because: kasan: bad access detected
[   25.819024] 
[   25.819181] Memory state around the buggy address:
[   25.819590]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.820246]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.821361] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.822070]                                      ^
[   25.822831]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.823375]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.823906] ==================================================================
[   26.701023] ==================================================================
[   26.701325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450
[   26.701581] Read of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.702395] 
[   26.702769] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.702967] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.702985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.703011] Call Trace:
[   26.703034]  <TASK>
[   26.703058]  dump_stack_lvl+0x73/0xb0
[   26.703090]  print_report+0xd1/0x650
[   26.703115]  ? __virt_addr_valid+0x1db/0x2d0
[   26.703141]  ? kasan_atomics_helper+0x4f98/0x5450
[   26.703164]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.703192]  ? kasan_atomics_helper+0x4f98/0x5450
[   26.703216]  kasan_report+0x141/0x180
[   26.703239]  ? kasan_atomics_helper+0x4f98/0x5450
[   26.703266]  __asan_report_load8_noabort+0x18/0x20
[   26.703292]  kasan_atomics_helper+0x4f98/0x5450
[   26.703329]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.703353]  ? kasan_save_alloc_info+0x3b/0x50
[   26.703382]  kasan_atomics+0x1dc/0x310
[   26.703405]  ? __pfx_kasan_atomics+0x10/0x10
[   26.703430]  ? __pfx_read_tsc+0x10/0x10
[   26.703454]  ? ktime_get_ts64+0x86/0x230
[   26.703481]  kunit_try_run_case+0x1a5/0x480
[   26.703518]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.703542]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.703566]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.703590]  ? __kthread_parkme+0x82/0x180
[   26.703612]  ? preempt_count_sub+0x50/0x80
[   26.703638]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.703664]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.703689]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.703714]  kthread+0x337/0x6f0
[   26.703736]  ? trace_preempt_on+0x20/0xc0
[   26.703760]  ? __pfx_kthread+0x10/0x10
[   26.703782]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.703808]  ? calculate_sigpending+0x7b/0xa0
[   26.703833]  ? __pfx_kthread+0x10/0x10
[   26.703855]  ret_from_fork+0x116/0x1d0
[   26.703876]  ? __pfx_kthread+0x10/0x10
[   26.703897]  ret_from_fork_asm+0x1a/0x30
[   26.703933]  </TASK>
[   26.703948] 
[   26.713598] Allocated by task 313:
[   26.713948]  kasan_save_stack+0x45/0x70
[   26.714217]  kasan_save_track+0x18/0x40
[   26.714424]  kasan_save_alloc_info+0x3b/0x50
[   26.714757]  __kasan_kmalloc+0xb7/0xc0
[   26.714935]  __kmalloc_cache_noprof+0x189/0x420
[   26.715279]  kasan_atomics+0x95/0x310
[   26.715574]  kunit_try_run_case+0x1a5/0x480
[   26.715736]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.716087]  kthread+0x337/0x6f0
[   26.716213]  ret_from_fork+0x116/0x1d0
[   26.716414]  ret_from_fork_asm+0x1a/0x30
[   26.716842] 
[   26.716952] The buggy address belongs to the object at ffff88810490f900
[   26.716952]  which belongs to the cache kmalloc-64 of size 64
[   26.717515] The buggy address is located 0 bytes to the right of
[   26.717515]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.718259] 
[   26.718349] The buggy address belongs to the physical page:
[   26.718797] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.719196] flags: 0x200000000000000(node=0|zone=2)
[   26.719390] page_type: f5(slab)
[   26.719776] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.720100] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.720506] page dumped because: kasan: bad access detected
[   26.720722] 
[   26.720819] Memory state around the buggy address:
[   26.721209]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.721631]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.721918] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.722343]                                      ^
[   26.722585]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.723019]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.723322] ==================================================================
[   25.686361] ==================================================================
[   25.686651] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450
[   25.687146] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.687462] 
[   25.687915] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.688026] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.688042] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.688064] Call Trace:
[   25.688083]  <TASK>
[   25.688196]  dump_stack_lvl+0x73/0xb0
[   25.688231]  print_report+0xd1/0x650
[   25.688255]  ? __virt_addr_valid+0x1db/0x2d0
[   25.688279]  ? kasan_atomics_helper+0x5fe/0x5450
[   25.688301]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.688340]  ? kasan_atomics_helper+0x5fe/0x5450
[   25.688363]  kasan_report+0x141/0x180
[   25.688386]  ? kasan_atomics_helper+0x5fe/0x5450
[   25.688412]  kasan_check_range+0x10c/0x1c0
[   25.688437]  __kasan_check_write+0x18/0x20
[   25.688461]  kasan_atomics_helper+0x5fe/0x5450
[   25.688494]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.688518]  ? kasan_save_alloc_info+0x3b/0x50
[   25.688548]  kasan_atomics+0x1dc/0x310
[   25.688572]  ? __pfx_kasan_atomics+0x10/0x10
[   25.688597]  ? __pfx_read_tsc+0x10/0x10
[   25.688620]  ? ktime_get_ts64+0x86/0x230
[   25.688646]  kunit_try_run_case+0x1a5/0x480
[   25.688683]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.688709]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.688732]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.688756]  ? __kthread_parkme+0x82/0x180
[   25.688778]  ? preempt_count_sub+0x50/0x80
[   25.688802]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.688829]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.688855]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.688881]  kthread+0x337/0x6f0
[   25.688902]  ? trace_preempt_on+0x20/0xc0
[   25.688927]  ? __pfx_kthread+0x10/0x10
[   25.688949]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.688974]  ? calculate_sigpending+0x7b/0xa0
[   25.688999]  ? __pfx_kthread+0x10/0x10
[   25.689022]  ret_from_fork+0x116/0x1d0
[   25.689041]  ? __pfx_kthread+0x10/0x10
[   25.689063]  ret_from_fork_asm+0x1a/0x30
[   25.689095]  </TASK>
[   25.689108] 
[   25.699401] Allocated by task 313:
[   25.699652]  kasan_save_stack+0x45/0x70
[   25.700042]  kasan_save_track+0x18/0x40
[   25.700218]  kasan_save_alloc_info+0x3b/0x50
[   25.700417]  __kasan_kmalloc+0xb7/0xc0
[   25.700587]  __kmalloc_cache_noprof+0x189/0x420
[   25.700975]  kasan_atomics+0x95/0x310
[   25.701160]  kunit_try_run_case+0x1a5/0x480
[   25.701454]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.701793]  kthread+0x337/0x6f0
[   25.701936]  ret_from_fork+0x116/0x1d0
[   25.702116]  ret_from_fork_asm+0x1a/0x30
[   25.702290] 
[   25.702395] The buggy address belongs to the object at ffff88810490f900
[   25.702395]  which belongs to the cache kmalloc-64 of size 64
[   25.703341] The buggy address is located 0 bytes to the right of
[   25.703341]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.704082] 
[   25.704185] The buggy address belongs to the physical page:
[   25.704419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.705006] flags: 0x200000000000000(node=0|zone=2)
[   25.705204] page_type: f5(slab)
[   25.705378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.705960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.706286] page dumped because: kasan: bad access detected
[   25.706530] 
[   25.706734] Memory state around the buggy address:
[   25.707005]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.707284]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.707630] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.708197]                                      ^
[   25.708380]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.709003]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.709392] ==================================================================
[   26.334185] ==================================================================
[   26.334694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450
[   26.335001] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.335220] 
[   26.335299] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.335359] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.335374] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.335397] Call Trace:
[   26.335411]  <TASK>
[   26.335427]  dump_stack_lvl+0x73/0xb0
[   26.335455]  print_report+0xd1/0x650
[   26.335500]  ? __virt_addr_valid+0x1db/0x2d0
[   26.335524]  ? kasan_atomics_helper+0x164f/0x5450
[   26.335546]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.335574]  ? kasan_atomics_helper+0x164f/0x5450
[   26.335598]  kasan_report+0x141/0x180
[   26.335621]  ? kasan_atomics_helper+0x164f/0x5450
[   26.335648]  kasan_check_range+0x10c/0x1c0
[   26.335673]  __kasan_check_write+0x18/0x20
[   26.335698]  kasan_atomics_helper+0x164f/0x5450
[   26.335721]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.335745]  ? kasan_save_alloc_info+0x3b/0x50
[   26.335785]  kasan_atomics+0x1dc/0x310
[   26.335808]  ? __pfx_kasan_atomics+0x10/0x10
[   26.335844]  ? __pfx_read_tsc+0x10/0x10
[   26.335868]  ? ktime_get_ts64+0x86/0x230
[   26.335893]  kunit_try_run_case+0x1a5/0x480
[   26.335919]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.335943]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.335966]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.335989]  ? __kthread_parkme+0x82/0x180
[   26.336011]  ? preempt_count_sub+0x50/0x80
[   26.336035]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.336061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.336086]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.336112]  kthread+0x337/0x6f0
[   26.336133]  ? trace_preempt_on+0x20/0xc0
[   26.336157]  ? __pfx_kthread+0x10/0x10
[   26.336178]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.336204]  ? calculate_sigpending+0x7b/0xa0
[   26.336230]  ? __pfx_kthread+0x10/0x10
[   26.336252]  ret_from_fork+0x116/0x1d0
[   26.336273]  ? __pfx_kthread+0x10/0x10
[   26.336294]  ret_from_fork_asm+0x1a/0x30
[   26.336335]  </TASK>
[   26.336348] 
[   26.343532] Allocated by task 313:
[   26.343711]  kasan_save_stack+0x45/0x70
[   26.343905]  kasan_save_track+0x18/0x40
[   26.344092]  kasan_save_alloc_info+0x3b/0x50
[   26.344301]  __kasan_kmalloc+0xb7/0xc0
[   26.344546]  __kmalloc_cache_noprof+0x189/0x420
[   26.344786]  kasan_atomics+0x95/0x310
[   26.344915]  kunit_try_run_case+0x1a5/0x480
[   26.345064]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.345236]  kthread+0x337/0x6f0
[   26.345361]  ret_from_fork+0x116/0x1d0
[   26.345508]  ret_from_fork_asm+0x1a/0x30
[   26.345695] 
[   26.345790] The buggy address belongs to the object at ffff88810490f900
[   26.345790]  which belongs to the cache kmalloc-64 of size 64
[   26.346349] The buggy address is located 0 bytes to the right of
[   26.346349]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.346988] 
[   26.347085] The buggy address belongs to the physical page:
[   26.347364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.347733] flags: 0x200000000000000(node=0|zone=2)
[   26.347895] page_type: f5(slab)
[   26.348064] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.348425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.348768] page dumped because: kasan: bad access detected
[   26.348995] 
[   26.349087] Memory state around the buggy address:
[   26.349297]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.349636]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.349963] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.350240]                                      ^
[   26.350458]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.350802]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.351125] ==================================================================
[   25.855583] ==================================================================
[   25.856435] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450
[   25.857213] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.857640] 
[   25.857931] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.857987] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.858003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.858035] Call Trace:
[   25.858054]  <TASK>
[   25.858073]  dump_stack_lvl+0x73/0xb0
[   25.858105]  print_report+0xd1/0x650
[   25.858130]  ? __virt_addr_valid+0x1db/0x2d0
[   25.858156]  ? kasan_atomics_helper+0xac7/0x5450
[   25.858179]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.858206]  ? kasan_atomics_helper+0xac7/0x5450
[   25.858229]  kasan_report+0x141/0x180
[   25.858252]  ? kasan_atomics_helper+0xac7/0x5450
[   25.858279]  kasan_check_range+0x10c/0x1c0
[   25.858313]  __kasan_check_write+0x18/0x20
[   25.858339]  kasan_atomics_helper+0xac7/0x5450
[   25.858362]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.858387]  ? kasan_save_alloc_info+0x3b/0x50
[   25.858416]  kasan_atomics+0x1dc/0x310
[   25.858440]  ? __pfx_kasan_atomics+0x10/0x10
[   25.858466]  ? __pfx_read_tsc+0x10/0x10
[   25.858587]  ? ktime_get_ts64+0x86/0x230
[   25.858622]  kunit_try_run_case+0x1a5/0x480
[   25.858650]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.858675]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.858797]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.858824]  ? __kthread_parkme+0x82/0x180
[   25.858848]  ? preempt_count_sub+0x50/0x80
[   25.858874]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.858900]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.858927]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.858952]  kthread+0x337/0x6f0
[   25.858973]  ? trace_preempt_on+0x20/0xc0
[   25.858999]  ? __pfx_kthread+0x10/0x10
[   25.859021]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.859046]  ? calculate_sigpending+0x7b/0xa0
[   25.859072]  ? __pfx_kthread+0x10/0x10
[   25.859095]  ret_from_fork+0x116/0x1d0
[   25.859116]  ? __pfx_kthread+0x10/0x10
[   25.859137]  ret_from_fork_asm+0x1a/0x30
[   25.859170]  </TASK>
[   25.859183] 
[   25.871248] Allocated by task 313:
[   25.871579]  kasan_save_stack+0x45/0x70
[   25.872066]  kasan_save_track+0x18/0x40
[   25.872259]  kasan_save_alloc_info+0x3b/0x50
[   25.872467]  __kasan_kmalloc+0xb7/0xc0
[   25.872641]  __kmalloc_cache_noprof+0x189/0x420
[   25.873216]  kasan_atomics+0x95/0x310
[   25.873524]  kunit_try_run_case+0x1a5/0x480
[   25.873935]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.874170]  kthread+0x337/0x6f0
[   25.874337]  ret_from_fork+0x116/0x1d0
[   25.874794]  ret_from_fork_asm+0x1a/0x30
[   25.875051] 
[   25.875273] The buggy address belongs to the object at ffff88810490f900
[   25.875273]  which belongs to the cache kmalloc-64 of size 64
[   25.875959] The buggy address is located 0 bytes to the right of
[   25.875959]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.876470] 
[   25.876560] The buggy address belongs to the physical page:
[   25.877251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.877959] flags: 0x200000000000000(node=0|zone=2)
[   25.878184] page_type: f5(slab)
[   25.878349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.878983] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.879513] page dumped because: kasan: bad access detected
[   25.880141] 
[   25.880236] Memory state around the buggy address:
[   25.880464]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.881041]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.881348] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.882003]                                      ^
[   25.882338]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.883407]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.883921] ==================================================================
[   26.385572] ==================================================================
[   26.386365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450
[   26.386752] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.387233] 
[   26.387322] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.387372] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.387386] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.387409] Call Trace:
[   26.387425]  <TASK>
[   26.387443]  dump_stack_lvl+0x73/0xb0
[   26.387472]  print_report+0xd1/0x650
[   26.387516]  ? __virt_addr_valid+0x1db/0x2d0
[   26.387542]  ? kasan_atomics_helper+0x1818/0x5450
[   26.387564]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.387592]  ? kasan_atomics_helper+0x1818/0x5450
[   26.387615]  kasan_report+0x141/0x180
[   26.387638]  ? kasan_atomics_helper+0x1818/0x5450
[   26.387665]  kasan_check_range+0x10c/0x1c0
[   26.387690]  __kasan_check_write+0x18/0x20
[   26.387713]  kasan_atomics_helper+0x1818/0x5450
[   26.387737]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.387761]  ? kasan_save_alloc_info+0x3b/0x50
[   26.387790]  kasan_atomics+0x1dc/0x310
[   26.387814]  ? __pfx_kasan_atomics+0x10/0x10
[   26.387839]  ? __pfx_read_tsc+0x10/0x10
[   26.387862]  ? ktime_get_ts64+0x86/0x230
[   26.387887]  kunit_try_run_case+0x1a5/0x480
[   26.387914]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.387939]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.387963]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.387986]  ? __kthread_parkme+0x82/0x180
[   26.388009]  ? preempt_count_sub+0x50/0x80
[   26.388034]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.388061]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.388086]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.388112]  kthread+0x337/0x6f0
[   26.388133]  ? trace_preempt_on+0x20/0xc0
[   26.388157]  ? __pfx_kthread+0x10/0x10
[   26.388181]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.388206]  ? calculate_sigpending+0x7b/0xa0
[   26.388233]  ? __pfx_kthread+0x10/0x10
[   26.388256]  ret_from_fork+0x116/0x1d0
[   26.388277]  ? __pfx_kthread+0x10/0x10
[   26.388299]  ret_from_fork_asm+0x1a/0x30
[   26.388339]  </TASK>
[   26.388353] 
[   26.394904] Allocated by task 313:
[   26.395066]  kasan_save_stack+0x45/0x70
[   26.395230]  kasan_save_track+0x18/0x40
[   26.395372]  kasan_save_alloc_info+0x3b/0x50
[   26.395542]  __kasan_kmalloc+0xb7/0xc0
[   26.395673]  __kmalloc_cache_noprof+0x189/0x420
[   26.395824]  kasan_atomics+0x95/0x310
[   26.395951]  kunit_try_run_case+0x1a5/0x480
[   26.396094]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.396263]  kthread+0x337/0x6f0
[   26.396439]  ret_from_fork+0x116/0x1d0
[   26.396679]  ret_from_fork_asm+0x1a/0x30
[   26.396908] 
[   26.397011] The buggy address belongs to the object at ffff88810490f900
[   26.397011]  which belongs to the cache kmalloc-64 of size 64
[   26.397511] The buggy address is located 0 bytes to the right of
[   26.397511]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.398164] 
[   26.398294] The buggy address belongs to the physical page:
[   26.398515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.398762] flags: 0x200000000000000(node=0|zone=2)
[   26.398923] page_type: f5(slab)
[   26.399042] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.399398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.399770] page dumped because: kasan: bad access detected
[   26.399941] 
[   26.400025] Memory state around the buggy address:
[   26.400262]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.400609]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.400819] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.401025]                                      ^
[   26.401173]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.401392]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.401708] ==================================================================
[   26.559850] ==================================================================
[   26.560585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450
[   26.561436] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.562170] 
[   26.562390] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.562447] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.562464] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.562621] Call Trace:
[   26.562646]  <TASK>
[   26.562669]  dump_stack_lvl+0x73/0xb0
[   26.562717]  print_report+0xd1/0x650
[   26.562781]  ? __virt_addr_valid+0x1db/0x2d0
[   26.562808]  ? kasan_atomics_helper+0x1d7a/0x5450
[   26.562832]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.562859]  ? kasan_atomics_helper+0x1d7a/0x5450
[   26.562882]  kasan_report+0x141/0x180
[   26.562905]  ? kasan_atomics_helper+0x1d7a/0x5450
[   26.562931]  kasan_check_range+0x10c/0x1c0
[   26.562956]  __kasan_check_write+0x18/0x20
[   26.562980]  kasan_atomics_helper+0x1d7a/0x5450
[   26.563003]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.563026]  ? kasan_save_alloc_info+0x3b/0x50
[   26.563055]  kasan_atomics+0x1dc/0x310
[   26.563078]  ? __pfx_kasan_atomics+0x10/0x10
[   26.563103]  ? __pfx_read_tsc+0x10/0x10
[   26.563126]  ? ktime_get_ts64+0x86/0x230
[   26.563152]  kunit_try_run_case+0x1a5/0x480
[   26.563178]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.563202]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.563225]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.563248]  ? __kthread_parkme+0x82/0x180
[   26.563271]  ? preempt_count_sub+0x50/0x80
[   26.563295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.563330]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.563356]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.563381]  kthread+0x337/0x6f0
[   26.563402]  ? trace_preempt_on+0x20/0xc0
[   26.563427]  ? __pfx_kthread+0x10/0x10
[   26.563449]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.563495]  ? calculate_sigpending+0x7b/0xa0
[   26.563521]  ? __pfx_kthread+0x10/0x10
[   26.563544]  ret_from_fork+0x116/0x1d0
[   26.563565]  ? __pfx_kthread+0x10/0x10
[   26.563587]  ret_from_fork_asm+0x1a/0x30
[   26.563620]  </TASK>
[   26.563633] 
[   26.575356] Allocated by task 313:
[   26.576114]  kasan_save_stack+0x45/0x70
[   26.576419]  kasan_save_track+0x18/0x40
[   26.576818]  kasan_save_alloc_info+0x3b/0x50
[   26.577143]  __kasan_kmalloc+0xb7/0xc0
[   26.577476]  __kmalloc_cache_noprof+0x189/0x420
[   26.577680]  kasan_atomics+0x95/0x310
[   26.577848]  kunit_try_run_case+0x1a5/0x480
[   26.578029]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.578243]  kthread+0x337/0x6f0
[   26.578755]  ret_from_fork+0x116/0x1d0
[   26.579120]  ret_from_fork_asm+0x1a/0x30
[   26.579454] 
[   26.579758] The buggy address belongs to the object at ffff88810490f900
[   26.579758]  which belongs to the cache kmalloc-64 of size 64
[   26.580395] The buggy address is located 0 bytes to the right of
[   26.580395]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.581213] 
[   26.581329] The buggy address belongs to the physical page:
[   26.581847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.582291] flags: 0x200000000000000(node=0|zone=2)
[   26.582702] page_type: f5(slab)
[   26.582872] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.583187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.583736] page dumped because: kasan: bad access detected
[   26.584035] 
[   26.584252] Memory state around the buggy address:
[   26.584634]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.584937]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.585229] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.585752]                                      ^
[   26.586228]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.586707]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.586987] ==================================================================
[   25.825019] ==================================================================
[   25.826088] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450
[   25.826743] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.827415] 
[   25.827651] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.827718] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.827734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.827758] Call Trace:
[   25.827820]  <TASK>
[   25.827840]  dump_stack_lvl+0x73/0xb0
[   25.827872]  print_report+0xd1/0x650
[   25.827897]  ? __virt_addr_valid+0x1db/0x2d0
[   25.827922]  ? kasan_atomics_helper+0xa2b/0x5450
[   25.827945]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.827973]  ? kasan_atomics_helper+0xa2b/0x5450
[   25.827995]  kasan_report+0x141/0x180
[   25.828018]  ? kasan_atomics_helper+0xa2b/0x5450
[   25.828045]  kasan_check_range+0x10c/0x1c0
[   25.828069]  __kasan_check_write+0x18/0x20
[   25.828092]  kasan_atomics_helper+0xa2b/0x5450
[   25.828117]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.828141]  ? kasan_save_alloc_info+0x3b/0x50
[   25.828169]  kasan_atomics+0x1dc/0x310
[   25.828193]  ? __pfx_kasan_atomics+0x10/0x10
[   25.828218]  ? __pfx_read_tsc+0x10/0x10
[   25.828242]  ? ktime_get_ts64+0x86/0x230
[   25.828267]  kunit_try_run_case+0x1a5/0x480
[   25.828295]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.828329]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.828353]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.828376]  ? __kthread_parkme+0x82/0x180
[   25.828398]  ? preempt_count_sub+0x50/0x80
[   25.828425]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.828451]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.828476]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.828516]  kthread+0x337/0x6f0
[   25.828538]  ? trace_preempt_on+0x20/0xc0
[   25.828563]  ? __pfx_kthread+0x10/0x10
[   25.828585]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.828611]  ? calculate_sigpending+0x7b/0xa0
[   25.828636]  ? __pfx_kthread+0x10/0x10
[   25.828659]  ret_from_fork+0x116/0x1d0
[   25.828680]  ? __pfx_kthread+0x10/0x10
[   25.828703]  ret_from_fork_asm+0x1a/0x30
[   25.828736]  </TASK>
[   25.828749] 
[   25.842172] Allocated by task 313:
[   25.842518]  kasan_save_stack+0x45/0x70
[   25.842770]  kasan_save_track+0x18/0x40
[   25.842954]  kasan_save_alloc_info+0x3b/0x50
[   25.843151]  __kasan_kmalloc+0xb7/0xc0
[   25.843335]  __kmalloc_cache_noprof+0x189/0x420
[   25.843855]  kasan_atomics+0x95/0x310
[   25.844157]  kunit_try_run_case+0x1a5/0x480
[   25.844635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.845047]  kthread+0x337/0x6f0
[   25.845213]  ret_from_fork+0x116/0x1d0
[   25.845401]  ret_from_fork_asm+0x1a/0x30
[   25.846163] 
[   25.846273] The buggy address belongs to the object at ffff88810490f900
[   25.846273]  which belongs to the cache kmalloc-64 of size 64
[   25.847236] The buggy address is located 0 bytes to the right of
[   25.847236]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.848220] 
[   25.848346] The buggy address belongs to the physical page:
[   25.848867] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.849217] flags: 0x200000000000000(node=0|zone=2)
[   25.849448] page_type: f5(slab)
[   25.849925] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.850388] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.851276] page dumped because: kasan: bad access detected
[   25.851779] 
[   25.851874] Memory state around the buggy address:
[   25.852079]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.852380]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.853174] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.853657]                                      ^
[   25.853939]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.854222]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.854798] ==================================================================
[   26.107488] ==================================================================
[   26.108323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450
[   26.108683] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.108917] 
[   26.108997] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.109045] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.109061] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.109084] Call Trace:
[   26.109100]  <TASK>
[   26.109116]  dump_stack_lvl+0x73/0xb0
[   26.109143]  print_report+0xd1/0x650
[   26.109167]  ? __virt_addr_valid+0x1db/0x2d0
[   26.109192]  ? kasan_atomics_helper+0x1148/0x5450
[   26.109215]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.109241]  ? kasan_atomics_helper+0x1148/0x5450
[   26.109264]  kasan_report+0x141/0x180
[   26.109287]  ? kasan_atomics_helper+0x1148/0x5450
[   26.109325]  kasan_check_range+0x10c/0x1c0
[   26.109350]  __kasan_check_write+0x18/0x20
[   26.109374]  kasan_atomics_helper+0x1148/0x5450
[   26.109397]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.109421]  ? kasan_save_alloc_info+0x3b/0x50
[   26.109450]  kasan_atomics+0x1dc/0x310
[   26.109474]  ? __pfx_kasan_atomics+0x10/0x10
[   26.109499]  ? __pfx_read_tsc+0x10/0x10
[   26.109522]  ? ktime_get_ts64+0x86/0x230
[   26.109548]  kunit_try_run_case+0x1a5/0x480
[   26.109574]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.109599]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.109622]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.109645]  ? __kthread_parkme+0x82/0x180
[   26.109666]  ? preempt_count_sub+0x50/0x80
[   26.109691]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.109717]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.109746]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.109771]  kthread+0x337/0x6f0
[   26.109792]  ? trace_preempt_on+0x20/0xc0
[   26.109817]  ? __pfx_kthread+0x10/0x10
[   26.109839]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.109864]  ? calculate_sigpending+0x7b/0xa0
[   26.109889]  ? __pfx_kthread+0x10/0x10
[   26.109912]  ret_from_fork+0x116/0x1d0
[   26.109941]  ? __pfx_kthread+0x10/0x10
[   26.109974]  ret_from_fork_asm+0x1a/0x30
[   26.110006]  </TASK>
[   26.110019] 
[   26.117252] Allocated by task 313:
[   26.117427]  kasan_save_stack+0x45/0x70
[   26.117650]  kasan_save_track+0x18/0x40
[   26.117853]  kasan_save_alloc_info+0x3b/0x50
[   26.118058]  __kasan_kmalloc+0xb7/0xc0
[   26.118237]  __kmalloc_cache_noprof+0x189/0x420
[   26.118450]  kasan_atomics+0x95/0x310
[   26.118654]  kunit_try_run_case+0x1a5/0x480
[   26.118835]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.119077]  kthread+0x337/0x6f0
[   26.119236]  ret_from_fork+0x116/0x1d0
[   26.119397]  ret_from_fork_asm+0x1a/0x30
[   26.119686] 
[   26.119768] The buggy address belongs to the object at ffff88810490f900
[   26.119768]  which belongs to the cache kmalloc-64 of size 64
[   26.120142] The buggy address is located 0 bytes to the right of
[   26.120142]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.120711] 
[   26.120803] The buggy address belongs to the physical page:
[   26.121026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.121261] flags: 0x200000000000000(node=0|zone=2)
[   26.121649] page_type: f5(slab)
[   26.121824] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.122176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.122423] page dumped because: kasan: bad access detected
[   26.122590] 
[   26.122655] Memory state around the buggy address:
[   26.122804]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.123015]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.123226] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.123670]                                      ^
[   26.123890]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.124225]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.124543] ==================================================================
[   25.941797] ==================================================================
[   25.942101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450
[   25.942401] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.942790] 
[   25.942903] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.942951] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.942966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.942989] Call Trace:
[   25.943004]  <TASK>
[   25.943021]  dump_stack_lvl+0x73/0xb0
[   25.943051]  print_report+0xd1/0x650
[   25.943075]  ? __virt_addr_valid+0x1db/0x2d0
[   25.943100]  ? kasan_atomics_helper+0xd47/0x5450
[   25.943123]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.943150]  ? kasan_atomics_helper+0xd47/0x5450
[   25.943173]  kasan_report+0x141/0x180
[   25.943196]  ? kasan_atomics_helper+0xd47/0x5450
[   25.943223]  kasan_check_range+0x10c/0x1c0
[   25.943248]  __kasan_check_write+0x18/0x20
[   25.943272]  kasan_atomics_helper+0xd47/0x5450
[   25.943297]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.943333]  ? kasan_save_alloc_info+0x3b/0x50
[   25.943363]  kasan_atomics+0x1dc/0x310
[   25.943387]  ? __pfx_kasan_atomics+0x10/0x10
[   25.943413]  ? __pfx_read_tsc+0x10/0x10
[   25.943436]  ? ktime_get_ts64+0x86/0x230
[   25.943462]  kunit_try_run_case+0x1a5/0x480
[   25.943502]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.943528]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.943551]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.943575]  ? __kthread_parkme+0x82/0x180
[   25.943597]  ? preempt_count_sub+0x50/0x80
[   25.943622]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.943649]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.943716]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.943747]  kthread+0x337/0x6f0
[   25.943768]  ? trace_preempt_on+0x20/0xc0
[   25.943794]  ? __pfx_kthread+0x10/0x10
[   25.943817]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.943843]  ? calculate_sigpending+0x7b/0xa0
[   25.943868]  ? __pfx_kthread+0x10/0x10
[   25.943891]  ret_from_fork+0x116/0x1d0
[   25.943912]  ? __pfx_kthread+0x10/0x10
[   25.943935]  ret_from_fork_asm+0x1a/0x30
[   25.943967]  </TASK>
[   25.943982] 
[   25.951626] Allocated by task 313:
[   25.952011]  kasan_save_stack+0x45/0x70
[   25.952215]  kasan_save_track+0x18/0x40
[   25.952418]  kasan_save_alloc_info+0x3b/0x50
[   25.952642]  __kasan_kmalloc+0xb7/0xc0
[   25.952851]  __kmalloc_cache_noprof+0x189/0x420
[   25.953069]  kasan_atomics+0x95/0x310
[   25.953248]  kunit_try_run_case+0x1a5/0x480
[   25.953427]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.953941]  kthread+0x337/0x6f0
[   25.954105]  ret_from_fork+0x116/0x1d0
[   25.954236]  ret_from_fork_asm+0x1a/0x30
[   25.954444] 
[   25.954536] The buggy address belongs to the object at ffff88810490f900
[   25.954536]  which belongs to the cache kmalloc-64 of size 64
[   25.955112] The buggy address is located 0 bytes to the right of
[   25.955112]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.955605] 
[   25.955673] The buggy address belongs to the physical page:
[   25.955842] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.956074] flags: 0x200000000000000(node=0|zone=2)
[   25.956229] page_type: f5(slab)
[   25.956468] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.957040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.957383] page dumped because: kasan: bad access detected
[   25.957658] 
[   25.957726] Memory state around the buggy address:
[   25.957881]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.958090]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.958301] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.959000]                                      ^
[   25.959229]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.959609]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.960278] ==================================================================
[   25.583593] ==================================================================
[   25.583876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450
[   25.584342] Read of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.584636] 
[   25.584831] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.584878] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.584893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.584915] Call Trace:
[   25.584929]  <TASK>
[   25.584944]  dump_stack_lvl+0x73/0xb0
[   25.584972]  print_report+0xd1/0x650
[   25.585050]  ? __virt_addr_valid+0x1db/0x2d0
[   25.585078]  ? kasan_atomics_helper+0x3df/0x5450
[   25.585102]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.585131]  ? kasan_atomics_helper+0x3df/0x5450
[   25.585154]  kasan_report+0x141/0x180
[   25.585177]  ? kasan_atomics_helper+0x3df/0x5450
[   25.585204]  kasan_check_range+0x10c/0x1c0
[   25.585229]  __kasan_check_read+0x15/0x20
[   25.585253]  kasan_atomics_helper+0x3df/0x5450
[   25.585277]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.585300]  ? kasan_save_alloc_info+0x3b/0x50
[   25.585341]  kasan_atomics+0x1dc/0x310
[   25.585367]  ? __pfx_kasan_atomics+0x10/0x10
[   25.585391]  ? __pfx_read_tsc+0x10/0x10
[   25.585414]  ? ktime_get_ts64+0x86/0x230
[   25.585439]  kunit_try_run_case+0x1a5/0x480
[   25.585464]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.585489]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.585536]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.585560]  ? __kthread_parkme+0x82/0x180
[   25.585581]  ? preempt_count_sub+0x50/0x80
[   25.585606]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.585632]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.585657]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.585718]  kthread+0x337/0x6f0
[   25.585747]  ? trace_preempt_on+0x20/0xc0
[   25.585771]  ? __pfx_kthread+0x10/0x10
[   25.585793]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.585819]  ? calculate_sigpending+0x7b/0xa0
[   25.585844]  ? __pfx_kthread+0x10/0x10
[   25.585867]  ret_from_fork+0x116/0x1d0
[   25.585887]  ? __pfx_kthread+0x10/0x10
[   25.585909]  ret_from_fork_asm+0x1a/0x30
[   25.585941]  </TASK>
[   25.585953] 
[   25.593803] Allocated by task 313:
[   25.594015]  kasan_save_stack+0x45/0x70
[   25.594235]  kasan_save_track+0x18/0x40
[   25.594450]  kasan_save_alloc_info+0x3b/0x50
[   25.594675]  __kasan_kmalloc+0xb7/0xc0
[   25.594838]  __kmalloc_cache_noprof+0x189/0x420
[   25.595012]  kasan_atomics+0x95/0x310
[   25.595405]  kunit_try_run_case+0x1a5/0x480
[   25.595612]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.595786]  kthread+0x337/0x6f0
[   25.595906]  ret_from_fork+0x116/0x1d0
[   25.596034]  ret_from_fork_asm+0x1a/0x30
[   25.596337] 
[   25.596442] The buggy address belongs to the object at ffff88810490f900
[   25.596442]  which belongs to the cache kmalloc-64 of size 64
[   25.597028] The buggy address is located 0 bytes to the right of
[   25.597028]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.597442] 
[   25.597580] The buggy address belongs to the physical page:
[   25.597961] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.598390] flags: 0x200000000000000(node=0|zone=2)
[   25.598555] page_type: f5(slab)
[   25.598739] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.599361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.600027] page dumped because: kasan: bad access detected
[   25.600250] 
[   25.600353] Memory state around the buggy address:
[   25.601001]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.601670]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.602133] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.602621]                                      ^
[   25.603199]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.603936]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.604570] ==================================================================
[   26.317066] ==================================================================
[   26.317423] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450
[   26.317809] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.318180] 
[   26.318289] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.318347] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.318361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.318383] Call Trace:
[   26.318401]  <TASK>
[   26.318419]  dump_stack_lvl+0x73/0xb0
[   26.318447]  print_report+0xd1/0x650
[   26.318470]  ? __virt_addr_valid+0x1db/0x2d0
[   26.318515]  ? kasan_atomics_helper+0x15b6/0x5450
[   26.318538]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.318565]  ? kasan_atomics_helper+0x15b6/0x5450
[   26.318588]  kasan_report+0x141/0x180
[   26.318611]  ? kasan_atomics_helper+0x15b6/0x5450
[   26.318638]  kasan_check_range+0x10c/0x1c0
[   26.318663]  __kasan_check_write+0x18/0x20
[   26.318686]  kasan_atomics_helper+0x15b6/0x5450
[   26.318711]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.318735]  ? kasan_save_alloc_info+0x3b/0x50
[   26.318763]  kasan_atomics+0x1dc/0x310
[   26.318787]  ? __pfx_kasan_atomics+0x10/0x10
[   26.318812]  ? __pfx_read_tsc+0x10/0x10
[   26.318834]  ? ktime_get_ts64+0x86/0x230
[   26.318860]  kunit_try_run_case+0x1a5/0x480
[   26.318897]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.318922]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.318945]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.318979]  ? __kthread_parkme+0x82/0x180
[   26.319001]  ? preempt_count_sub+0x50/0x80
[   26.319026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.319052]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.319077]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.319103]  kthread+0x337/0x6f0
[   26.319124]  ? trace_preempt_on+0x20/0xc0
[   26.319148]  ? __pfx_kthread+0x10/0x10
[   26.319169]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.319194]  ? calculate_sigpending+0x7b/0xa0
[   26.319228]  ? __pfx_kthread+0x10/0x10
[   26.319251]  ret_from_fork+0x116/0x1d0
[   26.319271]  ? __pfx_kthread+0x10/0x10
[   26.319292]  ret_from_fork_asm+0x1a/0x30
[   26.319343]  </TASK>
[   26.319356] 
[   26.326648] Allocated by task 313:
[   26.326776]  kasan_save_stack+0x45/0x70
[   26.326911]  kasan_save_track+0x18/0x40
[   26.327041]  kasan_save_alloc_info+0x3b/0x50
[   26.327183]  __kasan_kmalloc+0xb7/0xc0
[   26.327321]  __kmalloc_cache_noprof+0x189/0x420
[   26.327490]  kasan_atomics+0x95/0x310
[   26.327675]  kunit_try_run_case+0x1a5/0x480
[   26.327891]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.328154]  kthread+0x337/0x6f0
[   26.328327]  ret_from_fork+0x116/0x1d0
[   26.328527]  ret_from_fork_asm+0x1a/0x30
[   26.328720] 
[   26.328809] The buggy address belongs to the object at ffff88810490f900
[   26.328809]  which belongs to the cache kmalloc-64 of size 64
[   26.329331] The buggy address is located 0 bytes to the right of
[   26.329331]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.329859] 
[   26.329930] The buggy address belongs to the physical page:
[   26.330099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.330420] flags: 0x200000000000000(node=0|zone=2)
[   26.330700] page_type: f5(slab)
[   26.330868] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.331226] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.331524] page dumped because: kasan: bad access detected
[   26.331741] 
[   26.331835] Memory state around the buggy address:
[   26.332017]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.332314]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.332596] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.332864]                                      ^
[   26.333069]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.333362]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.333593] ==================================================================
[   26.531009] ==================================================================
[   26.531360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450
[   26.532000] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.532339] 
[   26.532447] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.532496] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.532510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.532533] Call Trace:
[   26.532551]  <TASK>
[   26.532570]  dump_stack_lvl+0x73/0xb0
[   26.532599]  print_report+0xd1/0x650
[   26.532622]  ? __virt_addr_valid+0x1db/0x2d0
[   26.532645]  ? kasan_atomics_helper+0x1ce1/0x5450
[   26.532667]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.532694]  ? kasan_atomics_helper+0x1ce1/0x5450
[   26.532717]  kasan_report+0x141/0x180
[   26.532739]  ? kasan_atomics_helper+0x1ce1/0x5450
[   26.532766]  kasan_check_range+0x10c/0x1c0
[   26.532791]  __kasan_check_write+0x18/0x20
[   26.532814]  kasan_atomics_helper+0x1ce1/0x5450
[   26.532838]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.532874]  ? kasan_save_alloc_info+0x3b/0x50
[   26.532903]  kasan_atomics+0x1dc/0x310
[   26.532927]  ? __pfx_kasan_atomics+0x10/0x10
[   26.532951]  ? __pfx_read_tsc+0x10/0x10
[   26.532974]  ? ktime_get_ts64+0x86/0x230
[   26.532999]  kunit_try_run_case+0x1a5/0x480
[   26.533026]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.533050]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.533073]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.533096]  ? __kthread_parkme+0x82/0x180
[   26.533118]  ? preempt_count_sub+0x50/0x80
[   26.533142]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.533168]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.533194]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.533220]  kthread+0x337/0x6f0
[   26.533242]  ? trace_preempt_on+0x20/0xc0
[   26.533266]  ? __pfx_kthread+0x10/0x10
[   26.533288]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.533325]  ? calculate_sigpending+0x7b/0xa0
[   26.533350]  ? __pfx_kthread+0x10/0x10
[   26.533374]  ret_from_fork+0x116/0x1d0
[   26.533394]  ? __pfx_kthread+0x10/0x10
[   26.533416]  ret_from_fork_asm+0x1a/0x30
[   26.533449]  </TASK>
[   26.533465] 
[   26.540493] Allocated by task 313:
[   26.540623]  kasan_save_stack+0x45/0x70
[   26.540758]  kasan_save_track+0x18/0x40
[   26.540889]  kasan_save_alloc_info+0x3b/0x50
[   26.541035]  __kasan_kmalloc+0xb7/0xc0
[   26.541167]  __kmalloc_cache_noprof+0x189/0x420
[   26.542159]  kasan_atomics+0x95/0x310
[   26.542806]  kunit_try_run_case+0x1a5/0x480
[   26.543257]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.543885]  kthread+0x337/0x6f0
[   26.544456]  ret_from_fork+0x116/0x1d0
[   26.544989]  ret_from_fork_asm+0x1a/0x30
[   26.545614] 
[   26.545808] The buggy address belongs to the object at ffff88810490f900
[   26.545808]  which belongs to the cache kmalloc-64 of size 64
[   26.547175] The buggy address is located 0 bytes to the right of
[   26.547175]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.548396] 
[   26.548659] The buggy address belongs to the physical page:
[   26.549275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.550114] flags: 0x200000000000000(node=0|zone=2)
[   26.550623] page_type: f5(slab)
[   26.551131] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.551815] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.552683] page dumped because: kasan: bad access detected
[   26.553279] 
[   26.553403] Memory state around the buggy address:
[   26.553973]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.554616]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.555282] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.555881]                                      ^
[   26.556459]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.557245]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.557692] ==================================================================
[   26.368420] ==================================================================
[   26.368834] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450
[   26.369165] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.369519] 
[   26.369624] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.369671] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.369685] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.369707] Call Trace:
[   26.369723]  <TASK>
[   26.369746]  dump_stack_lvl+0x73/0xb0
[   26.369775]  print_report+0xd1/0x650
[   26.369798]  ? __virt_addr_valid+0x1db/0x2d0
[   26.369823]  ? kasan_atomics_helper+0x177f/0x5450
[   26.369844]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.369871]  ? kasan_atomics_helper+0x177f/0x5450
[   26.369894]  kasan_report+0x141/0x180
[   26.369917]  ? kasan_atomics_helper+0x177f/0x5450
[   26.369944]  kasan_check_range+0x10c/0x1c0
[   26.369969]  __kasan_check_write+0x18/0x20
[   26.369994]  kasan_atomics_helper+0x177f/0x5450
[   26.370017]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.370042]  ? kasan_save_alloc_info+0x3b/0x50
[   26.370071]  kasan_atomics+0x1dc/0x310
[   26.370095]  ? __pfx_kasan_atomics+0x10/0x10
[   26.370120]  ? __pfx_read_tsc+0x10/0x10
[   26.370143]  ? ktime_get_ts64+0x86/0x230
[   26.370169]  kunit_try_run_case+0x1a5/0x480
[   26.370196]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.370221]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.370245]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.370268]  ? __kthread_parkme+0x82/0x180
[   26.370290]  ? preempt_count_sub+0x50/0x80
[   26.370325]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.370353]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.370378]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.370404]  kthread+0x337/0x6f0
[   26.370425]  ? trace_preempt_on+0x20/0xc0
[   26.370450]  ? __pfx_kthread+0x10/0x10
[   26.370492]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.370519]  ? calculate_sigpending+0x7b/0xa0
[   26.370544]  ? __pfx_kthread+0x10/0x10
[   26.370567]  ret_from_fork+0x116/0x1d0
[   26.370588]  ? __pfx_kthread+0x10/0x10
[   26.370611]  ret_from_fork_asm+0x1a/0x30
[   26.370642]  </TASK>
[   26.370655] 
[   26.377900] Allocated by task 313:
[   26.378098]  kasan_save_stack+0x45/0x70
[   26.378297]  kasan_save_track+0x18/0x40
[   26.378461]  kasan_save_alloc_info+0x3b/0x50
[   26.378692]  __kasan_kmalloc+0xb7/0xc0
[   26.378880]  __kmalloc_cache_noprof+0x189/0x420
[   26.379067]  kasan_atomics+0x95/0x310
[   26.379259]  kunit_try_run_case+0x1a5/0x480
[   26.379461]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.379709]  kthread+0x337/0x6f0
[   26.379827]  ret_from_fork+0x116/0x1d0
[   26.379953]  ret_from_fork_asm+0x1a/0x30
[   26.380089] 
[   26.380155] The buggy address belongs to the object at ffff88810490f900
[   26.380155]  which belongs to the cache kmalloc-64 of size 64
[   26.380536] The buggy address is located 0 bytes to the right of
[   26.380536]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.381043] 
[   26.381137] The buggy address belongs to the physical page:
[   26.381399] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.381774] flags: 0x200000000000000(node=0|zone=2)
[   26.382004] page_type: f5(slab)
[   26.382170] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.382538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.382896] page dumped because: kasan: bad access detected
[   26.383147] 
[   26.383237] Memory state around the buggy address:
[   26.383506]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.383802]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.384062] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.384271]                                      ^
[   26.384430]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.384666]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.384898] ==================================================================
[   25.960734] ==================================================================
[   25.960964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450
[   25.961186] Write of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.961419] 
[   25.961501] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.961549] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.961563] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.961585] Call Trace:
[   25.961603]  <TASK>
[   25.961620]  dump_stack_lvl+0x73/0xb0
[   25.961647]  print_report+0xd1/0x650
[   25.961671]  ? __virt_addr_valid+0x1db/0x2d0
[   25.961695]  ? kasan_atomics_helper+0xde0/0x5450
[   25.961716]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.961748]  ? kasan_atomics_helper+0xde0/0x5450
[   25.961770]  kasan_report+0x141/0x180
[   25.961792]  ? kasan_atomics_helper+0xde0/0x5450
[   25.961820]  kasan_check_range+0x10c/0x1c0
[   25.961906]  __kasan_check_write+0x18/0x20
[   25.961931]  kasan_atomics_helper+0xde0/0x5450
[   25.961956]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.961981]  ? kasan_save_alloc_info+0x3b/0x50
[   25.962010]  kasan_atomics+0x1dc/0x310
[   25.962034]  ? __pfx_kasan_atomics+0x10/0x10
[   25.962060]  ? __pfx_read_tsc+0x10/0x10
[   25.962083]  ? ktime_get_ts64+0x86/0x230
[   25.962110]  kunit_try_run_case+0x1a5/0x480
[   25.962136]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.962161]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.962184]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.962207]  ? __kthread_parkme+0x82/0x180
[   25.962230]  ? preempt_count_sub+0x50/0x80
[   25.962254]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.962280]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.962316]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.962343]  kthread+0x337/0x6f0
[   25.962365]  ? trace_preempt_on+0x20/0xc0
[   25.962389]  ? __pfx_kthread+0x10/0x10
[   25.962411]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.962438]  ? calculate_sigpending+0x7b/0xa0
[   25.962465]  ? __pfx_kthread+0x10/0x10
[   25.962488]  ret_from_fork+0x116/0x1d0
[   25.962516]  ? __pfx_kthread+0x10/0x10
[   25.962538]  ret_from_fork_asm+0x1a/0x30
[   25.962571]  </TASK>
[   25.962583] 
[   25.970181] Allocated by task 313:
[   25.970415]  kasan_save_stack+0x45/0x70
[   25.970666]  kasan_save_track+0x18/0x40
[   25.970843]  kasan_save_alloc_info+0x3b/0x50
[   25.970988]  __kasan_kmalloc+0xb7/0xc0
[   25.971115]  __kmalloc_cache_noprof+0x189/0x420
[   25.971265]  kasan_atomics+0x95/0x310
[   25.971404]  kunit_try_run_case+0x1a5/0x480
[   25.971548]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.971717]  kthread+0x337/0x6f0
[   25.971883]  ret_from_fork+0x116/0x1d0
[   25.972105]  ret_from_fork_asm+0x1a/0x30
[   25.972316] 
[   25.972409] The buggy address belongs to the object at ffff88810490f900
[   25.972409]  which belongs to the cache kmalloc-64 of size 64
[   25.972933] The buggy address is located 0 bytes to the right of
[   25.972933]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.973504] 
[   25.973588] The buggy address belongs to the physical page:
[   25.973822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.974125] flags: 0x200000000000000(node=0|zone=2)
[   25.974285] page_type: f5(slab)
[   25.975440] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.976412] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.977480] page dumped because: kasan: bad access detected
[   25.978506] 
[   25.979034] Memory state around the buggy address:
[   25.980123]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.980957]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.982220] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.982469]                                      ^
[   25.983286]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.984359]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.985111] ==================================================================
[   26.809039] ==================================================================
[   26.809410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450
[   26.809943] Write of size 8 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.810293] 
[   26.810392] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.810444] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.810458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.810484] Call Trace:
[   26.810507]  <TASK>
[   26.810537]  dump_stack_lvl+0x73/0xb0
[   26.810606]  print_report+0xd1/0x650
[   26.810632]  ? __virt_addr_valid+0x1db/0x2d0
[   26.810683]  ? kasan_atomics_helper+0x224c/0x5450
[   26.810706]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.810733]  ? kasan_atomics_helper+0x224c/0x5450
[   26.810756]  kasan_report+0x141/0x180
[   26.810780]  ? kasan_atomics_helper+0x224c/0x5450
[   26.810836]  kasan_check_range+0x10c/0x1c0
[   26.810861]  __kasan_check_write+0x18/0x20
[   26.810885]  kasan_atomics_helper+0x224c/0x5450
[   26.810909]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.810931]  ? kasan_save_alloc_info+0x3b/0x50
[   26.810988]  kasan_atomics+0x1dc/0x310
[   26.811012]  ? __pfx_kasan_atomics+0x10/0x10
[   26.811037]  ? __pfx_read_tsc+0x10/0x10
[   26.811060]  ? ktime_get_ts64+0x86/0x230
[   26.811086]  kunit_try_run_case+0x1a5/0x480
[   26.811113]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.811138]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.811161]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.811184]  ? __kthread_parkme+0x82/0x180
[   26.811207]  ? preempt_count_sub+0x50/0x80
[   26.811233]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.811260]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.811285]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.811322]  kthread+0x337/0x6f0
[   26.811373]  ? trace_preempt_on+0x20/0xc0
[   26.811399]  ? __pfx_kthread+0x10/0x10
[   26.811420]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.811446]  ? calculate_sigpending+0x7b/0xa0
[   26.811472]  ? __pfx_kthread+0x10/0x10
[   26.811494]  ret_from_fork+0x116/0x1d0
[   26.811514]  ? __pfx_kthread+0x10/0x10
[   26.811565]  ret_from_fork_asm+0x1a/0x30
[   26.811598]  </TASK>
[   26.811612] 
[   26.820256] Allocated by task 313:
[   26.820579]  kasan_save_stack+0x45/0x70
[   26.820714]  kasan_save_track+0x18/0x40
[   26.820840]  kasan_save_alloc_info+0x3b/0x50
[   26.820976]  __kasan_kmalloc+0xb7/0xc0
[   26.821139]  __kmalloc_cache_noprof+0x189/0x420
[   26.821287]  kasan_atomics+0x95/0x310
[   26.821421]  kunit_try_run_case+0x1a5/0x480
[   26.821896]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.822383]  kthread+0x337/0x6f0
[   26.822774]  ret_from_fork+0x116/0x1d0
[   26.823138]  ret_from_fork_asm+0x1a/0x30
[   26.823533] 
[   26.823707] The buggy address belongs to the object at ffff88810490f900
[   26.823707]  which belongs to the cache kmalloc-64 of size 64
[   26.824173] The buggy address is located 0 bytes to the right of
[   26.824173]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.824631] 
[   26.824813] The buggy address belongs to the physical page:
[   26.825327] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.826114] flags: 0x200000000000000(node=0|zone=2)
[   26.826579] page_type: f5(slab)
[   26.826966] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.827657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.828422] page dumped because: kasan: bad access detected
[   26.829008] 
[   26.829080] Memory state around the buggy address:
[   26.829444]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.830019]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.830847] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.831048]                                      ^
[   26.831192]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.831407]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.831928] ==================================================================
[   26.053888] ==================================================================
[   26.054432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450
[   26.055104] Read of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.055376] 
[   26.055472] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.055533] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.055559] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.055581] Call Trace:
[   26.055595]  <TASK>
[   26.055612]  dump_stack_lvl+0x73/0xb0
[   26.055642]  print_report+0xd1/0x650
[   26.055666]  ? __virt_addr_valid+0x1db/0x2d0
[   26.055691]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.055714]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.055750]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.055774]  kasan_report+0x141/0x180
[   26.055797]  ? kasan_atomics_helper+0x4a36/0x5450
[   26.055835]  __asan_report_load4_noabort+0x18/0x20
[   26.055859]  kasan_atomics_helper+0x4a36/0x5450
[   26.055882]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.055905]  ? kasan_save_alloc_info+0x3b/0x50
[   26.055933]  kasan_atomics+0x1dc/0x310
[   26.055956]  ? __pfx_kasan_atomics+0x10/0x10
[   26.055982]  ? __pfx_read_tsc+0x10/0x10
[   26.056004]  ? ktime_get_ts64+0x86/0x230
[   26.056029]  kunit_try_run_case+0x1a5/0x480
[   26.056056]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.056080]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.056103]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.056126]  ? __kthread_parkme+0x82/0x180
[   26.056148]  ? preempt_count_sub+0x50/0x80
[   26.056182]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.056209]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.056235]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.056271]  kthread+0x337/0x6f0
[   26.056292]  ? trace_preempt_on+0x20/0xc0
[   26.056326]  ? __pfx_kthread+0x10/0x10
[   26.056348]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.056381]  ? calculate_sigpending+0x7b/0xa0
[   26.056406]  ? __pfx_kthread+0x10/0x10
[   26.056439]  ret_from_fork+0x116/0x1d0
[   26.056459]  ? __pfx_kthread+0x10/0x10
[   26.056481]  ret_from_fork_asm+0x1a/0x30
[   26.056522]  </TASK>
[   26.056535] 
[   26.063845] Allocated by task 313:
[   26.064032]  kasan_save_stack+0x45/0x70
[   26.064256]  kasan_save_track+0x18/0x40
[   26.064460]  kasan_save_alloc_info+0x3b/0x50
[   26.064672]  __kasan_kmalloc+0xb7/0xc0
[   26.064834]  __kmalloc_cache_noprof+0x189/0x420
[   26.064985]  kasan_atomics+0x95/0x310
[   26.065112]  kunit_try_run_case+0x1a5/0x480
[   26.065254]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.065524]  kthread+0x337/0x6f0
[   26.065688]  ret_from_fork+0x116/0x1d0
[   26.065870]  ret_from_fork_asm+0x1a/0x30
[   26.066060] 
[   26.066150] The buggy address belongs to the object at ffff88810490f900
[   26.066150]  which belongs to the cache kmalloc-64 of size 64
[   26.066823] The buggy address is located 0 bytes to the right of
[   26.066823]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.067176] 
[   26.067313] The buggy address belongs to the physical page:
[   26.067641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.068316] flags: 0x200000000000000(node=0|zone=2)
[   26.068560] page_type: f5(slab)
[   26.068735] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.069005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.069356] page dumped because: kasan: bad access detected
[   26.069592] 
[   26.069702] Memory state around the buggy address:
[   26.069890]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.070102]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.070331] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.070655]                                      ^
[   26.070873]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.071185]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.071484] ==================================================================
[   26.200908] ==================================================================
[   26.201638] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450
[   26.201976] Read of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   26.202259] 
[   26.202370] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   26.202418] Tainted: [B]=BAD_PAGE, [N]=TEST
[   26.202433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   26.202455] Call Trace:
[   26.203044]  <TASK>
[   26.203084]  dump_stack_lvl+0x73/0xb0
[   26.203120]  print_report+0xd1/0x650
[   26.203144]  ? __virt_addr_valid+0x1db/0x2d0
[   26.203170]  ? kasan_atomics_helper+0x49ce/0x5450
[   26.203388]  ? kasan_complete_mode_report_info+0x2a/0x200
[   26.203436]  ? kasan_atomics_helper+0x49ce/0x5450
[   26.203462]  kasan_report+0x141/0x180
[   26.203508]  ? kasan_atomics_helper+0x49ce/0x5450
[   26.203535]  __asan_report_load4_noabort+0x18/0x20
[   26.203561]  kasan_atomics_helper+0x49ce/0x5450
[   26.203586]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   26.203609]  ? kasan_save_alloc_info+0x3b/0x50
[   26.203639]  kasan_atomics+0x1dc/0x310
[   26.203663]  ? __pfx_kasan_atomics+0x10/0x10
[   26.203692]  ? __pfx_read_tsc+0x10/0x10
[   26.203717]  ? ktime_get_ts64+0x86/0x230
[   26.203744]  kunit_try_run_case+0x1a5/0x480
[   26.203771]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.203795]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   26.203819]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   26.203842]  ? __kthread_parkme+0x82/0x180
[   26.203864]  ? preempt_count_sub+0x50/0x80
[   26.203890]  ? __pfx_kunit_try_run_case+0x10/0x10
[   26.203918]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.203944]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   26.203973]  kthread+0x337/0x6f0
[   26.203994]  ? trace_preempt_on+0x20/0xc0
[   26.204019]  ? __pfx_kthread+0x10/0x10
[   26.204041]  ? _raw_spin_unlock_irq+0x47/0x80
[   26.204067]  ? calculate_sigpending+0x7b/0xa0
[   26.204092]  ? __pfx_kthread+0x10/0x10
[   26.204116]  ret_from_fork+0x116/0x1d0
[   26.204137]  ? __pfx_kthread+0x10/0x10
[   26.204159]  ret_from_fork_asm+0x1a/0x30
[   26.204191]  </TASK>
[   26.204205] 
[   26.215223] Allocated by task 313:
[   26.215403]  kasan_save_stack+0x45/0x70
[   26.215595]  kasan_save_track+0x18/0x40
[   26.215771]  kasan_save_alloc_info+0x3b/0x50
[   26.215962]  __kasan_kmalloc+0xb7/0xc0
[   26.216126]  __kmalloc_cache_noprof+0x189/0x420
[   26.216724]  kasan_atomics+0x95/0x310
[   26.217036]  kunit_try_run_case+0x1a5/0x480
[   26.217429]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   26.217709]  kthread+0x337/0x6f0
[   26.217872]  ret_from_fork+0x116/0x1d0
[   26.218044]  ret_from_fork_asm+0x1a/0x30
[   26.218221] 
[   26.218317] The buggy address belongs to the object at ffff88810490f900
[   26.218317]  which belongs to the cache kmalloc-64 of size 64
[   26.218721] The buggy address is located 0 bytes to the right of
[   26.218721]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   26.219214] 
[   26.219285] The buggy address belongs to the physical page:
[   26.219557] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   26.219933] flags: 0x200000000000000(node=0|zone=2)
[   26.220148] page_type: f5(slab)
[   26.220299] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   26.220670] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   26.220997] page dumped because: kasan: bad access detected
[   26.221232] 
[   26.221332] Memory state around the buggy address:
[   26.221566]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.221874]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   26.222122] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   26.222394]                                      ^
[   26.222651]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.222968]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   26.223179] ==================================================================
[   25.544892] ==================================================================
[   25.545147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450
[   25.545524] Read of size 4 at addr ffff88810490f930 by task kunit_try_catch/313
[   25.546089] 
[   25.546181] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc4-next-20250702 #1 PREEMPT(voluntary) 
[   25.546227] Tainted: [B]=BAD_PAGE, [N]=TEST
[   25.546239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   25.546259] Call Trace:
[   25.546274]  <TASK>
[   25.546287]  dump_stack_lvl+0x73/0xb0
[   25.546326]  print_report+0xd1/0x650
[   25.546348]  ? __virt_addr_valid+0x1db/0x2d0
[   25.546370]  ? kasan_atomics_helper+0x4b88/0x5450
[   25.546390]  ? kasan_complete_mode_report_info+0x2a/0x200
[   25.546415]  ? kasan_atomics_helper+0x4b88/0x5450
[   25.546437]  kasan_report+0x141/0x180
[   25.546459]  ? kasan_atomics_helper+0x4b88/0x5450
[   25.546507]  __asan_report_load4_noabort+0x18/0x20
[   25.546531]  kasan_atomics_helper+0x4b88/0x5450
[   25.546553]  ? __pfx_kasan_atomics_helper+0x10/0x10
[   25.546576]  ? kasan_save_alloc_info+0x3b/0x50
[   25.546603]  kasan_atomics+0x1dc/0x310
[   25.546625]  ? __pfx_kasan_atomics+0x10/0x10
[   25.546648]  ? __pfx_read_tsc+0x10/0x10
[   25.546669]  ? ktime_get_ts64+0x86/0x230
[   25.546692]  kunit_try_run_case+0x1a5/0x480
[   25.546717]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.546741]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   25.546762]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   25.546784]  ? __kthread_parkme+0x82/0x180
[   25.546804]  ? preempt_count_sub+0x50/0x80
[   25.546827]  ? __pfx_kunit_try_run_case+0x10/0x10
[   25.546853]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.546880]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   25.546906]  kthread+0x337/0x6f0
[   25.546928]  ? trace_preempt_on+0x20/0xc0
[   25.546951]  ? __pfx_kthread+0x10/0x10
[   25.546973]  ? _raw_spin_unlock_irq+0x47/0x80
[   25.546999]  ? calculate_sigpending+0x7b/0xa0
[   25.547024]  ? __pfx_kthread+0x10/0x10
[   25.547047]  ret_from_fork+0x116/0x1d0
[   25.547067]  ? __pfx_kthread+0x10/0x10
[   25.547089]  ret_from_fork_asm+0x1a/0x30
[   25.547122]  </TASK>
[   25.547134] 
[   25.555065] Allocated by task 313:
[   25.555212]  kasan_save_stack+0x45/0x70
[   25.555377]  kasan_save_track+0x18/0x40
[   25.555748]  kasan_save_alloc_info+0x3b/0x50
[   25.555956]  __kasan_kmalloc+0xb7/0xc0
[   25.556085]  __kmalloc_cache_noprof+0x189/0x420
[   25.556235]  kasan_atomics+0x95/0x310
[   25.556451]  kunit_try_run_case+0x1a5/0x480
[   25.556842]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   25.557114]  kthread+0x337/0x6f0
[   25.557272]  ret_from_fork+0x116/0x1d0
[   25.557465]  ret_from_fork_asm+0x1a/0x30
[   25.557657] 
[   25.557752] The buggy address belongs to the object at ffff88810490f900
[   25.557752]  which belongs to the cache kmalloc-64 of size 64
[   25.558276] The buggy address is located 0 bytes to the right of
[   25.558276]  allocated 48-byte region [ffff88810490f900, ffff88810490f930)
[   25.558948] 
[   25.559049] The buggy address belongs to the physical page:
[   25.559252] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10490f
[   25.559562] flags: 0x200000000000000(node=0|zone=2)
[   25.560028] page_type: f5(slab)
[   25.560201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
[   25.560614] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
[   25.561025] page dumped because: kasan: bad access detected
[   25.561215] 
[   25.561282] Memory state around the buggy address:
[   25.561447]  ffff88810490f800: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.562069]  ffff88810490f880: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc
[   25.562744] >ffff88810490f900: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc
[   25.563025]                                      ^
[   25.563176]  ffff88810490f980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.563512]  ffff88810490fa00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   25.563962] ==================================================================